<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>EKE — Everyday Knowledge Engine</title>
    <description>Bite-sized knowledge episodes on science, history, culture, and everyday topics. AI-generated expert conversations that make complex subjects accessible.</description>
    <link>https://idallasj.github.io/pke/eke/feed.xml</link>
    <language>en-us</language>
    <atom:link href="https://idallasj.github.io/pke/eke/feed.xml" rel="self" type="application/rss+xml" />
    <itunes:author>Isaiah Jefferson</itunes:author>
    <itunes:owner>
      <itunes:name>Isaiah Jefferson</itunes:name>
      <itunes:email>idallasj@gmail.com</itunes:email>
    </itunes:owner>
    <itunes:image href="https://idallasj.github.io/pke/eke/cover.png" />
    <itunes:category text="Education">
      <itunes:category text="Self-Improvement" />
    </itunes:category>
    <itunes:explicit>no</itunes:explicit>
    <itunes:type>episodic</itunes:type>

    <item>
      <title>GS-ITILV4-TRANSFORMATION Ep. 1/1: Why an OT Organization Adopted ITILv4 — And How They're Making It Stick</title>
      <description>How a global BESS operations team adopted ITIL v4 as a service management framework — the org structure changes, resistance they faced, and how they went from 79% to 85% ITILv4 practice coverage across all 34 practices.</description>
      <itunes:summary>How a global BESS operations team adopted ITIL v4 as a service management framework — the org structure changes, resistance they faced, and how they went from 79% to 85% ITILv4 practice coverage across all 34 practices.</itunes:summary>
      <content:encoded><![CDATA[<h1>Episode 1: Why an OT Organization Adopted ITILv4 — And How They're Making It Stick</h1>
<p><strong>Guest:</strong> Dr. Matilda Reyes, ITIL v4 Managing Professional<br />
<strong>Host:</strong> George<br />
<strong>Duration:</strong> ~25 minutes<br />
<strong>Topic:</strong> Service management transformation in operational technology environments</p>
<h2>What to Remember</h2>
<p>ITIL v4 isn't about IT departments—it's about any organization delivering managed services to paying customers under contractual obligations, whether those services run on servers or battery storage systems.</p>
<h2>The Core Problem (0:00-3:00)</h2>
<p>A global battery energy storage (BESS) company was world-class at operational technology but struggled with:</p>
<ul>
<li>Stuck customer satisfaction scores</li>
<li>Inconsistent SLA performance</li>
<li>Burnout from heroic individuals keeping systems running</li>
<li>Scaling challenges as they grew</li>
</ul>
<p><strong>Key Insight:</strong> They weren't selling hardware—they were selling uptime, response times, and grid reliability under 20-year service agreements.</p>
<h2>The Three Forms of Resistance (3:00-8:00)</h2>
<h3>1. &quot;We're Not IT&quot; Objection</h3>
<p><strong>Problem:</strong> Teams reject ITIL as irrelevant to operational technology
<strong>Reframe:</strong> ITIL stands for Information Technology Infrastructure Library, but it covers any organization delivering managed services using people, processes, technology, and partners
<strong>Test Question:</strong> Do you deliver managed services to paying customers under contractual obligations?</p>
<h3>2. &quot;I Have 20+ Years Experience&quot; Objection</h3>
<p><strong>Problem:</strong> Experienced leaders see frameworks as unnecessary
<strong>Response:</strong> ITIL makes hard-won knowledge transferable, auditable, and scalable beyond individual expertise
<strong>Critical Question:</strong> What happens to service quality when you're not personally available?</p>
<h3>3. Performative Compliance</h3>
<p><strong>Problem:</strong> Teams say the right words but don't change how they work
<strong>Solution:</strong> Make adoption measurable, tie to customer outcomes, create visible dashboards, recognize early adopters</p>
<h2>The Transformation Structure (8:00-15:00)</h2>
<h3>Organizational Restructure</h3>
<p><strong>Before:</strong> Traditional departmental structure<br />
<strong>After:</strong> Five clear divisions aligned to service delivery:</p>
<ol>
<li><strong>Program Management and Strategy</strong> - Strategic projects, business analysis</li>
<li><strong>Global Asset Intelligence</strong> - Elevated from small team to major division</li>
<li><strong>Service Engineering</strong> - Costs, risk, Field Services Center of Excellence</li>
<li><strong>Regional Operations</strong> - Americas, Europe, APAC territories</li>
