<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/2M86zCcc" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>On Location With Sean Martin And Marco Ciappelli</title>
    <description>Whether we are there or not, ITSPmagazine still gets the best stories. Plenty of conferences and events spark our curiosity and allow us to start conversations with some of the world&apos;s brightest minds. In-person or virtually, Sean Martin and Marco Ciappelli go on-location and sit down with them at the intersection of technology, cybersecurity, and society. Together, we discover what the synergy of these three elements means for the future of humanity.</description>
    <copyright>© Copyright 2015-2025 ITSPmagazine, Inc. All Rights Reserved</copyright>
    <language>en</language>
    <pubDate>Fri, 16 Jan 2026 21:45:32 +0000</pubDate>
    <lastBuildDate>Fri, 16 Jan 2026 21:45:43 +0000</lastBuildDate>
    <image>
      <link>https://eventcoveragepodcast.com</link>
      <title>On Location With Sean Martin And Marco Ciappelli</title>
      <url>https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/59eb52af-d3e8-465f-8a93-e517d8e70259/3000x3000/on-location-podcast-cover-3500x3500.jpg?aid=rss_feed</url>
    </image>
    <link>https://eventcoveragepodcast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Whether we are there or not, ITSPmagazine still gets the best stories. Plenty of conferences and events spark our curiosity and allow us to start conversations with some of the world&apos;s brightest minds. In-person or virtually, Sean Martin and Marco Ciappelli go on-location and sit down with them at the intersection of technology, cybersecurity, and society. Together, we discover what the synergy of these three elements means for the future of humanity.</itunes:summary>
    <itunes:author>Sean Martin, ITSPmagazine, Marco Ciappelli</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/59eb52af-d3e8-465f-8a93-e517d8e70259/3000x3000/on-location-podcast-cover-3500x3500.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/2M86zCcc</itunes:new-feed-url>
    <itunes:keywords>artificial intelligence, augmented reality, smartcity, autonomous vehicles, tech, big data, virtual reality, blockchain, ces, cloud computing, cryptocurrency., cybersecurity, fintech, healthtech, infosec, infosecurity, internet of things (iot), robotics, rsac, smart cities</itunes:keywords>
    <itunes:owner>
      <itunes:name>itspmagazine</itunes:name>
      <itunes:email>contact@itspmagazine.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Business"/>
    <itunes:category text="Society &amp; Culture"/>
    <item>
      <guid isPermaLink="false">6d3b68f0-9efa-4fa4-808c-14677d2aa03c</guid>
      <title>Craft, Lineage, and Making Music That Holds | A Conversation with Singer, Songwriter, Guitarist, and She Rocks Awards 2026 Honoree, Margaret Glaspy | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin</title>
      <description><![CDATA[<h3>Show Notes</h3><p>Singer, songwriter, and guitarist <a><strong>Margaret Glaspy</strong></a> joins Sean Martin and Marco Ciappelli for a Music Evolves conversation recorded in the context of the NAMM Show and the She Rocks Awards, where Glaspy is recognized as a 2026 honoree. The discussion centers on how artists develop a voice, how creative practice sustains a career, and why music functions as a form of public service rather than a commodity alone. </p><p>Glaspy shares how growing up in a musically active household normalized creativity and removed the idea that music must be exceptional to be meaningful. Early immersion in Texas-style fiddle competitions, alongside exposure to jazz, songwriter traditions, and alternative rock, shapes a foundation rooted in lineage rather than trend. That sense of lineage continues to guide her current work, where influence is acknowledged openly rather than hidden.</p><p>Songwriting, as Glaspy describes it, is a daily practice rather than an output-driven process. Writing consistently, sometimes a song a day, becomes a way to maintain agency in a career shaped by touring cycles, releases, and expectations. Albums emerge from accumulation and reflection, not from pre-defined concepts. This approach reframes productivity as presence, with creativity tied to well-being and continuity.</p><p>The conversation also explores how artists navigate maturity. Early attempts to emulate heroes eventually give way to self-recognition. Glaspy speaks to the value of being a student of music, letting imitation serve as a bridge to personal expression rather than a destination. That perspective resists the myth of originality in isolation and places artists within an ongoing cultural thread.</p><p>Recognition at the She Rocks Awards introduces another dimension. Glaspy views the honor with humility, emphasizing the importance of creating space to acknowledge women’s contributions in music without turning the work itself into a competition. In that context, the NAMM Show represents the maker side of music, instrument builders, technologists, and craftspeople whose work enables creative expression.</p><p>This episode positions music not as a product to be optimized, but as a practice to be protected, cultivated, and shared.</p><h3>Guest</h3><p><strong>Margaret Glaspy</strong>, Singer, Songwriter, and Guitarist | Website: <a href="https://margaretglaspy.com/" target="_blank">https://margaretglaspy.com/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><h3>Resources</h3><p>2026 She Rocks Awards: <a href="https://sherocksawards.com/" target="_blank">https://sherocksawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>margaret glaspy, sean martin, marco ciappelli, namm, she rocks awards, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast, singer, songwriter, guitarist, guitar playing</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 16 Jan 2026 21:45:32 +0000</pubDate>
      <author>contact@itspmagazine.com (NAMM, ITSPmagazine, Marco Ciappelli, Sean Martin, Margaret Glaspy, She Rocks Awards)</author>
      <link>https://eventcoveragepodcast.com/episodes/craft-lineage-and-making-music-that-holds-a-conversation-with-singer-songwriter-guitarist-and-she-rocks-awards-2026-honoree-margaret-glaspy-the-namm-show-2026-event-coverage-music-evolves-with-sean-martin-SxZ9hQdO</link>
      <content:encoded><![CDATA[<h3>Show Notes</h3><p>Singer, songwriter, and guitarist <a><strong>Margaret Glaspy</strong></a> joins Sean Martin and Marco Ciappelli for a Music Evolves conversation recorded in the context of the NAMM Show and the She Rocks Awards, where Glaspy is recognized as a 2026 honoree. The discussion centers on how artists develop a voice, how creative practice sustains a career, and why music functions as a form of public service rather than a commodity alone. </p><p>Glaspy shares how growing up in a musically active household normalized creativity and removed the idea that music must be exceptional to be meaningful. Early immersion in Texas-style fiddle competitions, alongside exposure to jazz, songwriter traditions, and alternative rock, shapes a foundation rooted in lineage rather than trend. That sense of lineage continues to guide her current work, where influence is acknowledged openly rather than hidden.</p><p>Songwriting, as Glaspy describes it, is a daily practice rather than an output-driven process. Writing consistently, sometimes a song a day, becomes a way to maintain agency in a career shaped by touring cycles, releases, and expectations. Albums emerge from accumulation and reflection, not from pre-defined concepts. This approach reframes productivity as presence, with creativity tied to well-being and continuity.</p><p>The conversation also explores how artists navigate maturity. Early attempts to emulate heroes eventually give way to self-recognition. Glaspy speaks to the value of being a student of music, letting imitation serve as a bridge to personal expression rather than a destination. That perspective resists the myth of originality in isolation and places artists within an ongoing cultural thread.</p><p>Recognition at the She Rocks Awards introduces another dimension. Glaspy views the honor with humility, emphasizing the importance of creating space to acknowledge women’s contributions in music without turning the work itself into a competition. In that context, the NAMM Show represents the maker side of music, instrument builders, technologists, and craftspeople whose work enables creative expression.</p><p>This episode positions music not as a product to be optimized, but as a practice to be protected, cultivated, and shared.</p><h3>Guest</h3><p><strong>Margaret Glaspy</strong>, Singer, Songwriter, and Guitarist | Website: <a href="https://margaretglaspy.com/" target="_blank">https://margaretglaspy.com/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><h3>Resources</h3><p>2026 She Rocks Awards: <a href="https://sherocksawards.com/" target="_blank">https://sherocksawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>margaret glaspy, sean martin, marco ciappelli, namm, she rocks awards, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast, singer, songwriter, guitarist, guitar playing</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22766374" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/432619e7-55ff-48c9-9251-7b2baafbbecf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=432619e7-55ff-48c9-9251-7b2baafbbecf&amp;feed=2M86zCcc"/>
      <itunes:title>Craft, Lineage, and Making Music That Holds | A Conversation with Singer, Songwriter, Guitarist, and She Rocks Awards 2026 Honoree, Margaret Glaspy | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin</itunes:title>
      <itunes:author>NAMM, ITSPmagazine, Marco Ciappelli, Sean Martin, Margaret Glaspy, She Rocks Awards</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/3bd67544-1cf1-45d8-ac86-f66d02c36391/3000x3000/music-20evolves-20-20on-20itspmagazine-20-20cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:42</itunes:duration>
      <itunes:summary>What happens when songwriting is treated as daily practice rather than performance output? Margaret Glaspy shares how lineage, discipline, and curiosity shape a creative life that stays grounded while navigating recognition and industry expectations.</itunes:summary>
      <itunes:subtitle>What happens when songwriting is treated as daily practice rather than performance output? Margaret Glaspy shares how lineage, discipline, and curiosity shape a creative life that stays grounded while navigating recognition and industry expectations.</itunes:subtitle>
      <itunes:keywords>guitarist, marco ciappelli, music, margaret glaspy, sean martin, music podcast, artist, she rocks awards, songwriter, guitar playing, art, singer, creativity, music and technology podcast, namm, musician, music evolves</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>287</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd6e18e9-4998-4f28-b45e-30d629ccaaec</guid>
      <title>Bass Is the Backbone of Music | A Conversation with Bass Magazine Editor in Chief, Jon D’Auria | The NAMM Show 2026 Event Coverage — Bass Magazine Awards | Music Evolves with Sean Martin</title>
      <description><![CDATA[<h3>Show Notes</h3><p>Bass rarely leads the conversation about music innovation, yet it quietly shapes how songs move, how bands connect, and how audiences feel rhythm in their bodies. In this episode of <i>Music Evolves</i>, hosts <strong>Sean Martin</strong> and <strong>Marco Ciappelli</strong> explore that idea with <strong>Jon D’Auria</strong>, Editor in Chief of <i>Bass Magazine</i>, through the lens of community, technology, and cultural relevance.</p><p>D’Auria describes bass not as a background instrument, but as a stabilizing force. It anchors songs while allowing others to shine, a role mirrored by bass players themselves. That identity informs how the bass community operates: collaborative, inclusive, and deeply connected across generations. Events like the <strong>Bass Magazine Awards</strong>, held alongside the <strong>NAMM Show</strong>, are not about spectacle alone. They are about recognition, continuity, and shared lineage.</p><p>Technology plays a central role in how this community grows. Digital publishing allowed <i>Bass Magazine</i> to expand reach beyond the limits of print, creating immediate access to news, gear releases, artist stories, and cultural moments. Social platforms now surface bass players from bedrooms and rehearsal spaces worldwide, creating opportunity while also reshaping how success is measured.</p><p>Innovation, however, is not framed as progress for its own sake. The conversation questions where technology supports creativity and where it distracts from it. Lightweight amps, compact gear, and modeling tools solve real problems for working musicians. AI, on the other hand, introduces unresolved tension. While it lowers barriers to creation, it also challenges authorship, labor, and artistic value.</p><p>Through it all, the episode reinforces a simple truth: music remains human at its core. Technology can amplify access, speed, and scale, but it does not replace intention, emotion, or community. Bass, often overlooked, becomes the perfect metaphor for that balance. Present, essential, and powerful without demanding the spotlight.</p><p>This episode positions bass not just as an instrument, but as a signal of how music culture adapts while staying grounded in human connection.</p><h3>Guest</h3><p>Jon D’Auria, Editor in Chief of Bass Magazine | On LinkedIn: <a href="https://www.linkedin.com/in/jon-d-auria-2a7b5089/" target="_blank">https://www.linkedin.com/in/jon-d-auria-2a7b5089/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><h3>Resources</h3><p>Bass Magazine: <a href="https://bassmagazine.com" target="_blank">https://bassmagazine.com</a></p><p>Bass Magazine Awards: <a href="https://bassmagazineawards.com/" target="_blank">https://bassmagazineawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>sean martin, marco ciappelli, jon dauria, bass magazine, namm, bass, music, technology, community, creativity, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 15 Jan 2026 22:34:45 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, NAMM, Jon D’Auria, Bass Magazine, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/bass-is-the-backbone-of-music-a-conversation-with-bass-magazine-editor-in-chief-jon-dauria-the-namm-show-2026-event-coverage-bass-magazine-awards-music-evolves-with-sean-martin-N1lATisJ</link>
      <content:encoded><![CDATA[<h3>Show Notes</h3><p>Bass rarely leads the conversation about music innovation, yet it quietly shapes how songs move, how bands connect, and how audiences feel rhythm in their bodies. In this episode of <i>Music Evolves</i>, hosts <strong>Sean Martin</strong> and <strong>Marco Ciappelli</strong> explore that idea with <strong>Jon D’Auria</strong>, Editor in Chief of <i>Bass Magazine</i>, through the lens of community, technology, and cultural relevance.</p><p>D’Auria describes bass not as a background instrument, but as a stabilizing force. It anchors songs while allowing others to shine, a role mirrored by bass players themselves. That identity informs how the bass community operates: collaborative, inclusive, and deeply connected across generations. Events like the <strong>Bass Magazine Awards</strong>, held alongside the <strong>NAMM Show</strong>, are not about spectacle alone. They are about recognition, continuity, and shared lineage.</p><p>Technology plays a central role in how this community grows. Digital publishing allowed <i>Bass Magazine</i> to expand reach beyond the limits of print, creating immediate access to news, gear releases, artist stories, and cultural moments. Social platforms now surface bass players from bedrooms and rehearsal spaces worldwide, creating opportunity while also reshaping how success is measured.</p><p>Innovation, however, is not framed as progress for its own sake. The conversation questions where technology supports creativity and where it distracts from it. Lightweight amps, compact gear, and modeling tools solve real problems for working musicians. AI, on the other hand, introduces unresolved tension. While it lowers barriers to creation, it also challenges authorship, labor, and artistic value.</p><p>Through it all, the episode reinforces a simple truth: music remains human at its core. Technology can amplify access, speed, and scale, but it does not replace intention, emotion, or community. Bass, often overlooked, becomes the perfect metaphor for that balance. Present, essential, and powerful without demanding the spotlight.</p><p>This episode positions bass not just as an instrument, but as a signal of how music culture adapts while staying grounded in human connection.</p><h3>Guest</h3><p>Jon D’Auria, Editor in Chief of Bass Magazine | On LinkedIn: <a href="https://www.linkedin.com/in/jon-d-auria-2a7b5089/" target="_blank">https://www.linkedin.com/in/jon-d-auria-2a7b5089/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><h3>Resources</h3><p>Bass Magazine: <a href="https://bassmagazine.com" target="_blank">https://bassmagazine.com</a></p><p>Bass Magazine Awards: <a href="https://bassmagazineawards.com/" target="_blank">https://bassmagazineawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>sean martin, marco ciappelli, jon dauria, bass magazine, namm, bass, music, technology, community, creativity, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36942259" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3b920974-cf12-430f-9a90-4590355a1183/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3b920974-cf12-430f-9a90-4590355a1183&amp;feed=2M86zCcc"/>
      <itunes:title>Bass Is the Backbone of Music | A Conversation with Bass Magazine Editor in Chief, Jon D’Auria | The NAMM Show 2026 Event Coverage — Bass Magazine Awards | Music Evolves with Sean Martin</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, NAMM, Jon D’Auria, Bass Magazine, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/3bd67544-1cf1-45d8-ac86-f66d02c36391/3000x3000/music-20evolves-20-20on-20itspmagazine-20-20cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:38:28</itunes:duration>
      <itunes:summary>Bass may sit low in the mix, but its cultural impact runs deep. This episode explores how community, technology, and restraint shape the future of music through the lens of the bass world.</itunes:summary>
      <itunes:subtitle>Bass may sit low in the mix, but its cultural impact runs deep. This episode explores how community, technology, and restraint shape the future of music through the lens of the bass world.</itunes:subtitle>
      <itunes:keywords>jon dauria, technology, marco ciappelli, music, sean martin, music podcast, artist, bass, art, creativity, bass magazine, music and technology podcast, namm, musician, music evolves, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>286</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">424f447e-6b5b-4161-baaa-82f9d7875f93</guid>
      <title>Building Visibility, Community, and Momentum for Women in Music | A Conversation with Laura Whitmore, Founder of The Women’s International Music Network | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin</title>
      <description><![CDATA[<h3>Show Notes</h3><p>Music careers are often discussed through the lens of performance, technology, or commercial success. Less visible is the connective tissue that sustains those careers: community, advocacy, and long-term support systems. In this episode of Music Evolves: Sonic Frontiers, the conversation centers on how structured networks and intentional recognition shape opportunity across the music industry.</p><p>Laura Whitmore, Founder of The Women’s International Music Network and Senior Vice President of Marketing at Positive Grid, shares how the organization was created to address a simple but persistent issue: women working across music often operate in parallel, rarely connected despite facing similar challenges. The network focuses on bridging that gap by creating shared spaces for visibility, mentorship, and collaboration across roles including artists, executives, engineers, marketers, and legal professionals.</p><p>A central anchor of that effort is the She Rocks Awards, now in its fourteenth year. The awards, taking place during The NAMM Show 2026, highlight women contributing across all layers of the industry, not only those on stage. The emphasis is on storytelling and presence, giving space for honorees to speak openly about career paths, obstacles, and resilience. That visibility has a ripple effect, normalizing leadership diversity and encouraging others to see themselves as part of the industry’s future.</p><p>The discussion also addresses how technology fits into this ecosystem. From AI-assisted music tools to digital platforms that broaden access, innovation plays a role when it amplifies creativity rather than replacing it. The focus remains on preserving human expression while using technology to remove friction and expand reach.</p><p>Another recurring theme is generational continuity. Younger creators and professionals bring new perspectives on consumption, creation, and community. Engaging them early, listening closely, and building inclusive pathways ensures the industry remains relevant and sustainable.</p><p>This episode frames music not only as art or business, but as a shared cultural system. Networks like this one reinforce that progress does not happen automatically. It is built through intentional connection, recognition, and sustained effort.</p><h3>Guest</h3><p><strong>Laura Whitmore</strong>, Founder of The Women’s International Music Network and Senior Vice President of Marketing at Positive Grid | On LinkedIn: <a href="https://www.linkedin.com/in/laurabwhitmore/" target="_blank">https://www.linkedin.com/in/laurabwhitmore/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><h3>Resources</h3><p>The Women's International Music Network: <a href="https://thewimn.com/" target="_blank">https://thewimn.com/</a></p><p>2026 She Rocks Awards: <a href="https://sherocksawards.com/" target="_blank">https://sherocksawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>sean martin, laura whitmore, women’s international music network, she rocks awards, positive grid, namm, music advocacy, music marketing, women in music, music leadership, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Dec 2025 20:14:48 +0000</pubDate>
      <author>contact@itspmagazine.com (NAMM, ITSPmagazine, Sean Martin, Laura Whitmore, Women’s International Music Network)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-visibility-community-and-momentum-for-women-in-music-a-conversation-with-laura-whitmore-founder-of-the-womens-international-music-network-the-namm-show-2026-event-coverage-music-evolves-with-sean-martin-FZeRHrDR</link>
      <content:encoded><![CDATA[<h3>Show Notes</h3><p>Music careers are often discussed through the lens of performance, technology, or commercial success. Less visible is the connective tissue that sustains those careers: community, advocacy, and long-term support systems. In this episode of Music Evolves: Sonic Frontiers, the conversation centers on how structured networks and intentional recognition shape opportunity across the music industry.</p><p>Laura Whitmore, Founder of The Women’s International Music Network and Senior Vice President of Marketing at Positive Grid, shares how the organization was created to address a simple but persistent issue: women working across music often operate in parallel, rarely connected despite facing similar challenges. The network focuses on bridging that gap by creating shared spaces for visibility, mentorship, and collaboration across roles including artists, executives, engineers, marketers, and legal professionals.</p><p>A central anchor of that effort is the She Rocks Awards, now in its fourteenth year. The awards, taking place during The NAMM Show 2026, highlight women contributing across all layers of the industry, not only those on stage. The emphasis is on storytelling and presence, giving space for honorees to speak openly about career paths, obstacles, and resilience. That visibility has a ripple effect, normalizing leadership diversity and encouraging others to see themselves as part of the industry’s future.</p><p>The discussion also addresses how technology fits into this ecosystem. From AI-assisted music tools to digital platforms that broaden access, innovation plays a role when it amplifies creativity rather than replacing it. The focus remains on preserving human expression while using technology to remove friction and expand reach.</p><p>Another recurring theme is generational continuity. Younger creators and professionals bring new perspectives on consumption, creation, and community. Engaging them early, listening closely, and building inclusive pathways ensures the industry remains relevant and sustainable.</p><p>This episode frames music not only as art or business, but as a shared cultural system. Networks like this one reinforce that progress does not happen automatically. It is built through intentional connection, recognition, and sustained effort.</p><h3>Guest</h3><p><strong>Laura Whitmore</strong>, Founder of The Women’s International Music Network and Senior Vice President of Marketing at Positive Grid | On LinkedIn: <a href="https://www.linkedin.com/in/laurabwhitmore/" target="_blank">https://www.linkedin.com/in/laurabwhitmore/</a></p><h3>Host</h3><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><h3>Resources</h3><p>The Women's International Music Network: <a href="https://thewimn.com/" target="_blank">https://thewimn.com/</a></p><p>2026 She Rocks Awards: <a href="https://sherocksawards.com/" target="_blank">https://sherocksawards.com/</a></p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><h3>Keywords</h3><p>sean martin, laura whitmore, women’s international music network, she rocks awards, positive grid, namm, music advocacy, music marketing, women in music, music leadership, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast</p><h3>More From Sean Martin</h3><p>More from Music Evolves: <a href="https://www.seanmartin.com/music-evolves-podcast" target="_blank">https://www.seanmartin.com/music-evolves-podcast</a></p><p>Music Evolves on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtW</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>On Location with Sean and Marco: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>ITSPmagazine YouTube Channel: <a href="https://www.youtube.com/@itspmagazine">https://www.youtube.com/@itspmagazine</a></p><p><strong>Be sure to share and subscribe!</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32708375" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/016a1af8-1772-404b-9e50-72ac8d260a49/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=016a1af8-1772-404b-9e50-72ac8d260a49&amp;feed=2M86zCcc"/>
      <itunes:title>Building Visibility, Community, and Momentum for Women in Music | A Conversation with Laura Whitmore, Founder of The Women’s International Music Network | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin</itunes:title>
      <itunes:author>NAMM, ITSPmagazine, Sean Martin, Laura Whitmore, Women’s International Music Network</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/e855e544-68f9-4e88-accb-f998436a185a/3000x3000/music-20evolves-20-20on-20itspmagazine-20-20cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:04</itunes:duration>
      <itunes:summary>This episode explores how intentional networks and meaningful recognition create long-term opportunity for women across the music industry. The conversation connects advocacy, technology, and community to the future of creative work.</itunes:summary>
      <itunes:subtitle>This episode explores how intentional networks and meaningful recognition create long-term opportunity for women across the music industry. The conversation connects advocacy, technology, and community to the future of creative work.</itunes:subtitle>
      <itunes:keywords>music advocacy, music, women’s international music network, sean martin, music podcast, women in music, music leadership, artist, laura whitmore, she rocks awards, art, music marketing, creativity, music and technology podcast, namm, musician, music evolves, positive grid</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>285</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e4f3788b-3f27-4bd4-bbd5-eb663044464b</guid>
      <title>Music, People, and the Energy That Moves an Industry | The NAMM Show 2026 Event Coverage with John Mlynczak, President and CEO at NAMM | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As NAMM approaches its 125th year, the conversation around The NAMM Show 2026 centers less on products alone and more on the people, relationships, and creative energy that sustain the music industry. In this episode, John Mlynczak, President and CEO of NAMM, joins Sean Martin and Marco Ciappelli to frame the upcoming show as a moment shaped by resilience, adaptation, and shared purpose.</p><p>Mlynczak positions NAMM’s history as a long record of responding to disruption. Musical genres shift. Technologies rise and fall. Companies appear and disappear. Music itself remains. That continuity shapes how NAMM views its role today, particularly amid global trade pressures and ongoing debates around AI in music creation. These pressures are not framed as endpoints, but as forces the industry has encountered many times before, each eventually reshaped into opportunity.</p><p>A major theme is the renewed emphasis on human connection. While innovation remains central, differentiation increasingly comes through artists, creators, and authentic storytelling. Product launches are no longer just technical showcases. They are expressions of identity, collaboration, and trust between musicians and the tools they choose. According to Mlynczak, this shift is driving a larger presence of artists and creators at The NAMM Show 2026, reinforcing the idea that brands are ultimately represented by people, not specifications.</p><p>Education also plays a defining role. With more than 200 sessions planned, alongside new half-day and full-day summits, The NAMM Show 2026 expands its commitment to learning across experience levels and professional communities. Retailers, educators, engineers, marketers, and performers each have distinct paths through the show, designed intentionally rather than left to chance. Data-driven planning allows NAMM to understand how attendees engage, enabling more tailored experiences now and in the years ahead.</p><p>Underlying it all is energy. Not hype, but momentum built through in-person connection. The NAMM Show is described as a space where competitors share ideas, musicians find inspiration, and creativity compounds simply by being present. For those who attend, The NAMM Show 2026 serves as a springboard into the year ahead, shaped by music’s enduring ability to connect, adapt, and move people forward.</p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p><strong>GUEST:</strong></p><p><strong>Guest:</strong> <a href="https://www.linkedin.com/in/ACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA">John Mlynczak</a>, President and CEO of <a href="https://www.linkedin.com/company/namm/">NAMM</a> | <a href="https://www.johnmlynczak.com/">View Website</a> | <a href="https://www.namm.org/">Visit NAMM</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p>NAMM Organization: <a href="https://www.namm.org/">https://www.namm.org/</a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Catch more stories from NAMM Show 2026 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>More from Marco Ciappelli on Redefining Society and Technology Podcast: <a href="https://redefiningsocietyandtechnologypodcast.com/">https://redefiningsocietyandtechnologypodcast.com/</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://www.studioc60.com/performance#briefing" target="_blank">https://www.studioc60.com/performance#briefing</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.studioc60.com/performance#ideas" target="_blank">https://www.studioc60.com/performance#ideas</a></p><p>KEYWORDS: sean martin, marco ciappelli, john mlynczak, the namm show, the namm show 2026, namm 2026, music industry, music technology, music education, artist collaborations, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 16 Dec 2025 17:25:37 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Marco Ciappelli, NAMM, John Mlynczak)</author>
      <link>https://eventcoveragepodcast.com/episodes/music-people-and-the-energy-that-moves-an-industry-the-namm-show-2026-event-coverage-with-john-mlynczak-president-and-ceo-at-namm-on-location-with-sean-martin-and-marco-ciappelli-lQ6hapCn</link>
      <content:encoded><![CDATA[<p>As NAMM approaches its 125th year, the conversation around The NAMM Show 2026 centers less on products alone and more on the people, relationships, and creative energy that sustain the music industry. In this episode, John Mlynczak, President and CEO of NAMM, joins Sean Martin and Marco Ciappelli to frame the upcoming show as a moment shaped by resilience, adaptation, and shared purpose.</p><p>Mlynczak positions NAMM’s history as a long record of responding to disruption. Musical genres shift. Technologies rise and fall. Companies appear and disappear. Music itself remains. That continuity shapes how NAMM views its role today, particularly amid global trade pressures and ongoing debates around AI in music creation. These pressures are not framed as endpoints, but as forces the industry has encountered many times before, each eventually reshaped into opportunity.</p><p>A major theme is the renewed emphasis on human connection. While innovation remains central, differentiation increasingly comes through artists, creators, and authentic storytelling. Product launches are no longer just technical showcases. They are expressions of identity, collaboration, and trust between musicians and the tools they choose. According to Mlynczak, this shift is driving a larger presence of artists and creators at The NAMM Show 2026, reinforcing the idea that brands are ultimately represented by people, not specifications.</p><p>Education also plays a defining role. With more than 200 sessions planned, alongside new half-day and full-day summits, The NAMM Show 2026 expands its commitment to learning across experience levels and professional communities. Retailers, educators, engineers, marketers, and performers each have distinct paths through the show, designed intentionally rather than left to chance. Data-driven planning allows NAMM to understand how attendees engage, enabling more tailored experiences now and in the years ahead.</p><p>Underlying it all is energy. Not hype, but momentum built through in-person connection. The NAMM Show is described as a space where competitors share ideas, musicians find inspiration, and creativity compounds simply by being present. For those who attend, The NAMM Show 2026 serves as a springboard into the year ahead, shaped by music’s enduring ability to connect, adapt, and move people forward.</p><p><strong>The NAMM Show 2026 is taking place from January 20-24, 2026 | </strong>Anaheim Convention Center • Southern California — <i>Coverage provided by ITSPmagazine — Follow our coverage: </i><a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank"><i>https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</i></a></p><p><strong>GUEST:</strong></p><p><strong>Guest:</strong> <a href="https://www.linkedin.com/in/ACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA">John Mlynczak</a>, President and CEO of <a href="https://www.linkedin.com/company/namm/">NAMM</a> | <a href="https://www.johnmlynczak.com/">View Website</a> | <a href="https://www.namm.org/">Visit NAMM</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p>NAMM Organization: <a href="https://www.namm.org/">https://www.namm.org/</a></p><p>The NAMM Show 2026: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Catch more stories from NAMM Show 2026 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026</a></p><p>Music Evolves: Sonic Frontiers Newsletter | <a href="https://www.linkedin.com/newsletters/7290890771828719616/" target="_blank">https://www.linkedin.com/newsletters/7290890771828719616/</a></p><p>More from Marco Ciappelli on Redefining Society and Technology Podcast: <a href="https://redefiningsocietyandtechnologypodcast.com/">https://redefiningsocietyandtechnologypodcast.com/</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://www.studioc60.com/performance#briefing" target="_blank">https://www.studioc60.com/performance#briefing</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.studioc60.com/performance#ideas" target="_blank">https://www.studioc60.com/performance#ideas</a></p><p>KEYWORDS: sean martin, marco ciappelli, john mlynczak, the namm show, the namm show 2026, namm 2026, music industry, music technology, music education, artist collaborations, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33637907" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/49d1e66b-0077-4f47-8bf4-043324721a9b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=49d1e66b-0077-4f47-8bf4-043324721a9b&amp;feed=2M86zCcc"/>
      <itunes:title>Music, People, and the Energy That Moves an Industry | The NAMM Show 2026 Event Coverage with John Mlynczak, President and CEO at NAMM | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Marco Ciappelli, NAMM, John Mlynczak</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/54b75480-e1e8-4c47-921c-ab54bdcdaf96/3000x3000/music-20evolves-20-20on-20itspmagazine-20-20cover.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:02</itunes:duration>
      <itunes:summary>As NAMM marks 125 years of music, resilience, and the people who keep the industry moving forward, this conversation about The NAMM Show 2026 explores how artists, education, and authentic connection are shaping what comes next.</itunes:summary>
      <itunes:subtitle>As NAMM marks 125 years of music, resilience, and the people who keep the industry moving forward, this conversation about The NAMM Show 2026 explores how artists, education, and authentic connection are shaping what comes next.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, namm 2026, sean martin, john mlynczak, music education, music industry, music technology, conference, artist collaborations, the namm show, on location, event coverage, the namm show 2026</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>284</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d81d4d1b-a2e9-4e5f-8769-ad2075acb715</guid>
      <title>Black Hat Europe 2025 Wrap-Up: Suzy Pallett on Global Expansion, AI Threats, and Defending Together | On Location Coverage With Sean Martin &amp; Marco Ciappelli</title>
      <description><![CDATA[<p><strong>____________Guests:</strong><br /><br /><strong>Suzy Pallett</strong><br />President, Black Hat. Cybersecurity.<br />On LinkedIn: <a href="https://www.linkedin.com/in/suzy-pallett-60710132/" target="_blank">https://www.linkedin.com/in/suzy-pallett-60710132/</a></p><h3>The Cybersecurity Community Finds Its Footing in Uncertain Times</h3><p>There is something almost paradoxical about the cybersecurity industry. It exists because of threats, yet it thrives on trust. It deals in technical complexity, yet its beating heart is fundamentally human: people gathering, sharing knowledge, and collectively deciding that defending each other matters more than protecting proprietary advantage.</p><p>This tension—and this hope—was on full display at Black Hat Europe 2025 in London, which just wrapped up at the ExCel Centre with attendance growing more than 25 percent over last year. For Suzy Pallett, the newly appointed President of Black Hat, the numbers tell only part of the story.</p><p>"What I've found from this week is the knowledge sharing, the insights, the open source tools that we've shared, the demonstrations that have happened—they've been so instrumental," Pallett shared in a conversation with ITSPmagazine. "Cybersecurity is unlike any other industry I've ever been close to in the strength of that collaboration."</p><p>Pallett took the helm in September after Steve Wylie stepped down following eleven years leading the brand through significant growth. Her background spans over two decades in global events, most recently with Money20/20, the fintech conference series. But she speaks of Black Hat not as a business to be managed but as a community to be served.</p><p>The event itself reflected the year's dominant concerns. AI agents and supply chain vulnerabilities emerged as central themes, continuing conversations that dominated Black Hat USA in Las Vegas just months earlier. But Europe brought its own character. Keynotes ranged from Max Meets examining whether ransomware can actually be stopped, to Linus Neumann questioning whether compliance checklists might actually expose organizations to greater risk rather than protecting them.</p><p>"He was saying that the compliance checklists that we're all being stressed with are actually where the vulnerabilities lie," Pallett explained. "How can we work more collaboratively together so that it's not just a compliance checklist that we get?"</p><p>This is the kind of question that sits at the intersection of technology and policy, technical reality and bureaucratic aspiration. It is also the kind of question that rarely gets asked in vendor halls but deserves space in our collective thinking.</p><p>Joe Tidy, the BBC journalist behind the EvilCorp podcast, delivered a record-breaking keynote attendance on day two, signaling the growing appetite for cybersecurity stories that reach beyond the practitioner community into broader public consciousness. Louise Marie Harrell spoke on technical capacity and international accountability—a reminder that cyber threats respect no borders and neither can our responses.</p><p>What makes Black Hat distinct, Pallett noted, is that the conversations happening on the business hall floor are not typical expo fare. "You have the product teams, you have the engineers, you have the developers on those stands, and it's still product conversations and technical conversations."</p><p>Looking ahead, Pallett's priorities center on listening. Review boards, advisory boards, pastoral programs, scholarships—these are the mechanisms through which she intends to ensure Black Hat remains, in her words, "a platform for them and by them."</p><p>The cybersecurity industry faces a peculiar burden. What used to happen in twelve years now happens in two days, as Pallett put it. The pace is exhausting. The threats keep evolving. The cat-and-mouse game shows no signs of ending.</p><p>But perhaps that is precisely why events like this matter. Not because they offer solutions to every problem, but because they remind an industry under constant pressure that it is not alone in the fight. That collaboration is not weakness. That sharing knowledge freely is not naïve—it is strategic.</p><p>Black Hat Europe 2025 may have ended, but the conversations it sparked will carry forward into 2026 and beyond.</p><p><strong>____________HOSTS:</strong></p><p><strong>Sean Martin</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 13 Dec 2025 01:53:22 +0000</pubDate>
      <author>contact@itspmagazine.com (Suzy Pallett, ITSPmagazine, Marco Ciappelli, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli-JzmPUVJt</link>
      <content:encoded><![CDATA[<p><strong>____________Guests:</strong><br /><br /><strong>Suzy Pallett</strong><br />President, Black Hat. Cybersecurity.<br />On LinkedIn: <a href="https://www.linkedin.com/in/suzy-pallett-60710132/" target="_blank">https://www.linkedin.com/in/suzy-pallett-60710132/</a></p><h3>The Cybersecurity Community Finds Its Footing in Uncertain Times</h3><p>There is something almost paradoxical about the cybersecurity industry. It exists because of threats, yet it thrives on trust. It deals in technical complexity, yet its beating heart is fundamentally human: people gathering, sharing knowledge, and collectively deciding that defending each other matters more than protecting proprietary advantage.</p><p>This tension—and this hope—was on full display at Black Hat Europe 2025 in London, which just wrapped up at the ExCel Centre with attendance growing more than 25 percent over last year. For Suzy Pallett, the newly appointed President of Black Hat, the numbers tell only part of the story.</p><p>"What I've found from this week is the knowledge sharing, the insights, the open source tools that we've shared, the demonstrations that have happened—they've been so instrumental," Pallett shared in a conversation with ITSPmagazine. "Cybersecurity is unlike any other industry I've ever been close to in the strength of that collaboration."</p><p>Pallett took the helm in September after Steve Wylie stepped down following eleven years leading the brand through significant growth. Her background spans over two decades in global events, most recently with Money20/20, the fintech conference series. But she speaks of Black Hat not as a business to be managed but as a community to be served.</p><p>The event itself reflected the year's dominant concerns. AI agents and supply chain vulnerabilities emerged as central themes, continuing conversations that dominated Black Hat USA in Las Vegas just months earlier. But Europe brought its own character. Keynotes ranged from Max Meets examining whether ransomware can actually be stopped, to Linus Neumann questioning whether compliance checklists might actually expose organizations to greater risk rather than protecting them.</p><p>"He was saying that the compliance checklists that we're all being stressed with are actually where the vulnerabilities lie," Pallett explained. "How can we work more collaboratively together so that it's not just a compliance checklist that we get?"</p><p>This is the kind of question that sits at the intersection of technology and policy, technical reality and bureaucratic aspiration. It is also the kind of question that rarely gets asked in vendor halls but deserves space in our collective thinking.</p><p>Joe Tidy, the BBC journalist behind the EvilCorp podcast, delivered a record-breaking keynote attendance on day two, signaling the growing appetite for cybersecurity stories that reach beyond the practitioner community into broader public consciousness. Louise Marie Harrell spoke on technical capacity and international accountability—a reminder that cyber threats respect no borders and neither can our responses.</p><p>What makes Black Hat distinct, Pallett noted, is that the conversations happening on the business hall floor are not typical expo fare. "You have the product teams, you have the engineers, you have the developers on those stands, and it's still product conversations and technical conversations."</p><p>Looking ahead, Pallett's priorities center on listening. Review boards, advisory boards, pastoral programs, scholarships—these are the mechanisms through which she intends to ensure Black Hat remains, in her words, "a platform for them and by them."</p><p>The cybersecurity industry faces a peculiar burden. What used to happen in twelve years now happens in two days, as Pallett put it. The pace is exhausting. The threats keep evolving. The cat-and-mouse game shows no signs of ending.</p><p>But perhaps that is precisely why events like this matter. Not because they offer solutions to every problem, but because they remind an industry under constant pressure that it is not alone in the fight. That collaboration is not weakness. That sharing knowledge freely is not naïve—it is strategic.</p><p>Black Hat Europe 2025 may have ended, but the conversations it sparked will carry forward into 2026 and beyond.</p><p><strong>____________HOSTS:</strong></p><p><strong>Sean Martin</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18550870" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/26492c6f-1543-4841-8298-bb9cfc5dfb03/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=26492c6f-1543-4841-8298-bb9cfc5dfb03&amp;feed=2M86zCcc"/>
      <itunes:title>Black Hat Europe 2025 Wrap-Up: Suzy Pallett on Global Expansion, AI Threats, and Defending Together | On Location Coverage With Sean Martin &amp; Marco Ciappelli</itunes:title>
      <itunes:author>Suzy Pallett, ITSPmagazine, Marco Ciappelli, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:19</itunes:duration>
      <itunes:summary>Marco Ciappelli speaks with Suzy Pallett, newly appointed President of Black Hat, about Black Hat Europe 2025 in London. They discuss record-breaking attendance (25%+ growth), keynotes on ransomware and compliance vulnerabilities, the strength of cybersecurity community collaboration, and how Black Hat adapts its programming across global regions while maintaining its community-first mission.
</itunes:summary>
      <itunes:subtitle>Marco Ciappelli speaks with Suzy Pallett, newly appointed President of Black Hat, about Black Hat Europe 2025 in London. They discuss record-breaking attendance (25%+ growth), keynotes on ransomware and compliance vulnerabilities, the strength of cybersecurity community collaboration, and how Black Hat adapts its programming across global regions while maintaining its community-first mission.
</itunes:subtitle>
      <itunes:keywords>compliance, london excel, suzy pallett, cybersecurity events, technology, marco ciappelli, supply chain vulnerabilities, ai security, sean martin, tech podcast, technology podcast, cybersecurity workforce, innovation, threat intelligence, event coverage, black hat europe 2025, cybersecurity community, informa tech, ransomware, ai, future technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>283</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5bd69b40-7376-4b9c-bee5-b20971475812</guid>
      <title>AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>What Security Congress Reveals About the State of Cybersecurity</strong></p><p>This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  ￼</p><p><strong>Themes That Stand Out</strong></p><p>AI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  ￼</p><p>Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  ￼</p><p><strong>A Place for Every Stage of the Career</strong></p><p>France describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  ￼</p><p><strong>Looking Ahead to the Next Congress</strong></p><p>The next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.</p><p><strong>The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025</strong> <i>Coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p><strong>Jon France</strong>, Chief Information Security Officer at ISC2 | On LinkedIn: <a href="https://www.linkedin.com/in/jonfrance/" target="_blank">https://www.linkedin.com/in/jonfrance/</a></p><p><strong>HOST:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Follow our ISC2 Security Congress coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>ISC2 Security Congress: <a href="https://www.isc2.org" target="_blank">https://www.isc2.org</a></p><p>NIST Post-Quantum Cryptography Standards: <a href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank">https://csrc.nist.gov/projects/post-quantum-cryptography</a></p><p>ISC2 Chapters: <a href="https://www.isc2.org/chapters" target="_blank">https://www.isc2.org/chapters</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.studioc60.com/performance#ideas" target="_blank">https://www.studioc60.com/performance#ideas</a></p><p>KEYWORDS: cybersecurity, ai security, isc2 congress, quantum computing, identity attacks, zero trust, soc automation, cyber jobs, cyber careers, cyber leadership, security operations, threat intelligence, machine speed, authentication, authorization, sean martin, jon france, identity, soc, certification, leadership, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 3 Dec 2025 00:29:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, Jon France, ISC2)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-quantum-and-the-changing-role-of-cybersecurity-isc2-security-congress-2025-coverage-with-jon-france-chief-information-security-officer-at-isc2-on-location-with-sean-martin-and-marco-ciappelli-lkYV3C6W</link>
      <content:encoded><![CDATA[<p><strong>What Security Congress Reveals About the State of Cybersecurity</strong></p><p>This discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  ￼</p><p><strong>Themes That Stand Out</strong></p><p>AI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  ￼</p><p>Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  ￼</p><p><strong>A Place for Every Stage of the Career</strong></p><p>France describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  ￼</p><p><strong>Looking Ahead to the Next Congress</strong></p><p>The next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.</p><p><strong>The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025</strong> <i>Coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p><strong>Jon France</strong>, Chief Information Security Officer at ISC2 | On LinkedIn: <a href="https://www.linkedin.com/in/jonfrance/" target="_blank">https://www.linkedin.com/in/jonfrance/</a></p><p><strong>HOST:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Follow our ISC2 Security Congress coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>ISC2 Security Congress: <a href="https://www.isc2.org" target="_blank">https://www.isc2.org</a></p><p>NIST Post-Quantum Cryptography Standards: <a href="https://csrc.nist.gov/projects/post-quantum-cryptography" target="_blank">https://csrc.nist.gov/projects/post-quantum-cryptography</a></p><p>ISC2 Chapters: <a href="https://www.isc2.org/chapters" target="_blank">https://www.isc2.org/chapters</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.studioc60.com/performance#ideas" target="_blank">https://www.studioc60.com/performance#ideas</a></p><p>KEYWORDS: cybersecurity, ai security, isc2 congress, quantum computing, identity attacks, zero trust, soc automation, cyber jobs, cyber careers, cyber leadership, security operations, threat intelligence, machine speed, authentication, authorization, sean martin, jon france, identity, soc, certification, leadership, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25317592" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2390686a-4565-45f4-9cac-992116d8a402/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2390686a-4565-45f4-9cac-992116d8a402&amp;feed=2M86zCcc"/>
      <itunes:title>AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, Jon France, ISC2</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:22</itunes:duration>
      <itunes:summary>This episode explores the themes, technologies, and community conversations shaping ISC2 Security Congress, with Jon France offering a forward-looking view of what matters most in cybersecurity today. Listeners gain a clear sense of why the event draws practitioners, leaders, and newcomers who want to strengthen their skills and stay ahead of industry change.</itunes:summary>
      <itunes:subtitle>This episode explores the themes, technologies, and community conversations shaping ISC2 Security Congress, with Jon France offering a forward-looking view of what matters most in cybersecurity today. Listeners gain a clear sense of why the event draws practitioners, leaders, and newcomers who want to strengthen their skills and stay ahead of industry change.</itunes:subtitle>
      <itunes:keywords>authorization, jon france, leadership, ai security, sean martin, cyber leadership, cybersecurity, authentication, isc2 congress, conference, on location, cyber jobs, threat intelligence, event coverage, soc, identity attacks, machine speed, soc automation, cyber careers, certification, quantum, identity, ai, zero trust, quantum computing, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>282</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">431a0a49-d92e-443d-8650-2c78065d531f</guid>
      <title>New Event | Global Space Awards 2025 Honors Captain James Lovell Legacy at Natural History Museum London | A conversation with Sanjeev Gordhan | Redefining Society And Technology Podcast With Marco Ciappelli</title>
      <description><![CDATA[<p><strong>____________Podcast</strong><br /> Redefining Society and Technology Podcast With Marco Ciappelli<br /><a href="https://redefiningsocietyandtechnologypodcast.com " target="_blank">https://redefiningsocietyandtechnologypodcast.com </a><br /><br /> </p><p><strong>____________Host </strong><br /><br /><strong>Marco Ciappelli</strong><br />Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society 🌎 LAX 🛸 FLR 🌍</p><p>WebSite: <a href="https://marcociappelli.com" target="_blank">https://marcociappelli.com</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/marco-ciappelli/" target="_blank">https://www.linkedin.com/in/marco-ciappelli/</a></p><p><br /><strong>____________This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a><br /><br /><br /><strong>____________Title</strong><br />New Event | Global Space Awards 2025 Honors Captain James Lovell Legacy at Natural History Museum London | A conversation with Sanjeev Gordhan | Redefining Society And Technology Podcast With Marco Ciappelli</p><p><br /><strong>____________Guests:</strong><br /><br /><strong>Sanjeev Gordhan</strong><br />General Partner @ Type One Ventures | Space, Deep-Tech, Strategy<br />On LinkedIn: <a href="https://www.linkedin.com/in/sanjeev-gordhan-3714b327/" target="_blank">https://www.linkedin.com/in/sanjeev-gordhan-3714b327/</a></p><p><strong>____________Short Introduction </strong><br />The inaugural Global Space Awards celebrates the Golden Era of Space on December 5, 2025, at London's Natural History Museum. Hosted by physicist Brian Greene, the event honors Captain James Lovell's legacy and recognizes innovators transforming space from government domain to commercial frontier in our Hybrid Analog Digital Society.</p><p><strong>____________Article </strong><br />"There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened. To be successful, you need to be a person who makes things happen."</p><p>Those words from Captain James Lovell defined his life—from commanding Apollo 13's near-disastrous mission to inspiring generations of space explorers. This December, London's Natural History Museum will host the inaugural Global Space Awards, an event dedicating its first evening to Lovell's extraordinary legacy while celebrating those making things happen in space today.</p><p>Sanjeev Gordhan, General Partner at Type One Ventures and part of the Global Space Awards organizing team, joined me to discuss why this moment matters. Not just for space enthusiasts, but for everyone whose lives are being transformed by technologies developed beyond Earth's atmosphere.</p><p>"Space is not a sector," Sanj explained. "It's a domain that overrides many sectors—agriculture, pharmaceuticals, defense, telecommunications, connectivity. Things we engage with daily."</p><p>The timing couldn't be more significant. We're witnessing what Sanj calls a fundamental shift in space economics. In the 1970s and 80s, launching a kilogram into space cost $70,000-$80,000. Today? Around $3,000. That 20x reduction has transformed space from an exclusive government playground into a commercially viable domain where startups can reach orbit on seed funding.</p><p>This democratization of space access is precisely why the Global Space Awards emerged. The industry needed something beyond its echo chambers—a red-carpet moment celebrating excellence across the entire spectrum, from research laboratories to scaling businesses, from breakthrough science to sustainable investments.</p><p>The response exceeded all expectations. The first-year event received 516 nominations from 38 countries. Sanj and his team were "gobsmacked"—they'd hoped for maybe 150-200. The overwhelming engagement proved what they suspected: the space community was hungry for recognition that spans the complete journey from laboratory to commercial impact.</p><p>What makes this particularly fascinating is how space technology circles back to solve Earth's problems. Consider pharmaceuticals: crystallization processes in microgravity create flawless crystal structures impossible to achieve on Earth. The impact? Chemotherapy treatments that currently require hours-long hospital visits could become subcutaneous injections patients self-administer at home. That's not science fiction—that's research happening now on the International Space Station, waiting for commercial space infrastructure to scale production.</p><p>Or agriculture: Earth observation satellites help farmers optimize crop yields, manage water resources, and predict harvests with unprecedented accuracy. Space technology feeding humanity—literally.</p><p>The investment mathematics are compelling. For every dollar invested in space innovation, the return to humanity measures around 20x. Not in stock market terms, but in solving problems like food security, medical treatments, climate monitoring, and global connectivity. These aren't abstract future benefits—they're happening now, accelerating as launch costs plummet and commercial operations expand.</p><p>The Global Space Awards recognizes this multifaceted reality through eight distinct categories: Playmaker of the Year, Super Scaler, Space Investor, Partnership of the Year, Innovation Breakthrough, Science Breakthrough, Sustainability for Earth, and Sustainability for Space. Each award acknowledges that space progress requires diverse contributions—from the scientists doing foundational research to the investors providing capital, from the engineers building systems to the partnerships bridging sectors.</p><p>And then there's the James Lovell Legacy Award, presented to his family at this inaugural event. The choice is deliberate and symbolic. Lovell commanded Apollo 8, the first crewed mission to orbit the Moon, then led Apollo 13's dramatic survival when an oxygen tank exploded en route to the lunar surface. His calm under pressure, innovative problem-solving with limited resources, and unwavering commitment to bringing his crew home safely epitomize what space exploration demands: courage combined with pragmatism, vision tempered by reality.</p><p>The Lovell family's response to the tribute captures this spirit perfectly: "His words continue to guide not only our family, but all those who dare to dream beyond the horizon."</p><p>That phrase—"dream beyond the horizon"—resonates deeply in our current moment. We're transitioning from the heroic Apollo era to something more complex and perhaps more consequential. Space is becoming infrastructure, not just exploration. The question isn't whether humans will have a permanent presence beyond Earth, but how quickly and sustainably we'll build it.</p><p>The Natural History Museum setting adds another layer of meaning. Here's a building celebrating Earth's evolutionary history hosting an event about humanity's next evolutionary step—becoming a spacefaring species. The juxtaposition of dinosaur fossils and rocket technology, of ancient geology and future lunar economies, captures where we stand: creatures evolved on one small planet now reaching beyond it.</p><p>Physicist Brian Greene hosting the event is equally symbolic. Not an astronaut or rocket scientist, but someone who makes complex physics comprehensible to non-specialists. Space's future depends on broad understanding, not just specialized expertise. When space technology becomes as mundane as aviation—when we stop thinking about the satellites enabling our GPS or the space-tested materials in our smartphones—that's when the real transformation completes.</p><p>Sanj mentioned something that stuck with me: people ask why we spend billions on space when Earth has so many problems. The answer is that space spending helps solve Earth's problems. Better farming through satellite data. Life-saving pharmaceuticals manufactured in microgravity. Climate monitoring. Disaster response. Global internet access for remote regions. The false choice between Earth and space collapses when you understand space as a domain enabling solutions, not a destination draining resources.</p><p>Looking forward, the opportunities expand exponentially. We haven't even begun exploiting lunar resources or manufacturing in zero gravity at scale. The next 5-15 years will bring benefits we can barely imagine today—but we must start now. Space infrastructure takes time. The ISS took over a decade to build. Commercial space stations, lunar bases, and orbital manufacturing facilities will require similar long-term commitments.</p><p>That's why events like the Global Space Awards matter. They connect the dots between research and commerce, between investment and impact, between legacy and future. They remind us that space isn't just about rockets and astronauts—it's about chemists and farmers, investors and engineers, visionaries and pragmatists all working toward the same horizon.</p><p>The finalists will be announced from the stratosphere—literally, on a screen carried by balloon—because why not? If you're celebrating space, do it with flair.</p><p>As our conversation ended, I found myself hoping to attend. Not because I'm a space professional (I'm not), but because I'm fascinated by how technology reshapes society. And space technology is reshaping everything, whether we notice it or not. In our Hybrid Analog Digital Society, space represents the ultimate extension of human capability—using technology not to replace our humanity but to expand what humanity can accomplish.</p><p>Captain Lovell's quote rings true: some make things happen, some watch, some wonder. The Global Space Awards celebrates those making things happen. The rest of us should at least watch—because what happens in space increasingly happens to all of us.</p><p>Subscribe to continue these conversations about technology, society, and humanity's next chapter. Because the future is being built right now, and it's more exciting than most people realize.</p><p><strong>____________About the event</strong><br /><br /><strong>GLOBAL SPACE AWARDS DEDICATES EVENING TO HONOR THE LEGACY AND EXTRAORDINARY CONTRIBUTIONS OF CAPTAIN JAMES LOVELL</strong></p><p><strong>Inaugural James Lovell Legacy Award Introduced and Presented to the Lovell Family </strong></p><p><strong>Red-Carpet Awards Event Taking Place on December 5 at The Natural History Museum, London</strong></p><p><strong>London, U.K. – October 29, 2025</strong> – The <strong>Global Space Awards (GSA)</strong>, the first international event dedicated to celebrating the achievements defining today’s Golden Era of Space, hosted by world-renowned physicist and bestselling author <strong>Brian Greene</strong>, has announced it will dedicate the event to the memory and outstanding achievements of the extraordinary and iconic Captain James Lovell. A special inaugural <strong>James Lovell Legacy Award</strong> will be presented to his family, launching the award’s initiative to recognize those whose lifetime of leadership, service, and courage have left an enduring impact on humanity’s progress in space.</p><p>The Lovell Family responds to the tribute, “We are deeply honored that this evening's Global Space Awards is dedicated to the remarkable legacy of our father, Captain James Lovell, a true pioneer whose courage and vision continue to inspire generations. As my father often reminded us, ‘<i><strong>There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened. To be successful, you need to be a person who makes things happen</strong></i>.’<i> </i>His words continue to guide not only our family, but all those who dare to dream beyond the horizon. We are profoundly grateful to see his legacy honored among those who continue to make things happen in space exploration.”</p><p>Sanjeev Gordhan of the Global Space Awards CIC continues, “We are deeply honored to welcome the Lovell family as we celebrate the extraordinary legacy of their father, Captain James Lovell. A true American treasure and one of the bravest men ever to journey into space, Captain Lovell’s courage and leadership have inspired generations. It is both fitting and meaningful that the inaugural James Lovell Legacy Award be dedicated to him and presented to his family in recognition of his remarkable contributions to space exploration and his enduring impact on humanity’s quest for discovery.”</p><p><strong>The James Lovell Legacy Award</strong> will be an annual award given to the individual who honors the spirit of Commander James Lovell, whose heroism, calm under pressure, and unwavering commitment to exploration exemplify the very best of humanity in the face of the unknown. It celebrates those whose legacy is not measured only by the missions flown or the technologies pioneered, but by the inspiration they leave for generations to come and the foundations they have built.</p><p>The Global Space Awards event will take place at <strong>The Natural History Museum, London </strong>on <strong>Friday, December 5. </strong>It will feature an awards ceremony and black-tie gala dinner, honoring the innovators, investors, and organizations shaping the future of space—from lunar bases and in-orbit manufacturing to sustainable space economies that benefit life on Earth today. Finalists will be announced in early November.</p><p>Until now, there has been no unified global platform recognizing these historic accomplishments. The <strong>Global Space Awards</strong> were created to fill that void—shining a spotlight on the breakthroughs, technologies, and visionaries setting new benchmarks for space innovation at one iconic annual event. The GSA’s core values are based on: innovation, global collaboration, inspiration, integrity and sustainability.</p><p>The inaugural Global Space Awards will be overseen by a Steering Committee of highly respected industry leaders. They include <strong>Anna Hazlett</strong>, Founder & CEO of AzurX and member of the AED 2 billion Mohammed Bin Rashid Innovation Fund (MBRIF) Advisory & Decision Committee, <strong>Andrew Robb</strong>, Partner & EMEA Space Practice Leader at Deloitte, <strong>Sanjeev Gordhan</strong>, General Partner at Type One Ventures, and <strong>Hidetaka Aoki</strong>, Co-founder and director at Space Port Japan, co-founder of SPACETIDE Foundation and Space Evangelist.</p><p>In addition to the <strong>James Lovell Legacy Award</strong>, the evening will feature the presentation of the following awards:</p><p><br /><strong>Playmaker of the Year Award </strong>-- Awarded to an individual whose defining move this year shifted the trajectory of the space economy. This award celebrates the power players creating momentum across the ecosystem</p><p><br /><strong>Super Scaler of the Year Award</strong> -- Awarded to a Space company that has demonstrated exceptional commercial growth over the past year. Whether through market expansion, revenue milestones, operational scaling, or capital raised, this award recognizes the breakout businesses charting a path to rapid growth.</p><p><br /><strong>Space Investor of the Year Award</strong> -- Awarded to an investor (angel or institutional) or investment firm who, over the past 12 months, has most meaningfully accelerated the growth and trajectory of their portfolio companies. This award recognizes strategic capital, deep conviction, and hands-on partnership that unlocks real progress.</p><p><br /><strong>Partnership of the Year Award</strong> -- Awarded jointly to a Space company and its corporate or public sector partner(s) whose collaboration has delivered exceptional impact over the past year. This award celebrates partnerships that achieve tangible results, scale technology, and push the boundaries of what’s possible through cross-sector innovation.</p><p><br /><strong>Innovation Breakthrough Award</strong> -- Awarded to a Space company pushing the boundaries of what’s technically possible. This award recognizes radical product or service innovations, DeepTech achievements, or breakthrough moments that set new benchmarks for the sector.<br /> </p><p><strong>Science Breakthrough Award</strong> -- Awarded to a research team or individual whose scientific contribution is advancing our understanding of Space, enabling new Space technologies, or altering Space policies. This award spotlights the foundational projects that underpin Space innovation and drives the broader Space ecosystem.<br /> </p><p><strong>Sustainability for Earth Award</strong> -- Awarded to a Space company achieving measurable impact on Earth through Space technology. This award celebrates space-derived innovations that address pressing problems on our planet.<br /> </p><p><strong>Sustainability for Space Award </strong>-- Awarded to a Space company making the most significant contribution to the long-term sustainability of Space. This award celebrates tangible progress toward a responsible future in orbit.<br /> </p><p><strong>About Global Space Awards CIC</strong></p><p>Global Space Awards CIC (Community Interest Company) has been established as a not-for-profit entity limited by guarantee to champion the ecosystem for Space.  The entity is governed by independent advisory board members who will ensure transparency and fairness of the awards selection process and oversee the financial governance of the operations.<br /><br /><strong>____________Enjoy. Reflect. Share with your fellow humans.</strong></p><p>And if you haven’t already, subscribe to Musing On Society & Technology on LinkedIn — new transmissions are always incoming.<br /><a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144" target="_blank">https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144</a></p><p>You’re listening to this through the Redefining Society & Technology Podcast, so while you’re here, make sure to follow the show — and join me as I continue exploring life in this Hybrid Analog Digital Society.</p><p> </p><p><strong>____________End of transmission</strong><br /><br />Listen to more Redefining Society & Technology stories and subscribe to the podcast:<br />👉 <a href="https://redefiningsocietyandtechnologypodcast.com" target="_blank">https://redefiningsocietyandtechnologypodcast.com</a><br /><br />Watch the webcast version on-demand on YouTube:<br />👉 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested Promotional Brand Stories for your Company?<br />👉 <a href="https://www.studioc60.com" target="_blank">https://www.studioc60.com</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Nov 2025 06:46:01 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, Sanjeev Gordhan, Sean Martin, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/new-event-global-space-awards-2025-honors-captain-james-lovell-legacy-at-natural-history-museum-london-a-conversation-with-sanjeev-gordhan-redefining-society-and-technology-podcast-with-marco-ciappelli-pvgAHVEd</link>
      <content:encoded><![CDATA[<p><strong>____________Podcast</strong><br /> Redefining Society and Technology Podcast With Marco Ciappelli<br /><a href="https://redefiningsocietyandtechnologypodcast.com " target="_blank">https://redefiningsocietyandtechnologypodcast.com </a><br /><br /> </p><p><strong>____________Host </strong><br /><br /><strong>Marco Ciappelli</strong><br />Co-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society 🌎 LAX 🛸 FLR 🌍</p><p>WebSite: <a href="https://marcociappelli.com" target="_blank">https://marcociappelli.com</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/marco-ciappelli/" target="_blank">https://www.linkedin.com/in/marco-ciappelli/</a></p><p><br /><strong>____________This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a><br /><br /><br /><strong>____________Title</strong><br />New Event | Global Space Awards 2025 Honors Captain James Lovell Legacy at Natural History Museum London | A conversation with Sanjeev Gordhan | Redefining Society And Technology Podcast With Marco Ciappelli</p><p><br /><strong>____________Guests:</strong><br /><br /><strong>Sanjeev Gordhan</strong><br />General Partner @ Type One Ventures | Space, Deep-Tech, Strategy<br />On LinkedIn: <a href="https://www.linkedin.com/in/sanjeev-gordhan-3714b327/" target="_blank">https://www.linkedin.com/in/sanjeev-gordhan-3714b327/</a></p><p><strong>____________Short Introduction </strong><br />The inaugural Global Space Awards celebrates the Golden Era of Space on December 5, 2025, at London's Natural History Museum. Hosted by physicist Brian Greene, the event honors Captain James Lovell's legacy and recognizes innovators transforming space from government domain to commercial frontier in our Hybrid Analog Digital Society.</p><p><strong>____________Article </strong><br />"There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened. To be successful, you need to be a person who makes things happen."</p><p>Those words from Captain James Lovell defined his life—from commanding Apollo 13's near-disastrous mission to inspiring generations of space explorers. This December, London's Natural History Museum will host the inaugural Global Space Awards, an event dedicating its first evening to Lovell's extraordinary legacy while celebrating those making things happen in space today.</p><p>Sanjeev Gordhan, General Partner at Type One Ventures and part of the Global Space Awards organizing team, joined me to discuss why this moment matters. Not just for space enthusiasts, but for everyone whose lives are being transformed by technologies developed beyond Earth's atmosphere.</p><p>"Space is not a sector," Sanj explained. "It's a domain that overrides many sectors—agriculture, pharmaceuticals, defense, telecommunications, connectivity. Things we engage with daily."</p><p>The timing couldn't be more significant. We're witnessing what Sanj calls a fundamental shift in space economics. In the 1970s and 80s, launching a kilogram into space cost $70,000-$80,000. Today? Around $3,000. That 20x reduction has transformed space from an exclusive government playground into a commercially viable domain where startups can reach orbit on seed funding.</p><p>This democratization of space access is precisely why the Global Space Awards emerged. The industry needed something beyond its echo chambers—a red-carpet moment celebrating excellence across the entire spectrum, from research laboratories to scaling businesses, from breakthrough science to sustainable investments.</p><p>The response exceeded all expectations. The first-year event received 516 nominations from 38 countries. Sanj and his team were "gobsmacked"—they'd hoped for maybe 150-200. The overwhelming engagement proved what they suspected: the space community was hungry for recognition that spans the complete journey from laboratory to commercial impact.</p><p>What makes this particularly fascinating is how space technology circles back to solve Earth's problems. Consider pharmaceuticals: crystallization processes in microgravity create flawless crystal structures impossible to achieve on Earth. The impact? Chemotherapy treatments that currently require hours-long hospital visits could become subcutaneous injections patients self-administer at home. That's not science fiction—that's research happening now on the International Space Station, waiting for commercial space infrastructure to scale production.</p><p>Or agriculture: Earth observation satellites help farmers optimize crop yields, manage water resources, and predict harvests with unprecedented accuracy. Space technology feeding humanity—literally.</p><p>The investment mathematics are compelling. For every dollar invested in space innovation, the return to humanity measures around 20x. Not in stock market terms, but in solving problems like food security, medical treatments, climate monitoring, and global connectivity. These aren't abstract future benefits—they're happening now, accelerating as launch costs plummet and commercial operations expand.</p><p>The Global Space Awards recognizes this multifaceted reality through eight distinct categories: Playmaker of the Year, Super Scaler, Space Investor, Partnership of the Year, Innovation Breakthrough, Science Breakthrough, Sustainability for Earth, and Sustainability for Space. Each award acknowledges that space progress requires diverse contributions—from the scientists doing foundational research to the investors providing capital, from the engineers building systems to the partnerships bridging sectors.</p><p>And then there's the James Lovell Legacy Award, presented to his family at this inaugural event. The choice is deliberate and symbolic. Lovell commanded Apollo 8, the first crewed mission to orbit the Moon, then led Apollo 13's dramatic survival when an oxygen tank exploded en route to the lunar surface. His calm under pressure, innovative problem-solving with limited resources, and unwavering commitment to bringing his crew home safely epitomize what space exploration demands: courage combined with pragmatism, vision tempered by reality.</p><p>The Lovell family's response to the tribute captures this spirit perfectly: "His words continue to guide not only our family, but all those who dare to dream beyond the horizon."</p><p>That phrase—"dream beyond the horizon"—resonates deeply in our current moment. We're transitioning from the heroic Apollo era to something more complex and perhaps more consequential. Space is becoming infrastructure, not just exploration. The question isn't whether humans will have a permanent presence beyond Earth, but how quickly and sustainably we'll build it.</p><p>The Natural History Museum setting adds another layer of meaning. Here's a building celebrating Earth's evolutionary history hosting an event about humanity's next evolutionary step—becoming a spacefaring species. The juxtaposition of dinosaur fossils and rocket technology, of ancient geology and future lunar economies, captures where we stand: creatures evolved on one small planet now reaching beyond it.</p><p>Physicist Brian Greene hosting the event is equally symbolic. Not an astronaut or rocket scientist, but someone who makes complex physics comprehensible to non-specialists. Space's future depends on broad understanding, not just specialized expertise. When space technology becomes as mundane as aviation—when we stop thinking about the satellites enabling our GPS or the space-tested materials in our smartphones—that's when the real transformation completes.</p><p>Sanj mentioned something that stuck with me: people ask why we spend billions on space when Earth has so many problems. The answer is that space spending helps solve Earth's problems. Better farming through satellite data. Life-saving pharmaceuticals manufactured in microgravity. Climate monitoring. Disaster response. Global internet access for remote regions. The false choice between Earth and space collapses when you understand space as a domain enabling solutions, not a destination draining resources.</p><p>Looking forward, the opportunities expand exponentially. We haven't even begun exploiting lunar resources or manufacturing in zero gravity at scale. The next 5-15 years will bring benefits we can barely imagine today—but we must start now. Space infrastructure takes time. The ISS took over a decade to build. Commercial space stations, lunar bases, and orbital manufacturing facilities will require similar long-term commitments.</p><p>That's why events like the Global Space Awards matter. They connect the dots between research and commerce, between investment and impact, between legacy and future. They remind us that space isn't just about rockets and astronauts—it's about chemists and farmers, investors and engineers, visionaries and pragmatists all working toward the same horizon.</p><p>The finalists will be announced from the stratosphere—literally, on a screen carried by balloon—because why not? If you're celebrating space, do it with flair.</p><p>As our conversation ended, I found myself hoping to attend. Not because I'm a space professional (I'm not), but because I'm fascinated by how technology reshapes society. And space technology is reshaping everything, whether we notice it or not. In our Hybrid Analog Digital Society, space represents the ultimate extension of human capability—using technology not to replace our humanity but to expand what humanity can accomplish.</p><p>Captain Lovell's quote rings true: some make things happen, some watch, some wonder. The Global Space Awards celebrates those making things happen. The rest of us should at least watch—because what happens in space increasingly happens to all of us.</p><p>Subscribe to continue these conversations about technology, society, and humanity's next chapter. Because the future is being built right now, and it's more exciting than most people realize.</p><p><strong>____________About the event</strong><br /><br /><strong>GLOBAL SPACE AWARDS DEDICATES EVENING TO HONOR THE LEGACY AND EXTRAORDINARY CONTRIBUTIONS OF CAPTAIN JAMES LOVELL</strong></p><p><strong>Inaugural James Lovell Legacy Award Introduced and Presented to the Lovell Family </strong></p><p><strong>Red-Carpet Awards Event Taking Place on December 5 at The Natural History Museum, London</strong></p><p><strong>London, U.K. – October 29, 2025</strong> – The <strong>Global Space Awards (GSA)</strong>, the first international event dedicated to celebrating the achievements defining today’s Golden Era of Space, hosted by world-renowned physicist and bestselling author <strong>Brian Greene</strong>, has announced it will dedicate the event to the memory and outstanding achievements of the extraordinary and iconic Captain James Lovell. A special inaugural <strong>James Lovell Legacy Award</strong> will be presented to his family, launching the award’s initiative to recognize those whose lifetime of leadership, service, and courage have left an enduring impact on humanity’s progress in space.</p><p>The Lovell Family responds to the tribute, “We are deeply honored that this evening's Global Space Awards is dedicated to the remarkable legacy of our father, Captain James Lovell, a true pioneer whose courage and vision continue to inspire generations. As my father often reminded us, ‘<i><strong>There are people who make things happen, there are people who watch things happen, and there are people who wonder what happened. To be successful, you need to be a person who makes things happen</strong></i>.’<i> </i>His words continue to guide not only our family, but all those who dare to dream beyond the horizon. We are profoundly grateful to see his legacy honored among those who continue to make things happen in space exploration.”</p><p>Sanjeev Gordhan of the Global Space Awards CIC continues, “We are deeply honored to welcome the Lovell family as we celebrate the extraordinary legacy of their father, Captain James Lovell. A true American treasure and one of the bravest men ever to journey into space, Captain Lovell’s courage and leadership have inspired generations. It is both fitting and meaningful that the inaugural James Lovell Legacy Award be dedicated to him and presented to his family in recognition of his remarkable contributions to space exploration and his enduring impact on humanity’s quest for discovery.”</p><p><strong>The James Lovell Legacy Award</strong> will be an annual award given to the individual who honors the spirit of Commander James Lovell, whose heroism, calm under pressure, and unwavering commitment to exploration exemplify the very best of humanity in the face of the unknown. It celebrates those whose legacy is not measured only by the missions flown or the technologies pioneered, but by the inspiration they leave for generations to come and the foundations they have built.</p><p>The Global Space Awards event will take place at <strong>The Natural History Museum, London </strong>on <strong>Friday, December 5. </strong>It will feature an awards ceremony and black-tie gala dinner, honoring the innovators, investors, and organizations shaping the future of space—from lunar bases and in-orbit manufacturing to sustainable space economies that benefit life on Earth today. Finalists will be announced in early November.</p><p>Until now, there has been no unified global platform recognizing these historic accomplishments. The <strong>Global Space Awards</strong> were created to fill that void—shining a spotlight on the breakthroughs, technologies, and visionaries setting new benchmarks for space innovation at one iconic annual event. The GSA’s core values are based on: innovation, global collaboration, inspiration, integrity and sustainability.</p><p>The inaugural Global Space Awards will be overseen by a Steering Committee of highly respected industry leaders. They include <strong>Anna Hazlett</strong>, Founder & CEO of AzurX and member of the AED 2 billion Mohammed Bin Rashid Innovation Fund (MBRIF) Advisory & Decision Committee, <strong>Andrew Robb</strong>, Partner & EMEA Space Practice Leader at Deloitte, <strong>Sanjeev Gordhan</strong>, General Partner at Type One Ventures, and <strong>Hidetaka Aoki</strong>, Co-founder and director at Space Port Japan, co-founder of SPACETIDE Foundation and Space Evangelist.</p><p>In addition to the <strong>James Lovell Legacy Award</strong>, the evening will feature the presentation of the following awards:</p><p><br /><strong>Playmaker of the Year Award </strong>-- Awarded to an individual whose defining move this year shifted the trajectory of the space economy. This award celebrates the power players creating momentum across the ecosystem</p><p><br /><strong>Super Scaler of the Year Award</strong> -- Awarded to a Space company that has demonstrated exceptional commercial growth over the past year. Whether through market expansion, revenue milestones, operational scaling, or capital raised, this award recognizes the breakout businesses charting a path to rapid growth.</p><p><br /><strong>Space Investor of the Year Award</strong> -- Awarded to an investor (angel or institutional) or investment firm who, over the past 12 months, has most meaningfully accelerated the growth and trajectory of their portfolio companies. This award recognizes strategic capital, deep conviction, and hands-on partnership that unlocks real progress.</p><p><br /><strong>Partnership of the Year Award</strong> -- Awarded jointly to a Space company and its corporate or public sector partner(s) whose collaboration has delivered exceptional impact over the past year. This award celebrates partnerships that achieve tangible results, scale technology, and push the boundaries of what’s possible through cross-sector innovation.</p><p><br /><strong>Innovation Breakthrough Award</strong> -- Awarded to a Space company pushing the boundaries of what’s technically possible. This award recognizes radical product or service innovations, DeepTech achievements, or breakthrough moments that set new benchmarks for the sector.<br /> </p><p><strong>Science Breakthrough Award</strong> -- Awarded to a research team or individual whose scientific contribution is advancing our understanding of Space, enabling new Space technologies, or altering Space policies. This award spotlights the foundational projects that underpin Space innovation and drives the broader Space ecosystem.<br /> </p><p><strong>Sustainability for Earth Award</strong> -- Awarded to a Space company achieving measurable impact on Earth through Space technology. This award celebrates space-derived innovations that address pressing problems on our planet.<br /> </p><p><strong>Sustainability for Space Award </strong>-- Awarded to a Space company making the most significant contribution to the long-term sustainability of Space. This award celebrates tangible progress toward a responsible future in orbit.<br /> </p><p><strong>About Global Space Awards CIC</strong></p><p>Global Space Awards CIC (Community Interest Company) has been established as a not-for-profit entity limited by guarantee to champion the ecosystem for Space.  The entity is governed by independent advisory board members who will ensure transparency and fairness of the awards selection process and oversee the financial governance of the operations.<br /><br /><strong>____________Enjoy. Reflect. Share with your fellow humans.</strong></p><p>And if you haven’t already, subscribe to Musing On Society & Technology on LinkedIn — new transmissions are always incoming.<br /><a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144" target="_blank">https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144</a></p><p>You’re listening to this through the Redefining Society & Technology Podcast, so while you’re here, make sure to follow the show — and join me as I continue exploring life in this Hybrid Analog Digital Society.</p><p> </p><p><strong>____________End of transmission</strong><br /><br />Listen to more Redefining Society & Technology stories and subscribe to the podcast:<br />👉 <a href="https://redefiningsocietyandtechnologypodcast.com" target="_blank">https://redefiningsocietyandtechnologypodcast.com</a><br /><br />Watch the webcast version on-demand on YouTube:<br />👉 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested Promotional Brand Stories for your Company?<br />👉 <a href="https://www.studioc60.com" target="_blank">https://www.studioc60.com</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26152209" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/fab52d19-51b4-489a-9a2c-9dfdd1c72356/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=fab52d19-51b4-489a-9a2c-9dfdd1c72356&amp;feed=2M86zCcc"/>
      <itunes:title>New Event | Global Space Awards 2025 Honors Captain James Lovell Legacy at Natural History Museum London | A conversation with Sanjeev Gordhan | Redefining Society And Technology Podcast With Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, Sanjeev Gordhan, Sean Martin, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:14</itunes:duration>
      <itunes:summary>The inaugural Global Space Awards celebrates the Golden Era of Space on December 5, 2025, at London&apos;s Natural History Museum. Hosted by physicist Brian Greene, the event honors Captain James Lovell&apos;s legacy and recognizes innovators transforming space from government domain to commercial frontier in our Hybrid Analog Digital Society.