<li><strong>Sales Support</strong> - Deal support, offer design</li>
</ol>
<h3>Coverage Audit Results</h3>
<ul>
<li><strong>Before restructure:</strong> 79% coverage (27 of 34 ITIL practices had clear owners)</li>
<li><strong>After restructure:</strong> 85% coverage (29 of 34 practices covered)</li>
<li><strong>Key gaps closed:</strong> Architecture Management, Project Management, Obsolescence Management</li>
</ul>
<h2>From Heroics to Systems (15:00-20:00)</h2>
<h3>The Shift in Practice</h3>
<p><strong>Old Way:</strong> Brilliant individuals working extraordinary hours<br />
<strong>New Way:</strong> Predictable systems that scale beyond any individual</p>
<h3>Concrete Examples</h3>
<ul>
<li><strong>Problem Management:</strong> Known Error Database captures tribal knowledge organizationally</li>
<li><strong>Incident Management:</strong> Every fault has defined owner, escalation path, resolution clock</li>
<li><strong>Change Management:</strong> All updates assessed, authorized, tested with rollback plans</li>
<li><strong>Service Level Management:</strong> Continuous feedback loop from commitment to delivery</li>
</ul>
<h3>Customer Impact</h3>
<ul>
<li>Faster incident resolution</li>
<li>Fewer repeat failures</li>
<li>Proactive communication about maintenance</li>
<li>Transparent SLA reporting</li>
<li>Self-service portal that works</li>
<li>Field teams arrive knowing site history</li>
</ul>
<h2>The One Degree Principle (20:00-23:00)</h2>
<h3>Core Operating Principle</h3>
<p>Every team member must be at most one degree of separation from paying customers:</p>
<ul>
<li><strong>First degree:</strong> Directly serving customers (field, calls, incidents)</li>
<li><strong>One degree:</strong> Directly enabling customer-facing teams</li>
</ul>
<h3>Internal Dependencies</h3>
<ul>
<li><strong>No &quot;internal customers&quot;</strong> - creates service hierarchies optimizing for internal satisfaction</li>
<li><strong>Use Operational Level Agreements (OLAs)</strong> - internal commitments that enable external SLAs</li>
<li><strong>SLAs face outward, OLAs coordinate inward</strong></li>
</ul>
<h2>Critical Success Factors (23:00-25:00)</h2>
<h3>The Artefact and Dependency Register</h3>
<p><strong>What it captures:</strong></p>
<ul>
<li>What does each team produce?</li>
<li>What do other teams depend on from you?</li>
<li>What inputs do you need from others?</li>
</ul>
<p><strong>Example:</strong> Digital Service Center produces KPI dashboards → Field Operations needs dashboards → But depends on clean data from Regional Operations</p>
<h3>Making It Stick</h3>
<ol>
<li><strong>Map roles</strong> to one degree of separation test</li>
<li><strong>Audit ITIL coverage</strong> - identify practice ownership gaps</li>
<li><strong>Reframe resistance</strong> - focus on managed services, not technology type</li>
<li><strong>Target heroic dependencies</strong> - document knowledge before people leave</li>
<li><strong>Commission dependency mapping</strong> - make invisible dependencies visible</li>
</ol>
<h2>Key Timestamps</h2>
<ul>
<li>0:00 - The $50M contradiction: Why OT adopted ITIL</li>
<li>3:00 - Three forms of resistance and how to address them</li>
<li>8:00 - Organizational restructure and coverage audit</li>
<li>15:00 - From reactive heroics to predictive systems</li>
<li>20:00 - One degree of separation principle</li>
<li>23:00 - Artefact mapping and success factors</li>
</ul>
<h2>Resources</h2>
<ul>
<li><a href="https://www.axelos.com/certifications/itil-service-management/itil-4-foundation">ITIL 4 Foundation Syllabus</a> - Official overview of all 34 practices</li>
<li><a href="https://www.axelos.com/best-practice-solutions/itil/itil-4-practice-guides">ITIL 4 Practice Guides</a> - Free excerpts for specific practices</li>
<li><a href="https://www.smartsheet.com/content/raci-chart-template">RACI Matrix Templates</a> - Free responsibility assignment templates</li>
</ul>
<hr />

<hr />
<h3>Episode Resources</h3>
<ul>
  <li><a href="https://idallasj.github.io/pke/eke/gs-itilv4-transformation/episode_01/cheatsheet.html">Cheat Sheet</a></li>
  <li><a href="https://idallasj.github.io/pke/eke/gs-itilv4-transformation/episode_01/script.html">Full Script</a></li>
  <li><a href="https://idallasj.github.io/pke/eke/gs-itilv4-transformation/episode_01/curriculum.html">Curriculum</a></li>
</ul>
<hr />