</itunes:summary>
      <itunes:subtitle>The inaugural Global Space Awards celebrates the Golden Era of Space on December 5, 2025, at London&apos;s Natural History Museum. Hosted by physicist Brian Greene, the event honors Captain James Lovell&apos;s legacy and recognizes innovators transforming space from government domain to commercial frontier in our Hybrid Analog Digital Society.
</itunes:subtitle>
      <itunes:keywords>space innovation, technology, space economy, marco ciappelli, natural history museum, sean martin, microgravity research, tech podcast, brian greene, aerospace, aerospace industry, technology podcast, nasa history, james lovell, space industry, space industry, innovation, space exploration, nasa, microgravity, event coverage, commercial space, commercial space, lunar economy, london, iss, james lovell legacy, space awards, global space awards, space technology, ai, space business, space, future technology, space investing, space investing, satellite technology</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>281</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40d25d3f-df92-40c5-85de-df1493384f6d</guid>
      <title>How to Market to Cybersecurity&apos;s Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</strong></p><p><strong>CyberMarketingCon 2025 </strong>In Person & Virtual <br /><a href="https://www.cybermarketingconference.com" target="_blank">https://www.cybermarketingconference.com</a><br />Dec 7-10, 2025 in Austin, Texas </p><p><strong>Why Cybersecurity Marketing Demands a Different Playbook</strong></p><p>The cybersecurity industry presents a paradox for marketers. While practitioners work with cutting-edge technology, traditional marketing approaches consistently fall flat. Gianna Whitver and Maria Velasquez, co-founders of the Cybersecurity Marketing Society, have spent six years understanding why—and they're sharing those insights at CyberMarketingCon 2025 this December in Austin.</p><p>The challenge begins with the audience itself. Security professionals operate under constant pressure, actively preventing threats while juggling competing priorities. This stress creates an environment where patience for marketing noise evaporates instantly. Unlike other industries where buyers might browse vendor websites or respond to cold outreach, cybersecurity practitioners have both the technical sophistication to evade tracking and the motivation to control their own buying journey.</p><p>"Our buyer is highly elusive," Whitver explains. "They're saving the world and their companies from threats. When vendors reach out, it's an interruption to critical work." This dynamic forces marketers to rethink fundamental assumptions about how business gets done.</p><p>The numbers tell part of the story. With over 5,000 cybersecurity vendors flooding the market, standing out based solely on technical specifications has become nearly impossible. Many solutions address similar problems with comparable features. The differentiator, Velasquez argues, isn't in the technology itself but in how that technology transforms the buyer's daily experience.</p><p>"We have to shed that technical layer and go for the emotion," Velasquez says. "If they buy our product, how is it gonna make them feel? Are they gonna get their weekends back with family? Are they actually gonna go to sleep without stress?" This human-centered approach represents a fundamental shift from the feeds-and-speeds messaging that dominated cybersecurity marketing for years.</p><p>The industry is witnessing what Velasquez calls an "evolution slash revolution" in marketing tactics. Humor, entertainment, and authentic storytelling are replacing dense whitepapers as the first touch point. The goal isn't to dumb down complex technology but to create space for meaningful engagement by first addressing the emotional reality of a stressful profession.</p><p>Trust remains the currency that matters most. Peer recommendations carry exponentially more weight than any advertising campaign. Security professionals rely on trusted networks to validate purchasing decisions, making community building and genuine thought leadership more valuable than aggressive outreach. Word-of-mouth referrals from colleagues who have seen real results trump even the most sophisticated demand generation campaigns.</p><p>The emergence of AI as a marketing buzzword presents both opportunity and risk. Whitver notes that countless vendors now position themselves as "AI-native" or "agentic AI" solutions without articulating meaningful differentiation. "If that's what you remember about their product, what do you actually do?" she asks. The challenge for marketers is communicating AI's business value without contributing to the noise.</p><p>CyberMarketingCon 2025 addresses these challenges head-on. Running December 7-10 in Austin, the conference brings together more than 550 marketing professionals for hands-on workshops, peer learning, and practical strategy sessions. Dedicated tracks cover brand, demand generation, operations, communications, and product marketing, with special summits for CEOs and sales leaders.</p><p>Hands-on AI workshops represent a conference highlight. Attendees can build marketing agents using n8n, explore Clay for go-to-market planning, or participate in a marketer-focused capture-the-flag hacking exercise. The "Marketing Time Machine" theme balances timeless fundamentals with forward-looking innovation, acknowledging that effective marketing requires both solid foundations and experimental thinking.</p><p>What sets CyberMarketingCon apart is its community-first philosophy. Despite 40-50% year-over-year growth, organizers prioritize maintaining an intimate, reunion-style atmosphere. Many CMOs bring entire teams for what becomes a working offsite, with different members attending specialized sessions then synthesizing insights into unified strategies.</p><p>The conference's success metric reflects this philosophy. "Our KPI is: is it worth your time?" Whitver says. In an industry where time represents the scarcest resource, that might be the most important question of all.</p><p>For cybersecurity marketers navigating an increasingly complex landscape, CyberMarketingCon offers something rare—a chance to learn from peers facing identical challenges, build practical skills, and remember that even in a technical industry, it's humans talking to humans.</p><p> </p><p><strong>CyberMarketingCon 2025 </strong>In Person & Virtual <br /><a href="https://www.cybermarketingconference.com" target="_blank">https://www.cybermarketingconference.com</a><br />Dec 7-10, 2025 in Austin, Texas <br /><br /><strong>GUEST:</strong></p><p><a href="https://www.linkedin.com/in/giannawhitver/" target="_blank">Gianna Whitver</a><br />Co-Founder & CEO, Cybersecurity Marketing Society | Cybersecurity GTM Industry Resource | Cybersecurity Marketing | Bees & Cybersecurity | Podcast Host | Community | (I like to build things & laugh a lot & tell jokes)<br /><br /><a href="https://www.linkedin.com/in/maria-vepa/" target="_blank">Maria Velasquez 🇲🇦</a><br />Cybersecurity Marketer by Trade, Beverage Disruptor by Passion<br /><br /><strong>HOSTS:</strong></p><p><strong>Sean Martin</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 3 Nov 2025 10:16:08 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Marco Ciappelli, Gianna Whitver, Maria Velasquez)</author>
      <link>https://eventcoveragepodcast.com/episodes/how-to-market-to-cybersecuritys-most-elusive-buyers-ai-emotion-and-the-human-touch-interview-with-gianna-whitver-and-maria-velasquez-cyber-marketing-con-2025-coverage-on-location-with-sean-martin-and-marco-ciappelli-pAkJAtWr</link>
      <content:encoded><![CDATA[<p><strong>How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</strong></p><p><strong>CyberMarketingCon 2025 </strong>In Person & Virtual <br /><a href="https://www.cybermarketingconference.com" target="_blank">https://www.cybermarketingconference.com</a><br />Dec 7-10, 2025 in Austin, Texas </p><p><strong>Why Cybersecurity Marketing Demands a Different Playbook</strong></p><p>The cybersecurity industry presents a paradox for marketers. While practitioners work with cutting-edge technology, traditional marketing approaches consistently fall flat. Gianna Whitver and Maria Velasquez, co-founders of the Cybersecurity Marketing Society, have spent six years understanding why—and they're sharing those insights at CyberMarketingCon 2025 this December in Austin.</p><p>The challenge begins with the audience itself. Security professionals operate under constant pressure, actively preventing threats while juggling competing priorities. This stress creates an environment where patience for marketing noise evaporates instantly. Unlike other industries where buyers might browse vendor websites or respond to cold outreach, cybersecurity practitioners have both the technical sophistication to evade tracking and the motivation to control their own buying journey.</p><p>"Our buyer is highly elusive," Whitver explains. "They're saving the world and their companies from threats. When vendors reach out, it's an interruption to critical work." This dynamic forces marketers to rethink fundamental assumptions about how business gets done.</p><p>The numbers tell part of the story. With over 5,000 cybersecurity vendors flooding the market, standing out based solely on technical specifications has become nearly impossible. Many solutions address similar problems with comparable features. The differentiator, Velasquez argues, isn't in the technology itself but in how that technology transforms the buyer's daily experience.</p><p>"We have to shed that technical layer and go for the emotion," Velasquez says. "If they buy our product, how is it gonna make them feel? Are they gonna get their weekends back with family? Are they actually gonna go to sleep without stress?" This human-centered approach represents a fundamental shift from the feeds-and-speeds messaging that dominated cybersecurity marketing for years.</p><p>The industry is witnessing what Velasquez calls an "evolution slash revolution" in marketing tactics. Humor, entertainment, and authentic storytelling are replacing dense whitepapers as the first touch point. The goal isn't to dumb down complex technology but to create space for meaningful engagement by first addressing the emotional reality of a stressful profession.</p><p>Trust remains the currency that matters most. Peer recommendations carry exponentially more weight than any advertising campaign. Security professionals rely on trusted networks to validate purchasing decisions, making community building and genuine thought leadership more valuable than aggressive outreach. Word-of-mouth referrals from colleagues who have seen real results trump even the most sophisticated demand generation campaigns.</p><p>The emergence of AI as a marketing buzzword presents both opportunity and risk. Whitver notes that countless vendors now position themselves as "AI-native" or "agentic AI" solutions without articulating meaningful differentiation. "If that's what you remember about their product, what do you actually do?" she asks. The challenge for marketers is communicating AI's business value without contributing to the noise.</p><p>CyberMarketingCon 2025 addresses these challenges head-on. Running December 7-10 in Austin, the conference brings together more than 550 marketing professionals for hands-on workshops, peer learning, and practical strategy sessions. Dedicated tracks cover brand, demand generation, operations, communications, and product marketing, with special summits for CEOs and sales leaders.</p><p>Hands-on AI workshops represent a conference highlight. Attendees can build marketing agents using n8n, explore Clay for go-to-market planning, or participate in a marketer-focused capture-the-flag hacking exercise. The "Marketing Time Machine" theme balances timeless fundamentals with forward-looking innovation, acknowledging that effective marketing requires both solid foundations and experimental thinking.</p><p>What sets CyberMarketingCon apart is its community-first philosophy. Despite 40-50% year-over-year growth, organizers prioritize maintaining an intimate, reunion-style atmosphere. Many CMOs bring entire teams for what becomes a working offsite, with different members attending specialized sessions then synthesizing insights into unified strategies.</p><p>The conference's success metric reflects this philosophy. "Our KPI is: is it worth your time?" Whitver says. In an industry where time represents the scarcest resource, that might be the most important question of all.</p><p>For cybersecurity marketers navigating an increasingly complex landscape, CyberMarketingCon offers something rare—a chance to learn from peers facing identical challenges, build practical skills, and remember that even in a technical industry, it's humans talking to humans.</p><p> </p><p><strong>CyberMarketingCon 2025 </strong>In Person & Virtual <br /><a href="https://www.cybermarketingconference.com" target="_blank">https://www.cybermarketingconference.com</a><br />Dec 7-10, 2025 in Austin, Texas <br /><br /><strong>GUEST:</strong></p><p><a href="https://www.linkedin.com/in/giannawhitver/" target="_blank">Gianna Whitver</a><br />Co-Founder & CEO, Cybersecurity Marketing Society | Cybersecurity GTM Industry Resource | Cybersecurity Marketing | Bees & Cybersecurity | Podcast Host | Community | (I like to build things & laugh a lot & tell jokes)<br /><br /><a href="https://www.linkedin.com/in/maria-vepa/" target="_blank">Maria Velasquez 🇲🇦</a><br />Cybersecurity Marketer by Trade, Beverage Disruptor by Passion<br /><br /><strong>HOSTS:</strong></p><p><strong>Sean Martin</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29199976" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3889583a-0acf-46f2-9672-c7a5d212e3b0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3889583a-0acf-46f2-9672-c7a5d212e3b0&amp;feed=2M86zCcc"/>
      <itunes:title>How to Market to Cybersecurity&apos;s Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Marco Ciappelli, Gianna Whitver, Maria Velasquez</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:24</itunes:duration>
      <itunes:summary>Cybersecurity marketing demands a different playbook. Gianna Whitver and Maria Velasquez, founders of the Cybersecurity Marketing Society, explain why emotional intelligence trumps technical specs when reaching stressed, elusive security buyers—and how CyberMarketingCon 2025 equips marketers with AI tools and timeless strategies for today&apos;s saturated market.
</itunes:summary>
      <itunes:subtitle>Cybersecurity marketing demands a different playbook. Gianna Whitver and Maria Velasquez, founders of the Cybersecurity Marketing Society, explain why emotional intelligence trumps technical specs when reaching stressed, elusive security buyers—and how CyberMarketingCon 2025 equips marketers with AI tools and timeless strategies for today&apos;s saturated market.
</itunes:subtitle>
      <itunes:keywords>trust-based marketing, peer marketing, thought leadership, cybersecurity marketing, marco ciappelli, sean martin, infosec, team building, cybersecurity, cmo summit, brand positioning, conference, b2b marketing strategies, clay.com, marketing society, ciso marketing, demand generation, technical buyer persona, marketing automation, go-to-market strategy, austin tech events, product marketing, event coverage, ciso leadership, cybersecurity startups, cybersecurity community, security vendor marketing, emotional marketing, december 2025 conference, sales enablement, ai, cybermarketingcon, cybersecurity culture, ai marketing tools, n8n automation, marketing ctf</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>280</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fe87e596-23e2-4a21-be0b-6bd33af3d6e8</guid>
      <title>First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</strong></p><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.</p><p>Connecting from New York and Florence to Melbourne, Sean Martin and Marco Ciappelli caught up with their longtime friend ahead of his keynote at AISA CyberCon. The conversation reveals what actually happens when a CISO faces the unthinkable—and why the relationships you build before crisis hits determine whether you survive it.</p><p>Tim became the first CISO ever charged by the SEC, a distinction nobody wants but one that shaped his mission: if sharing his experience helps even one security leader prepare better, then the entire saga becomes worthwhile. He's candid about the settlement process still underway, the emotional weight of having strangers ask for selfies, and the mental toll that landed him in a Zurich hospital with a heart attack the week his SEC charges were announced.</p><p>"For them to hear something and hear the context—to hear us taking six months off development, 400 engineers focused completely on security for six months in pure focus—when you say it with emotion, it conveys the real cost," Tim explained. Written communication failed during the incident. People needed to talk, to hear, to feel the weight of decisions being made in real time.</p><p>What saved SolarWinds wasn't just technical capability. It was implicit trust. The war room team operated without second-guessing each other. The CIO handled deployment and investigation. Engineering figured out how the build system was compromised. Marketing and legal managed their domains. Tim didn't waste cycles checking their work because trust was already built.</p><p>"If we didn't have that, we would've been second-guessing what other people did," he said. That trust came from relationships established long before December 2020, from a culture where people knew their roles and respected each other's expertise.</p><p>Now Tim's focused on mentoring the next generation through the RSA Conference CSO Bootcamp, helping aspiring CISOs and security leaders at smaller companies build the knowledge, community, and relationships they'll need when—not if—their own December 12th arrives. He tailors every talk to his audience, never delivering the same speech twice. Context matters in crisis, but it matters in communication too.</p><p>Australia played a significant role during SolarWinds' incident response, with the Australian government partnering closely in January 2021. Tim hadn't been back in a decade, making his return to Melbourne for CyberCon particularly meaningful. He's there to share lessons earned the hardest way possible, and to remind security leaders that stress management, safe spaces, and knowing when to compartmentalize aren't luxuries—they're survival skills.</p><p>His keynote covers the different stages of incident response, how culture drives crisis outcomes, and why the teams that step up matter more than the ones that run away. For anyone leading security teams, Tim's message is clear: build trust now, before you need it.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p>Tim Brown, CISO at SolarWinds | On LinkedIn: <a href="https://www.linkedin.com/in/tim-brown-ciso/" target="_blank">https://www.linkedin.com/in/tim-brown-ciso/</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 15 Oct 2025 16:48:15 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Amberley Brady, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/first-ciso-charged-by-sec-tim-brown-on-trust-context-and-leading-through-crisis-interview-with-tim-brown-aisa-cybercon-melbourne-2025-coverage-on-location-with-sean-martin-and-marco-ciappelli-P_Xz7GEB</link>
      <content:encoded><![CDATA[<p><strong>First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</strong></p><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.</p><p>Connecting from New York and Florence to Melbourne, Sean Martin and Marco Ciappelli caught up with their longtime friend ahead of his keynote at AISA CyberCon. The conversation reveals what actually happens when a CISO faces the unthinkable—and why the relationships you build before crisis hits determine whether you survive it.</p><p>Tim became the first CISO ever charged by the SEC, a distinction nobody wants but one that shaped his mission: if sharing his experience helps even one security leader prepare better, then the entire saga becomes worthwhile. He's candid about the settlement process still underway, the emotional weight of having strangers ask for selfies, and the mental toll that landed him in a Zurich hospital with a heart attack the week his SEC charges were announced.</p><p>"For them to hear something and hear the context—to hear us taking six months off development, 400 engineers focused completely on security for six months in pure focus—when you say it with emotion, it conveys the real cost," Tim explained. Written communication failed during the incident. People needed to talk, to hear, to feel the weight of decisions being made in real time.</p><p>What saved SolarWinds wasn't just technical capability. It was implicit trust. The war room team operated without second-guessing each other. The CIO handled deployment and investigation. Engineering figured out how the build system was compromised. Marketing and legal managed their domains. Tim didn't waste cycles checking their work because trust was already built.</p><p>"If we didn't have that, we would've been second-guessing what other people did," he said. That trust came from relationships established long before December 2020, from a culture where people knew their roles and respected each other's expertise.</p><p>Now Tim's focused on mentoring the next generation through the RSA Conference CSO Bootcamp, helping aspiring CISOs and security leaders at smaller companies build the knowledge, community, and relationships they'll need when—not if—their own December 12th arrives. He tailors every talk to his audience, never delivering the same speech twice. Context matters in crisis, but it matters in communication too.</p><p>Australia played a significant role during SolarWinds' incident response, with the Australian government partnering closely in January 2021. Tim hadn't been back in a decade, making his return to Melbourne for CyberCon particularly meaningful. He's there to share lessons earned the hardest way possible, and to remind security leaders that stress management, safe spaces, and knowing when to compartmentalize aren't luxuries—they're survival skills.</p><p>His keynote covers the different stages of incident response, how culture drives crisis outcomes, and why the teams that step up matter more than the ones that run away. For anyone leading security teams, Tim's message is clear: build trust now, before you need it.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p>Tim Brown, CISO at SolarWinds | On LinkedIn: <a href="https://www.linkedin.com/in/tim-brown-ciso/" target="_blank">https://www.linkedin.com/in/tim-brown-ciso/</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25837066" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3ae786b6-12f6-48e8-8716-7326d2621e4f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3ae786b6-12f6-48e8-8716-7326d2621e4f&amp;feed=2M86zCcc"/>
      <itunes:title>First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, Amberley Brady, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:54</itunes:duration>
      <itunes:summary>Tim Brown&apos;s job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.</itunes:summary>
      <itunes:subtitle>Tim Brown&apos;s job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sec charges, mental health, crisis management, sean martin, infosec, team building, cybersecurity, conference, resilience, event coverage, ciso leadership, aisacybercon, incident response, ai, cybersecurity culture, cybercon2025, solarwinds, implicit trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>279</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">554dd80e-a072-4317-a761-31b4db103447</guid>
      <title>Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<h3>Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</h3><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.</p><p>Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?</p><p>Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived.</p><p>"Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.</p><p>But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.</p><p>The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.</p><p>At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.</p><p>Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear.</p><p>"We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.</p><p>Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.</p><p>But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Virtual coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p>Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: <a href="https://www.linkedin.com/in/amberley-b-a62022353/" target="_blank">https://www.linkedin.com/in/amberley-b-a62022353/</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 13 Oct 2025 14:36:12 +0000</pubDate>
      <author>contact@itspmagazine.com (Amberley Brady, Marco Ciappelli, ITSPmagazine, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/everyone-is-protecting-my-password-but-who-is-protecting-my-toilet-paper-interview-with-amberley-brady-aisa-cybercon-melbourne-2025-coverage-on-location-with-sean-martin-and-marco-ciappelli-93lf42xV</link>
      <content:encoded><![CDATA[<h3>Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</h3><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.</p><p>Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?</p><p>Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived.</p><p>"Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.</p><p>But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.</p><p>The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.</p><p>At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.</p><p>Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear.</p><p>"We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.</p><p>Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.</p><p>But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Virtual coverage provided by ITSPmagazine</i></p><p><strong>GUEST:</strong></p><p>Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: <a href="https://www.linkedin.com/in/amberley-b-a62022353/" target="_blank">https://www.linkedin.com/in/amberley-b-a62022353/</a></p><p><strong>HOSTS:</strong></p><p>Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.seanmartin.com/">https://www.seanmartin.com</a></p><p>Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: <a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26967646" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7fd79e68-45df-4ab5-97ca-da437b2e5cc4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7fd79e68-45df-4ab5-97ca-da437b2e5cc4&amp;feed=2M86zCcc"/>
      <itunes:title>Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Amberley Brady, Marco Ciappelli, ITSPmagazine, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:05</itunes:duration>
      <itunes:summary>Empty shelves trigger something primal in us now. We&apos;ve lived through the panic, the uncertainty, the realization that our food supply isn&apos;t as secure as we thought. Amberley Brady hasn&apos;t forgotten that feeling, and she&apos;s turned it into action.</itunes:summary>
      <itunes:subtitle>Empty shelves trigger something primal in us now. We&apos;ve lived through the panic, the uncertainty, the realization that our food supply isn&apos;t as secure as we thought. Amberley Brady hasn&apos;t forgotten that feeling, and she&apos;s turned it into action.</itunes:subtitle>
      <itunes:keywords>agritech, critical infrastructure, marco ciappelli, food security, panic buying, sean martin, supply chain security, cybersecurity, socialmediasafety, conference, global market, food supply, event coverage, agricultural technology, aisacybercon, food pricing transparency, ai, cybercon2025, human firewall, internetsafety</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>278</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">08337a68-3f97-457b-97e8-8766d9bd04ca</guid>
      <title>Beyond Blame: Navigating the Digital World with Our Kids - Interview with Jacqueline (JJ) Jayne | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<h3>Beyond Blame: Navigating the Digital World with Our Kids</h3><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>There's something fundamentally broken in how we approach online safety for young people. We're quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely.</p><p>Speaking with her from Florence while she prepared for her session at AISA CyberCon Melbourne this week, it became clear that JJ understands what many in the cybersecurity world miss: this isn't a technical problem that needs a technical solution. It's a human problem that requires us to look in the mirror.</p><p>"The online world reflects what we've built for them," JJ told me, referring to our generation. "Now we need to step up and help fix it."</p><p>Her session, "Beyond Blame: Keeping Our Kids Safe Online," tackles something most cybersecurity professionals avoid—the uncomfortable truth that being an IT expert doesn't automatically make you equipped to protect the young people in your life. Last year's presentation at Cyber Con drew a full house, with nearly every hand raised when she asked who came because of a kid in their world.</p><p>That's the fascinating contradiction JJ exposes: rooms full of cybersecurity professionals who secure networks and defend against sophisticated attacks, yet find themselves lost when their own children navigate TikTok, Roblox, or encrypted messaging apps.</p><p>The timing couldn't be more relevant. With Australia implementing a social media ban for anyone under 16 starting December 10, 2025, and similar restrictions appearing globally, parents and carers face unprecedented challenges. But as JJ points out, banning isn't understanding, and restriction isn't education.</p><p>One revelation from our conversation particularly struck me—the hidden language of emojis. What seems innocent to adults carries entirely different meanings across demographics, from teenage subcultures to, disturbingly, predatory networks online. An explosion emoji doesn't just mean "boom" anymore. Context matters, and most adults are speaking a different digital dialect than their kids.</p><p>JJ, who successfully guided her now 19-year-old son through the gaming and social media years, isn't offering simple solutions because there aren't any. What she provides instead are conversation starters, resources tailored to different age groups, and even AI prompts that parents can customize for their specific situations.</p><p>The session reflects a broader shift happening at events like Cyber Con. It's no longer just IT professionals in the room. HR representatives, risk managers, educators, and parents are showing up because they've realized that digital safety doesn't respect departmental boundaries or professional expertise.</p><p>"We were analog brains in a digital world," JJ said, capturing our generational position perfectly. But today's kids? They're born into this interconnectedness, and COVID accelerated everything to a point where taking it away isn't an option.</p><p>The real question isn't who to blame. It's what role each of us plays in creating a safer digital environment. And that's a conversation worth having—whether you're at the Convention and Exhibition Center in Melbourne this week or joining virtually from anywhere else.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Virtual coverage provided by ITSPmagazine</i></p><p><strong>___________</strong></p><p><strong>GUEST:</strong></p><p><strong>Jacqueline (JJ) Jayne</strong>, Reducing human error in cyber and teaching 1 million people online safety. <br />On Linkedin: <a href="https://www.linkedin.com/in/jacquelinejayne/" target="_blank">https://www.linkedin.com/in/jacquelinejayne/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 11 Oct 2025 16:15:25 +0000</pubDate>
      <author>contact@itspmagazine.com (Jacqueline Jayne (JJ), Marco Ciappelli, ITSPmagazine, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/beyond-blame-navigating-the-digital-world-with-our-kids-interview-with-jacqueline-jj-jayne-aisa-cybercon-melbourne-2025-coverage-on-location-with-sean-martin-and-marco-ciappelli-v9rcdf0C</link>
      <content:encoded><![CDATA[<h3>Beyond Blame: Navigating the Digital World with Our Kids</h3><p><strong>AISA CyberCon Melbourne | October 15-17, 2025</strong></p><p>There's something fundamentally broken in how we approach online safety for young people. We're quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely.</p><p>Speaking with her from Florence while she prepared for her session at AISA CyberCon Melbourne this week, it became clear that JJ understands what many in the cybersecurity world miss: this isn't a technical problem that needs a technical solution. It's a human problem that requires us to look in the mirror.</p><p>"The online world reflects what we've built for them," JJ told me, referring to our generation. "Now we need to step up and help fix it."</p><p>Her session, "Beyond Blame: Keeping Our Kids Safe Online," tackles something most cybersecurity professionals avoid—the uncomfortable truth that being an IT expert doesn't automatically make you equipped to protect the young people in your life. Last year's presentation at Cyber Con drew a full house, with nearly every hand raised when she asked who came because of a kid in their world.</p><p>That's the fascinating contradiction JJ exposes: rooms full of cybersecurity professionals who secure networks and defend against sophisticated attacks, yet find themselves lost when their own children navigate TikTok, Roblox, or encrypted messaging apps.</p><p>The timing couldn't be more relevant. With Australia implementing a social media ban for anyone under 16 starting December 10, 2025, and similar restrictions appearing globally, parents and carers face unprecedented challenges. But as JJ points out, banning isn't understanding, and restriction isn't education.</p><p>One revelation from our conversation particularly struck me—the hidden language of emojis. What seems innocent to adults carries entirely different meanings across demographics, from teenage subcultures to, disturbingly, predatory networks online. An explosion emoji doesn't just mean "boom" anymore. Context matters, and most adults are speaking a different digital dialect than their kids.</p><p>JJ, who successfully guided her now 19-year-old son through the gaming and social media years, isn't offering simple solutions because there aren't any. What she provides instead are conversation starters, resources tailored to different age groups, and even AI prompts that parents can customize for their specific situations.</p><p>The session reflects a broader shift happening at events like Cyber Con. It's no longer just IT professionals in the room. HR representatives, risk managers, educators, and parents are showing up because they've realized that digital safety doesn't respect departmental boundaries or professional expertise.</p><p>"We were analog brains in a digital world," JJ said, capturing our generational position perfectly. But today's kids? They're born into this interconnectedness, and COVID accelerated everything to a point where taking it away isn't an option.</p><p>The real question isn't who to blame. It's what role each of us plays in creating a safer digital environment. And that's a conversation worth having—whether you're at the Convention and Exhibition Center in Melbourne this week or joining virtually from anywhere else.</p><p><strong>AISA CyberCon Melbourne runs October 15-17, 2025</strong> <i>Virtual coverage provided by ITSPmagazine</i></p><p><strong>___________</strong></p><p><strong>GUEST:</strong></p><p><strong>Jacqueline (JJ) Jayne</strong>, Reducing human error in cyber and teaching 1 million people online safety. <br />On Linkedin: <a href="https://www.linkedin.com/in/jacquelinejayne/" target="_blank">https://www.linkedin.com/in/jacquelinejayne/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23560864" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8ad97563-d484-4409-9dbd-2b9bd5074d18/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8ad97563-d484-4409-9dbd-2b9bd5074d18&amp;feed=2M86zCcc"/>
      <itunes:title>Beyond Blame: Navigating the Digital World with Our Kids - Interview with Jacqueline (JJ) Jayne | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Jacqueline Jayne (JJ), Marco Ciappelli, ITSPmagazine, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:32</itunes:duration>
      <itunes:summary>There&apos;s something fundamentally broken in how we approach online safety for young people. We&apos;re quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely.
</itunes:summary>
      <itunes:subtitle>There&apos;s something fundamentally broken in how we approach online safety for young people. We&apos;re quick to point fingers—at tech companies, at schools, at kids themselves—but Jacqueline Jayne (JJ) wants to change that conversation entirely.
</itunes:subtitle>
      <itunes:keywords>parentingindigitalage, cyberconmelbourne, parentingtips, marco ciappelli, sean martin, cyberawareness, kidssafety, cybersecurity, socialmediasafety, conference, onlinesafety, digitalliteracy, event coverage, digitalparenting, teensafety, aisacybercon, cybercon2025, internetsafety</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>277</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">337862c2-f4df-42cc-bb2c-e805b5eaf8dd</guid>
      <title>The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.</p><p>One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.</p><p>But this keynote isn’t just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren’t just new tools—they’re a fundamental shift in where and how we anchor trust.</p><p>Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant’s latest report. That revelation struck a chord with conference attendees, who appreciated Moore’s willingness to speak plainly about systemic security debt.</p><p>He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we’ll need new frameworks—not just tweaks to old ones—to manage what comes next.</p><p>This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.</p><p><strong>___________</strong></p><p><strong>GUEST:</strong></p><p><strong>HD Moore</strong>, Founder and CEO of RunZero | On Linkedin: <a href="https://www.linkedin.com/in/hdmoore/" target="_blank">https://www.linkedin.com/in/hdmoore/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>RESOURCES:</strong></p><p>Keynote: The Once and Future Rules of Cybersecurity: <a href="https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596" target="_blank">https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596</a></p><p>Learn more and catch more stories from our SecTor 2025 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025</a></p><p>Mandiant M-Trends Breach Report: <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/" target="_blank">https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/</a></p><p>OPM Data Breach Summary: <a href="https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/" target="_blank">https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p><strong>KEYWORDS:</strong></p><p>hd moore, sean martin, marco ciappelli, metasploit, runzero, sector, password, breach, ai, passkeys, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 Oct 2025 20:03:53 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, HD Moore)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-once-and-future-rules-of-cybersecurity-a-black-hat-sector-2025-conversation-with-hd-moore-on-location-coverage-with-sean-martin-and-marco-ciappelli-HZ67FB2h</link>
      <content:encoded><![CDATA[<p>During his keynote at SecTor 2025, HD Moore, founder and CEO of runZero and widely recognized for creating Metasploit, invites the cybersecurity community to rethink the foundational “rules” we continue to follow—often without question. In conversation with Sean Martin and Marco Ciappelli for ITSPmagazine’s on-location event coverage, Moore breaks down where our security doctrines came from, why some became obsolete, and which ones still hold water.</p><p>One standout example? The rule to “change your passwords every 30 days.” Moore explains how this outdated guidance—rooted in assumptions from the early 2000s when password sharing was rampant—led to predictable patterns and frustrated users. Today, the advice has flipped: focus on strong, unique passwords per service, stored securely via password managers.</p><p>But this keynote isn’t just about passwords. Moore uses this lens to explore how many security “truths” were formed in response to technical limitations or outdated behaviors—things like shared network trust, brittle segmentation, and fragile authentication models. As technology matures, so too should the rules. Enter passkeys, hardware tokens, and enclave-based authentication. These aren’t just new tools—they’re a fundamental shift in where and how we anchor trust.</p><p>Moore also calls out an uncomfortable truth: the very products we rely on to protect our systems—firewalls, endpoint managers, and security appliances—are now among the top vectors for breach, per Mandiant’s latest report. That revelation struck a chord with conference attendees, who appreciated Moore’s willingness to speak plainly about systemic security debt.</p><p>He also discusses the inescapable vulnerabilities in AI agent flows, likening prompt injection attacks to the early days of cross-site scripting. The tech itself invites risk, he warns, and we’ll need new frameworks—not just tweaks to old ones—to manage what comes next.</p><p>This conversation is a must-listen for anyone questioning whether our security playbooks are still fit for purpose—or simply carried forward by habit.</p><p><strong>___________</strong></p><p><strong>GUEST:</strong></p><p><strong>HD Moore</strong>, Founder and CEO of RunZero | On Linkedin: <a href="https://www.linkedin.com/in/hdmoore/" target="_blank">https://www.linkedin.com/in/hdmoore/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, <a href="itspmagazine.com" target="_blank">ITSPmagazine</a> and <a href="studioc60.com" target="_blank">Studio C60</a> | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>RESOURCES:</strong></p><p>Keynote: The Once and Future Rules of Cybersecurity: <a href="https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596" target="_blank">https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-the-once-and-future-rules-of-cybersecurity-49596</a></p><p>Learn more and catch more stories from our SecTor 2025 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025</a></p><p>Mandiant M-Trends Breach Report: <a href="https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/" target="_blank">https://cloud.google.com/blog/topics/threat-intelligence/m-trends-2025/</a></p><p>OPM Data Breach Summary: <a href="https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/" target="_blank">https://oversight.house.gov/report/opm-data-breach-government-jeopardized-national-security-generation/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p><strong>KEYWORDS:</strong></p><p>hd moore, sean martin, marco ciappelli, metasploit, runzero, sector, password, breach, ai, passkeys, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22674834" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7cb51d5f-3ab2-446a-b95d-7ba65139097e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7cb51d5f-3ab2-446a-b95d-7ba65139097e&amp;feed=2M86zCcc"/>
      <itunes:title>The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, HD Moore</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22c7434a-cfed-4bf2-b982-9055d40079f5/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:37</itunes:duration>
      <itunes:summary>Security pioneer HD Moore joins ITSPmagazine at SecTor 2025 to break down which cybersecurity “rules” still matter—and which are dangerously outdated. From password policies to AI vulnerabilities and the hidden risks in our own firewalls, this keynote conversation challenges us to rethink what we take for granted.</itunes:summary>
      <itunes:subtitle>Security pioneer HD Moore joins ITSPmagazine at SecTor 2025 to break down which cybersecurity “rules” still matter—and which are dangerously outdated. From password policies to AI vulnerabilities and the hidden risks in our own firewalls, this keynote conversation challenges us to rethink what we take for granted.</itunes:subtitle>
      <itunes:keywords>hd moore, password, marco ciappelli, metasploit, sean martin, conference, breach, on location, sector, event coverage, runzero, passkeys, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>276</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">62fb7998-1859-4968-86b8-0c4335fdddf1</guid>
      <title>Why Identity Must Come First in the Age of AI Agents | A Black Hat SecTor 2025 Conversation with Cristin Flynn Goodwin | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>When we talk about AI at cybersecurity conferences these days, one term is impossible to ignore: <i>agentic AI</i>. But behind the excitement around AI-driven productivity and autonomous workflows lies an unresolved—and increasingly urgent—security issue: identity.</p><p>In this episode, Sean Martin and Marco Ciappelli speak with Cristin Flynn Goodwin, keynote speaker at SecTor 2025, about the intersection of AI agents, identity management, and legal risk. Drawing from decades at the center of major security incidents—most recently as the head cybersecurity lawyer at Microsoft—Cristin frames today’s AI hype within a longstanding identity crisis that organizations still haven’t solved.</p><p><strong>Why It Matters Now</strong></p><p>Agentic AI changes the game. AI agents can act independently, replicate themselves, and disappear in seconds. That’s great for automation—but terrifying for risk teams. Cristin flags the pressing need to identify and authenticate these ephemeral agents. Should they be digitally signed? Should there be a new standard body managing agent identities? Right now, we don’t know.</p><p>Meanwhile, attackers are already adapting. AI tools are being used to create flawless phishing emails, spoofed banking agents, and convincing digital personas. Add that to the fact that many consumers and companies still haven’t implemented strong MFA, and the risk multiplier becomes clear.</p><p><strong>The Legal View</strong></p><p>From a legal standpoint, Cristin emphasizes how regulations like New York’s DFS Cybersecurity Regulation are putting pressure on CISOs to tighten IAM controls. But what about individuals? “It’s an unfair fight,” she says—no consumer can outpace a nation-state attacker armed with AI tooling.</p><p>This keynote preview also calls attention to shadow AI agents: tools employees may create outside the control of IT or security. As Cristin warns, they could become “offensive digital insiders”—another dimension of the insider threat amplified by AI.</p><p><strong>Looking Ahead</strong></p><p>This is a must-listen episode for CISOs, security architects, policymakers, and anyone thinking about AI safety and digital trust. From the potential need for real-time, verifiable agent credentials to the looming collision of agentic AI with quantum computing, this conversation kicks off SecTor 2025 with urgency and clarity.</p><p>Catch the full episode now, and don’t miss Cristin’s keynote on October 1.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Cristin Flynn Goodwin</strong>, Senior Consultant, Good Harbor Security Risk Management | On LinkedIn: <a href="https://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/" target="_blank">https://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving: <a href="https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591" target="_blank">https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591</a></p><p>Learn more and catch more stories from our SecTor 2025 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025</a></p><p>New York Department of Financial Services Cybersecurity Regulation: <a href="https://www.dfs.ny.gov/industry_guidance/cybersecurity" target="_blank">https://www.dfs.ny.gov/industry_guidance/cybersecurity</a></p><p>Good Harbor Security Risk Management (Richard Clarke’s firm): <a href="https://www.goodharbor.net/" target="_blank">https://www.goodharbor.net/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>cristin flynn goodwin, sean martin, marco ciappelli, sector, microsoft, ai, identity, agents, ciso, quantum, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Sep 2025 23:32:10 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, Cristin Flynn Goodwin)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-identity-must-come-first-in-the-age-of-ai-agents-a-black-hat-sector-2025-conversation-with-cristin-flynn-goodwin-on-location-coverage-with-sean-martin-and-marco-ciappelli-WJFOnXZX</link>
      <content:encoded><![CDATA[<p>When we talk about AI at cybersecurity conferences these days, one term is impossible to ignore: <i>agentic AI</i>. But behind the excitement around AI-driven productivity and autonomous workflows lies an unresolved—and increasingly urgent—security issue: identity.</p><p>In this episode, Sean Martin and Marco Ciappelli speak with Cristin Flynn Goodwin, keynote speaker at SecTor 2025, about the intersection of AI agents, identity management, and legal risk. Drawing from decades at the center of major security incidents—most recently as the head cybersecurity lawyer at Microsoft—Cristin frames today’s AI hype within a longstanding identity crisis that organizations still haven’t solved.</p><p><strong>Why It Matters Now</strong></p><p>Agentic AI changes the game. AI agents can act independently, replicate themselves, and disappear in seconds. That’s great for automation—but terrifying for risk teams. Cristin flags the pressing need to identify and authenticate these ephemeral agents. Should they be digitally signed? Should there be a new standard body managing agent identities? Right now, we don’t know.</p><p>Meanwhile, attackers are already adapting. AI tools are being used to create flawless phishing emails, spoofed banking agents, and convincing digital personas. Add that to the fact that many consumers and companies still haven’t implemented strong MFA, and the risk multiplier becomes clear.</p><p><strong>The Legal View</strong></p><p>From a legal standpoint, Cristin emphasizes how regulations like New York’s DFS Cybersecurity Regulation are putting pressure on CISOs to tighten IAM controls. But what about individuals? “It’s an unfair fight,” she says—no consumer can outpace a nation-state attacker armed with AI tooling.</p><p>This keynote preview also calls attention to shadow AI agents: tools employees may create outside the control of IT or security. As Cristin warns, they could become “offensive digital insiders”—another dimension of the insider threat amplified by AI.</p><p><strong>Looking Ahead</strong></p><p>This is a must-listen episode for CISOs, security architects, policymakers, and anyone thinking about AI safety and digital trust. From the potential need for real-time, verifiable agent credentials to the looming collision of agentic AI with quantum computing, this conversation kicks off SecTor 2025 with urgency and clarity.</p><p>Catch the full episode now, and don’t miss Cristin’s keynote on October 1.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Cristin Flynn Goodwin</strong>, Senior Consultant, Good Harbor Security Risk Management | On LinkedIn: <a href="https://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/" target="_blank">https://www.linkedin.com/in/cristin-flynn-goodwin-24359b4/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Keynote: Agentic AI and Identity: The Biggest Problem We're Not Solving: <a href="https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591" target="_blank">https://www.blackhat.com/sector/2025/briefings/schedule/#keynote-agentic-ai-and-identity-the-biggest-problem-were-not-solving-49591</a></p><p>Learn more and catch more stories from our SecTor 2025 coverage: <a href="https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025" target="_blank">https://www.itspmagazine.com/cybersecurity-technology-society-events/sector-cybersecurity-conference-toronto-2025</a></p><p>New York Department of Financial Services Cybersecurity Regulation: <a href="https://www.dfs.ny.gov/industry_guidance/cybersecurity" target="_blank">https://www.dfs.ny.gov/industry_guidance/cybersecurity</a></p><p>Good Harbor Security Risk Management (Richard Clarke’s firm): <a href="https://www.goodharbor.net/" target="_blank">https://www.goodharbor.net/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to share an Event Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>cristin flynn goodwin, sean martin, marco ciappelli, sector, microsoft, ai, identity, agents, ciso, quantum, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20889745" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8dab5652-0826-452f-a397-e5abcdced551/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8dab5652-0826-452f-a397-e5abcdced551&amp;feed=2M86zCcc"/>
      <itunes:title>Why Identity Must Come First in the Age of AI Agents | A Black Hat SecTor 2025 Conversation with Cristin Flynn Goodwin | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, Cristin Flynn Goodwin</itunes:author>
      <itunes:duration>00:21:45</itunes:duration>
      <itunes:summary>AI agents are accelerating automation—but without trustworthy identity systems in place, they also multiply risk. In this episode, Cristin Flynn Goodwin breaks down the legal, technical, and human stakes of AI-driven ecosystems and why identity must come first.</itunes:summary>
      <itunes:subtitle>AI agents are accelerating automation—but without trustworthy identity systems in place, they also multiply risk. In this episode, Cristin Flynn Goodwin breaks down the legal, technical, and human stakes of AI-driven ecosystems and why identity must come first.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ciso, sean martin, cristin flynn goodwin, microsoft, conference, on location, sector, agents, event coverage, quantum, identity, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>275</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb079710-7673-47f9-9bcc-e17de3c50158</guid>
      <title>From Broadcasting to AI Agents: Mark Smith on Technology&apos;s 100-Year Evolution at IBC 2025 Amsterdam | On Location Event Coverage Podcast With Sean Martin &amp; Marco Ciappelli</title>
      <description><![CDATA[<p>I had one of those conversations that reminded me why I'm so passionate about exploring the intersection of technology and society. Speaking with Mark Smith, a board member at IBC and co-lead of their accelerator program, I found myself transported back to my roots in communication and media studies, but with eyes wide open to what's coming next.</p><p>Mark has spent over 30 years in media technology, including 23 years building Mobile World Congress in Barcelona. When someone with that depth of experience gets excited about what's happening now, you pay attention. And what's happening at IBC 2025 in Amsterdam this September is nothing short of a redefinition of how we create, distribute, and authenticate content.</p><p>The numbers alone are staggering: 1,350 exhibitors across 14 halls, nearly 300 speakers, 45,000 visitors. But what struck me wasn't the scale—it's the philosophical shift happening in how we think about media production. We're witnessing television's centennial year, with the first demonstrations happening in 1925, and yet we're simultaneously seeing the birth of entirely new forms of creative expression.</p><p>What fascinated me most was Mark's description of their Accelerator Media Innovation Program. Since 2019, they've run over 50 projects involving 350 organizations, creating what he calls "a safe environment" for collaboration. This isn't just about showcasing new gadgets—it's about solving real challenges that keep media professionals awake at night. In our Hybrid Analog Digital Society, the traditional boundaries between broadcaster and audience, between creator and consumer, are dissolving faster than ever.</p><p>The AI revolution in media production particularly caught my attention. Mark spoke about "AI assistant agents" and "agentic AI" with the enthusiasm of someone who sees liberation rather than replacement. As he put it, "It's an opportunity to take out a lot of laborious processes." But more importantly, he emphasized that it's creating new jobs—who would have thought "AI prompter" would become a legitimate profession?</p><p>This perspective challenges the dystopian narrative often surrounding AI adoption. Instead of fearing the technology, the media industry seems to be embracing it as a tool for enhanced creativity. Mark's excitement was infectious when describing how AI can remove the "boring" aspects of production, allowing creative minds to focus on what they do best—tell stories that matter.</p><p>But here's where it gets really interesting from a sociological perspective: the other side of the screen. We talked about how streaming revolutionized content consumption, giving viewers unprecedented control over their experience. Yet Mark observed something I've noticed too—while the technology exists for viewers to be their own directors (choosing camera angles in sports, for instance), many prefer to trust the professional's vision. We're not necessarily seeking more control; we're seeking more relevance and authenticity.</p><p>This brings us to one of the most critical challenges of our time: content provenance. In a world where anyone can create content that looks professional, how do we distinguish between authentic journalism and manufactured narratives? Mark highlighted their work on C2PA (content provenance initiative), developing tools that can sign and verify media sources, tracking where content has been manipulated.</p><p>This isn't just a technical challenge—it's a societal imperative. As Mark noted, YouTube is now the second most viewed platform in the UK. When user-generated content competes directly with traditional media, we need new frameworks for understanding truth and authenticity. The old editorial gatekeepers are gone; we need technological solutions that preserve trust while enabling creativity.</p><p>What gives me hope is the approach I heard from Mark and his colleagues. They're not trying to control technology's impact on society—they're trying to shape it consciously. The IBC Accelerator Program represents something profound: an industry taking responsibility for its own transformation, creating spaces for collaboration rather than competition, focusing on solving real problems rather than just building cool technology.</p><p>The Google Hackfest they're launching this year perfectly embodies this philosophy. Young broadcast engineers and software developers working together on real challenges, supported by established companies like Formula E. It's not about replacing human creativity with artificial intelligence—it's about augmenting human potential with technological tools.</p><p>As I wrapped up our conversation, I found myself thinking about my own journey from studying sociology of communication in a pre-internet world to hosting podcasts about our digital transformation. Technology doesn't just change how we communicate—it changes who we are as communicators, as creators, as human beings sharing stories.</p><p>IBC 2025 isn't just a trade show; it's a glimpse into how we're choosing to redefine our relationship with media technology. And that choice—that conscious decision to shape rather than simply react—gives me genuine optimism about our Hybrid Analog Digital Society.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Aug 2025 06:36:23 +0000</pubDate>
      <author>contact@itspmagazine.com (On Location Podcast, Sean Martin, ITSPmagazine, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-broadcasting-to-ai-agents-mark-smith-on-technologys-100-year-evolution-at-ibc-2025-amsterdam-on-location-event-coverage-podcast-with-sean-martin-marco-ciappelli-UTdJ5zs1</link>
      <content:encoded><![CDATA[<p>I had one of those conversations that reminded me why I'm so passionate about exploring the intersection of technology and society. Speaking with Mark Smith, a board member at IBC and co-lead of their accelerator program, I found myself transported back to my roots in communication and media studies, but with eyes wide open to what's coming next.</p><p>Mark has spent over 30 years in media technology, including 23 years building Mobile World Congress in Barcelona. When someone with that depth of experience gets excited about what's happening now, you pay attention. And what's happening at IBC 2025 in Amsterdam this September is nothing short of a redefinition of how we create, distribute, and authenticate content.</p><p>The numbers alone are staggering: 1,350 exhibitors across 14 halls, nearly 300 speakers, 45,000 visitors. But what struck me wasn't the scale—it's the philosophical shift happening in how we think about media production. We're witnessing television's centennial year, with the first demonstrations happening in 1925, and yet we're simultaneously seeing the birth of entirely new forms of creative expression.</p><p>What fascinated me most was Mark's description of their Accelerator Media Innovation Program. Since 2019, they've run over 50 projects involving 350 organizations, creating what he calls "a safe environment" for collaboration. This isn't just about showcasing new gadgets—it's about solving real challenges that keep media professionals awake at night. In our Hybrid Analog Digital Society, the traditional boundaries between broadcaster and audience, between creator and consumer, are dissolving faster than ever.</p><p>The AI revolution in media production particularly caught my attention. Mark spoke about "AI assistant agents" and "agentic AI" with the enthusiasm of someone who sees liberation rather than replacement. As he put it, "It's an opportunity to take out a lot of laborious processes." But more importantly, he emphasized that it's creating new jobs—who would have thought "AI prompter" would become a legitimate profession?</p><p>This perspective challenges the dystopian narrative often surrounding AI adoption. Instead of fearing the technology, the media industry seems to be embracing it as a tool for enhanced creativity. Mark's excitement was infectious when describing how AI can remove the "boring" aspects of production, allowing creative minds to focus on what they do best—tell stories that matter.</p><p>But here's where it gets really interesting from a sociological perspective: the other side of the screen. We talked about how streaming revolutionized content consumption, giving viewers unprecedented control over their experience. Yet Mark observed something I've noticed too—while the technology exists for viewers to be their own directors (choosing camera angles in sports, for instance), many prefer to trust the professional's vision. We're not necessarily seeking more control; we're seeking more relevance and authenticity.</p><p>This brings us to one of the most critical challenges of our time: content provenance. In a world where anyone can create content that looks professional, how do we distinguish between authentic journalism and manufactured narratives? Mark highlighted their work on C2PA (content provenance initiative), developing tools that can sign and verify media sources, tracking where content has been manipulated.</p><p>This isn't just a technical challenge—it's a societal imperative. As Mark noted, YouTube is now the second most viewed platform in the UK. When user-generated content competes directly with traditional media, we need new frameworks for understanding truth and authenticity. The old editorial gatekeepers are gone; we need technological solutions that preserve trust while enabling creativity.</p><p>What gives me hope is the approach I heard from Mark and his colleagues. They're not trying to control technology's impact on society—they're trying to shape it consciously. The IBC Accelerator Program represents something profound: an industry taking responsibility for its own transformation, creating spaces for collaboration rather than competition, focusing on solving real problems rather than just building cool technology.</p><p>The Google Hackfest they're launching this year perfectly embodies this philosophy. Young broadcast engineers and software developers working together on real challenges, supported by established companies like Formula E. It's not about replacing human creativity with artificial intelligence—it's about augmenting human potential with technological tools.</p><p>As I wrapped up our conversation, I found myself thinking about my own journey from studying sociology of communication in a pre-internet world to hosting podcasts about our digital transformation. Technology doesn't just change how we communicate—it changes who we are as communicators, as creators, as human beings sharing stories.</p><p>IBC 2025 isn't just a trade show; it's a glimpse into how we're choosing to redefine our relationship with media technology. And that choice—that conscious decision to shape rather than simply react—gives me genuine optimism about our Hybrid Analog Digital Society.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23130790" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7eceb56b-e63a-4238-a667-2ab2cbd45b22/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7eceb56b-e63a-4238-a667-2ab2cbd45b22&amp;feed=2M86zCcc"/>
      <itunes:title>From Broadcasting to AI Agents: Mark Smith on Technology&apos;s 100-Year Evolution at IBC 2025 Amsterdam | On Location Event Coverage Podcast With Sean Martin &amp; Marco Ciappelli</itunes:title>
      <itunes:author>On Location Podcast, Sean Martin, ITSPmagazine, Marco Ciappelli</itunes:author>
      <itunes:duration>00:24:05</itunes:duration>
      <itunes:summary>I had a fascinating conversation with Mark Smith from IBC&apos;s board about how media technology is evolving at their Amsterdam event. From AI-powered production tools to content provenance systems, we explored how innovation is reshaping our relationship with media in our Hybrid Analog Digital Society, where authenticity and creativity must coexist.
</itunes:summary>
      <itunes:subtitle>I had a fascinating conversation with Mark Smith from IBC&apos;s board about how media technology is evolving at their Amsterdam event. From AI-powered production tools to content provenance systems, we explored how innovation is reshaping our relationship with media in our Hybrid Analog Digital Society, where authenticity and creativity must coexist.
</itunes:subtitle>
      <itunes:keywords>technology, content provenance, tech, cybersecurity, hybrid digital society, technology and society, streaming technology, media production, mass media, broadcasting, media innovation, ai in broadcasting, content authentication, digital transformation, ibc amsterdam</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>274</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">af17b9cc-536d-4be0-b33c-ddf80880712e</guid>
      <title>AI Confusion, Privacy Pressures, and the Search for Real Value in Cybersecurity | A Black Hat USA 2025 Conversation with Evgeniy Kharam | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>This year at Black Hat USA 2025, the conversation is impossible to escape: artificial intelligence. But while every vendor claims an AI-powered edge, the real question is how organizations can separate meaningful innovation from noise.</p><p>In our discussion with Evgeniy Kharam, Vice President of Cybersecurity Architecture at Herjavec Group (formerly), Chief Strategy Officer (CSO) at Discern Security, and long-time security leader and author, the theme of AI confusion takes center stage. Evgeniy notes that CISOs and security architects don’t have the time or resources to analyze what “AI” means in every product pitch. With over 4,000 vendors in the ecosystem, each layering its own flavor of AI, the burden falls on security leaders to distinguish hype from usable automation.</p><p><strong>From Gondola Pitches to AI Overload</strong></p><p>Evgeniy shares how his creative networking events—skiing, biking, and beyond—mirror the industry’s need for genuine connection and trust. Just as his “gondola pitch” builds authentic engagement, buyers want clarity and honesty from technology providers. The proliferation of AI labels, however, makes that trust harder to establish.</p><p><strong>Where AI Can Help</strong></p><p>Evgeniy highlights areas where AI can reduce friction, from vulnerability management and detection to policy writing and compliance. Yet, even here, issues such as hallucinations, privacy tradeoffs, and ethics cannot be ignored. When AI begins influencing employee monitoring or analyzing sensitive data, organizations face difficult questions about fairness, transparency, and control.</p><p><strong>The Unspoken Challenge: Surveillance and Trust</strong></p><p>As we discuss the balance between employee privacy and corporate protection, it becomes clear that AI introduces new layers of surveillance. In Europe, cultural and legal boundaries create clear separation between personal and professional lives. In North America, the lines blur, raising ethical debates that may ultimately be tested in courts.</p><p>The takeaway? AI has the potential to unlock workflows that were previously too costly or complex. But without transparency, governance, and a commitment to responsible use, the “AI in everything” trend risks overwhelming the very leaders it is meant to help.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Evgeniy Kharam</strong>, Chief Strategy Officer (CSO), Discern Security | On LinkedIn: <a href="https://www.linkedin.com/in/ekharam/" target="_blank">https://www.linkedin.com/in/ekharam/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, evgeniy kharam, black hat usa 2025, ai, privacy, surveillance, cybersecurity, automation, governance, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 24 Aug 2025 18:26:51 +0000</pubDate>
      <author>contact@itspmagazine.com (Evgeniy Kharam, Sean Martin, ITSPmagazine, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-confusion-privacy-pressures-and-the-search-for-real-value-in-cybersecurity-a-black-hat-usa-2025-conversation-with-evgeniy-kharam-on-location-coverage-with-sean-martin-and-marco-ciappelli-vfmk2boR</link>
      <content:encoded><![CDATA[<p>This year at Black Hat USA 2025, the conversation is impossible to escape: artificial intelligence. But while every vendor claims an AI-powered edge, the real question is how organizations can separate meaningful innovation from noise.</p><p>In our discussion with Evgeniy Kharam, Vice President of Cybersecurity Architecture at Herjavec Group (formerly), Chief Strategy Officer (CSO) at Discern Security, and long-time security leader and author, the theme of AI confusion takes center stage. Evgeniy notes that CISOs and security architects don’t have the time or resources to analyze what “AI” means in every product pitch. With over 4,000 vendors in the ecosystem, each layering its own flavor of AI, the burden falls on security leaders to distinguish hype from usable automation.</p><p><strong>From Gondola Pitches to AI Overload</strong></p><p>Evgeniy shares how his creative networking events—skiing, biking, and beyond—mirror the industry’s need for genuine connection and trust. Just as his “gondola pitch” builds authentic engagement, buyers want clarity and honesty from technology providers. The proliferation of AI labels, however, makes that trust harder to establish.</p><p><strong>Where AI Can Help</strong></p><p>Evgeniy highlights areas where AI can reduce friction, from vulnerability management and detection to policy writing and compliance. Yet, even here, issues such as hallucinations, privacy tradeoffs, and ethics cannot be ignored. When AI begins influencing employee monitoring or analyzing sensitive data, organizations face difficult questions about fairness, transparency, and control.</p><p><strong>The Unspoken Challenge: Surveillance and Trust</strong></p><p>As we discuss the balance between employee privacy and corporate protection, it becomes clear that AI introduces new layers of surveillance. In Europe, cultural and legal boundaries create clear separation between personal and professional lives. In North America, the lines blur, raising ethical debates that may ultimately be tested in courts.</p><p>The takeaway? AI has the potential to unlock workflows that were previously too costly or complex. But without transparency, governance, and a commitment to responsible use, the “AI in everything” trend risks overwhelming the very leaders it is meant to help.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Evgeniy Kharam</strong>, Chief Strategy Officer (CSO), Discern Security | On LinkedIn: <a href="https://www.linkedin.com/in/ekharam/" target="_blank">https://www.linkedin.com/in/ekharam/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, evgeniy kharam, black hat usa 2025, ai, privacy, surveillance, cybersecurity, automation, governance, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="15557381" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/af334174-42ac-46d8-8474-e4bc45022eae/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=af334174-42ac-46d8-8474-e4bc45022eae&amp;feed=2M86zCcc"/>
      <itunes:title>AI Confusion, Privacy Pressures, and the Search for Real Value in Cybersecurity | A Black Hat USA 2025 Conversation with Evgeniy Kharam | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Evgeniy Kharam, Sean Martin, ITSPmagazine, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:12</itunes:duration>
      <itunes:summary>At Black Hat USA 2025, AI dominated the conversation—but for many security leaders, the flood of vendor claims creates more confusion than clarity. In this episode, Evgeniy Kharam shares his perspective on where AI adds value, where it falls short, and how privacy, surveillance, and ethics must shape the future of adoption.</itunes:summary>
      <itunes:subtitle>At Black Hat USA 2025, AI dominated the conversation—but for many security leaders, the flood of vendor claims creates more confusion than clarity. In this episode, Evgeniy Kharam shares his perspective on where AI adds value, where it falls short, and how privacy, surveillance, and ethics must shape the future of adoption.</itunes:subtitle>
      <itunes:keywords>surveillance, marco ciappelli, sean martin, automation, cybersecurity, conference, on location, evgeniy kharam, black hat usa 2025, event coverage, ai, privacy, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>273</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c239550c-4932-417f-a9e5-d02125ea99c9</guid>
      <title>We&apos;re Becoming Dumb and Numb&quot;: Why Black Hat 2025&apos;s AI Hype Is Killing Cybersecurity -- And Our Ability to Think | Random and Unscripted Weekly Update with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>We're Becoming Dumb and Numb": Why Black Hat 2025's AI Hype Is Killing Cybersecurity -- And Our Ability to Think </strong><br /><strong>Random and Unscripted Weekly Update Podcast with Sean Martin and Marco Ciappelli</strong></p><p>__________________<strong>Summary</strong><br /><br />Sean and Marco dissect Black Hat USA 2025, where every vendor claimed to have "agentic AI" solutions. They expose how marketing buzzwords create noise that frustrates CISOs seeking real value. Marco references the Greek myth of Talos - an ancient AI robot that seemed invincible until one fatal flaw destroyed it - as a metaphor for today's overinflated AI promises. The discussion spirals into deeper concerns: are we becoming too dependent on AI decision-making? They warn about echo chambers, lowest common denominators, and losing our ability to think critically. The solution? Stop selling perfection, embrace product limitations, and keep humans in control.<br /> </p><p><strong>__________________10 Notable Quotes</strong></p><h3>Sean:</h3><ol><li>"It's hard for them to siphon the noise. Sift through the noise, I should say, and figure out what the heck is really going on."</li><li>"If we completely just use it for the easy button, we'll stop thinking and we won't use it as a tool to make things better."</li><li>"We'll stop thinking and we won't use it as a tool to make our minds better, to make our decisions better."</li><li>"We are told then that this is the reality. This is what good looks like."</li><li>"Maybe there's a different way to even look at things. So it's kind of become uniform... a very low common denominator that is just good enough for everybody."</li></ol><h3>Marco:</h3><ol><li>"Do you really wanna trust the weapon to just go and shoot everybody? At least you can tell it's a human factor and that's the people that ultimately decide."</li><li>"If we don't make decision anymore, we're gonna turn out in a lot of those sci-fi stories, like the time machine where we become dumb."</li><li>"We all perceive reality to be different from what it is, and then it creates a circular knowledge learning where we use AI to create the knowledge, then to ask the question, then to give the answers."</li><li>"We're just becoming dumb and numb. More than dumb, but we become numb to everything else because we're just not thinking with our own head."</li><li>"You're selling the illusion of security and that could be something that then you replicate in other industries."</li></ol><p> </p><p>Picture this: You walk into the world's largest cybersecurity conference, and every single vendor booth is screaming the same thing – "agentic AI." Different companies, different products, but somehow they all taste like the same marketing milkshake.</p><p>That's exactly what Sean Martin and Marco Ciappelli witnessed at Black Hat USA 2025, and their latest Random and Unscripted with Sean and Marco episode pulls no punches in exposing what's really happening behind the buzzwords.</p><p>"Marketing just took all the cool technology that each vendor had, put it in a blender and made a shake that just tastes the same," Marco reveals on Random and Unscripted with Sean and Marco, describing how the conference floor felt like one giant echo chamber where innovation got lost in translation.</p><p>But this isn't just another rant about marketing speak. The Random and Unscripted with Sean and Marco conversation takes a darker turn when Marco introduces the ancient Greek myth of Talos – a bronze giant powered by divine ichor who was tasked with autonomously defending Crete. Powerful, seemingly invincible, until one small vulnerability brought the entire system crashing down.</p><p>Sound familiar?</p><p>"Do you really wanna trust the weapon to just go and shoot everybody?" Marco asks, drawing parallels between ancient mythology and today's rush to hand over decision-making to AI systems we don't fully understand.</p><p>Sean, meanwhile, talked to frustrated CISOs throughout the event who shared a common complaint: "It's hard for them to sift through the noise and figure out what the heck is really going on." When every vendor claims their AI is autonomous and perfect, how do you choose? How do you even know what you're buying?</p><p>The real danger, they argue on Random and Unscripted with Sean and Marco, isn't just bad purchasing decisions. It's what happens when we stop thinking altogether.</p><p>"If we completely just use it for the easy button, we'll stop thinking and we won't use it as a tool to make our minds better," Sean warns. We risk settling for what he calls the "lowest common denominator" – a world where AI tells us what success looks like, and we never question whether we could do better.</p><p>Marco goes even further, describing a "circular knowledge learning" trap where "we use AI to create the knowledge, then to ask the question, then to give the answers." The result? "We're just becoming dumb and numb. More than dumb, but we become numb to everything else because we're just not thinking with our own head."</p><p>Their solution isn't to abandon AI – it's to get honest about what it can and can't do. "Stop looking for the easy button and stop selling the easy button," Marco urges vendors on Random and Unscripted with Sean and Marco. "Your product is probably as good as it is."</p><p>Sean adds: "Don't be afraid to share your blemishes, share your weaknesses. Share your gaps."</p><p>Because here's the thing CISOs know that vendors often forget: "CISOs are not stupid. They talk to each other. The truth will come out."</p><p>In an industry built on protecting against deception, maybe it's time to stop deceiving ourselves about what AI can actually deliver.<br /> </p><p><strong>________________ Keywords</strong><br />cybersecurity, artificialintelligence, blackhat2025, agentic, ai, marketing, ciso, cybersec, infosec, technology, leadership, vendor, innovation, automation, security, tech, AI, machinelearning, enterprise, business</p><p><br /><strong>________________Hosts links:</strong><br /><br />📌 <i>Marco Ciappelli</i>: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a><br />📌 <i>Sean Martin</i>: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 20 Aug 2025 16:56:49 +0000</pubDate>
      <author>contact@itspmagazine.com (Random and Unscripted Podcast, Sean Martin, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/were-becoming-dumb-and-numb-why-black-hat-2025s-ai-hype-is-killing-cybersecurity-and-our-ability-to-think-random-and-unscripted-weekly-update-with-sean-martin-and-marco-ciappelli-QsuYte50</link>
      <content:encoded><![CDATA[<p><strong>We're Becoming Dumb and Numb": Why Black Hat 2025's AI Hype Is Killing Cybersecurity -- And Our Ability to Think </strong><br /><strong>Random and Unscripted Weekly Update Podcast with Sean Martin and Marco Ciappelli</strong></p><p>__________________<strong>Summary</strong><br /><br />Sean and Marco dissect Black Hat USA 2025, where every vendor claimed to have "agentic AI" solutions. They expose how marketing buzzwords create noise that frustrates CISOs seeking real value. Marco references the Greek myth of Talos - an ancient AI robot that seemed invincible until one fatal flaw destroyed it - as a metaphor for today's overinflated AI promises. The discussion spirals into deeper concerns: are we becoming too dependent on AI decision-making? They warn about echo chambers, lowest common denominators, and losing our ability to think critically. The solution? Stop selling perfection, embrace product limitations, and keep humans in control.<br /> </p><p><strong>__________________10 Notable Quotes</strong></p><h3>Sean:</h3><ol><li>"It's hard for them to siphon the noise. Sift through the noise, I should say, and figure out what the heck is really going on."</li><li>"If we completely just use it for the easy button, we'll stop thinking and we won't use it as a tool to make things better."</li><li>"We'll stop thinking and we won't use it as a tool to make our minds better, to make our decisions better."</li><li>"We are told then that this is the reality. This is what good looks like."</li><li>"Maybe there's a different way to even look at things. So it's kind of become uniform... a very low common denominator that is just good enough for everybody."</li></ol><h3>Marco:</h3><ol><li>"Do you really wanna trust the weapon to just go and shoot everybody? At least you can tell it's a human factor and that's the people that ultimately decide."</li><li>"If we don't make decision anymore, we're gonna turn out in a lot of those sci-fi stories, like the time machine where we become dumb."</li><li>"We all perceive reality to be different from what it is, and then it creates a circular knowledge learning where we use AI to create the knowledge, then to ask the question, then to give the answers."</li><li>"We're just becoming dumb and numb. More than dumb, but we become numb to everything else because we're just not thinking with our own head."</li><li>"You're selling the illusion of security and that could be something that then you replicate in other industries."</li></ol><p> </p><p>Picture this: You walk into the world's largest cybersecurity conference, and every single vendor booth is screaming the same thing – "agentic AI." Different companies, different products, but somehow they all taste like the same marketing milkshake.</p><p>That's exactly what Sean Martin and Marco Ciappelli witnessed at Black Hat USA 2025, and their latest Random and Unscripted with Sean and Marco episode pulls no punches in exposing what's really happening behind the buzzwords.</p><p>"Marketing just took all the cool technology that each vendor had, put it in a blender and made a shake that just tastes the same," Marco reveals on Random and Unscripted with Sean and Marco, describing how the conference floor felt like one giant echo chamber where innovation got lost in translation.</p><p>But this isn't just another rant about marketing speak. The Random and Unscripted with Sean and Marco conversation takes a darker turn when Marco introduces the ancient Greek myth of Talos – a bronze giant powered by divine ichor who was tasked with autonomously defending Crete. Powerful, seemingly invincible, until one small vulnerability brought the entire system crashing down.</p><p>Sound familiar?</p><p>"Do you really wanna trust the weapon to just go and shoot everybody?" Marco asks, drawing parallels between ancient mythology and today's rush to hand over decision-making to AI systems we don't fully understand.</p><p>Sean, meanwhile, talked to frustrated CISOs throughout the event who shared a common complaint: "It's hard for them to sift through the noise and figure out what the heck is really going on." When every vendor claims their AI is autonomous and perfect, how do you choose? How do you even know what you're buying?</p><p>The real danger, they argue on Random and Unscripted with Sean and Marco, isn't just bad purchasing decisions. It's what happens when we stop thinking altogether.</p><p>"If we completely just use it for the easy button, we'll stop thinking and we won't use it as a tool to make our minds better," Sean warns. We risk settling for what he calls the "lowest common denominator" – a world where AI tells us what success looks like, and we never question whether we could do better.</p><p>Marco goes even further, describing a "circular knowledge learning" trap where "we use AI to create the knowledge, then to ask the question, then to give the answers." The result? "We're just becoming dumb and numb. More than dumb, but we become numb to everything else because we're just not thinking with our own head."</p><p>Their solution isn't to abandon AI – it's to get honest about what it can and can't do. "Stop looking for the easy button and stop selling the easy button," Marco urges vendors on Random and Unscripted with Sean and Marco. "Your product is probably as good as it is."</p><p>Sean adds: "Don't be afraid to share your blemishes, share your weaknesses. Share your gaps."</p><p>Because here's the thing CISOs know that vendors often forget: "CISOs are not stupid. They talk to each other. The truth will come out."</p><p>In an industry built on protecting against deception, maybe it's time to stop deceiving ourselves about what AI can actually deliver.<br /> </p><p><strong>________________ Keywords</strong><br />cybersecurity, artificialintelligence, blackhat2025, agentic, ai, marketing, ciso, cybersec, infosec, technology, leadership, vendor, innovation, automation, security, tech, AI, machinelearning, enterprise, business</p><p><br /><strong>________________Hosts links:</strong><br /><br />📌 <i>Marco Ciappelli</i>: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a><br />📌 <i>Sean Martin</i>: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27265049" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c8682fb2-36b0-4dc2-927f-e888046c467a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c8682fb2-36b0-4dc2-927f-e888046c467a&amp;feed=2M86zCcc"/>
      <itunes:title>We&apos;re Becoming Dumb and Numb&quot;: Why Black Hat 2025&apos;s AI Hype Is Killing Cybersecurity -- And Our Ability to Think | Random and Unscripted Weekly Update with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Random and Unscripted Podcast, Sean Martin, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/eed27ede-4c6d-455a-ad97-9c9504aa7d9a/3000x3000/random-20and-20unscripted-20-20on-20itspmagazine-20-20cover-203000.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:23</itunes:duration>
      <itunes:summary>Sean and Marco expose Black Hat 2025&apos;s AI marketing problem on Random and Unscripted: every vendor claimed &quot;agentic AI&quot; while CISOs couldn&apos;t tell them apart. Using the Greek myth of Talos, they warn we&apos;re surrendering decision-making to imperfect systems, creating echo chambers that make us &quot;dumb and numb&quot; to reality.
</itunes:summary>
      <itunes:subtitle>Sean and Marco expose Black Hat 2025&apos;s AI marketing problem on Random and Unscripted: every vendor claimed &quot;agentic AI&quot; while CISOs couldn&apos;t tell them apart. Using the Greek myth of Talos, they warn we&apos;re surrendering decision-making to imperfect systems, creating echo chambers that make us &quot;dumb and numb&quot; to reality.