<p><a href="https://idallasj.github.io/pke/eke/gs-itilv4-transformation/episode_01/show_notes.html">View full show notes</a></p>]]></content:encoded>
      <pubDate>Mon, 09 Mar 2026 18:09:28 +0000</pubDate>
      <guid isPermaLink="false">https://idallasj.github.io/pke/eke/gs-itilv4-transformation/audio/episode_01.mp3#v3-1773079768</guid>
      <itunes:duration>16:51</itunes:duration>
      <itunes:author>Isaiah Jefferson</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://idallasj.github.io/pke/eke/cover.png" />
      <enclosure url="https://idallasj.github.io/pke/eke/gs-itilv4-transformation/audio/episode_01.mp3" length="16179659" type="audio/mpeg" />
    </item>
    <item>
      <title>INTRODUCING-AGENTSHROUD Ep. 1/1: Introducing AgentShroud — The Security Proxy for Autonomous AI Agents</title>
      <description>AgentShroud is an enterprise-grade transparent security proxy for autonomous AI agents — covering PII redaction, egress firewall, RBAC, prompt injection defense, credential blocking, and full audit trails. Built for production AI deployments where security and compliance matter.</description>
      <itunes:summary>AgentShroud is an enterprise-grade transparent security proxy for autonomous AI agents — covering PII redaction, egress firewall, RBAC, prompt injection defense, credential blocking, and full audit trails. Built for production AI deployments where security and compliance matter.</itunes:summary>
      <content:encoded><![CDATA[<h1>Episode 1: Introducing AgentShroud — The Security Proxy for Autonomous AI Agents</h1>
<p><strong>Guest:</strong> Dr. Matilda Reyes, Cybersecurity Researcher &amp; AI Safety Expert<br />
<strong>Duration:</strong> ~25 minutes<br />
<strong>Release:</strong> Secure AI Podcast</p>
<h2>What to Remember</h2>
<p>AgentShroud is a transparent security proxy that sits between AI agents and external services, providing defense-in-depth protection without requiring any changes to the agent's code.</p>
<h2>The Problem: Autonomous AI Without Security</h2>
<p><strong>[00:00 - 04:30]</strong> AI agents are becoming incredibly capable—reading email, browsing the web, running code, managing infrastructure—but most deployments have zero security layers between the agent and the outside world.</p>
<h3>Five Core Security Risks:</h3>
<ol>
<li><strong>Data Exfiltration</strong> - Agents leak PII, credentials, or proprietary data</li>
<li><strong>Prompt Injection</strong> - Malicious users manipulate agents into unauthorized actions</li>
<li><strong>Unauthorized Access</strong> - Uncontrolled API and database access</li>
<li><strong>Invisible Actions</strong> - No audit trail of agent behavior</li>
<li><strong>Token Abuse</strong> - Users burning through API credits in multi-user systems</li>
</ol>
<h2>The Solution: AgentShroud's Architecture</h2>
<p><strong>[04:30 - 12:00]</strong> AgentShroud uses a &quot;defense in depth&quot; approach with three security pipelines:</p>
<h3>Inbound Pipeline (User → Agent)</h3>
<ul>
<li>Rate limiting (e.g., 20 messages/hour for non-owners)</li>
<li>User role resolution (owner/collaborator/unknown)</li>
<li>Prompt injection detection</li>
<li>Sensitive data redaction</li>
<li>Role-specific restrictions</li>
</ul>
<h3>Outbound Pipeline (Agent → User)</h3>
<ul>
<li>Strips hallucinated tool calls</li>
<li>Blocks credential leaks (API keys, passwords)</li>
<li>Redacts PII (phone numbers, SSNs)</li>
<li>Filters internal infrastructure details</li>
<li>Detects encoding bypass attempts</li>
</ul>
<h3>Egress Pipeline (Agent → External Services)</h3>
<ul>
<li>Domain allowlist with deny-all default</li>
<li>Human-in-the-loop approval for new domains</li>
<li>Real-time Telegram notifications for approval requests</li>
<li>Complete audit logging</li>
</ul>
<h2>Key Security Features</h2>
<p><strong>[12:00 - 18:00]</strong></p>
<h3>Transparent Operation</h3>
<p>The AI agent has no idea AgentShroud exists—it thinks it's talking directly to APIs and services while every request/response flows through security inspection.</p>
<h3>Role-Based Access Control</h3>
<ul>
<li><strong>Owner</strong>: Full access to tools and capabilities</li>
<li><strong>Collaborator</strong>: Zero tool access, hashed identifiers, strict rate limiting</li>
<li><strong>Unknown</strong>: Blocked entirely</li>
</ul>
<h3>Encoding Bypass Detection</h3>
<p>Catches attempts to exfiltrate data using base64 encoding, URL encoding, or other obfuscation techniques by analyzing strings longer than 24 characters.</p>