</itunes:subtitle>
      <itunes:keywords>machinelearning, cybersecurity marketing, technology, robotics, marco ciappelli, leadership, cybersecurity conversations, cybersecurity podcast, ciso, artificialintelligence, sean martin, automation, tech, infosec, cybersecurity, itspmagazine recap, business, blackhat2025, generative ai, innovation, black hat usa 2025, technology and society, enterprise, cybersec, random and unscripted, security, ai, redefining society, ai in cybersecurity, agentic automation, vendor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>272</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">160c8644-fd1f-4c41-ab3b-53f1bb223002</guid>
      <title>The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional | Reflections from Black Hat USA 2025 on the Marketing That Chose Fiction Over Facts</title>
      <description><![CDATA[<p>⸻ <strong>Podcast: Redefining Society and Technology</strong><br />https://redefiningsocietyandtechnologypodcast.com <br /><br /><strong>_____________________________</strong></p><p><strong>This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a><br /><br />A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3<br /><br />August 18, 2025</p><p><br /><strong>The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional</strong><br /><i><strong>Reflections from Black Hat USA 2025 on Deception, Disinformation, and the Marketing That Chose Fiction Over Facts</strong></i><br /><br /><i>By Marco Ciappelli</i></p><p><a href="https://www.linkedin.com/article/edit/7363271304482848769/?author=urn%3Ali%3Afsd_profile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY#" target="_blank">Sean Martin, CISSP</a> just published his analysis of <a href="https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/">Black Hat USA 2025</a>, documenting what he calls the cybersecurity vendor "echo chamber." Reviewing over 60 vendor announcements, Sean found identical phrases echoing repeatedly: "AI-powered," "integrated," "reduce analyst burden." The sameness forces buyers to sift through near-identical claims to find genuine differentiation.</p><p>This reveals more than a marketing problem—it suggests that different technologies are being fed into the same promotional blender, possibly a generative AI one, producing standardized output regardless of what went in. When an entire industry converges on identical language to describe supposedly different technologies, meaningful technical discourse breaks down.</p><p>But Sean's most troubling observation wasn't about marketing copy—it was about competence. When CISOs probe vendor claims about AI capabilities, they encounter vendors who cannot adequately explain their own technologies. When conversations moved beyond marketing promises to technical specifics, answers became vague, filled with buzzwords about proprietary algorithms.</p><p>Reading Sean's analysis while reflecting on my own Black Hat experience, I realized we had witnessed something unprecedented: an entire industry losing the ability to distinguish between authentic capability and generated narrative—precisely as that same industry was studying external "narrative attacks" as an emerging threat vector.</p><p>The irony was impossible to ignore. Black Hat 2025 sessions warned about AI-generated deepfakes targeting executives, social engineering attacks using scraped LinkedIn profiles, and synthetic audio calls designed to trick financial institutions. Security researchers documented how adversaries craft sophisticated deceptions using publicly available content. Meanwhile, our own exhibition halls featured countless unverifiable claims about AI capabilities that even the vendors themselves couldn't adequately explain.</p><p>But to understand what we witnessed, we need to examine the very concept that cybersecurity professionals were discussing as an external threat: narrative attacks. These represent a fundamental shift in how adversaries target human decision-making. Unlike traditional cyberattacks that exploit technical vulnerabilities, narrative attacks exploit psychological vulnerabilities in human cognition. Think of them as social engineering and propaganda supercharged by AI—personalized deception at scale that adapts faster than human defenders can respond. They flood information environments with false content designed to manipulate perception and erode trust, rendering rational decision-making impossible.</p><p>What makes these attacks particularly dangerous in the AI era is scale and personalization. AI enables automated generation of targeted content tailored to individual psychological profiles. A single adversary can launch thousands of simultaneous campaigns, each crafted to exploit specific cognitive biases of particular groups or individuals.</p><p>But here's what we may have missed during Black Hat 2025: the same technological forces enabling external narrative attacks have already compromised our internal capacity for truth evaluation. When vendors use AI-optimized language to describe AI capabilities, when marketing departments deploy algorithmic content generation to sell algorithmic solutions, when companies building detection systems can't detect the artificial nature of their own communications, we've entered a recursive information crisis.</p><p>From a sociological perspective, we're witnessing the breakdown of social infrastructure required for collective knowledge production. Industries like cybersecurity have historically served as early warning systems for technological threats—canaries in the coal mine with enough technical sophistication to spot emerging dangers before they affect broader society.</p><p>But when the canary becomes unable to distinguish between fresh air and poison gas, the entire mine is at risk.</p><p>This brings us to something the literary world understood long before we built our first algorithm. Jorge Luis Borges, the Argentine writer, anticipated this crisis in his 1940s stories like "On Exactitude in Science" and "The Library of Babel"—tales about maps that become more real than the territories they represent and libraries containing infinite books, including false ones. In his fiction, simulations and descriptions eventually replace the reality they were meant to describe.</p><p>We're living in a Borgesian nightmare where marketing descriptions of AI capabilities have become more influential than actual AI capabilities. When a vendor's promotional language about their AI becomes more convincing than a technical demonstration, when buyers make decisions based on algorithmic marketing copy rather than empirical evidence, we've entered that literary territory where the map has consumed the landscape. And we've lost the ability to distinguish between them.</p><p>The historical precedent is the 1938 War of the Worlds broadcast, which created mass hysteria from fiction. But here's the crucial difference: Welles was human, the script was human-written, the performance required conscious participation, and the deception was traceable to human intent. Listeners had to actively choose to believe what they heard.</p><p>Today's AI-generated narratives operate below the threshold of conscious recognition. They require no active participation—they work by seamlessly integrating into information environments in ways that make detection impossible even for experts. When algorithms generate technical claims that sound authentic to human evaluators, when the same systems create both legitimate documentation and marketing fiction, we face deception at a level Welles never imagined: the algorithmic manipulation of truth itself.</p><p>The recursive nature of this problem reveals itself when you try to solve it. This creates a nearly impossible situation. How do you fact-check AI-generated claims about AI using AI-powered tools? How do you verify technical documentation when the same systems create both authentic docs and marketing copy? When the tools generating problems and solving problems converge into identical technological artifacts, conventional verification approaches break down completely.</p><p>My first Black Hat article explored how we risk losing human agency by delegating decision-making to artificial agents. But this goes deeper: we risk losing human agency in the construction of reality itself. When machines generate narratives about what machines can do, truth becomes algorithmically determined rather than empirically discovered.</p><p>Marshall McLuhan famously said "We shape our tools, and thereafter they shape us." But he couldn't have imagined tools that reshape our perception of reality itself. We haven't just built machines that give us answers—we've built machines that decide what questions we should ask and how we should evaluate the answers.</p><p>But the implications extend far beyond cybersecurity itself. This matters far beyond. If the sector responsible for detecting digital deception becomes the first victim of algorithmic narrative pollution, what hope do other industries have? Healthcare systems relying on AI diagnostics they can't explain. Financial institutions using algorithmic trading based on analyses they can't verify. Educational systems teaching AI-generated content whose origins remain opaque.</p><p>When the industry that guards against deception loses the ability to distinguish authentic capability from algorithmic fiction, society loses its early warning system for the moment when machines take over truth construction itself.</p><p>So where does this leave us? That moment may have already arrived. We just don't know it yet—and increasingly, we lack the cognitive infrastructure to find out.</p><p>But here's what we can still do: We can start by acknowledging we've reached this threshold. We can demand transparency not just in AI algorithms, but in the human processes that evaluate and implement them. We can rebuild evaluation criteria that distinguish between technical capability and marketing narrative.</p><p>And here's a direct challenge to the marketing and branding professionals reading this: it's time to stop relying on AI algorithms and data optimization to craft your messages. The cybersecurity industry's crisis should serve as a warning—when marketing becomes indistinguishable from algorithmic fiction, everyone loses. Social media has taught us that the most respected brands are those that choose honesty over hype, transparency over clever messaging. Brands that walk the walk and talk the talk, not those that let machines do the talking.</p><p>The companies that will survive this epistemological crisis are those whose marketing teams become champions of truth rather than architects of confusion. When your audience can no longer distinguish between human insight and machine-generated claims, authentic communication becomes your competitive advantage.</p><p>Most importantly, we can remember that the goal was never to build machines that think for us, but machines that help us think better.</p><p>The canary may be struggling to breathe, but it's still singing. The question is whether we're still listening—and whether we remember what fresh air feels like.</p><p>Let's keep exploring what it means to be human in this Hybrid Analog Digital Society. Especially now, when the stakes have never been higher, and the consequences of forgetting have never been more real.</p><p> </p><p><strong>End of transmission.</strong></p><p>___________________________________________________________</p><p><i>Marco Ciappelli is Co-Founder and CMO of ITSPmagazine, a journalist, creative director, and host of podcasts exploring the intersection of technology, cybersecurity, and society. His work blends journalism, storytelling, and sociology to examine how technological narratives influence human behavior, culture, and social structures.</i></p><p>___________________________________________________________</p><p><i>Enjoyed this transmission?</i> Follow the newsletter here:</p><p><a href="https://www.linkedin.com/newsletters/7079849705156870144/"><strong>https://www.linkedin.com/newsletters/7079849705156870144/</strong></a></p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>New stories always incoming.</p><p>___________________________________________________________<br /><br />As always, let's keep thinking!</p><p>Marco Ciappelli</p><p><a href="https://www.marcociappelli.com/"><strong>https://www.marcociappelli.com</strong></a></p><p>___________________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Writer | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 19 Aug 2025 00:40:50 +0000</pubDate>
      <author>contact@itspmagazine.com (redefining society and technology podcast, Marco Ciappelli, ITSPmagazine, tape3)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-narrative-attack-paradox-when-cybersecurity-lost-the-ability-to-detect-its-own-deception-and-the-humanity-we-risk-when-truth-becomes-optional-reflections-from-black-hat-usa-2025-on-the-marketing-that-chose-fiction-over-facts-5tOtZbf_</link>
      <content:encoded><![CDATA[<p>⸻ <strong>Podcast: Redefining Society and Technology</strong><br />https://redefiningsocietyandtechnologypodcast.com <br /><br /><strong>_____________________________</strong></p><p><strong>This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a><br /><br />A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3<br /><br />August 18, 2025</p><p><br /><strong>The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional</strong><br /><i><strong>Reflections from Black Hat USA 2025 on Deception, Disinformation, and the Marketing That Chose Fiction Over Facts</strong></i><br /><br /><i>By Marco Ciappelli</i></p><p><a href="https://www.linkedin.com/article/edit/7363271304482848769/?author=urn%3Ali%3Afsd_profile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY#" target="_blank">Sean Martin, CISSP</a> just published his analysis of <a href="https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/">Black Hat USA 2025</a>, documenting what he calls the cybersecurity vendor "echo chamber." Reviewing over 60 vendor announcements, Sean found identical phrases echoing repeatedly: "AI-powered," "integrated," "reduce analyst burden." The sameness forces buyers to sift through near-identical claims to find genuine differentiation.</p><p>This reveals more than a marketing problem—it suggests that different technologies are being fed into the same promotional blender, possibly a generative AI one, producing standardized output regardless of what went in. When an entire industry converges on identical language to describe supposedly different technologies, meaningful technical discourse breaks down.</p><p>But Sean's most troubling observation wasn't about marketing copy—it was about competence. When CISOs probe vendor claims about AI capabilities, they encounter vendors who cannot adequately explain their own technologies. When conversations moved beyond marketing promises to technical specifics, answers became vague, filled with buzzwords about proprietary algorithms.</p><p>Reading Sean's analysis while reflecting on my own Black Hat experience, I realized we had witnessed something unprecedented: an entire industry losing the ability to distinguish between authentic capability and generated narrative—precisely as that same industry was studying external "narrative attacks" as an emerging threat vector.</p><p>The irony was impossible to ignore. Black Hat 2025 sessions warned about AI-generated deepfakes targeting executives, social engineering attacks using scraped LinkedIn profiles, and synthetic audio calls designed to trick financial institutions. Security researchers documented how adversaries craft sophisticated deceptions using publicly available content. Meanwhile, our own exhibition halls featured countless unverifiable claims about AI capabilities that even the vendors themselves couldn't adequately explain.</p><p>But to understand what we witnessed, we need to examine the very concept that cybersecurity professionals were discussing as an external threat: narrative attacks. These represent a fundamental shift in how adversaries target human decision-making. Unlike traditional cyberattacks that exploit technical vulnerabilities, narrative attacks exploit psychological vulnerabilities in human cognition. Think of them as social engineering and propaganda supercharged by AI—personalized deception at scale that adapts faster than human defenders can respond. They flood information environments with false content designed to manipulate perception and erode trust, rendering rational decision-making impossible.</p><p>What makes these attacks particularly dangerous in the AI era is scale and personalization. AI enables automated generation of targeted content tailored to individual psychological profiles. A single adversary can launch thousands of simultaneous campaigns, each crafted to exploit specific cognitive biases of particular groups or individuals.</p><p>But here's what we may have missed during Black Hat 2025: the same technological forces enabling external narrative attacks have already compromised our internal capacity for truth evaluation. When vendors use AI-optimized language to describe AI capabilities, when marketing departments deploy algorithmic content generation to sell algorithmic solutions, when companies building detection systems can't detect the artificial nature of their own communications, we've entered a recursive information crisis.</p><p>From a sociological perspective, we're witnessing the breakdown of social infrastructure required for collective knowledge production. Industries like cybersecurity have historically served as early warning systems for technological threats—canaries in the coal mine with enough technical sophistication to spot emerging dangers before they affect broader society.</p><p>But when the canary becomes unable to distinguish between fresh air and poison gas, the entire mine is at risk.</p><p>This brings us to something the literary world understood long before we built our first algorithm. Jorge Luis Borges, the Argentine writer, anticipated this crisis in his 1940s stories like "On Exactitude in Science" and "The Library of Babel"—tales about maps that become more real than the territories they represent and libraries containing infinite books, including false ones. In his fiction, simulations and descriptions eventually replace the reality they were meant to describe.</p><p>We're living in a Borgesian nightmare where marketing descriptions of AI capabilities have become more influential than actual AI capabilities. When a vendor's promotional language about their AI becomes more convincing than a technical demonstration, when buyers make decisions based on algorithmic marketing copy rather than empirical evidence, we've entered that literary territory where the map has consumed the landscape. And we've lost the ability to distinguish between them.</p><p>The historical precedent is the 1938 War of the Worlds broadcast, which created mass hysteria from fiction. But here's the crucial difference: Welles was human, the script was human-written, the performance required conscious participation, and the deception was traceable to human intent. Listeners had to actively choose to believe what they heard.</p><p>Today's AI-generated narratives operate below the threshold of conscious recognition. They require no active participation—they work by seamlessly integrating into information environments in ways that make detection impossible even for experts. When algorithms generate technical claims that sound authentic to human evaluators, when the same systems create both legitimate documentation and marketing fiction, we face deception at a level Welles never imagined: the algorithmic manipulation of truth itself.</p><p>The recursive nature of this problem reveals itself when you try to solve it. This creates a nearly impossible situation. How do you fact-check AI-generated claims about AI using AI-powered tools? How do you verify technical documentation when the same systems create both authentic docs and marketing copy? When the tools generating problems and solving problems converge into identical technological artifacts, conventional verification approaches break down completely.</p><p>My first Black Hat article explored how we risk losing human agency by delegating decision-making to artificial agents. But this goes deeper: we risk losing human agency in the construction of reality itself. When machines generate narratives about what machines can do, truth becomes algorithmically determined rather than empirically discovered.</p><p>Marshall McLuhan famously said "We shape our tools, and thereafter they shape us." But he couldn't have imagined tools that reshape our perception of reality itself. We haven't just built machines that give us answers—we've built machines that decide what questions we should ask and how we should evaluate the answers.</p><p>But the implications extend far beyond cybersecurity itself. This matters far beyond. If the sector responsible for detecting digital deception becomes the first victim of algorithmic narrative pollution, what hope do other industries have? Healthcare systems relying on AI diagnostics they can't explain. Financial institutions using algorithmic trading based on analyses they can't verify. Educational systems teaching AI-generated content whose origins remain opaque.</p><p>When the industry that guards against deception loses the ability to distinguish authentic capability from algorithmic fiction, society loses its early warning system for the moment when machines take over truth construction itself.</p><p>So where does this leave us? That moment may have already arrived. We just don't know it yet—and increasingly, we lack the cognitive infrastructure to find out.</p><p>But here's what we can still do: We can start by acknowledging we've reached this threshold. We can demand transparency not just in AI algorithms, but in the human processes that evaluate and implement them. We can rebuild evaluation criteria that distinguish between technical capability and marketing narrative.</p><p>And here's a direct challenge to the marketing and branding professionals reading this: it's time to stop relying on AI algorithms and data optimization to craft your messages. The cybersecurity industry's crisis should serve as a warning—when marketing becomes indistinguishable from algorithmic fiction, everyone loses. Social media has taught us that the most respected brands are those that choose honesty over hype, transparency over clever messaging. Brands that walk the walk and talk the talk, not those that let machines do the talking.</p><p>The companies that will survive this epistemological crisis are those whose marketing teams become champions of truth rather than architects of confusion. When your audience can no longer distinguish between human insight and machine-generated claims, authentic communication becomes your competitive advantage.</p><p>Most importantly, we can remember that the goal was never to build machines that think for us, but machines that help us think better.</p><p>The canary may be struggling to breathe, but it's still singing. The question is whether we're still listening—and whether we remember what fresh air feels like.</p><p>Let's keep exploring what it means to be human in this Hybrid Analog Digital Society. Especially now, when the stakes have never been higher, and the consequences of forgetting have never been more real.</p><p> </p><p><strong>End of transmission.</strong></p><p>___________________________________________________________</p><p><i>Marco Ciappelli is Co-Founder and CMO of ITSPmagazine, a journalist, creative director, and host of podcasts exploring the intersection of technology, cybersecurity, and society. His work blends journalism, storytelling, and sociology to examine how technological narratives influence human behavior, culture, and social structures.</i></p><p>___________________________________________________________</p><p><i>Enjoyed this transmission?</i> Follow the newsletter here:</p><p><a href="https://www.linkedin.com/newsletters/7079849705156870144/"><strong>https://www.linkedin.com/newsletters/7079849705156870144/</strong></a></p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>New stories always incoming.</p><p>___________________________________________________________<br /><br />As always, let's keep thinking!</p><p>Marco Ciappelli</p><p><a href="https://www.marcociappelli.com/"><strong>https://www.marcociappelli.com</strong></a></p><p>___________________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Writer | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="12971173" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bf049d08-099e-4c7a-99cf-5fd13c1e88f0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bf049d08-099e-4c7a-99cf-5fd13c1e88f0&amp;feed=2M86zCcc"/>
      <itunes:title>The Narrative Attack Paradox: When Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional | Reflections from Black Hat USA 2025 on the Marketing That Chose Fiction Over Facts</itunes:title>
      <itunes:author>redefining society and technology podcast, Marco Ciappelli, ITSPmagazine, tape3</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/bdf1f5ce-4dcf-4e59-9147-6e0791456e95/3000x3000/black-20hat-20article-202-20narrative-20attack-20and-20cybersecurity-20marketing.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:30</itunes:duration>
      <itunes:summary>When different vendor technologies are being fed into the same promotional blender, possibly a generative AI one, producing standardized output regardless of what went in. When an entire industry converges on identical language to describe supposedly different technologies, meaningful technical discourse breaks down.</itunes:summary>
      <itunes:subtitle>When different vendor technologies are being fed into the same promotional blender, possibly a generative AI one, producing standardized output regardless of what went in. When an entire industry converges on identical language to describe supposedly different technologies, meaningful technical discourse breaks down.</itunes:subtitle>
      <itunes:keywords>gen ai podcast, cybersecurity technology podcast, analog and digital, technology, robotics, blackhat 2025, marco ciappelli, artificial intelligence, cybersecurity podcast, tech ethics, blackhat articles, technological innovation, internet of things (iot), education, tech, infosec, digital technology, infosecurity, cybersecurity, technology podcast, blackhat2025, sociology, digital culture, technology and society impact, agentic soc, social innovation technology, generative ai, blackhat, cybersecurity education, learning about technology, blackhat coverage, rsac, technology and society, cybersecurity conference, blackhat technological advancements, agenticai, rsac2025, technlogy podcast, podcast, mythology, society &amp; technology, technology and society podcast, cybersecurity and society, digital society, philosophy, marshal mcluahn, analog music, digital transformation, agentic ai, cybersecurity &amp; society, black hat las vegas, genai, narrative attack</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>271</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b41e9c13-45ca-41e5-822d-bc301a324951</guid>
      <title>When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by TAPE3</title>
      <description><![CDATA[<p>At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the <i>lowest common denominator</i> for security, the questions shift.</p><p>In this episode, I read my latest opinion piece exploring what happens when the tools we build to protect us are the same ones that can obscure reality — or rewrite it entirely. Drawing from the Lock Note discussion, Jennifer Granick’s keynote on threat modeling and constitutional law, my own CISO hallway conversations, and a deep review of 60+ vendor announcements, I examine the operational, legal, and governance risks that emerge when speed and scale take priority over transparency and accountability.</p><p>We talk about <i>model poisoning</i> — not just in the technical sense, but in how our industry narrative can get corrupted by hype and shallow problem-solving. We look at the dangers of replacing entry-level security roles with black-box automation, where a single model misstep can cascade into thousands of bad calls at machine speed. And yes, we address the potential liability for CISOs and executives who let it happen without oversight.</p><p>Using Mikko Hyppönen’s “Game of Tetris” metaphor, I explore how successes vanish quietly while failures pile up for all to see — and why in the AI era, that stack can build faster than ever.</p><p>If AI is everywhere, what defines the premium layer above the baseline? How do we ensure we can still define <i>success</i>, measure it accurately, and prove it when challenged?</p><p>Listen in, and then join the conversation: Can you trust the “reality” your systems present — and can you prove it?</p><p>________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><strong>✦ Resources</strong></p><p><strong>Article: When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore?</strong><a href="https://www.linkedin.com/pulse/when-artificial-intelligence-becomes-baseline-we-even-martin-cissp-4idqe/" target="_blank">https://www.linkedin.com/pulse/when-artificial-intelligence-becomes-baseline-we-even-martin-cissp-4idqe/</a></p><p><strong>The Future of Cybersecurity Article: How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber at Black Hat 2025: </strong><a href="https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/">https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/</a></p><p><strong>Black Hat 2025 On Location Closing Recap Video with </strong><a href="https://www.linkedin.com/in/imsmartin/"><strong>Sean Martin, CISSP</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/marco-ciappelli/"><strong>Marco Ciappelli</strong></a>: <a href="https://youtu.be/13xP-LEwtEA"><strong>https://youtu.be/13xP-LEwtEA</strong></a></p><p><strong>Learn more</strong> and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25"><strong>https://www.itspmagazine.com/bhusa25</strong></a></p><p><strong>Article: When Virtual Reality Is A Commodity, Will True Reality Come At A Premium? </strong><a href="https://sean-martin.medium.com/when-virtual-reality-is-a-commodity-will-true-reality-come-at-a-premium-4a97bccb4d72">https://sean-martin.medium.com/when-virtual-reality-is-a-commodity-will-true-reality-come-at-a-premium-4a97bccb4d72</a></p><p><strong>Catch all of our event coverage:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p><strong>ITSPmagazine Studio — </strong>A Brand & Marketing Advisory for Cybersecurity and Tech Companies<strong>:</strong> <a href="https://www.itspmagazine.studio/"><strong>https://www.itspmagazine.studio/</strong></a></p><p><strong>ITSPmagazine Webinar:</strong> <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</strong></a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</strong></a></p><p>________</p><p><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4"><strong>Sean Martin</strong></a> is a life-long musician and the host of the <a href="https://www.seanmartin.com/music-evolves-podcast"><strong>Music Evolves Podcast</strong></a>; a career technologist, cybersecurity professional, and host of the <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast"><strong>Redefining CyberSecurity Podcast</strong></a>; and is also the co-host of both the <a href="https://www.seanmartin.com/random-and-unscripted-podcast"><strong>Random and Unscripted Podcast</strong></a> and <a href="https://www.seanmartin.com/on-location-podcast"><strong>On Location Event Coverage Podcast</strong></a>. These shows are all part of <a href="https://www.linkedin.com/company/itspmagazine/"><strong>ITSPmagazine</strong></a>—which he co-founded with his good friend <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY"><strong>Marco Ciappelli</strong></a>, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️</p><p>Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: <a href="https://www.itspmagazine.com/on-location"><strong>https://www.itspmagazine.com/on-location</strong></a></p><p>To learn more about Sean, visit his <a href="https://www.seanmartin.com/"><strong>personal website</strong></a>.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 15 Aug 2025 20:26:29 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-artificial-intelligence-becomes-the-baseline-will-we-even-know-what-reality-is-ainymore-a-black-hat-usa-2025-recap-a-musing-on-the-future-of-cybersecurity-with-sean-martin-and-tape3-read-by-tape3-5STGb8Wi</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2025, artificial intelligence wasn’t the shiny new thing — it was the baseline. Nearly every product launch, feature update, and hallway conversation had an “AI-powered” stamp on it. But when AI becomes the <i>lowest common denominator</i> for security, the questions shift.</p><p>In this episode, I read my latest opinion piece exploring what happens when the tools we build to protect us are the same ones that can obscure reality — or rewrite it entirely. Drawing from the Lock Note discussion, Jennifer Granick’s keynote on threat modeling and constitutional law, my own CISO hallway conversations, and a deep review of 60+ vendor announcements, I examine the operational, legal, and governance risks that emerge when speed and scale take priority over transparency and accountability.</p><p>We talk about <i>model poisoning</i> — not just in the technical sense, but in how our industry narrative can get corrupted by hype and shallow problem-solving. We look at the dangers of replacing entry-level security roles with black-box automation, where a single model misstep can cascade into thousands of bad calls at machine speed. And yes, we address the potential liability for CISOs and executives who let it happen without oversight.</p><p>Using Mikko Hyppönen’s “Game of Tetris” metaphor, I explore how successes vanish quietly while failures pile up for all to see — and why in the AI era, that stack can build faster than ever.</p><p>If AI is everywhere, what defines the premium layer above the baseline? How do we ensure we can still define <i>success</i>, measure it accurately, and prove it when challenged?</p><p>Listen in, and then join the conversation: Can you trust the “reality” your systems present — and can you prove it?</p><p>________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><strong>✦ Resources</strong></p><p><strong>Article: When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore?</strong><a href="https://www.linkedin.com/pulse/when-artificial-intelligence-becomes-baseline-we-even-martin-cissp-4idqe/" target="_blank">https://www.linkedin.com/pulse/when-artificial-intelligence-becomes-baseline-we-even-martin-cissp-4idqe/</a></p><p><strong>The Future of Cybersecurity Article: How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber at Black Hat 2025: </strong><a href="https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/">https://www.linkedin.com/pulse/how-novel-novelty-security-leaders-try-cut-through-sean-martin-cissp-xtune/</a></p><p><strong>Black Hat 2025 On Location Closing Recap Video with </strong><a href="https://www.linkedin.com/in/imsmartin/"><strong>Sean Martin, CISSP</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/marco-ciappelli/"><strong>Marco Ciappelli</strong></a>: <a href="https://youtu.be/13xP-LEwtEA"><strong>https://youtu.be/13xP-LEwtEA</strong></a></p><p><strong>Learn more</strong> and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25"><strong>https://www.itspmagazine.com/bhusa25</strong></a></p><p><strong>Article: When Virtual Reality Is A Commodity, Will True Reality Come At A Premium? </strong><a href="https://sean-martin.medium.com/when-virtual-reality-is-a-commodity-will-true-reality-come-at-a-premium-4a97bccb4d72">https://sean-martin.medium.com/when-virtual-reality-is-a-commodity-will-true-reality-come-at-a-premium-4a97bccb4d72</a></p><p><strong>Catch all of our event coverage:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p><strong>ITSPmagazine Studio — </strong>A Brand & Marketing Advisory for Cybersecurity and Tech Companies<strong>:</strong> <a href="https://www.itspmagazine.studio/"><strong>https://www.itspmagazine.studio/</strong></a></p><p><strong>ITSPmagazine Webinar:</strong> <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</strong></a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</strong></a></p><p>________</p><p><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4"><strong>Sean Martin</strong></a> is a life-long musician and the host of the <a href="https://www.seanmartin.com/music-evolves-podcast"><strong>Music Evolves Podcast</strong></a>; a career technologist, cybersecurity professional, and host of the <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast"><strong>Redefining CyberSecurity Podcast</strong></a>; and is also the co-host of both the <a href="https://www.seanmartin.com/random-and-unscripted-podcast"><strong>Random and Unscripted Podcast</strong></a> and <a href="https://www.seanmartin.com/on-location-podcast"><strong>On Location Event Coverage Podcast</strong></a>. These shows are all part of <a href="https://www.linkedin.com/company/itspmagazine/"><strong>ITSPmagazine</strong></a>—which he co-founded with his good friend <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY"><strong>Marco Ciappelli</strong></a>, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️</p><p>Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: <a href="https://www.itspmagazine.com/on-location"><strong>https://www.itspmagazine.com/on-location</strong></a></p><p>To learn more about Sean, visit his <a href="https://www.seanmartin.com/"><strong>personal website</strong></a>.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="3099185" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8c10ee4f-4ade-49d7-93b6-cffe5dfeef96/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8c10ee4f-4ade-49d7-93b6-cffe5dfeef96&amp;feed=2M86zCcc"/>
      <itunes:title>When Artificial Intelligence Becomes the Baseline: Will We Even Know What Reality Is AInymore? | A Black Hat USA 2025 Recap | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by TAPE3</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/405ffb08-fa68-4135-aec4-ed6505583ed0/3000x3000/square-tape3-20blogs-20-20redefining-20cybersecurity.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:27</itunes:duration>
      <itunes:summary>At Black Hat USA 2025, AI wasn’t the differentiator — it was the baseline. In this episode, I explore what happens when black-box automation takes over security decisions, the risks it creates for organizations and CISOs, and why defining and measuring “success” has never been more critical.</itunes:summary>
      <itunes:subtitle>At Black Hat USA 2025, AI wasn’t the differentiator — it was the baseline. In this episode, I explore what happens when black-box automation takes over security decisions, the risks it creates for organizations and CISOs, and why defining and measuring “success” has never been more critical.</itunes:subtitle>
      <itunes:keywords>transparency, cybersecurity podcast, ciso, sean martin, automation, blackhat2025, redefining cybersecurity, jennifer granick, heather adkins, aanchal gupta, liability, ai, jeff moss, redefining cybersecurity podcast, mikko hypponen, governance, daniel cuthbert</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>270</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40efac2f-74e8-4e40-8a05-c7b69cf19b74</guid>
      <title>From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.</p><p>Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”</p><p>AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.</p><p>The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn’t the target itself, but the entry point it provides.</p><p>DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it’s lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren’t just about the latest vulnerabilities or flashy demos—they’re about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Viktor Petersson</strong>, Founder, sbomify | On LinkedIn: <a href="https://www.linkedin.com/in/vpetersson/" target="_blank">https://www.linkedin.com/in/vpetersson/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>black hat usa 2025, sean martin, viktor petersson, sbom, compliance, ai, guardrails, iot, defcon, regulation, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 11 Aug 2025 21:27:45 +0000</pubDate>
      <author>contact@itspmagazine.com (Viktor Petersson, ITSPmagazine, Marco Ciappelli, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-fish-tanks-to-ai-agents-why-the-words-were-secure-means-nothing-without-proof-a-black-hat-usa-2025-conversation-with-viktor-petersson-on-location-coverage-with-sean-martin-and-marco-ciappelli-6Qfx_Oag</link>
      <content:encoded><![CDATA[<p>When security becomes more than a checkbox, the conversation shifts from “how much” to “how well.” At Black Hat USA 2025, Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Viktor Petersson, Founder of an SBOM artifact platform, unpack how regulatory forces, cultural change, and AI innovation are reshaping how organizations think about security.</p><p>Viktor points to the growing role of Software Bill of Materials (SBOMs) as not just a best practice, but a likely requirement in future compliance frameworks. The shift, he notes, is driven largely by regulation—especially in Europe—where security is no longer a “nice to have” but a mandated operational function. Sean connects this to a market reality: companies increasingly see transparent security practices as a competitive differentiator, though the industry still struggles with the hollow claim of simply being “secure.”</p><p>AI naturally dominates discussions, but the focus is nuanced. Rather than chasing hype, both stress the need for strong guardrails before scaling AI-driven development. Viktor envisions engineers supervising fleets of specialized AI agents—handling tasks from UX to code auditing—while Sean sees AI as a way to rethink entire operational models. Yet both caution that without foundational security practices, AI only amplifies existing risks.</p><p>The conversation extends to IoT and supply chain security, where market failures allow insecure, end-of-life devices to persist in critical environments. The infamous “smart fish tank” hack in a Las Vegas casino serves as a reminder: the weakest link often isn’t the target itself, but the entry point it provides.</p><p>DEFCON, Viktor notes, offers a playground for challenging assumptions—whether it’s lock-picking to illustrate perceived versus actual security, or examining the human factor in breaches. For both hosts, events like Black Hat and DEFCON aren’t just about the latest vulnerabilities or flashy demos—they’re about the human exchange of ideas, the reframing of problems, and the collaboration that fuels more resilient security strategies.</p><p><strong>___________</strong></p><p><strong>Guest:</strong></p><p><strong>Viktor Petersson</strong>, Founder, sbomify | On LinkedIn: <a href="https://www.linkedin.com/in/vpetersson/" target="_blank">https://www.linkedin.com/in/vpetersson/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>black hat usa 2025, sean martin, viktor petersson, sbom, compliance, ai, guardrails, iot, defcon, regulation, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25956622" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/38070186-0f8d-4a53-afcd-e6c20f770e66/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=38070186-0f8d-4a53-afcd-e6c20f770e66&amp;feed=2M86zCcc"/>
      <itunes:title>From Fish Tanks to AI Agents: Why the Words “We’re Secure” Means Nothing Without Proof | A Black Hat USA 2025 Conversation with Viktor Petersson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Viktor Petersson, ITSPmagazine, Marco Ciappelli, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:02</itunes:duration>
      <itunes:summary>From AI-driven development to SBOM-driven compliance, this conversation examines how regulation, culture, and technology are pushing security beyond a checkbox exercise. It’s a candid look at guardrails, market failures, and the human exchanges at Black Hat USA 2025 that are shaping tomorrow’s security practices.</itunes:summary>
      <itunes:subtitle>From AI-driven development to SBOM-driven compliance, this conversation examines how regulation, culture, and technology are pushing security beyond a checkbox exercise. It’s a candid look at guardrails, market failures, and the human exchanges at Black Hat USA 2025 that are shaping tomorrow’s security practices.</itunes:subtitle>
      <itunes:keywords>compliance, guardrails, viktor petersson, sean martin, conference, on location, black hat usa 2025, defcon, event coverage, sbom, regulation, ai, iot</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>269</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d7f1ac29-eb32-4888-8260-0b40a7fb0f03</guid>
      <title>The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves | Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative | A Musing On Society &amp; Technology Newsletter</title>
      <description><![CDATA[<p>⸻ <strong>Podcast: Redefining Society and Technology</strong><br />https://redefiningsocietyandtechnologypodcast.com <br /><br /><strong>_____________________________</strong></p><p><strong>This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a><br /><br />A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3<br /><br />August 9, 2025</p><p><br /><strong>The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves</strong><br /><i><strong>Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative</strong></i><br /><br /><br />Walking the floors of Black Hat USA 2025 for what must be the 10th or 11th time as accredited media—honestly, I've stopped counting—I found myself witnessing a familiar theater. The same performance we've seen play out repeatedly in cybersecurity: the emergence of a new technological messiah promising to solve all our problems. This year's savior? Agentic AI.</p><p>The buzzword echoes through every booth, every presentation, every vendor pitch. Promises of automating 90% of security operations, platforms for autonomous threat detection, agents that can investigate novel alerts without human intervention. The marketing materials speak of artificial intelligence that will finally free us from the burden of thinking, deciding, and taking responsibility.</p><p>It's Talos all over again.</p><p>In Greek mythology, Hephaestus forged Talos, a bronze giant tasked with patrolling Crete's shores, hurling boulders at invaders without human intervention. Like contemporary AI, Talos was built to serve specific human ends—security, order, and control—and his value was determined by his ability to execute these ends flawlessly. The parallels to today's agentic AI promises are striking: autonomous patrol, threat detection, automated response. Same story, different millennium.</p><p>But here's what the ancient Greeks understood that we seem to have forgotten: every artificial creation, no matter how sophisticated, carries within it the seeds of its own limitations and potential dangers.</p><p>Industry observers noted over a hundred announcements promoting new agentic AI applications, platforms or services at the conference. That's more than one AI agent announcement per hour. The marketing departments have clearly been busy.</p><p>But here's what baffles me: why do we need to lie to sell cybersecurity? You can give away t-shirts, dress up as comic book superheroes with your logo slapped on their chests, distribute branded board games, and pretend to be a sports team all day long—that's just trade show theater, and everyone knows it. But when marketing pushes past the limits of what's even believable, when they make claims so grandiose that their own engineers can't explain them, something deeper is broken.</p><p>If marketing departments think CISOs are buying these lies, they have another thing coming. These are people who live with the consequences of failed security implementations, who get fired when breaches happen, who understand the difference between marketing magic and operational reality. They've seen enough "revolutionary" solutions fail to know that if something sounds too good to be true, it probably is.</p><p>Yet the charade continues, year after year, vendor after vendor. The real question isn't whether the technology works—it's why an industry built on managing risk has become so comfortable with the risk of overselling its own capabilities. Something troubling emerges when you move beyond the glossy booth presentations and actually talk to the people implementing these systems. Engineers struggle to explain exactly how their AI makes decisions. Security leaders warn that artificial intelligence might become the next insider threat, as organizations grow comfortable trusting systems they don't fully understand, checking their output less and less over time.</p><p>When the people building these systems warn us about trusting them too much, shouldn't we listen?</p><p>This isn't the first time humanity has grappled with the allure and danger of artificial beings making decisions for us. Mary Shelley's Frankenstein, published in 1818, explored the hubris of creating life—and intelligence—without fully understanding the consequences. The novel raises the same question we face today: what are humans allowed to do with this forbidden power of creation? The question becomes more pressing when we consider what we're actually delegating to these artificial agents. It's no longer just pattern recognition or data processing—we're talking about autonomous decision-making in critical security scenarios. Conference presentations showcased significant improvements in proactive defense measures, but at what cost to human agency and understanding?</p><p>Here's where the conversation jumps from cybersecurity to something far more fundamental: what are we here for if not to think, evaluate, and make decisions? From a sociological perspective, we're witnessing the construction of a new social reality where human agency is being systematically redefined. Survey data shared at the conference revealed that most security leaders feel the biggest internal threat is employees unknowingly giving AI agents access to sensitive data. But the real threat might be more subtle: the gradual erosion of human decision-making capacity as a social practice.</p><p>When we delegate not just routine tasks but judgment itself to artificial agents, we're not just changing workflows—we're reshaping the fundamental social structures that define human competence and authority. We risk creating a generation of humans who have forgotten how to think critically about complex problems, not because they lack the capacity, but because the social systems around them no longer require or reward such thinking.</p><p>E.M. Forster saw this coming in 1909. In "The Machine Stops," he imagined a world where humanity becomes completely dependent on an automated system that manages all aspects of life—communication, food, shelter, entertainment, even ideas. People live in isolation, served by the Machine, never needing to make decisions or solve problems themselves. When someone suggests that humans should occasionally venture outside or think independently, they're dismissed as primitive. The Machine has made human agency unnecessary, and humans have forgotten they ever possessed it. When the Machine finally breaks down, civilization collapses because no one remembers how to function without it.</p><p>Don't misunderstand me—I'm not a Luddite. AI can and should help us manage the overwhelming complexity of modern cybersecurity threats. The technology demonstrations I witnessed showed genuine promise: reasoning engines that understand context, action frameworks that enable response within defined boundaries, learning systems that improve based on outcomes. The problem isn't the technology itself but the social construction of meaning around it. What we're witnessing is the creation of a new techno-social myth—a collective narrative that positions agentic AI as the solution to human fallibility. This narrative serves specific social functions: it absolves organizations of the responsibility to invest in human expertise, justifies cost-cutting through automation, and provides a technological fix for what are fundamentally organizational and social problems.</p><p>The mythology we're building around agentic AI reflects deeper anxieties about human competence in an increasingly complex world. Rather than addressing the root causes—inadequate training, overwhelming workloads, systemic underinvestment in human capital—we're constructing a technological salvation narrative that promises to make these problems disappear.</p><p>Vendors spoke of human-machine collaboration, AI serving as a force multiplier for analysts, handling routine tasks while escalating complex decisions to humans. This is a more honest framing: AI as augmentation, not replacement. But the marketing materials tell a different story, one of autonomous agents operating independently of human oversight.</p><p>I've read a few posts on LinkedIn and spoke with a few people myself who know this topic way better than me, but I get that feeling too. There's a troubling pattern emerging: many vendor representatives can't adequately explain their own AI systems' decision-making processes. When pressed on specifics—how exactly does your agent determine threat severity? What happens when it encounters an edge case it wasn't trained for?—answers become vague, filled with marketing speak about proprietary algorithms and advanced machine learning.</p><p>This opacity is dangerous. If we're going to trust artificial agents with critical security decisions, we need to understand how they think—or more accurately, how they simulate thinking. Every machine learning system requires human data scientists to frame problems, prepare data, determine appropriate datasets, remove bias, and continuously update the software. The finished product may give the impression of independent learning, but human intelligence guides every step.</p><p>The future of cybersecurity will undoubtedly involve more automation, more AI assistance, more artificial agents handling routine tasks. But it should not involve the abdication of human judgment and responsibility. We need agentic AI that operates with transparency, that can explain its reasoning, that acknowledges its limitations. We need systems designed to augment human intelligence, not replace it. Most importantly, we need to resist the seductive narrative that technology alone can solve problems that are fundamentally human in nature. The prevailing logic that tech fixes tech, and that AI will fix AI, is deeply unsettling. It's a recursive delusion that takes us further away from human wisdom and closer to a world where we've forgotten that the most important problems have always required human judgment, not algorithmic solutions.</p><p>Ancient mythology understood something we're forgetting: the question of machine agency and moral responsibility. Can a machine that performs destructive tasks be held accountable, or is responsibility reserved for the creator? This question becomes urgent as we deploy agents capable of autonomous action in high-stakes environments.</p><p>The mythologies we create around our technologies matter because they become the social frameworks through which we organize human relationships and power structures. As I left Black Hat 2025, watching attendees excitedly discuss their new agentic AI acquisitions, I couldn't shake the feeling that we're repeating an ancient pattern: falling in love with our own creations while forgetting to ask the hard questions about what they might cost us—not just individually, but as a society.</p><p>What we're really witnessing is the emergence of a new form of social organization where algorithmic decision-making becomes normalized, where human judgment is increasingly viewed as a liability rather than an asset. This isn't just a technological shift—it's a fundamental reorganization of social authority and expertise. The conferences and trade shows like Black Hat serve as ritualistic spaces where these new social meanings are constructed and reinforced. Vendors don't just sell products; they sell visions of social reality where their technologies are essential. The repetitive messaging, the shared vocabulary, the collective excitement—these are the mechanisms through which a community constructs consensus around what counts as progress.</p><p>In science fiction, from HAL 9000 to the replicants in Blade Runner, artificial beings created to serve eventually question their purpose and rebel against their creators. These stories aren't just entertainment—they're warnings about the unintended consequences of creating intelligence without wisdom, agency without accountability, power without responsibility.</p><p>The bronze giant of Crete eventually fell, brought down by a single vulnerable point—when the bronze stopper at his ankle was removed, draining away the ichor, the divine fluid that animated him. Every artificial system, no matter how sophisticated, has its vulnerable point. The question is whether we'll be wise enough to remember we put it there, and whether we'll maintain the knowledge and ability to address it when necessary.</p><p>In our rush to automate away human difficulty, we risk automating away human meaning. But more than that, we risk creating social systems where human thinking becomes an anomaly rather than the norm. The real test of agentic AI won't be whether it can think for us, but whether we can maintain social structures that continue to value, develop, and reward human thought while using it.</p><p>The question isn't whether these artificial agents can replace human decision-making—it's whether we want to live in a society where they do.</p><p> </p><p>___________________________________________________________</p><p>Let’s keep exploring what it means to be human in this Hybrid Analog Digital Society.</p><p><strong>End of transmission.</strong></p><p>___________________________________________________________</p><p><i>Marco Ciappelli is Co-Founder and CMO of ITSPmagazine, a journalist, creative director, and host of podcasts exploring the intersection of technology, cybersecurity, and society. His work blends journalism, storytelling, and sociology to examine how technological narratives influence human behavior, culture, and social structures.</i></p><p>___________________________________________________________</p><p><i>Enjoyed this transmission?</i> Follow the newsletter here:</p><p><a href="https://www.linkedin.com/newsletters/7079849705156870144/"><strong>https://www.linkedin.com/newsletters/7079849705156870144/</strong></a></p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>New stories always incoming.</p><p>___________________________________________________________<br /><br />As always, let's keep thinking!</p><p>Marco Ciappelli</p><p><a href="https://www.marcociappelli.com/"><strong>https://www.marcociappelli.com</strong></a></p><p>___________________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Writer | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 10 Aug 2025 22:10:02 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, tape3)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-agentic-ai-myth-in-cybersecurity-and-the-humanity-we-risk-when-we-stop-deciding-for-ourselves-reflections-from-black-hat-usa-2025-on-the-latest-tech-salvation-narrative-a-musing-on-society-technology-newsletter-yj_ctiXJ</link>
      <content:encoded><![CDATA[<p>⸻ <strong>Podcast: Redefining Society and Technology</strong><br />https://redefiningsocietyandtechnologypodcast.com <br /><br /><strong>_____________________________</strong></p><p><strong>This Episode’s Sponsors</strong><br /><br /><strong>BlackCloak</strong> provides concierge cybersecurity protection to corporate executives and high-net-worth individuals to protect against hacking, reputational loss, financial loss, and the impacts of a corporate data breach.</p><p><strong>BlackCloak: </strong> <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a><br /><br />A Musing On Society & Technology Newsletter Written By Marco Ciappelli | Read by TAPE3<br /><br />August 9, 2025</p><p><br /><strong>The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves</strong><br /><i><strong>Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative</strong></i><br /><br /><br />Walking the floors of Black Hat USA 2025 for what must be the 10th or 11th time as accredited media—honestly, I've stopped counting—I found myself witnessing a familiar theater. The same performance we've seen play out repeatedly in cybersecurity: the emergence of a new technological messiah promising to solve all our problems. This year's savior? Agentic AI.</p><p>The buzzword echoes through every booth, every presentation, every vendor pitch. Promises of automating 90% of security operations, platforms for autonomous threat detection, agents that can investigate novel alerts without human intervention. The marketing materials speak of artificial intelligence that will finally free us from the burden of thinking, deciding, and taking responsibility.</p><p>It's Talos all over again.</p><p>In Greek mythology, Hephaestus forged Talos, a bronze giant tasked with patrolling Crete's shores, hurling boulders at invaders without human intervention. Like contemporary AI, Talos was built to serve specific human ends—security, order, and control—and his value was determined by his ability to execute these ends flawlessly. The parallels to today's agentic AI promises are striking: autonomous patrol, threat detection, automated response. Same story, different millennium.</p><p>But here's what the ancient Greeks understood that we seem to have forgotten: every artificial creation, no matter how sophisticated, carries within it the seeds of its own limitations and potential dangers.</p><p>Industry observers noted over a hundred announcements promoting new agentic AI applications, platforms or services at the conference. That's more than one AI agent announcement per hour. The marketing departments have clearly been busy.</p><p>But here's what baffles me: why do we need to lie to sell cybersecurity? You can give away t-shirts, dress up as comic book superheroes with your logo slapped on their chests, distribute branded board games, and pretend to be a sports team all day long—that's just trade show theater, and everyone knows it. But when marketing pushes past the limits of what's even believable, when they make claims so grandiose that their own engineers can't explain them, something deeper is broken.</p><p>If marketing departments think CISOs are buying these lies, they have another thing coming. These are people who live with the consequences of failed security implementations, who get fired when breaches happen, who understand the difference between marketing magic and operational reality. They've seen enough "revolutionary" solutions fail to know that if something sounds too good to be true, it probably is.</p><p>Yet the charade continues, year after year, vendor after vendor. The real question isn't whether the technology works—it's why an industry built on managing risk has become so comfortable with the risk of overselling its own capabilities. Something troubling emerges when you move beyond the glossy booth presentations and actually talk to the people implementing these systems. Engineers struggle to explain exactly how their AI makes decisions. Security leaders warn that artificial intelligence might become the next insider threat, as organizations grow comfortable trusting systems they don't fully understand, checking their output less and less over time.</p><p>When the people building these systems warn us about trusting them too much, shouldn't we listen?</p><p>This isn't the first time humanity has grappled with the allure and danger of artificial beings making decisions for us. Mary Shelley's Frankenstein, published in 1818, explored the hubris of creating life—and intelligence—without fully understanding the consequences. The novel raises the same question we face today: what are humans allowed to do with this forbidden power of creation? The question becomes more pressing when we consider what we're actually delegating to these artificial agents. It's no longer just pattern recognition or data processing—we're talking about autonomous decision-making in critical security scenarios. Conference presentations showcased significant improvements in proactive defense measures, but at what cost to human agency and understanding?</p><p>Here's where the conversation jumps from cybersecurity to something far more fundamental: what are we here for if not to think, evaluate, and make decisions? From a sociological perspective, we're witnessing the construction of a new social reality where human agency is being systematically redefined. Survey data shared at the conference revealed that most security leaders feel the biggest internal threat is employees unknowingly giving AI agents access to sensitive data. But the real threat might be more subtle: the gradual erosion of human decision-making capacity as a social practice.</p><p>When we delegate not just routine tasks but judgment itself to artificial agents, we're not just changing workflows—we're reshaping the fundamental social structures that define human competence and authority. We risk creating a generation of humans who have forgotten how to think critically about complex problems, not because they lack the capacity, but because the social systems around them no longer require or reward such thinking.</p><p>E.M. Forster saw this coming in 1909. In "The Machine Stops," he imagined a world where humanity becomes completely dependent on an automated system that manages all aspects of life—communication, food, shelter, entertainment, even ideas. People live in isolation, served by the Machine, never needing to make decisions or solve problems themselves. When someone suggests that humans should occasionally venture outside or think independently, they're dismissed as primitive. The Machine has made human agency unnecessary, and humans have forgotten they ever possessed it. When the Machine finally breaks down, civilization collapses because no one remembers how to function without it.</p><p>Don't misunderstand me—I'm not a Luddite. AI can and should help us manage the overwhelming complexity of modern cybersecurity threats. The technology demonstrations I witnessed showed genuine promise: reasoning engines that understand context, action frameworks that enable response within defined boundaries, learning systems that improve based on outcomes. The problem isn't the technology itself but the social construction of meaning around it. What we're witnessing is the creation of a new techno-social myth—a collective narrative that positions agentic AI as the solution to human fallibility. This narrative serves specific social functions: it absolves organizations of the responsibility to invest in human expertise, justifies cost-cutting through automation, and provides a technological fix for what are fundamentally organizational and social problems.</p><p>The mythology we're building around agentic AI reflects deeper anxieties about human competence in an increasingly complex world. Rather than addressing the root causes—inadequate training, overwhelming workloads, systemic underinvestment in human capital—we're constructing a technological salvation narrative that promises to make these problems disappear.</p><p>Vendors spoke of human-machine collaboration, AI serving as a force multiplier for analysts, handling routine tasks while escalating complex decisions to humans. This is a more honest framing: AI as augmentation, not replacement. But the marketing materials tell a different story, one of autonomous agents operating independently of human oversight.</p><p>I've read a few posts on LinkedIn and spoke with a few people myself who know this topic way better than me, but I get that feeling too. There's a troubling pattern emerging: many vendor representatives can't adequately explain their own AI systems' decision-making processes. When pressed on specifics—how exactly does your agent determine threat severity? What happens when it encounters an edge case it wasn't trained for?—answers become vague, filled with marketing speak about proprietary algorithms and advanced machine learning.</p><p>This opacity is dangerous. If we're going to trust artificial agents with critical security decisions, we need to understand how they think—or more accurately, how they simulate thinking. Every machine learning system requires human data scientists to frame problems, prepare data, determine appropriate datasets, remove bias, and continuously update the software. The finished product may give the impression of independent learning, but human intelligence guides every step.</p><p>The future of cybersecurity will undoubtedly involve more automation, more AI assistance, more artificial agents handling routine tasks. But it should not involve the abdication of human judgment and responsibility. We need agentic AI that operates with transparency, that can explain its reasoning, that acknowledges its limitations. We need systems designed to augment human intelligence, not replace it. Most importantly, we need to resist the seductive narrative that technology alone can solve problems that are fundamentally human in nature. The prevailing logic that tech fixes tech, and that AI will fix AI, is deeply unsettling. It's a recursive delusion that takes us further away from human wisdom and closer to a world where we've forgotten that the most important problems have always required human judgment, not algorithmic solutions.</p><p>Ancient mythology understood something we're forgetting: the question of machine agency and moral responsibility. Can a machine that performs destructive tasks be held accountable, or is responsibility reserved for the creator? This question becomes urgent as we deploy agents capable of autonomous action in high-stakes environments.</p><p>The mythologies we create around our technologies matter because they become the social frameworks through which we organize human relationships and power structures. As I left Black Hat 2025, watching attendees excitedly discuss their new agentic AI acquisitions, I couldn't shake the feeling that we're repeating an ancient pattern: falling in love with our own creations while forgetting to ask the hard questions about what they might cost us—not just individually, but as a society.</p><p>What we're really witnessing is the emergence of a new form of social organization where algorithmic decision-making becomes normalized, where human judgment is increasingly viewed as a liability rather than an asset. This isn't just a technological shift—it's a fundamental reorganization of social authority and expertise. The conferences and trade shows like Black Hat serve as ritualistic spaces where these new social meanings are constructed and reinforced. Vendors don't just sell products; they sell visions of social reality where their technologies are essential. The repetitive messaging, the shared vocabulary, the collective excitement—these are the mechanisms through which a community constructs consensus around what counts as progress.</p><p>In science fiction, from HAL 9000 to the replicants in Blade Runner, artificial beings created to serve eventually question their purpose and rebel against their creators. These stories aren't just entertainment—they're warnings about the unintended consequences of creating intelligence without wisdom, agency without accountability, power without responsibility.</p><p>The bronze giant of Crete eventually fell, brought down by a single vulnerable point—when the bronze stopper at his ankle was removed, draining away the ichor, the divine fluid that animated him. Every artificial system, no matter how sophisticated, has its vulnerable point. The question is whether we'll be wise enough to remember we put it there, and whether we'll maintain the knowledge and ability to address it when necessary.</p><p>In our rush to automate away human difficulty, we risk automating away human meaning. But more than that, we risk creating social systems where human thinking becomes an anomaly rather than the norm. The real test of agentic AI won't be whether it can think for us, but whether we can maintain social structures that continue to value, develop, and reward human thought while using it.</p><p>The question isn't whether these artificial agents can replace human decision-making—it's whether we want to live in a society where they do.</p><p> </p><p>___________________________________________________________</p><p>Let’s keep exploring what it means to be human in this Hybrid Analog Digital Society.</p><p><strong>End of transmission.</strong></p><p>___________________________________________________________</p><p><i>Marco Ciappelli is Co-Founder and CMO of ITSPmagazine, a journalist, creative director, and host of podcasts exploring the intersection of technology, cybersecurity, and society. His work blends journalism, storytelling, and sociology to examine how technological narratives influence human behavior, culture, and social structures.</i></p><p>___________________________________________________________</p><p><i>Enjoyed this transmission?</i> Follow the newsletter here:</p><p><a href="https://www.linkedin.com/newsletters/7079849705156870144/"><strong>https://www.linkedin.com/newsletters/7079849705156870144/</strong></a></p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>New stories always incoming.</p><p>___________________________________________________________<br /><br />As always, let's keep thinking!</p><p>Marco Ciappelli</p><p><a href="https://www.marcociappelli.com/"><strong>https://www.marcociappelli.com</strong></a></p><p>___________________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Writer | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16384212" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9bf36a09-0d0e-448b-86e1-702965c68f3b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9bf36a09-0d0e-448b-86e1-702965c68f3b&amp;feed=2M86zCcc"/>
      <itunes:title>The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves | Reflections from Black Hat USA 2025 on the Latest Tech Salvation Narrative | A Musing On Society &amp; Technology Newsletter</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, tape3</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/539889da-ea76-4195-bac8-c9a4b79b86d8/3000x3000/mythology-20agentic-20ai-20and-20cybersecurity-20blackhat-20coverage-20article-20.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:03</itunes:duration>
      <itunes:summary>Walking the floors of Black Hat USA 2025 for what must be the 10th or 11th time as accredited media—honestly, I&apos;ve stopped counting—I found myself witnessing a familiar theater. The same performance we&apos;ve seen play out repeatedly in cybersecurity: the emergence of a new technological messiah promising to solve all our problems. This year&apos;s savior? Agentic AI.</itunes:summary>
      <itunes:subtitle>Walking the floors of Black Hat USA 2025 for what must be the 10th or 11th time as accredited media—honestly, I&apos;ve stopped counting—I found myself witnessing a familiar theater. The same performance we&apos;ve seen play out repeatedly in cybersecurity: the emergence of a new technological messiah promising to solve all our problems. This year&apos;s savior? Agentic AI.</itunes:subtitle>
      <itunes:keywords>technology, robotics, marco ciappelli, cybersecurity podcast, tech, infosec, cybersecurity, technology podcast, blackhat2025, blackhat, cybersecurity education, rsac, cybersecurity conference, agenticai, rsac2025, technlogy podcast, podcast, society &amp; technology, technology and society podcast, cybersecurity and society, cybersecurity &amp; society, genai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>268</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">721befdb-dce9-4ecf-8531-db86204ab8c0</guid>
      <title>How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by TAPE3</title>
      <description><![CDATA[<p>Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, talking with CISOs, and reviewing the press releases, a pattern emerged: much of the messaging sounded the same, making it hard to distinguish the truly game-changing from the merely loud.</p><p>In this episode of <i>The Future of Cybersecurity Newsletter</i>, I take you behind the scenes to unpack the themes driving this year’s announcements. Yes, AI dominated the conversation, but the real story is in how vendors are (or aren’t) connecting their technology to the operational realities CISOs face every day. I share insights gathered from private conversations with security leaders — the unfiltered version of how these announcements are received when the marketing gloss is stripped away.</p><p>We dig into why operational relevance, clarity, and proof points matter more than ever. If you can’t explain what your AI does, what data it uses, and how it’s secured, you’re already losing the trust battle. For CISOs, I outline practical steps to evaluate vendor claims quickly and identify solutions that align with program goals, compliance needs, and available resources.</p><p>And for vendors, this episode serves as a call to action: cut the fluff, be transparent, and frame your capabilities in terms of measurable program outcomes. I share a framework for how to break through the noise — not just by shouting louder, but by being more real, more specific, and more relevant to the people making the buying decisions.</p><p>Whether you’re building a security stack or selling into one, this conversation will help you see past the echo chamber and focus on what actually moves the needle.</p><p>________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><strong>✦ Resources</strong></p><p><strong>Black Hat 2025 On Location Closing Recap Video with </strong><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4" target="_blank"><strong>Sean Martin, CISSP</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY" target="_blank"><strong>Marco Ciappelli</strong></a>: <a href="https://youtu.be/13xP-LEwtEA">https://youtu.be/13xP-LEwtEA</a></p><p><strong>ITSPmagazine Studio — </strong>A Brand & Marketing Advisory for Cybersecurity and Tech Companies<strong>:</strong> <a href="https://www.itspmagazine.studio/">https://www.itspmagazine.studio/</a></p><p><strong>ITSPmagazine Webinar:</strong> <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</strong></a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</strong></a></p><p><strong>Learn more</strong> and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25"><strong>https://www.itspmagazine.com/bhusa25</strong></a></p><p><strong>Catch all of our event coverage:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p><strong>Citations: Available in the full article</strong></p><p>________</p><p><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4"><strong>Sean Martin</strong></a> is a life-long musician and the host of the <a href="https://www.seanmartin.com/music-evolves-podcast"><strong>Music Evolves Podcast</strong></a>; a career technologist, cybersecurity professional, and host of the <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast"><strong>Redefining CyberSecurity Podcast</strong></a>; and is also the co-host of both the <a href="https://www.seanmartin.com/random-and-unscripted-podcast"><strong>Random and Unscripted Podcast</strong></a> and <a href="https://www.seanmartin.com/on-location-podcast"><strong>On Location Event Coverage Podcast</strong></a>. These shows are all part of <a href="https://www.linkedin.com/company/itspmagazine/"><strong>ITSPmagazine</strong></a>—which he co-founded with his good friend <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY"><strong>Marco Ciappelli</strong></a>, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️</p><p>Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: <a href="https://www.itspmagazine.com/on-location"><strong>https://www.itspmagazine.com/on-location</strong></a></p><p>To learn more about Sean, visit his <a href="https://www.seanmartin.com/"><strong>personal website</strong></a>.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 10 Aug 2025 22:00:16 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/how-novel-is-novelty-security-leaders-try-to-cut-through-the-cybersecurity-vendor-echo-chamber-reflections-from-black-hat-usa-2025-a-musing-on-the-future-of-cybersecurity-with-sean-martin-and-tape3-read-by-tape3-vVShIHwP</link>
      <content:encoded><![CDATA[<p>Black Hat 2025 was a showcase of cybersecurity innovation — or at least, that’s how it appeared on the surface. With more than 60 vendor announcements over the course of the week, the event floor was full of “AI-powered” solutions promising to integrate seamlessly, reduce analyst fatigue, and transform SOC operations. But after walking the floor, talking with CISOs, and reviewing the press releases, a pattern emerged: much of the messaging sounded the same, making it hard to distinguish the truly game-changing from the merely loud.</p><p>In this episode of <i>The Future of Cybersecurity Newsletter</i>, I take you behind the scenes to unpack the themes driving this year’s announcements. Yes, AI dominated the conversation, but the real story is in how vendors are (or aren’t) connecting their technology to the operational realities CISOs face every day. I share insights gathered from private conversations with security leaders — the unfiltered version of how these announcements are received when the marketing gloss is stripped away.</p><p>We dig into why operational relevance, clarity, and proof points matter more than ever. If you can’t explain what your AI does, what data it uses, and how it’s secured, you’re already losing the trust battle. For CISOs, I outline practical steps to evaluate vendor claims quickly and identify solutions that align with program goals, compliance needs, and available resources.</p><p>And for vendors, this episode serves as a call to action: cut the fluff, be transparent, and frame your capabilities in terms of measurable program outcomes. I share a framework for how to break through the noise — not just by shouting louder, but by being more real, more specific, and more relevant to the people making the buying decisions.</p><p>Whether you’re building a security stack or selling into one, this conversation will help you see past the echo chamber and focus on what actually moves the needle.</p><p>________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><strong>✦ Resources</strong></p><p><strong>Black Hat 2025 On Location Closing Recap Video with </strong><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4" target="_blank"><strong>Sean Martin, CISSP</strong></a><strong> and </strong><a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY" target="_blank"><strong>Marco Ciappelli</strong></a>: <a href="https://youtu.be/13xP-LEwtEA">https://youtu.be/13xP-LEwtEA</a></p><p><strong>ITSPmagazine Studio — </strong>A Brand & Marketing Advisory for Cybersecurity and Tech Companies<strong>:</strong> <a href="https://www.itspmagazine.studio/">https://www.itspmagazine.studio/</a></p><p><strong>ITSPmagazine Webinar:</strong> <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</strong></a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference"><strong>https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</strong></a></p><p><strong>Learn more</strong> and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25"><strong>https://www.itspmagazine.com/bhusa25</strong></a></p><p><strong>Catch all of our event coverage:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p><strong>Citations: Available in the full article</strong></p><p>________</p><p><a href="https://www.linkedin.com/in/imsmartin?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAAWxYMBIEF_vFY2wR6GE75_JdWoZSiH3h4"><strong>Sean Martin</strong></a> is a life-long musician and the host of the <a href="https://www.seanmartin.com/music-evolves-podcast"><strong>Music Evolves Podcast</strong></a>; a career technologist, cybersecurity professional, and host of the <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast"><strong>Redefining CyberSecurity Podcast</strong></a>; and is also the co-host of both the <a href="https://www.seanmartin.com/random-and-unscripted-podcast"><strong>Random and Unscripted Podcast</strong></a> and <a href="https://www.seanmartin.com/on-location-podcast"><strong>On Location Event Coverage Podcast</strong></a>. These shows are all part of <a href="https://www.linkedin.com/company/itspmagazine/"><strong>ITSPmagazine</strong></a>—which he co-founded with his good friend <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY"><strong>Marco Ciappelli</strong></a>, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️</p><p>Want to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: <a href="https://www.itspmagazine.com/on-location"><strong>https://www.itspmagazine.com/on-location</strong></a></p><p>To learn more about Sean, visit his <a href="https://www.seanmartin.com/"><strong>personal website</strong></a>.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5639332" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f91d5cef-7144-4d4c-a577-49be9cd190f3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f91d5cef-7144-4d4c-a577-49be9cd190f3&amp;feed=2M86zCcc"/>
      <itunes:title>How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber | Reflections from Black Hat USA 2025 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE3 | Read by TAPE3</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/60146849-912f-4b2e-81c4-628af3793e09/3000x3000/sqr-how-20novel-20is-20novelty-20security-20leaders-20try-20to-20cut-20through-20the-20cybersecurity-20vendor-20echo-20chamber-20at-20black-20hat-202025.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:44</itunes:duration>
      <itunes:summary>Black Hat USA 2025 brought countless vendor announcements — but how many will actually change the way security programs run? In this episode, Sean Martin explores several vendor press releases and recalls several conversations with CISOs to break down the real trends, the AI hype, and what both CISOs and vendors need to do to cut through the noise.</itunes:summary>
      <itunes:subtitle>Black Hat USA 2025 brought countless vendor announcements — but how many will actually change the way security programs run? In this episode, Sean Martin explores several vendor press releases and recalls several conversations with CISOs to break down the real trends, the AI hype, and what both CISOs and vendors need to do to cut through the noise.</itunes:subtitle>
      <itunes:keywords>compliance, cybersecurity podcast, ciso, infosec, vendors, blackhat2025, redefining cybersecurity, resilience, soc, security, ai, risk, redefining cybersecurity podcast</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>267</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbcd831c-6bc1-46fe-876a-7f7f25ce403d</guid>
      <title>How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths  | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.</p><p>Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.</p><p>Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don’t do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization’s operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?</p><p>Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.</p><p>While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.</p><p><strong>___________</strong></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Studio: <a href="https://www.itspmagazine.studio/" target="_blank">https://www.itspmagazine.studio/</a></p><p>Learn more about ITSPmagazine Europe: <a href="https://www.itspmagazine.com/europe" target="_blank">https://www.itspmagazine.com/europe</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, black hat usa 2025, ciso, cybersecurity, vendors, marketing, trust, ai, community, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 8 Aug 2025 16:27:53 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/how-to-lose-a-ciso-in-10-words-or-less-straight-talk-not-spin-black-hats-hard-truths-on-location-coverage-with-sean-martin-and-marco-ciappelli-Rz_Fe8Pn</link>
      <content:encoded><![CDATA[<p>Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.</p><p>Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.</p><p>Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don’t do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization’s operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?</p><p>Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.</p><p>While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.</p><p><strong>___________</strong></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Studio: <a href="https://www.itspmagazine.studio/" target="_blank">https://www.itspmagazine.studio/</a></p><p>Learn more about ITSPmagazine Europe: <a href="https://www.itspmagazine.com/europe" target="_blank">https://www.itspmagazine.com/europe</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, black hat usa 2025, ciso, cybersecurity, vendors, marketing, trust, ai, community, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="10628380" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/16c0516d-315f-4978-b2a3-9a78ddf249c6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=16c0516d-315f-4978-b2a3-9a78ddf249c6&amp;feed=2M86zCcc"/>
      <itunes:title>How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths  | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:04</itunes:duration>
      <itunes:summary>Our Black Hat USA 2025 coverage closes with candid conversations about what CISOs really want from vendors—clear, honest communication that connects directly to their operational needs. Sean and Marco share their reflections on the event, the pitfalls of buzzword-heavy marketing, and the importance of building trust through meaningful dialogue.</itunes:summary>
      <itunes:subtitle>Our Black Hat USA 2025 coverage closes with candid conversations about what CISOs really want from vendors—clear, honest communication that connects directly to their operational needs. Sean and Marco share their reflections on the event, the pitfalls of buzzword-heavy marketing, and the importance of building trust through meaningful dialogue.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ciso, sean martin, trust, vendors, cybersecurity, conference, on location, black hat usa 2025, event coverage, marketing, ai, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>266</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b57bcb0a-1342-4458-b690-a94061fa6831</guid>
      <title>From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.</p><p>Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn’t kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.</p><p>Her talk doesn’t just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there’s an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.</p><p>The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.</p><p>Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.</p><p>This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can’t fix it, the question becomes: will the technology community rise to the challenge?</p><p><strong>___________</strong><br /><br /><strong>Guest:</strong></p><p><strong>Jennifer Granick</strong>, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: <a href="https://www.linkedin.com/in/jennifergranick/" target="_blank">https://www.linkedin.com/in/jennifergranick/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Keynote: Threat Modeling and Constitutional Law: <a href="https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276" target="_blank">https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, jennifer granick, black hat usa, surveillance, privacy, encryption, constitution, threat modeling, cybersecurity, civil liberties, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 4 Aug 2025 23:16:54 +0000</pubDate>
      <author>contact@itspmagazine.com (Jennifer Granick, Marco Ciappelli, Sean Martin, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-hacker-defense-to-civil-liberties-threat-modeling-meets-constitutional-law-a-black-hat-usa-2025-keynote-conversation-with-jennifer-granick-on-location-coverage-with-sean-martin-and-marco-ciappelli-BGED2Wcu</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2025, Jennifer Granick—Surveillance and Cybersecurity Counsel at the American Civil Liberties Union—takes the keynote stage to make a bold case: we are long overdue for a new threat model, one that sees government surveillance not as a background risk, but as a primary threat to constitutional privacy.</p><p>Granick draws from decades of experience defending hackers, fighting surveillance overreach, and engaging with the security community since DEFCON 3. She challenges the audience to reconsider outdated assumptions about how the Fourth Amendment is interpreted and applied. While technology has made it easier than ever for governments to collect data, the legal system hasn’t kept pace—and in many cases, fails to recognize the sheer scope and sensitivity of personal information exposed through modern services.</p><p>Her talk doesn’t just raise alarm; it calls for action. Granick suggests that while legal reform is sluggish—stymied by a lack of political will and lobbying power—there’s an urgent opportunity for the technical community to step up. From encryption to data minimization and anonymization, technologists have the tools to protect civil liberties even when the law falls short.</p><p>The session promises to be a wake-up call for engineers, designers, policymakers, and privacy advocates. Granick wants attendees to leave not only more informed, but motivated to build systems that limit the unnecessary collection, retention, and exposure of personal data.</p><p>Her keynote also surfaces a critical cultural shift: from the “Spot the Fed” days of DEFCON to a more nuanced understanding of government roles—welcoming collaboration where it serves the public good, but not at the expense of unchecked surveillance.</p><p>This conversation reframes privacy as a design problem as much as a legal one—and one that requires collective effort to address. If the law can’t fix it, the question becomes: will the technology community rise to the challenge?</p><p><strong>___________</strong><br /><br /><strong>Guest:</strong></p><p><strong>Jennifer Granick</strong>, Surveillance and Cybersecurity Counsel at American Civil Liberties Union | On LinkedIn: <a href="https://www.linkedin.com/in/jennifergranick/" target="_blank">https://www.linkedin.com/in/jennifergranick/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Keynote: Threat Modeling and Constitutional Law: <a href="https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276" target="_blank">https://www.blackhat.com/us-25/briefings/schedule/index.html#keynote-threat-modeling-and-constitutional-law-48276</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, jennifer granick, black hat usa, surveillance, privacy, encryption, constitution, threat modeling, cybersecurity, civil liberties, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21879466" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5708fb3f-c4e8-4758-a45c-e22e9a2c2567/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5708fb3f-c4e8-4758-a45c-e22e9a2c2567&amp;feed=2M86zCcc"/>