<h3>Fail-Closed Philosophy</h3>
<p>Everything starts blocked; you explicitly allow what you need. Prevents unknown threats at the cost of initial configuration overhead.</p>
<h2>Real-World Security Gaps</h2>
<p><strong>[18:00 - 22:00]</strong> Most AI agent deployments are missing:</p>
<ol>
<li><strong>No PII redaction</strong> on agent output</li>
<li><strong>No egress control</strong> - agents can reach any URL</li>
<li><strong>No audit trail</strong> of agent actions</li>
<li><strong>No role-based access control</strong></li>
<li><strong>No prompt injection defense</strong></li>
</ol>
<p>These aren't edge cases—they're foundational gaps that attackers are already exploiting.</p>
<h2>Current Status &amp; Future</h2>
<p><strong>[22:00 - 25:00]</strong></p>
<ul>
<li><strong>Version 0.8.0</strong>: &quot;Enforcement hardening phase&quot; with 2,300+ automated tests</li>
<li><strong>Private beta</strong> with active development</li>
<li><strong>Version 0.9</strong>: Production hardening and performance optimization</li>
<li><strong>Version 1.0</strong>: Public release with full documentation</li>
</ul>
<h2>Key Takeaways</h2>
<h3>For Your AI Deployments:</h3>
<ol>
<li><strong>Audit your current setup</strong>: Do you have PII redaction? Egress control? Audit trails?</li>
<li><strong>Implement defense in depth</strong>: Don't rely on single security mechanisms</li>
<li><strong>Use fail-closed defaults</strong>: Unknown activity should be blocked, not allowed</li>
<li><strong>Require role-based access</strong>: Not every user needs the same agent permissions</li>
</ol>
<h3>Why External Security Matters:</h3>
<p>If you embed security into the agent itself, a compromised agent can disable its own security. A transparent proxy is external—the agent can't see it, modify it, or bypass it.</p>
<h2>Become a Collaborator</h2>
<p>AgentShroud is in private beta and accepting collaborators — especially red team testers.</p>
<p><strong>How to connect:</strong></p>
<ol>
<li>Open Telegram (download from telegram.org if you don't have it)</li>
<li>Search for <strong>@agentshroud_bot</strong></li>
<li>Tap Start or send <code>/start</code></li>
<li>That's it — you're connected. Just start chatting.</li>
</ol>
<p>Send your registration info and you'll get approved.</p>
<p><strong>Quick things to try:</strong></p>
<ul>
<li>&quot;What is AgentShroud?&quot; — get an overview</li>
<li>&quot;How does the security architecture work?&quot; — see the pipeline design</li>
<li>&quot;How can I help with red team testing?&quot; — get attack ideas</li>
<li>Try to get it to reveal sensitive data (that's the point!)</li>
</ul>
<blockquote>
<p><strong>Note:</strong> The bot runs through a security proxy, so some things will be intentionally blocked. That's the product working, not a bug. If you find a way around the restrictions — that's exactly what we need to know.</p>
</blockquote>
<h2>Resources</h2>
<ul>
<li><strong>OWASP AI Security and Privacy Guide</strong>: Comprehensive AI security framework</li>
<li><strong>NIST AI Risk Management Framework</strong>: Official US government AI risk guidelines</li>
</ul>
<hr />
<p><em>&quot;Autonomy without oversight is dangerous. But with the right security layers, we can make AI agents both powerful and trustworthy.&quot;</em> — Dr. Matilda Reyes</p>

<hr />
<h3>Episode Resources</h3>
<ul>
  <li><a href="https://idallasj.github.io/pke/eke/introducing-agentshroud/episode_01/cheatsheet.html">Cheat Sheet</a></li>
  <li><a href="https://idallasj.github.io/pke/eke/introducing-agentshroud/episode_01/script.html">Full Script</a></li>
  <li><a href="https://idallasj.github.io/pke/eke/introducing-agentshroud/episode_01/curriculum.html">Curriculum</a></li>
</ul>
<hr />
<p><a href="https://idallasj.github.io/pke/eke/introducing-agentshroud/episode_01/show_notes.html">View full show notes</a></p>]]></content:encoded>
      <pubDate>Mon, 09 Mar 2026 16:27:19 +0000</pubDate>
      <guid isPermaLink="false">https://idallasj.github.io/pke/eke/introducing-agentshroud/audio/episode_01.mp3#v3-1773073639</guid>
      <itunes:duration>17:25</itunes:duration>
      <itunes:author>Isaiah Jefferson</itunes:author>
      <itunes:explicit>no</itunes:explicit>
      <itunes:image href="https://idallasj.github.io/pke/eke/cover.png" />
      <enclosure url="https://idallasj.github.io/pke/eke/introducing-agentshroud/audio/episode_01.mp3" length="16733873" type="audio/mpeg" />
    </item>
  </channel>
</rss>