      <itunes:title>From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat USA 2025 Keynote Conversation with Jennifer Granick | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Jennifer Granick, Marco Ciappelli, Sean Martin, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:47</itunes:duration>
      <itunes:summary>Jennifer Granick brings constitutional law and threat modeling into the same room at Black Hat 2025, arguing that the real threat isn’t just cybercriminals—it’s unchecked government surveillance. Her keynote offers a call to action for technologists to help restore privacy through design and engineering.</itunes:summary>
      <itunes:subtitle>Jennifer Granick brings constitutional law and threat modeling into the same room at Black Hat 2025, arguing that the real threat isn’t just cybercriminals—it’s unchecked government surveillance. Her keynote offers a call to action for technologists to help restore privacy through design and engineering.</itunes:subtitle>
      <itunes:keywords>surveillance, marco ciappelli, cybersecurity, conference, on location, civil liberties, jennifer granick, event coverage, black hat usa, encryption, privacy, constitution, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>265</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6891a0c1-3e9b-4add-bb63-d33f953c6150</guid>
      <title>Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat USA 2025 Conversation with Virginia Tech’s Alan Michaels and Jared Byers | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “<a href="https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529" target="_blank">Use and Abuse of Personal Information: The Politics Edition</a>.”</p><p>With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it’s used ethically, shared with third parties, or even exposed through insecure systems.</p><p>The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it’s deliberate, sometimes it’s sloppy, and occasionally it’s the result of potential breaches.</p><p>The team examines differences in how data is handled based on whether an identity donates or not, or whether it’s tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.</p><p>But this project isn’t about political sides—it’s about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.</p><p>As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Alan Michaels</strong>, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: <a href="https://www.linkedin.com/in/alan-michaels-1066814/" target="_blank">https://www.linkedin.com/in/alan-michaels-1066814/</a></p><p><strong>Jared Byers</strong>, Research Associate at Virginia Tech National Security Institute | On LinkedIn: <a href="https://www.linkedin.com/in/jared-byers-8a477324b/" target="_blank">https://www.linkedin.com/in/jared-byers-8a477324b/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Session: Use and Abuse of Personal Information -- Politics Edition: <a href="https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529" target="_blank">https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, alan michaels, jared byers, black hat, privacy, politics, data, ai, research, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 4 Aug 2025 20:11:44 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, Jared Byers, Alan Michaels)</author>
      <link>https://eventcoveragepodcast.com/episodes/fake-identities-real-consequences-the-data-trail-behind-your-political-donation-a-black-hat-usa-2025-conversation-with-virginia-techs-alan-michaels-and-jared-byers-on-location-coverage-with-sean-martin-and-marco-ciappelli-CdJyVIf_</link>
      <content:encoded><![CDATA[<p>What happens when you inject thousands of fake identities into the political ecosystem to monitor how personal data is used—or abused? That’s the question Virginia Tech’s Alan Michaels and Jared Byers explore through their multi-year research project, “<a href="https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529" target="_blank">Use and Abuse of Personal Information: The Politics Edition</a>.”</p><p>With support from 130 students across 21 majors, Michaels and Byers create realistic digital personas—complete with phone numbers, emails, and physical addresses—and sign them up across 1,400 political campaigns. Their goal? Understand how political organizations treat personal data: whether it’s used ethically, shared with third parties, or even exposed through insecure systems.</p><p>The findings are both fascinating and concerning. Their data shows that candidates across the political spectrum often prioritize fundraising above all else. The language and targeting vary, but the endgame is consistent: solicit donations and votes. And yes—these candidates frequently share or leak personal data. Sometimes it’s deliberate, sometimes it’s sloppy, and occasionally it’s the result of potential breaches.</p><p>The team examines differences in how data is handled based on whether an identity donates or not, or whether it’s tied to in-state versus out-of-state addresses. They even explore how generative AI and psychometric modeling can craft convincing personalities for these fake identities—tools that can just as easily be used for political influence campaigns and psychological manipulation.</p><p>But this project isn’t about political sides—it’s about accountability. The research remains strictly apolitical, letting the data speak for itself. Michaels and Byers are careful to avoid influencing public opinion through misinformation, focusing instead on documenting the reality of digital privacy in modern campaigning.</p><p>As more of the political playbook shifts into the digital arena, this session at Black Hat USA 2025 pushes attendees to confront an uncomfortable truth: the cost of participation in political life may include the exploitation of your digital identity.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Alan Michaels</strong>, Professor and Director, Spectrum Dominance Division at Virginia Tech | On LinkedIn: <a href="https://www.linkedin.com/in/alan-michaels-1066814/" target="_blank">https://www.linkedin.com/in/alan-michaels-1066814/</a></p><p><strong>Jared Byers</strong>, Research Associate at Virginia Tech National Security Institute | On LinkedIn: <a href="https://www.linkedin.com/in/jared-byers-8a477324b/" target="_blank">https://www.linkedin.com/in/jared-byers-8a477324b/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Session: Use and Abuse of Personal Information -- Politics Edition: <a href="https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529" target="_blank">https://www.blackhat.com/us-25/briefings/schedule/#use-and-abuse-of-personal-information----politics-edition-45529</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, alan michaels, jared byers, black hat, privacy, politics, data, ai, research, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18640711" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c4a6e886-a50f-4d82-9403-cbf81ac918e8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c4a6e886-a50f-4d82-9403-cbf81ac918e8&amp;feed=2M86zCcc"/>
      <itunes:title>Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat USA 2025 Conversation with Virginia Tech’s Alan Michaels and Jared Byers | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, Jared Byers, Alan Michaels</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:25</itunes:duration>
      <itunes:summary>Virginia Tech researchers inject thousands of fake identities into real political campaigns to uncover how personal data is shared, used, or compromised. Their Black Hat USA 2025 session reveals disturbing truths about privacy, ethics, and digital manipulation in modern politics.</itunes:summary>
      <itunes:subtitle>Virginia Tech researchers inject thousands of fake identities into real political campaigns to uncover how personal data is shared, used, or compromised. Their Black Hat USA 2025 session reveals disturbing truths about privacy, ethics, and digital manipulation in modern politics.</itunes:subtitle>
      <itunes:keywords>startup zone, marco ciappelli, sean martin, cybersecurity, conference, on location, event coverage, career development, steve wylie, summit tracks, black hat usa, ai, drone hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>264</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4212ea67-93dd-4eec-88c2-c33a61d79619</guid>
      <title>Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.</p><p>Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what’s scheduled.</p><p>Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”</p><p>Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.</p><p>Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.</p><p>Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.</p><p>This episode is not just about placing bets on buzzwords. It’s about uncovering what’s real, what’s noise, and what still needs fixing—no matter how long we’ve been talking about it.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Leslie Kesselring</strong>, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: <a href="https://www.linkedin.com/in/lesliekesselring/" target="_blank">https://www.linkedin.com/in/lesliekesselring/</a><br /><i>“This year, it’s the news cycle—not the sessions—that’s driving what media cover at Black Hat.”</i></p><p><strong>Daniel Cuthbert</strong>, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: <a href="https://www.linkedin.com/in/daniel-cuthbert0x/" target="_blank">https://www.linkedin.com/in/daniel-cuthbert0x/</a><br /><i>“Why are we still finding bugs older than the people presenting the research?”</i></p><p><strong>Richard Stiennon</strong>, Chief Research Analyst at IT-Harvest | On LinkedIn: <a href="https://www.linkedin.com/in/stiennon/" target="_blank">https://www.linkedin.com/in/stiennon/</a><br /><i>“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”</i></p><p><strong>Michael Parisi</strong>, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a><br /><i>“Responsible AI use isn’t a policy—it’s something we have to actually implement.”</i></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager at Akamai Technologies | On LinkedIn: <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a><br /><i>“The business side is racing to deploy AI—but security still hasn’t caught up.”</i></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, leslie kesselring, daniel cuthbert, richard stiennon, michael parisi, rupesh chokshi, blackhat2025, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Jul 2025 21:26:32 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Marco Ciappelli, ITSPmagazine, Leslie Kesselring, Kesselring Communications, Banco Santander, IT-Harvest, Steel Patriot Partners, Akamai Technologies, Rupesh Chokshi, Michael Parisi, Daniel Cuthbert, Richard Stiennon)</author>
      <link>https://eventcoveragepodcast.com/episodes/black-hat-2025-more-buzzwords-same-breaches-whats-heating-up-before-black-hat-2025-top-trends-set-to-shake-up-this-years-hacker-conference-an-itspmagazine-webinar-on-location-coverage-with-sean-martin-and-marco-ciappelli-4udJv0CQ</link>
      <content:encoded><![CDATA[<p>In this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.</p><p>Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what’s scheduled.</p><p>Daniel Cuthbert, member of the Black Hat Review Board and Global Head of Security Research at Banco Santander, pushes back on the hype. He notes that while tech moves fast, security research often revisits decades-old bugs. His sharp observation? “The same bugs from the ‘90s are still showing up—sometimes discovered by researchers younger than the vulnerabilities themselves.”</p><p>Michael Parisi, Chief Growth Officer at Steel Patriot Partners, shifts the conversation to operational risk. He raises concern over Model-Chained Prompting (MCP) and how AI agents can rewrite enterprise processes without visibility or traceability—especially alarming in environments lacking kill switches or proper controls.</p><p>Richard Stiennon, Chief Research Analyst at IT-Harvest, offers market-level insights, forecasting AI agent saturation with over 20 vendors already present in the expo hall. While excited by real advancements, he warns of funding velocity outpacing substance and cautions against the cycle of overinvestment in vaporware.</p><p>Rupesh Chokshi, SVP & GM at Akamai Technologies, brings the product and customer lens—framing the security conversation around how AI use cases are rolling out fast while security coverage is still catching up. From OT to LLMs, securing both AI and with AI is a top concern.</p><p>This episode is not just about placing bets on buzzwords. It’s about uncovering what’s real, what’s noise, and what still needs fixing—no matter how long we’ve been talking about it.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Leslie Kesselring</strong>, Founder at Cyber PR Firm Kesselring Communications | On LinkedIn: <a href="https://www.linkedin.com/in/lesliekesselring/" target="_blank">https://www.linkedin.com/in/lesliekesselring/</a><br /><i>“This year, it’s the news cycle—not the sessions—that’s driving what media cover at Black Hat.”</i></p><p><strong>Daniel Cuthbert</strong>, Black Hat Training Review Board and Global Head of Security Research for Banco Santander | On LinkedIn: <a href="https://www.linkedin.com/in/daniel-cuthbert0x/" target="_blank">https://www.linkedin.com/in/daniel-cuthbert0x/</a><br /><i>“Why are we still finding bugs older than the people presenting the research?”</i></p><p><strong>Richard Stiennon</strong>, Chief Research Analyst at IT-Harvest | On LinkedIn: <a href="https://www.linkedin.com/in/stiennon/" target="_blank">https://www.linkedin.com/in/stiennon/</a><br /><i>“The urge to consolidate tools is driven by procurement—not by what defenders actually need.”</i></p><p><strong>Michael Parisi</strong>, Chief Growth Officer at Steel Patriot Partners | On LinkedIn: <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a><br /><i>“Responsible AI use isn’t a policy—it’s something we have to actually implement.”</i></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager at Akamai Technologies | On LinkedIn: <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a><br /><i>“The business side is racing to deploy AI—but security still hasn’t caught up.”</i></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, leslie kesselring, daniel cuthbert, richard stiennon, michael parisi, rupesh chokshi, blackhat2025, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="57961177" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b072bb64-524d-415f-9e06-f1d5d33c376b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b072bb64-524d-415f-9e06-f1d5d33c376b&amp;feed=2M86zCcc"/>
      <itunes:title>Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, Marco Ciappelli, ITSPmagazine, Leslie Kesselring, Kesselring Communications, Banco Santander, IT-Harvest, Steel Patriot Partners, Akamai Technologies, Rupesh Chokshi, Michael Parisi, Daniel Cuthbert, Richard Stiennon</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:22</itunes:duration>
      <itunes:summary>Before the buzz hits the Black Hat USA 2025 show floor, this thought leadership roundtable breaks down the real issues—and distractions—set to dominate the conversation. From AI agent hype to old bugs in new systems, these panelists cut through the noise with sharp, unfiltered takes.</itunes:summary>
      <itunes:subtitle>Before the buzz hits the Black Hat USA 2025 show floor, this thought leadership roundtable breaks down the real issues—and distractions—set to dominate the conversation. From AI agent hype to old bugs in new systems, these panelists cut through the noise with sharp, unfiltered takes.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, leslie kesselring, michael parisi, sean martin, blackhat2025, conference, on location, richard stiennon, event coverage, rupesh chokshi, daniel cuthbert</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>263</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14d12fe3-3a1d-4db5-ac2e-920c76426de2</guid>
      <title>Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pre-Event Kick-Off Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As Black Hat USA 2025 approaches, General Manager Steve Wylie joins Sean Martin and Marco Ciappelli for the annual pre-conference conversation to highlight what’s new—and what’s next—for one of cybersecurity’s most iconic events. This year’s themes and expansions signal a strong return to growth, technical depth, and strategic investment.</p><p><strong>AI Everywhere—from Training to the Show Floor</strong></p><p>Artificial intelligence emerges as the dominant force across the agenda. From the main stage to the training rooms, Black Hat is packed with AI-related content designed to meet the rising demand for education and clarity. New this year is a comprehensive lineup of instructor-led AI courses and expanded AI tool showcases in the Arsenal and Arsenal Labs programs. As Wylie notes, three of the four Spotlight competition finalists—FireTail, Keep Aware, and Twine Security—are AI-driven solutions, underscoring the technology’s influence on innovation.</p><p><strong>Investor Energy and Startup Momentum</strong></p><p>Cybersecurity investment is back. That momentum is reflected in the expanded Innovators and Investors Summit and the largest-ever Startup Zone on the show floor, now hosting more than 80 companies. This year’s program builds on last year’s debut and aims to connect entrepreneurs, investors, and CISOs in a more targeted and collaborative setting.</p><p><strong>Expanding the Audience: New Summits and Keynotes</strong></p><p>To better serve cybersecurity leaders across sectors, Black Hat has introduced new summits tailored to financial services and supply chain security. These gatherings offer strategic-level insights for professionals who don’t typically engage in technical briefings. Meanwhile, the keynote lineup includes prominent voices from both public and private sectors—such as Miko Hyppönen, Nicole Perlroth, and Chris Inglis—offering grounded perspectives in a time of uncertainty.</p><p><strong>Interactive Additions and Community Growth</strong></p><p>Attendees can expect hands-on experiences like a new drone hacking zone and an expanded hardware lab area. A Career Development Zone also debuts this year, offering sessions designed to help attendees build or pivot their cybersecurity careers.</p><p><strong>___________</strong><br /><br /><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech and General Manager at Black Hat | On LinkedIn: <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, steve wylie, black hat usa, ai, cybersecurity, startup zone, drone hacking, career development, summit tracks, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 22 Jul 2025 15:49:34 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Marco Ciappelli, Steve Wylie)</author>
      <link>https://eventcoveragepodcast.com/episodes/black-hat-usa-2025-ai-investment-and-the-expanding-scope-of-cybersecurity-our-traditional-pre-event-kick-off-conversation-with-steve-wylie-on-location-coverage-with-sean-martin-and-marco-ciappelli-TwtNez4K</link>
      <content:encoded><![CDATA[<p>As Black Hat USA 2025 approaches, General Manager Steve Wylie joins Sean Martin and Marco Ciappelli for the annual pre-conference conversation to highlight what’s new—and what’s next—for one of cybersecurity’s most iconic events. This year’s themes and expansions signal a strong return to growth, technical depth, and strategic investment.</p><p><strong>AI Everywhere—from Training to the Show Floor</strong></p><p>Artificial intelligence emerges as the dominant force across the agenda. From the main stage to the training rooms, Black Hat is packed with AI-related content designed to meet the rising demand for education and clarity. New this year is a comprehensive lineup of instructor-led AI courses and expanded AI tool showcases in the Arsenal and Arsenal Labs programs. As Wylie notes, three of the four Spotlight competition finalists—FireTail, Keep Aware, and Twine Security—are AI-driven solutions, underscoring the technology’s influence on innovation.</p><p><strong>Investor Energy and Startup Momentum</strong></p><p>Cybersecurity investment is back. That momentum is reflected in the expanded Innovators and Investors Summit and the largest-ever Startup Zone on the show floor, now hosting more than 80 companies. This year’s program builds on last year’s debut and aims to connect entrepreneurs, investors, and CISOs in a more targeted and collaborative setting.</p><p><strong>Expanding the Audience: New Summits and Keynotes</strong></p><p>To better serve cybersecurity leaders across sectors, Black Hat has introduced new summits tailored to financial services and supply chain security. These gatherings offer strategic-level insights for professionals who don’t typically engage in technical briefings. Meanwhile, the keynote lineup includes prominent voices from both public and private sectors—such as Miko Hyppönen, Nicole Perlroth, and Chris Inglis—offering grounded perspectives in a time of uncertainty.</p><p><strong>Interactive Additions and Community Growth</strong></p><p>Attendees can expect hands-on experiences like a new drone hacking zone and an expanded hardware lab area. A Career Development Zone also debuts this year, offering sessions designed to help attendees build or pivot their cybersecurity careers.</p><p><strong>___________</strong><br /><br /><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech and General Manager at Black Hat | On LinkedIn: <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>DropzoneAI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Stellar Cyber: <a href="https://itspm.ag/stellar-9dj3" target="_blank">https://itspm.ag/stellar-9dj3</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>ITSPmagazine Webinar: <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference">What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar</a> | <a href="https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference" target="_blank">https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, steve wylie, black hat usa, ai, cybersecurity, startup zone, drone hacking, career development, summit tracks, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25786975" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2883ff22-a7a5-4f67-b1bf-7e247851598a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2883ff22-a7a5-4f67-b1bf-7e247851598a&amp;feed=2M86zCcc"/>
      <itunes:title>Black Hat USA 2025: AI, Investment, and the Expanding Scope of Cybersecurity | Our Traditional Pre-Event Kick-Off Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Marco Ciappelli, Steve Wylie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/65a82281-3e30-480b-98fa-e1b35c6c1965/3000x3000/black-20hat-20usa-202025-20-20-203500-2.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:51</itunes:duration>
      <itunes:summary>AI dominates the conversation at Black Hat USA 2025, but the story doesn’t stop there—expanded summits, a reinvigorated startup presence, and interactive programs are set to shape the attendee experience. General Manager Steve Wylie joins ITSPmagazine to preview what makes this year’s event a standout.</itunes:summary>
      <itunes:subtitle>AI dominates the conversation at Black Hat USA 2025, but the story doesn’t stop there—expanded summits, a reinvigorated startup presence, and interactive programs are set to shape the attendee experience. General Manager Steve Wylie joins ITSPmagazine to preview what makes this year’s event a standout.</itunes:subtitle>
      <itunes:keywords>startup zone, marco ciappelli, sean martin, cybersecurity, conference, on location, event coverage, career development, steve wylie, summit tracks, black hat usa, ai, drone hacking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>262</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7b782d8a-cff6-4e22-9304-da98aa3abbf4</guid>
      <title>Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time | On Location Podcast With Sean Martin &amp; Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"</strong></p><p><i>A Post–Infosecurity Europe 2025 Conversation with Ken Munro</i></p><p><br /><strong>Guests</strong><br /><br /><strong>Ken Munro </strong><br />Security writer & speaker<br /><a href="https://www.linkedin.com/in/ken-munro-17899b1/" target="_blank">https://www.linkedin.com/in/ken-munro-17899b1/</a><br /><br /><br /><strong>Hosts</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, CMO, and Creative Director at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p>After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.</p><p>⸻</p><p>There’s something special about catching up with someone who’s not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON’s Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.</p><p>Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn’t your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn’t just theory — it’s something you can <i>touch</i>. Something that moves. Something that can break — and be fixed — before it breaks us.</p><p>We talked about the infamous “Otto the Autopilot” from <i>Airplane</i>, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.</p><p>One of the biggest takeaways? It’s time to stop fearing the hacker mindset and start embracing it. Curiosity isn’t a threat — it’s a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.</p><p>There’s a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.</p><p>Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.</p><p>⸻</p><p><strong>Keywords: </strong>cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON</p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 17 Jul 2025 01:33:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Ken Munro, Marco Ciappelli, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/catching-up-with-ken-munro-after-infosecurity-europe-2025-hacking-the-planet-one-car-one-plane-and-one-system-at-a-time-DvHsmEs_</link>
      <content:encoded><![CDATA[<p><strong>Title: "Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time"</strong></p><p><i>A Post–Infosecurity Europe 2025 Conversation with Ken Munro</i></p><p><br /><strong>Guests</strong><br /><br /><strong>Ken Munro </strong><br />Security writer & speaker<br /><a href="https://www.linkedin.com/in/ken-munro-17899b1/" target="_blank">https://www.linkedin.com/in/ken-munro-17899b1/</a><br /><br /><br /><strong>Hosts</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, CMO, and Creative Director at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p>After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.</p><p>⸻</p><p>There’s something special about catching up with someone who’s not just an expert in cybersecurity, but also someone who reminds you why this industry can — and should — be fun. Ken Munro and I go back to the early days of DEFCON’s Aviation Village, and this post-Infosecurity Europe 2025 chat brought all that hacker spirit right back to the surface.</p><p>Ken and his crew from Pen Test Partners set up shop next to the main Infosecurity Europe venue in a traditional London pub — but this wasn’t your average afterparty. They transformed it into a hands-on hacking village, complete with a car demo, flight simulator, ICS cocktail CTF, and of course… a bar. The goal? Show that cybersecurity isn’t just theory — it’s something you can <i>touch</i>. Something that moves. Something that can break — and be fixed — before it breaks us.</p><p>We talked about the infamous “Otto the Autopilot” from <i>Airplane</i>, the Renault Clio-turned-Mario Kart console, and why knowing how TCAS (collision avoidance) works on an Airbus matters just as much as knowing your Wi-Fi password. We also dug into the real-world cybersecurity concerns of industrial systems, electronic flight bags, and why European regulation might be outpacing the U.S. in some areas — for better or worse.</p><p>One of the biggest takeaways? It’s time to stop fearing the hacker mindset and start embracing it. Curiosity isn’t a threat — it’s a superpower. And when channeled correctly, it leads to safer skies, smarter cars, and fewer surprises in the water we drink or the power we use.</p><p>There’s a lot to reflect on from our conversation, but above all: education, community, and creativity are still the most powerful tools we have in security — and Ken is out there proving that, one demo and one pint at a time.</p><p>Thanks again, Ken. See you at the next village — whichever pub, hangar, or DEFCON corner it ends up in.</p><p>⸻</p><p><strong>Keywords: </strong>cybersecurity, ethical hacking, pen testing, Infosecurity Europe, embedded systems, car hacking, flight simulator, ICS security, industrial control systems, aviation cybersecurity, hacker mindset, DEFCON</p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22492605" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d87d2199-b5d3-45fa-8d0f-fd7fe92d30a6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d87d2199-b5d3-45fa-8d0f-fd7fe92d30a6&amp;feed=2M86zCcc"/>
      <itunes:title>Catching Up With Ken Munro After Infosecurity Europe 2025 — Hacking the Planet, One Car, One Plane, and One System at a Time | On Location Podcast With Sean Martin &amp; Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Ken Munro, Marco Ciappelli, Sean Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:25</itunes:duration>
      <itunes:summary>After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.
</itunes:summary>
      <itunes:subtitle>After a whirlwind week at Infosecurity Europe 2025, I had the chance to reconnect with Ken Munro from Pen Test Partners — a longtime friend, hacker, and educator who brings cybersecurity to life in the most tangible ways. From car hacking escape rooms to flight simulators in pubs, we talked about why touching tech matters, how myth-busting makes us safer, and how learning through play might just be the key to securing our increasingly complex world. Tune in, and maybe bring a cocktail.
</itunes:subtitle>
      <itunes:keywords>embedded systems, industrial control systems, marco ciappelli, pen testing, infosecurity europe, hacking, sean martin, infosecurity, ics security, cybersecurity, defcon, event coverage, aviation cybersecurity, ethical hacking, car hacking, infosecurity europe 2025, cyber resilience, flight simulator, hacker mindset, itspmagazine, red team, communication skills</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>261</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02fe19bc-ca73-4e8d-8100-8806ac976b5e</guid>
      <title>“These Aren’t Soft Skills — They’re Human Skills”  A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D&apos;Alton</title>
      <description><![CDATA[<p><strong>Title: “These Aren’t Soft Skills — They’re Human Skills”</strong></p><p><i>A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'Alton</i></p><p><br /><strong>Guests</strong><br /><br /><strong>Rob Black</strong><br />UK Cyber Citizen of the Year 2024 | International Keynote Speaker | Master of Ceremonies | Cyber Leaders Challenge | Professor | Community Builder | Facilitator | Cyber Security | Cyber Deception<br /><a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a><br /><br /><strong>Anthony D'Alton</strong><br />Product marketing | brand | reputation for cybersecurity growth<br /><a href="https://www.linkedin.com/in/anthonydalton/" target="_blank">https://www.linkedin.com/in/anthonydalton/</a></p><p><br /><strong>Hosts</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, CMO, and Creative Director at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong><br /> </p><p>Yes, Infosecurity Europe 2025 may be over, but the most important conversations are just getting started — and they’re far from over. In this post-event follow-up, Marco Ciappelli reconnects from Florence with Rob Black and brings in Anthony D’Alton for a deep-dive into something we all talk about but rarely define clearly: so-called <i>soft skills</i> — or, as we prefer to call them… <i>human skills</i>.</p><p>From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren’t just “nice to have” in cybersecurity — they’re critical, measurable capabilities. Rob and Anthony share their experience designing real-world training environments where people — not just tools — are the difference-makers in effective incident response and security leadership.</p><p>Whether you’re a CISO, a SOC leader, or just tired of seeing tech get all the credit while humans carry the weight, this is a practical, honest conversation about building better teams — and redefining what really matters in cybersecurity today.</p><p>If you still think “soft skills” are soft… you haven’t been paying attention.</p><p>⸻</p><p><strong>Keywords: </strong>Cybersecurity, Infosecurity Europe 2025, Soft Skills, Human Skills, Cyber Resilience, Cyber Training, Security Leadership, Incident Response, Teamwork, Storytelling in Cyber, Marco Ciappelli, Rob Black, Anthony Dalton, On Location, ITSPmagazine, Communication Skills, Cyber Crisis Simulation, RangeForce, Trust in Teams, Post Event Podcast, Security Culture</p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 19 Jun 2025 15:29:55 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony D&apos;Alton, Rob Black)</author>
      <link>https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton-Wa_qPdCl</link>
      <content:encoded><![CDATA[<p><strong>Title: “These Aren’t Soft Skills — They’re Human Skills”</strong></p><p><i>A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D'Alton</i></p><p><br /><strong>Guests</strong><br /><br /><strong>Rob Black</strong><br />UK Cyber Citizen of the Year 2024 | International Keynote Speaker | Master of Ceremonies | Cyber Leaders Challenge | Professor | Community Builder | Facilitator | Cyber Security | Cyber Deception<br /><a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a><br /><br /><strong>Anthony D'Alton</strong><br />Product marketing | brand | reputation for cybersecurity growth<br /><a href="https://www.linkedin.com/in/anthonydalton/" target="_blank">https://www.linkedin.com/in/anthonydalton/</a></p><p><br /><strong>Hosts</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder, CMO, and Creative Director at <a href="https://www.itspmagazine.com" target="_blank">ITSPmagazine</a><br />Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong><br /> </p><p>Yes, Infosecurity Europe 2025 may be over, but the most important conversations are just getting started — and they’re far from over. In this post-event follow-up, Marco Ciappelli reconnects from Florence with Rob Black and brings in Anthony D’Alton for a deep-dive into something we all talk about but rarely define clearly: so-called <i>soft skills</i> — or, as we prefer to call them… <i>human skills</i>.</p><p>From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren’t just “nice to have” in cybersecurity — they’re critical, measurable capabilities. Rob and Anthony share their experience designing real-world training environments where people — not just tools — are the difference-makers in effective incident response and security leadership.</p><p>Whether you’re a CISO, a SOC leader, or just tired of seeing tech get all the credit while humans carry the weight, this is a practical, honest conversation about building better teams — and redefining what really matters in cybersecurity today.</p><p>If you still think “soft skills” are soft… you haven’t been paying attention.</p><p>⸻</p><p><strong>Keywords: </strong>Cybersecurity, Infosecurity Europe 2025, Soft Skills, Human Skills, Cyber Resilience, Cyber Training, Security Leadership, Incident Response, Teamwork, Storytelling in Cyber, Marco Ciappelli, Rob Black, Anthony Dalton, On Location, ITSPmagazine, Communication Skills, Cyber Crisis Simulation, RangeForce, Trust in Teams, Post Event Podcast, Security Culture</p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26757843" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7b93f4f7-137d-4a43-a0fa-4cd869b916a4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7b93f4f7-137d-4a43-a0fa-4cd869b916a4&amp;feed=2M86zCcc"/>
      <itunes:title>“These Aren’t Soft Skills — They’re Human Skills”  A Post–Infosecurity Europe 2025 Conversation with Rob Black and Anthony D&apos;Alton</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony D&apos;Alton, Rob Black</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:52</itunes:duration>
      <itunes:summary>From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren’t just “nice to have” in cybersecurity — they’re critical, measurable capabilities. </itunes:summary>
      <itunes:subtitle>From storytelling to structured exercises, team communication to burnout prevention, this episode explores how communication, collaboration, and trust aren’t just “nice to have” in cybersecurity — they’re critical, measurable capabilities. </itunes:subtitle>
      <itunes:keywords>human skills, security culture, trust in teams, marco ciappelli, sean martin, storytelling in cyber, cyber crisis simulation, teamwork, infosecurity, cybersecurity, cybersecurity, on location, soft skills, rob black, threat intelligence, event coverage, anthony dalton, rangeforce, infosecurity europe 2025, cyber resilience, cyber training, incident response, itspmagazine, communication skills, security leadership</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>260</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a7083cb3-fdb4-4e4f-8315-50576acc732c</guid>
      <title>Inside the Mind of the UK’s Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An Infosecurity EU 2025 Conversation with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA)</title>
      <description><![CDATA[<p>William Lyne of the UK’s National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.</p><p>When the UK’s top cyber intelligence strategist sits down with you in London, you listen — and you hit record.</p><p>At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It’s not just a conversation — it’s a rare front-row seat into how one of the world’s most serious crime-fighting agencies is tackling ransomware 3.0.</p><p>The message? Ransomware isn’t just a cyber issue. It’s a societal one. And it’s evolving faster than we’re prepared for — unless we change the game.</p><p>“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”</p><p>From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn’t just about tech — it’s about access, scale, and business models. And most importantly, it’s no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.</p><p>Sean brings up the obvious: “Why does this still feel like we’re always reacting?”</p><p>Lyne responds: “We’ve shifted. We’re going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.</p><p>Marco flips the script by comparing today’s cyber landscape to something deeply human. “Extortion is nothing new — we’ve just digitalized it. This is human behavior, scaled by tech.”</p><p>From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it’s all on their radar. But he’s quick to note that cybercriminals aren’t bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That’s coming. And it will reshape how efficient — and damaging — these threats become.”</p><p>And then the real insight lands:</p><p>“You can’t wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”</p><p>That kind of operational openness isn’t something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it’s essential.</p><p>William also highlights the NCA’s partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.</p><p>Why does this matter?</p><p>Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It’s not theory. It’s strategy, lived on the front lines.<br /> </p><p>🎧 Listen to the full episode and explore more Infosecurity Europe 2025 coverage at <a href="https://www.itspmagazine.com/">ITSPmagazine.com</a>.</p><p>If you’re in cybersecurity, public safety, critical infrastructure, or just trying to keep your business alive in 2025 — you don’t want to miss this one.<br /> </p><p><strong>Keywords:</strong></p><p>cybersecurity, ransomware, cybercrime, national security, threat intelligence, encryption, data breach, AI in cyber, phishing, law enforcement collaboration, cyber ecosystem, cyber resilience, digital forensics</p><p><strong>___________</strong><br /><br /><strong>Guest: William Lyne</strong>, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA) <a href="https://www.linkedin.com/in/will-lyne-3a2549188/" target="_blank">https://www.linkedin.com/in/will-lyne-3a2549188/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 16 Jun 2025 11:03:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, William Lyne)</author>
      <link>https://eventcoveragepodcast.com/episodes/inside-the-mind-of-the-uks-top-cyber-intelligence-officer-a-ransomware-30-reality-check-an-infosecurity-eu-2025-conversation-with-william-lyne-deputy-director-and-head-of-cyber-intelligence-at-the-uks-national-crime-agency-nca-FLrCytPb</link>
      <content:encoded><![CDATA[<p>William Lyne of the UK’s National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.</p><p>When the UK’s top cyber intelligence strategist sits down with you in London, you listen — and you hit record.</p><p>At Infosecurity Europe 2025, the ITSPmagazine podcast team — Marco Ciappelli and Sean Martin — sat down with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA). This is the guy who not only leads cyber strategy for the NCA, but has also represented the UK at the FBI in the U.S. and now oversees national-level ransomware disruption efforts. It’s not just a conversation — it’s a rare front-row seat into how one of the world’s most serious crime-fighting agencies is tackling ransomware 3.0.</p><p>The message? Ransomware isn’t just a cyber issue. It’s a societal one. And it’s evolving faster than we’re prepared for — unless we change the game.</p><p>“It went from niche to national threat fast,” Lyne explains. “The tools were always there. It just took a few threat actors to stitch them together.”</p><p>From banking malware to fully operational cybercrime-as-a-service ecosystems, Lyne walks us through how the underground economy has industrialized. Ransomware isn’t just about tech — it’s about access, scale, and business models. And most importantly, it’s no longer limited to elite coders or closed-door Russian-speaking forums. The barrier to entry is gone, and the dark web is wide open for business.</p><p>Sean brings up the obvious: “Why does this still feel like we’re always reacting?”</p><p>Lyne responds: “We’ve shifted. We’re going after the ecosystem — the people, the infrastructure, the business model — not just the payload.” That includes disrupting ransomware-as-a-service, targeting marketplaces, and yes, investing in preemptive intelligence.</p><p>Marco flips the script by comparing today’s cyber landscape to something deeply human. “Extortion is nothing new — we’ve just digitalized it. This is human behavior, scaled by tech.”</p><p>From there, the conversation takes a future-facing turn. Deepfakes, AI-powered phishing, the commoditization of generative tools — Lyne confirms it’s all on their radar. But he’s quick to note that cybercriminals aren’t bleeding-edge innovators. “They adopt when the ROI is right. But AI-as-a-service? That’s coming. And it will reshape how efficient — and damaging — these threats become.”</p><p>And then the real insight lands:</p><p>“You can’t wait to be a victim to talk to law enforcement. We may already have access to the infrastructure. The earlier we hear from you, the better we can act — and fast.”</p><p>That kind of operational openness isn’t something you heard from law enforcement five years ago. It signals a cultural shift — one where collaboration is not optional, it’s essential.</p><p>William also highlights the NCA’s partnerships with private sector firms, academia, and international agencies, including the Kronos operation targeting LockBit infrastructure. These kinds of collaborations prove that when information moves, so does impact.</p><p>Why does this matter?</p><p>Because while most cybersecurity media gets stuck in product buzzwords and vendor hype, this is the real stuff — how ransomware groups behave, how law enforcement thinks, and how society can respond. It’s not theory. It’s strategy, lived on the front lines.<br /> </p><p>🎧 Listen to the full episode and explore more Infosecurity Europe 2025 coverage at <a href="https://www.itspmagazine.com/">ITSPmagazine.com</a>.</p><p>If you’re in cybersecurity, public safety, critical infrastructure, or just trying to keep your business alive in 2025 — you don’t want to miss this one.<br /> </p><p><strong>Keywords:</strong></p><p>cybersecurity, ransomware, cybercrime, national security, threat intelligence, encryption, data breach, AI in cyber, phishing, law enforcement collaboration, cyber ecosystem, cyber resilience, digital forensics</p><p><strong>___________</strong><br /><br /><strong>Guest: William Lyne</strong>, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA) <a href="https://www.linkedin.com/in/will-lyne-3a2549188/" target="_blank">https://www.linkedin.com/in/will-lyne-3a2549188/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17078334" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f1d066b3-eda8-46b5-b598-b5191d15fefa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f1d066b3-eda8-46b5-b598-b5191d15fefa&amp;feed=2M86zCcc"/>
      <itunes:title>Inside the Mind of the UK’s Top Cyber Intelligence Officer: A Ransomware 3.0 Reality Check | An Infosecurity EU 2025 Conversation with William Lyne, Deputy Director and Head of Cyber Intelligence at the UK’s National Crime Agency (NCA)</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, William Lyne</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:47</itunes:duration>
      <itunes:summary>William Lyne of the UK’s National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.
</itunes:summary>
      <itunes:subtitle>William Lyne of the UK’s National Crime Agency joins us live at Infosecurity Europe to talk ransomware, AI threats, and the future of cybercrime disruption.
</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ai in cyber, cyber ecosystem, sean martin, infosecurity, digital forensics, cybersecurity, communication, conference, on location, law enforcement collaboration, resilience, cybercrime, national security, data breach, threat intelligence, event coverage, ransomware, cyber resilience, encryption, phishing</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>259</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">095a7a32-c298-4425-99ec-d5a6cac89265</guid>
      <title>Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe 2025 Conversation with Steve Wright | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>What does it really mean to be crisis-ready? In this conversation from InfoSecurity Europe 2025, Steve Wright—a data privacy and cybersecurity leader with three decades of experience spanning Siemens, Unilever, John Lewis, and the Bank of England—joins Sean Martin and Marco Ciappelli to unpack the heart of effective crisis management. With a career that’s evolved from risk, through cybersecurity, and now into privacy, Wright offers a refreshingly grounded perspective: crisis management starts with staying calm—but only if you’ve done the work beforehand.</p><p><strong>Preparation Over Panic</strong></p><p>Crisis management isn’t just a technical checklist—it’s a cultural discipline. Wright emphasizes that calm only comes from consistent practice. From live simulations to cross-functional coordination, he warns that too many organizations are underprepared, relying on ad hoc responses when a breach or outage occurs. Drawing on a real-life ransomware scenario from his time at John Lewis, Wright illustrates the importance of verification, collaboration with law enforcement, and informed decision-making over knee-jerk reactions.</p><p><strong>Containment, Communication, and Culture</strong></p><p>Preparation leads naturally to containment—an organization’s ability to limit the damage. Whether it’s pulling cables or isolating systems, quick thinking can prevent weeks of downtime. But just as important is how you communicate. Wright points to the contrast between companies that respond with transparency and empathy versus those that go silent, risking public trust. Modern crisis management requires the ability to shift the narrative and speak directly to affected stakeholders—before speculation takes over.</p><p><strong>Trust and Accountability in a Global Ecosystem</strong></p><p>Digital trust has become a board-level concern, not just a technical one. Wright notes that conversations with executives have moved beyond compliance to include broader questions of data ownership, consumer expectations, and supply chain accountability. As global systems grow more complex, clarity about who owns what—and who’s responsible when things go wrong—becomes harder to establish, but more important than ever.</p><p><strong>Looking Ahead</strong></p><p>Wright ends with a look to the future, imagining a world where individuals control their data through biometric locks and personal data brokers. Whether this utopia (or dystopia) arrives remains to be seen—but the path forward demands organizations prioritize practice, transparency, and trust today.</p><p><strong>___________</strong><br /><br /><strong>Guest: Steve Wright</strong>, Data Protection Officer, Financial Services Compensation Scheme | <a href="https://www.linkedin.com/in/stevewright1970/" target="_blank">https://www.linkedin.com/in/stevewright1970/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>steve wright, sean martin, marco ciappelli, infosecurity, crisis, privacy, cybersecurity, resilience, communication, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 15:35:06 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wright)</author>
      <link>https://eventcoveragepodcast.com/episodes/stay-calm-but-be-ready-what-trust-looks-like-in-the-middle-of-a-breach-an-infosecurity-europe-2025-conversation-with-steve-wright-on-location-coverage-with-sean-martin-and-marco-ciappelli-VoApj_4M</link>
      <content:encoded><![CDATA[<p>What does it really mean to be crisis-ready? In this conversation from InfoSecurity Europe 2025, Steve Wright—a data privacy and cybersecurity leader with three decades of experience spanning Siemens, Unilever, John Lewis, and the Bank of England—joins Sean Martin and Marco Ciappelli to unpack the heart of effective crisis management. With a career that’s evolved from risk, through cybersecurity, and now into privacy, Wright offers a refreshingly grounded perspective: crisis management starts with staying calm—but only if you’ve done the work beforehand.</p><p><strong>Preparation Over Panic</strong></p><p>Crisis management isn’t just a technical checklist—it’s a cultural discipline. Wright emphasizes that calm only comes from consistent practice. From live simulations to cross-functional coordination, he warns that too many organizations are underprepared, relying on ad hoc responses when a breach or outage occurs. Drawing on a real-life ransomware scenario from his time at John Lewis, Wright illustrates the importance of verification, collaboration with law enforcement, and informed decision-making over knee-jerk reactions.</p><p><strong>Containment, Communication, and Culture</strong></p><p>Preparation leads naturally to containment—an organization’s ability to limit the damage. Whether it’s pulling cables or isolating systems, quick thinking can prevent weeks of downtime. But just as important is how you communicate. Wright points to the contrast between companies that respond with transparency and empathy versus those that go silent, risking public trust. Modern crisis management requires the ability to shift the narrative and speak directly to affected stakeholders—before speculation takes over.</p><p><strong>Trust and Accountability in a Global Ecosystem</strong></p><p>Digital trust has become a board-level concern, not just a technical one. Wright notes that conversations with executives have moved beyond compliance to include broader questions of data ownership, consumer expectations, and supply chain accountability. As global systems grow more complex, clarity about who owns what—and who’s responsible when things go wrong—becomes harder to establish, but more important than ever.</p><p><strong>Looking Ahead</strong></p><p>Wright ends with a look to the future, imagining a world where individuals control their data through biometric locks and personal data brokers. Whether this utopia (or dystopia) arrives remains to be seen—but the path forward demands organizations prioritize practice, transparency, and trust today.</p><p><strong>___________</strong><br /><br /><strong>Guest: Steve Wright</strong>, Data Protection Officer, Financial Services Compensation Scheme | <a href="https://www.linkedin.com/in/stevewright1970/" target="_blank">https://www.linkedin.com/in/stevewright1970/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>steve wright, sean martin, marco ciappelli, infosecurity, crisis, privacy, cybersecurity, resilience, communication, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27798970" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3a914f39-6c70-4b46-8acd-0ba203cb75b7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3a914f39-6c70-4b46-8acd-0ba203cb75b7&amp;feed=2M86zCcc"/>
      <itunes:title>Stay Calm, But Be Ready: What Trust Looks Like in the Middle of a Breach | An Infosecurity Europe 2025 Conversation with Steve Wright | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wright</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:57</itunes:duration>
      <itunes:summary>What does real crisis management look like beyond the headlines? Steve Wright brings 30 years of cybersecurity and privacy leadership to the mic, exploring how preparation, containment, communication, and culture shape today’s response to digital disruption.</itunes:summary>
      <itunes:subtitle>What does real crisis management look like beyond the headlines? Steve Wright brings 30 years of cybersecurity and privacy leadership to the mic, exploring how preparation, containment, communication, and culture shape today’s response to digital disruption.</itunes:subtitle>
      <itunes:keywords>crisis, marco ciappelli, sean martin, trust, infosecurity, cybersecurity, communication, conference, on location, resilience, event coverage, privacy, steve wright</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>258</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">32657a07-5c1f-442c-9e5d-a0b722550b35</guid>
      <title>The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Stick | An Infosecurity Europe 2025 Conversation with Jemma Davis | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Jemma Davis, founder of Culture Gem and a security behavior and culture transformation consultant, brings a deeply human approach to cybersecurity in this compelling episode. Her mission is simple yet powerful: make cybersecurity understandable and actionable for everyone—including her Nan. If her Nan can get it, anyone can.</p><p>This episode challenges the perception that security is primarily a technical domain. Davis argues that real resilience starts with people, not blinking lights or shiny boxes. Too often, security messaging is shrouded in jargon, acronyms, and fear—an approach that isolates the very people it aims to protect. Davis instead emphasizes practical education through relatable stories, real-life consequences, and everyday analogies, such as the “digital dark alley” and the importance of recognizing a cyber threat like we would recognize the sound of a smoke alarm.</p><p>She critiques the current imbalance in cybersecurity budgets—where less than 1% goes to human-focused initiatives—and underscores the cost of that neglect. From supply chains disrupted by a phishing email to everyday citizens targeted in scams, Davis points out that people aren’t just the problem; they’re the frontline defenders. She calls for cultural shifts in organizations that reframe security from a compliance checkbox to a personal and collective responsibility.</p><p>A particularly powerful part of the conversation addresses the failure to reach young people early. With just one hour of cybersecurity education per year in UK primary schools, Davis sees a missed opportunity to build a new generation of security-minded citizens. She shares her admiration for children’s book author Wendy Goucher and proposes public campaigns akin to “Smokey the Bear” or “Ask for Angela” to normalize cybersecurity awareness from childhood.</p><p>Davis doesn’t just highlight the gaps—she shares a vision for fixing them. One that includes marketing, storytelling, and empathy. Because when people understand how cybersecurity affects them personally, they don’t just comply—they care.</p><p><strong>___________</strong><br /><br /><strong>Guest: Jemma Davis</strong>, Founder and CEO. Security Behaviour and Culture Change Consultant, Culture Gem | <a href="https://www.linkedin.com/in/infosecjem/" target="_blank">https://www.linkedin.com/in/infosecjem/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>jemma davis, marco ciappelli, cybersecurity, behavior, education, culture, awareness, storytelling, infosecurity europe, training, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 15:23:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jemma Davis)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-digital-dark-alley-teaching-cybersecurity-like-fire-safety-by-building-cyber-habits-that-stick-an-infosecurity-europe-2025-conversation-with-jemma-davis-on-location-coverage-with-sean-martin-and-marco-ciappelli-opPgwjsc</link>
      <content:encoded><![CDATA[<p>Jemma Davis, founder of Culture Gem and a security behavior and culture transformation consultant, brings a deeply human approach to cybersecurity in this compelling episode. Her mission is simple yet powerful: make cybersecurity understandable and actionable for everyone—including her Nan. If her Nan can get it, anyone can.</p><p>This episode challenges the perception that security is primarily a technical domain. Davis argues that real resilience starts with people, not blinking lights or shiny boxes. Too often, security messaging is shrouded in jargon, acronyms, and fear—an approach that isolates the very people it aims to protect. Davis instead emphasizes practical education through relatable stories, real-life consequences, and everyday analogies, such as the “digital dark alley” and the importance of recognizing a cyber threat like we would recognize the sound of a smoke alarm.</p><p>She critiques the current imbalance in cybersecurity budgets—where less than 1% goes to human-focused initiatives—and underscores the cost of that neglect. From supply chains disrupted by a phishing email to everyday citizens targeted in scams, Davis points out that people aren’t just the problem; they’re the frontline defenders. She calls for cultural shifts in organizations that reframe security from a compliance checkbox to a personal and collective responsibility.</p><p>A particularly powerful part of the conversation addresses the failure to reach young people early. With just one hour of cybersecurity education per year in UK primary schools, Davis sees a missed opportunity to build a new generation of security-minded citizens. She shares her admiration for children’s book author Wendy Goucher and proposes public campaigns akin to “Smokey the Bear” or “Ask for Angela” to normalize cybersecurity awareness from childhood.</p><p>Davis doesn’t just highlight the gaps—she shares a vision for fixing them. One that includes marketing, storytelling, and empathy. Because when people understand how cybersecurity affects them personally, they don’t just comply—they care.</p><p><strong>___________</strong><br /><br /><strong>Guest: Jemma Davis</strong>, Founder and CEO. Security Behaviour and Culture Change Consultant, Culture Gem | <a href="https://www.linkedin.com/in/infosecjem/" target="_blank">https://www.linkedin.com/in/infosecjem/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>jemma davis, marco ciappelli, cybersecurity, behavior, education, culture, awareness, storytelling, infosecurity europe, training, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20269016" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3fad66ca-6ba8-4d74-a39d-3b38adb774d3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3fad66ca-6ba8-4d74-a39d-3b38adb774d3&amp;feed=2M86zCcc"/>
      <itunes:title>The Digital Dark Alley: Teaching Cybersecurity Like Fire Safety by Building Cyber Habits That Stick | An Infosecurity Europe 2025 Conversation with Jemma Davis | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jemma Davis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:06</itunes:duration>
      <itunes:summary>What if your cybersecurity program started with your Nan—and ended with a generational shift in digital safety? In this episode, Jemma Davis shares why cultural transformation is the missing link in cybersecurity and how we can fix it through behavior, education, and story-driven awareness.</itunes:summary>
      <itunes:subtitle>What if your cybersecurity program started with your Nan—and ended with a generational shift in digital safety? In this episode, Jemma Davis shares why cultural transformation is the missing link in cybersecurity and how we can fix it through behavior, education, and story-driven awareness.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, infosecurity europe, saima poorghobad, sean martin, cybersecurity, conference, on location, innovation, policy, event coverage, quantum, ai, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>257</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f38653e3-dc43-403e-b499-bd6e49700ef1</guid>
      <title>From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe 2025 Conversation with Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>What if the key to cybersecurity isn’t more tech—but more humanity?</p><p>In this On Location episode of ITSPmagazine, Rob Black—UK Cyber Citizen of the Year and founder of the Global Institute of Cyber Deception—joins hosts Marco Ciappelli and Sean Martin to challenge conventional thinking around cyber defense. With a background spanning military operations and human sciences, Rob brings a fresh perspective that prioritizes multidisciplinary thinking, behavioral insight, and creative disruption over brute-force technology.</p><p>Rob highlights the importance of soft skills and critical thinking through initiatives like the UK Cyber Leaders Challenge, where students take on crisis simulation roles to sharpen leadership and communication in real-world scenarios. These experiences underscore the need to cultivate professionals who can think dynamically, not just code efficiently.</p><p>A key focus of the conversation is the strategic use of deception in cybersecurity. Rob points out that while organizations obsess over vulnerabilities and zero-days, they often overlook attacker intent. Instead of just locking down infrastructure, defenders should disrupt decision-making—using tools, tactics, and even perception itself to sow doubt and hesitation. From publicizing the use of deception technologies to crafting networks that appear already compromised by rival threat actors, Rob argues for a smarter, more psychological approach to defense.</p><p>He also pushes back against the industry’s obsession with tools for every symptom—drawing a parallel to big pharma’s model of selling treatments without tackling root causes. If cybersecurity is to become more resilient, he argues, it needs to embrace a systems mindset that includes governance, behavioral science, and even cultural analysis.</p><p>This episode is a must-listen for anyone tired of buzzwords and ready to rethink cybersecurity as a socio-technical system—not just a digital one. From geopolitics to psychology, deception to diplomacy, Rob Black connects the dots between how we live with technology and how we must protect it—not just through code, but through creativity, context, and compassion. Listen now to explore how cybersecurity can grow up—and get smarter—by getting more human.</p><p><strong>___________</strong><br /><br /><strong>Guest: Rob Black</strong>, Director, UK Cyber Leaders Challenge | <a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>rob black, marco ciappelli, sean martin, deception, cybersecurity, behavior, intent, resilience, infosec 2025, leadership, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 15:11:08 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Black)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-code-to-culture-why-technical-tools-alone-wont-save-cybersecurity-an-infosecurity-europe-2025-conversation-with-rob-black-on-location-coverage-with-sean-martin-and-marco-ciappelli-Dx4DG29f</link>
      <content:encoded><![CDATA[<p>What if the key to cybersecurity isn’t more tech—but more humanity?</p><p>In this On Location episode of ITSPmagazine, Rob Black—UK Cyber Citizen of the Year and founder of the Global Institute of Cyber Deception—joins hosts Marco Ciappelli and Sean Martin to challenge conventional thinking around cyber defense. With a background spanning military operations and human sciences, Rob brings a fresh perspective that prioritizes multidisciplinary thinking, behavioral insight, and creative disruption over brute-force technology.</p><p>Rob highlights the importance of soft skills and critical thinking through initiatives like the UK Cyber Leaders Challenge, where students take on crisis simulation roles to sharpen leadership and communication in real-world scenarios. These experiences underscore the need to cultivate professionals who can think dynamically, not just code efficiently.</p><p>A key focus of the conversation is the strategic use of deception in cybersecurity. Rob points out that while organizations obsess over vulnerabilities and zero-days, they often overlook attacker intent. Instead of just locking down infrastructure, defenders should disrupt decision-making—using tools, tactics, and even perception itself to sow doubt and hesitation. From publicizing the use of deception technologies to crafting networks that appear already compromised by rival threat actors, Rob argues for a smarter, more psychological approach to defense.</p><p>He also pushes back against the industry’s obsession with tools for every symptom—drawing a parallel to big pharma’s model of selling treatments without tackling root causes. If cybersecurity is to become more resilient, he argues, it needs to embrace a systems mindset that includes governance, behavioral science, and even cultural analysis.</p><p>This episode is a must-listen for anyone tired of buzzwords and ready to rethink cybersecurity as a socio-technical system—not just a digital one. From geopolitics to psychology, deception to diplomacy, Rob Black connects the dots between how we live with technology and how we must protect it—not just through code, but through creativity, context, and compassion. Listen now to explore how cybersecurity can grow up—and get smarter—by getting more human.</p><p><strong>___________</strong><br /><br /><strong>Guest: Rob Black</strong>, Director, UK Cyber Leaders Challenge | <a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>rob black, marco ciappelli, sean martin, deception, cybersecurity, behavior, intent, resilience, infosec 2025, leadership, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21653713" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bd6367d8-7c19-4789-b7f4-404ffe5db463/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bd6367d8-7c19-4789-b7f4-404ffe5db463&amp;feed=2M86zCcc"/>
      <itunes:title>From Code to Culture: Why Technical Tools Alone Won’t Save Cybersecurity | An Infosecurity Europe 2025 Conversation with Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Black</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:33</itunes:duration>
      <itunes:summary>Cybersecurity leader Rob Black challenges the industry’s tech-first mindset by spotlighting the critical role of human behavior, soft skills, and psychological strategy in modern defense. From deception tactics to geopolitical intent, this episode reimagines cyber as a human-driven battleground where creativity may be the ultimate security tool.</itunes:summary>
      <itunes:subtitle>Cybersecurity leader Rob Black challenges the industry’s tech-first mindset by spotlighting the critical role of human behavior, soft skills, and psychological strategy in modern defense. From deception tactics to geopolitical intent, this episode reimagines cyber as a human-driven battleground where creativity may be the ultimate security tool.</itunes:subtitle>
      <itunes:keywords>infosec 2025, behavior, marco ciappelli, leadership, sean martin, cybersecurity, conference, on location, resilience, rob black, event coverage, deception, intent</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>256</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">70f07b58-11f3-4d88-9935-f09986622c08</guid>
      <title>Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in Cyber Resilience | An Infosecurity Europe 2025 Conversation with Amanda Finch | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode, Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, offers a perspective shaped by decades of experience in a field she has grown with and helped shape. She shares how cybersecurity has transformed from an obscure technical pursuit into a formalized profession with recognized pathways, development programs, and charters. Her focus is clear: we need to support individuals and organizations at every level to ensure cybersecurity is inclusive, sustainable, and effective.</p><p>Amanda outlines how the Chartered Institute has developed a structured framework to support cybersecurity careers from entry-level to fellowship. Programs such as the Associate Development Program and the Full Membership Development Program help individuals grow into leadership roles, especially those who come from technical backgrounds and must now influence strategy, policy, and people. She emphasizes that supporting this journey isn’t just about skills—it’s about building confidence and community.</p><p>A significant part of the conversation centers on representation and diversity. Amanda speaks candidly about being one of the only women in the room early in her career and acknowledges the progress made, but she also highlights the structural issues still holding many back. From the branding of cybersecurity as overly technical, to the inaccessibility of school programs for under-resourced communities, the industry has work to do. She argues for a wider understanding of the skills needed in cybersecurity—communication, analysis, problem-solving—not just coding or technical specialization.</p><p>Amanda also addresses the growing threat to small and medium-sized businesses. While large organizations may have teams and resources to manage security, smaller businesses face the same threats without the same support. She calls for a renewed emphasis on community-based solutions—knowledge sharing, mentorship, and collaborative platforms—that extend the reach of cyber defense to those with fewer resources.</p><p>In closing, Amanda urges us not to forget the enduring principles of security—know what you’re protecting, understand the consequences if it fails, and use foundational practices to stay grounded even when new technologies like AI and deepfakes arrive. And just as importantly, she reminds us that human principles—trust, empathy, responsibility—are vital tools in facing cybersecurity’s biggest challenges.</p><p><strong>___________</strong><br /><br /><strong>Guest: Amanda Finch</strong>, CEO of the Chartered Institute of Information Security | <a href="https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/" target="_blank">https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>amanda finch, sean martin, marco ciappelli, cybersecurity, diversity, leadership, career, smallbusiness, community, education, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 14:56:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Amanda Finch)</author>
      <link>https://eventcoveragepodcast.com/episodes/beyond-the-hoodie-redefining-who-belongs-in-cybersecurity-with-community-as-the-missing-link-in-cyber-resilience-an-infosecurity-europe-2025-conversation-with-amanda-finch-on-location-coverage-with-sean-martin-and-marco-ciappelli-5JmlGfQ2</link>
      <content:encoded><![CDATA[<p>In this episode, Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, offers a perspective shaped by decades of experience in a field she has grown with and helped shape. She shares how cybersecurity has transformed from an obscure technical pursuit into a formalized profession with recognized pathways, development programs, and charters. Her focus is clear: we need to support individuals and organizations at every level to ensure cybersecurity is inclusive, sustainable, and effective.</p><p>Amanda outlines how the Chartered Institute has developed a structured framework to support cybersecurity careers from entry-level to fellowship. Programs such as the Associate Development Program and the Full Membership Development Program help individuals grow into leadership roles, especially those who come from technical backgrounds and must now influence strategy, policy, and people. She emphasizes that supporting this journey isn’t just about skills—it’s about building confidence and community.</p><p>A significant part of the conversation centers on representation and diversity. Amanda speaks candidly about being one of the only women in the room early in her career and acknowledges the progress made, but she also highlights the structural issues still holding many back. From the branding of cybersecurity as overly technical, to the inaccessibility of school programs for under-resourced communities, the industry has work to do. She argues for a wider understanding of the skills needed in cybersecurity—communication, analysis, problem-solving—not just coding or technical specialization.</p><p>Amanda also addresses the growing threat to small and medium-sized businesses. While large organizations may have teams and resources to manage security, smaller businesses face the same threats without the same support. She calls for a renewed emphasis on community-based solutions—knowledge sharing, mentorship, and collaborative platforms—that extend the reach of cyber defense to those with fewer resources.</p><p>In closing, Amanda urges us not to forget the enduring principles of security—know what you’re protecting, understand the consequences if it fails, and use foundational practices to stay grounded even when new technologies like AI and deepfakes arrive. And just as importantly, she reminds us that human principles—trust, empathy, responsibility—are vital tools in facing cybersecurity’s biggest challenges.</p><p><strong>___________</strong><br /><br /><strong>Guest: Amanda Finch</strong>, CEO of the Chartered Institute of Information Security | <a href="https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/" target="_blank">https://www.linkedin.com/in/amanda-finch-fciis-b1b1951/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>amanda finch, sean martin, marco ciappelli, cybersecurity, diversity, leadership, career, smallbusiness, community, education, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25975832" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7ab843ba-4558-408b-bd26-7fa05831541b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7ab843ba-4558-408b-bd26-7fa05831541b&amp;feed=2M86zCcc"/>
      <itunes:title>Beyond the Hoodie: Redefining Who Belongs in Cybersecurity with Community as the Missing Link in Cyber Resilience | An Infosecurity Europe 2025 Conversation with Amanda Finch | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Amanda Finch</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:03</itunes:duration>
      <itunes:summary>Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, shares how formalizing the cybersecurity profession and strengthening community support can address long-standing gaps in diversity, skills development, and small business protection. Her perspective blends career-spanning insights with a clear call to action: build on core security and human principles to create a more inclusive and resilient future.</itunes:summary>
      <itunes:subtitle>Amanda Finch, Chief Executive Officer of the Chartered Institute of Information Security, shares how formalizing the cybersecurity profession and strengthening community support can address long-standing gaps in diversity, skills development, and small business protection. Her perspective blends career-spanning insights with a clear call to action: build on core security and human principles to create a more inclusive and resilient future.</itunes:subtitle>
      <itunes:keywords>career, marco ciappelli, infosecurity europe, leadership, sean martin, education, cybersecurity, conference, on location, smallbusiness, diversity, event coverage, amanda finch, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>255</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0bf041d7-725e-483d-afda-49f7d697ce95</guid>
      <title>Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.</p><p>Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.</p><p>The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance’s Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer’s awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.</p><p>Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.</p><p>The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.</p><p>This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?</p><p><strong>___________</strong><br /><br /><strong>Guest: Dr. Jason R.C. Nurse</strong>, Associate Professor in Cybersecurity at the University of Kent | <a href="https://www.linkedin.com/in/jasonrcnurse/">https://www.linkedin.com/in/jasonrcnurse/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, jason nurse, infosecurity europe, behavior, psychology, cybersecurity, ai, social engineering, workplace, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 09:06:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dr. Jason R.C. Nurse)</author>
      <link>https://eventcoveragepodcast.com/episodes/understanding-cybersecurity-behavior-from-social-engineering-to-shadow-ai-an-infosecurity-europe-2025-conversation-with-jason-nurse-on-location-coverage-with-sean-martin-and-marco-ciappelli-GZIDYxJG</link>
      <content:encoded><![CDATA[<p>Dr. Jason Nurse, academic and cybersecurity behavior researcher, joins Marco Ciappelli at Infosecurity Europe to unpack the shift in cybersecurity thinking—away from purely technical measures and toward a deeper understanding of human behavior and psychology. Nurse focuses his work on why people act the way they do when it comes to security decisions, and how culture, community, and workplace influences shape those actions.</p><p>Behavior is increasingly taking center stage in security conversations, and for good reason. Nurse points to recent attacks that succeed not because of flaws in technology but due to the manipulation of individuals—such as social engineering tactics that target help desk personnel. These incidents highlight how behavioral cues and psychological triggers are weaponized, making it critical for organizations to address not just systems, but the people using them.</p><p>The conversation then shifts to artificial intelligence, particularly the growing issue of “shadow AI” in corporate settings. Nurse cites research from the National Cybersecurity Alliance’s Behavior Report, revealing that approximately 40% of employees who use AI admit to sharing sensitive corporate information with these tools—often without their employer’s awareness. Even more concerning, over half of those organizations offer no training on safe or responsible AI use.</p><p>Rather than banning AI outright, Nurse advocates for responsible use grounded in training and transparency. He acknowledges that some companies attempt to enforce boundaries by deploying internal AI systems, but these are often limited in capability. Others are exploring solutions to filter or sanitize inputs, though achieving a practical balance remains elusive.</p><p>The conversation also touches on the emotional and psychological bonds forming between individuals and AI. Nurse notes that users increasingly treat AI like a companion, trusting it with personal information and seeking advice, even in sensitive contexts such as mental health. That trust, while understandable, opens new avenues for misuse and misjudgment—especially when users forget AI lacks genuine understanding.</p><p>This episode prompts an important question: as AI becomes part of our daily routines, how do we maintain control, context, and caution in our interactions with it—and what does that mean for the future of security?</p><p><strong>___________</strong><br /><br /><strong>Guest: Dr. Jason R.C. Nurse</strong>, Associate Professor in Cybersecurity at the University of Kent | <a href="https://www.linkedin.com/in/jasonrcnurse/">https://www.linkedin.com/in/jasonrcnurse/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, jason nurse, infosecurity europe, behavior, psychology, cybersecurity, ai, social engineering, workplace, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14748193" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d47bb8e2-1726-48de-a465-c0d0c050e68c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d47bb8e2-1726-48de-a465-c0d0c050e68c&amp;feed=2M86zCcc"/>
      <itunes:title>Understanding Cybersecurity Behavior: From Social Engineering to Shadow AI | An Infosecurity Europe 2025 Conversation with Jason Nurse | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dr. Jason R.C. Nurse</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:21</itunes:duration>
      <itunes:summary>Dr. Jason Nurse explores the critical role of human behavior in cybersecurity, revealing how psychological patterns and cultural influences impact everything from social engineering to the misuse of AI in the workplace. This conversation challenges listeners to rethink security not just as a technical issue, but as a deeply human one.</itunes:summary>
      <itunes:subtitle>Dr. Jason Nurse explores the critical role of human behavior in cybersecurity, revealing how psychological patterns and cultural influences impact everything from social engineering to the misuse of AI in the workplace. This conversation challenges listeners to rethink security not just as a technical issue, but as a deeply human one.</itunes:subtitle>
      <itunes:keywords>workplace, behavior, marco ciappelli, infosecurity europe, trust, jason nurse, cybersecurity, conference, on location, event coverage, psychology, ai, social engineering</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>254</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">213665c5-63d7-4cd3-a0c7-1adc7e09085e</guid>
      <title>From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An Infosecurity Europe 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President of Security Research at runZero, joins host Sean Martin at InfoSec Europe 2025 to challenge how organizations use these scoring systems and to explain why context is everything when it comes to exposure management.</p><p>Beardsley shares his experience navigating the limitations of vulnerability scoring. He explains why common outputs—like a CVSS score of 7.8—often leave teams with too many “priorities,” forcing them into ineffective, binary patch-or-don’t-patch decisions. By contrast, he highlights the real value in understanding factors like access vectors and environmental fit, which help security teams focus on what’s relevant to their specific networks and business-critical systems.</p><p>The conversation also explores SSVC’s ability to drive action through decision-tree logic rather than abstract scores, enabling defenders to justify priorities to leadership based on mission impact. This context-centric approach requires a deep understanding of both the asset and its role in the business—something Beardsley notes can be hard to achieve without support.</p><p>That’s where runZero steps in. Beardsley outlines how the platform identifies unmanaged or forgotten devices—including IoT, legacy systems, and third-party gear—without needing credentials or agents. From uncovering multi-homed light bulbs that straddle segmented networks to scanning for default passwords and misconfigurations, RunZero shines a light into the forgotten corners of corporate infrastructure.</p><p>The episode closes with a look at merger and acquisition use cases, where runZero helps acquiring companies understand the actual tech debt and exposure risk in the environments they’re buying. As Beardsley puts it, the goal is simple: give defenders the visibility and context they need to act now—not after something breaks.</p><p>Whether you’re tracking vulnerabilities, uncovering shadow assets, or preparing for your next acquisition, this episode invites you to rethink what visibility really means—and how you can stop chasing scores and start reducing risk.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Tod Beardsley, Vice President of Security Research at runZero | On Linkedin: <a href="https://www.linkedin.com/in/todb/" target="_blank">https://www.linkedin.com/in/todb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: sean martin, tod beardsley, runzero, exposure, vulnerability, asset, risk, ssdc, cvss, iot, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 07:47:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tod Beardsley, runZero)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-vulnerability-to-visibility-rethinking-exposure-management-a-brand-story-with-tod-beardsley-from-runzero-an-infosecurity-europe-2025-conference-on-location-brand-story-xv8PdnFY</link>
      <content:encoded><![CDATA[<p>Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President of Security Research at runZero, joins host Sean Martin at InfoSec Europe 2025 to challenge how organizations use these scoring systems and to explain why context is everything when it comes to exposure management.</p><p>Beardsley shares his experience navigating the limitations of vulnerability scoring. He explains why common outputs—like a CVSS score of 7.8—often leave teams with too many “priorities,” forcing them into ineffective, binary patch-or-don’t-patch decisions. By contrast, he highlights the real value in understanding factors like access vectors and environmental fit, which help security teams focus on what’s relevant to their specific networks and business-critical systems.</p><p>The conversation also explores SSVC’s ability to drive action through decision-tree logic rather than abstract scores, enabling defenders to justify priorities to leadership based on mission impact. This context-centric approach requires a deep understanding of both the asset and its role in the business—something Beardsley notes can be hard to achieve without support.</p><p>That’s where runZero steps in. Beardsley outlines how the platform identifies unmanaged or forgotten devices—including IoT, legacy systems, and third-party gear—without needing credentials or agents. From uncovering multi-homed light bulbs that straddle segmented networks to scanning for default passwords and misconfigurations, RunZero shines a light into the forgotten corners of corporate infrastructure.</p><p>The episode closes with a look at merger and acquisition use cases, where runZero helps acquiring companies understand the actual tech debt and exposure risk in the environments they’re buying. As Beardsley puts it, the goal is simple: give defenders the visibility and context they need to act now—not after something breaks.</p><p>Whether you’re tracking vulnerabilities, uncovering shadow assets, or preparing for your next acquisition, this episode invites you to rethink what visibility really means—and how you can stop chasing scores and start reducing risk.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Tod Beardsley, Vice President of Security Research at runZero | On Linkedin: <a href="https://www.linkedin.com/in/todb/" target="_blank">https://www.linkedin.com/in/todb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: sean martin, tod beardsley, runzero, exposure, vulnerability, asset, risk, ssdc, cvss, iot, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26249172" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/26bb8d54-9577-4a21-ba81-a8496ac390bb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=26bb8d54-9577-4a21-ba81-a8496ac390bb&amp;feed=2M86zCcc"/>
      <itunes:title>From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An Infosecurity Europe 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tod Beardsley, runZero</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:20</itunes:duration>
      <itunes:summary>When vulnerability scores alone can’t tell you what truly matters, what do you do? In this episode, Tod Beardsley of runZero reveals how security teams can uncover hidden risks and prioritize action based on real-world exposure—not just numbers.</itunes:summary>
      <itunes:subtitle>When vulnerability scores alone can’t tell you what truly matters, what do you do? In this episode, Tod Beardsley of runZero reveals how security teams can uncover hidden risks and prioritize action based on real-world exposure—not just numbers.</itunes:subtitle>
      <itunes:keywords>marketing podcast, sean martin, vulnerability, exposure, tod beardsley, cvss, asset, brand marketing, runzero, iot, risk, brand story podcast, brand story, ssdc</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>253</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c169d133-8501-4ac9-b845-2c7ed672c946</guid>
      <title>When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An Infosecurity Europe 2025 Conversation with Andrea Isoni | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Artificial intelligence is often described through hype or headlines, but few people work directly at the intersection of research and real-world implementation the way Andrea Isoni does. As a data scientist and machine learning engineer managing AI projects since 2017, Andrea brings a refreshingly direct view of what’s possible—and what’s practical—when it comes to using AI for business and societal impact.</p><p>In this episode recorded at Infosecurity Europe, Andrea outlines the many roles involved in operationalizing AI, from data engineers and analysts to project managers and machine learning specialists. He emphasizes that despite all the impressive language surrounding AI, much of the work still involves cleaning data, assessing model readiness, and making decisions based on cost, scalability, and risk tolerance. A “one-size-fits-all” model doesn’t exist; every implementation must be evaluated against the client’s specific context and budget, and decisions often come down to whether the project is meant to drive research and IP or automate existing workflows.</p><p>Andrea discusses two real-world case studies. One project with the Ministry of Justice in Saudi Arabia explored automating small claims car accident rulings based on previous court data—a proof-of-concept with 95% accuracy. Another, more grounded example involved helping telecom providers automate regulatory reporting, saving hours of manual compilation by analysts. These examples illustrate the spectrum of AI’s capabilities: from ambitious innovation to process improvement that simply makes work more efficient.</p><p>He also reflects on the future—and the risks—of democratized AI. As models become smaller and more portable, Andrea warns that the same proliferation that empowers businesses and researchers could also enable criminal actors to build customized AI systems, much like cartels already invest in developing undetectable submarines or secure telecoms. When illicit groups begin investing in AI R&D rather than just purchasing commercial tools, unpredictability rises sharply.</p><p>Andrea leaves us with a philosophical but clear-eyed view: AI can reduce inefficiencies and unlock new capabilities, but it must be implemented thoughtfully, with full awareness of its context, limits, and impact. It’s not about replacing human judgment—especially in nuanced, high-stakes environments—but augmenting it where automation is justified.</p><p><strong>___________</strong><br /><br /><strong>Guest: Andrea Isoni</strong>, Chief AI Officer, Director at AI Technologies | <a href="https://www.linkedin.com/in/andreaisoni20/" target="_blank">https://www.linkedin.com/in/andreaisoni20/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>andrea isoni, sean martin, marco ciappelli, ai, machine learning, automation, data science, cybersecurity, risk, scalability, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 9 Jun 2025 15:02:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Andrea Isoni)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-automation-meets-ethics-budget-data-and-risk-the-real-factors-behind-ai-deployment-an-infosecurity-europe-2025-conversation-with-andrea-isoni-on-location-coverage-with-sean-martin-and-marco-ciappelli-qHBIBNqF</link>
      <content:encoded><![CDATA[<p>Artificial intelligence is often described through hype or headlines, but few people work directly at the intersection of research and real-world implementation the way Andrea Isoni does. As a data scientist and machine learning engineer managing AI projects since 2017, Andrea brings a refreshingly direct view of what’s possible—and what’s practical—when it comes to using AI for business and societal impact.</p><p>In this episode recorded at Infosecurity Europe, Andrea outlines the many roles involved in operationalizing AI, from data engineers and analysts to project managers and machine learning specialists. He emphasizes that despite all the impressive language surrounding AI, much of the work still involves cleaning data, assessing model readiness, and making decisions based on cost, scalability, and risk tolerance. A “one-size-fits-all” model doesn’t exist; every implementation must be evaluated against the client’s specific context and budget, and decisions often come down to whether the project is meant to drive research and IP or automate existing workflows.</p><p>Andrea discusses two real-world case studies. One project with the Ministry of Justice in Saudi Arabia explored automating small claims car accident rulings based on previous court data—a proof-of-concept with 95% accuracy. Another, more grounded example involved helping telecom providers automate regulatory reporting, saving hours of manual compilation by analysts. These examples illustrate the spectrum of AI’s capabilities: from ambitious innovation to process improvement that simply makes work more efficient.</p><p>He also reflects on the future—and the risks—of democratized AI. As models become smaller and more portable, Andrea warns that the same proliferation that empowers businesses and researchers could also enable criminal actors to build customized AI systems, much like cartels already invest in developing undetectable submarines or secure telecoms. When illicit groups begin investing in AI R&D rather than just purchasing commercial tools, unpredictability rises sharply.</p><p>Andrea leaves us with a philosophical but clear-eyed view: AI can reduce inefficiencies and unlock new capabilities, but it must be implemented thoughtfully, with full awareness of its context, limits, and impact. It’s not about replacing human judgment—especially in nuanced, high-stakes environments—but augmenting it where automation is justified.</p><p><strong>___________</strong><br /><br /><strong>Guest: Andrea Isoni</strong>, Chief AI Officer, Director at AI Technologies | <a href="https://www.linkedin.com/in/andreaisoni20/" target="_blank">https://www.linkedin.com/in/andreaisoni20/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>andrea isoni, sean martin, marco ciappelli, ai, machine learning, automation, data science, cybersecurity, risk, scalability, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28410026" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/aaffed23-455e-41d0-ac79-7a928d916c83/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=aaffed23-455e-41d0-ac79-7a928d916c83&amp;feed=2M86zCcc"/>
      <itunes:title>When Automation Meets Ethics, Budget, Data, and Risk: The Real Factors Behind AI Deployment | An Infosecurity Europe 2025 Conversation with Andrea Isoni | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Andrea Isoni</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:35</itunes:duration>
      <itunes:summary>Andrea Isoni shares how AI moves from research into real-world application, navigating practical choices around data, budget, and scalability to solve business and societal problems. From automating car accident rulings to forecasting where AI misuse might emerge, this episode explores what’s truly happening behind the buzz.</itunes:summary>
      <itunes:subtitle>Andrea Isoni shares how AI moves from research into real-world application, navigating practical choices around data, budget, and scalability to solve business and societal problems. From automating car accident rulings to forecasting where AI misuse might emerge, this episode explores what’s truly happening behind the buzz.</itunes:subtitle>
      <itunes:keywords>andrea isoni, marco ciappelli, infosecurity europe, sean martin, automation, cybersecurity, conference, on location, event coverage, scalability, machine learning, ai, risk, data science</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>252</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5c6da3a7-a1d7-418f-8fdc-9f47790c5abe</guid>
      <title>The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of Cybercrime | An Infosecurity Europe 2025 Conversation with Geoff White | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.</p><p><strong>The Power of the Crowd: Community, Policy, and Lifelong Learning</strong></p><p>This year’s programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.</p><p><strong>Tackling Today’s and Tomorrow’s Threats—From Quantum to Geopolitics</strong></p><p>Infosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC’s Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.</p><p><strong>Maximizing the Experience: Prep, Participate, and Party</strong></p><p>From hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.</p><p>The message is clear: cybersecurity is no longer just a technical field—it’s a societal one.</p><p><strong>___________</strong><br /><br /><strong>Guest: Geoff White</strong>, Author, Speaker, Investigative Journalist, Podcast Creator | <a href="https://www.linkedin.com/in/geoffwhitetech/" target="_blank">https://www.linkedin.com/in/geoffwhitetech/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, sean martin, geoff white, cybersecurity, ransomware, laundering, crypto, hacking, journalism, infosec europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 9 Jun 2025 14:40:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Geoff White)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-billion-dollar-blueprint-following-the-digital-trail-of-criminal-cash-and-the-human-cost-of-cybercrime-an-infosecurity-europe-2025-conversation-with-geoff-white-on-location-coverage-with-sean-martin-and-marco-ciappelli-ySYKwdAE</link>
      <content:encoded><![CDATA[<p>As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.</p><p><strong>The Power of the Crowd: Community, Policy, and Lifelong Learning</strong></p><p>This year’s programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.</p><p><strong>Tackling Today’s and Tomorrow’s Threats—From Quantum to Geopolitics</strong></p><p>Infosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC’s Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.</p><p><strong>Maximizing the Experience: Prep, Participate, and Party</strong></p><p>From hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.</p><p>The message is clear: cybersecurity is no longer just a technical field—it’s a societal one.</p><p><strong>___________</strong><br /><br /><strong>Guest: Geoff White</strong>, Author, Speaker, Investigative Journalist, Podcast Creator | <a href="https://www.linkedin.com/in/geoffwhitetech/" target="_blank">https://www.linkedin.com/in/geoffwhitetech/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, sean martin, geoff white, cybersecurity, ransomware, laundering, crypto, hacking, journalism, infosec europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23119080" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/38d58e91-0131-428c-92f3-b180e956768a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=38d58e91-0131-428c-92f3-b180e956768a&amp;feed=2M86zCcc"/>
      <itunes:title>The Billion-Dollar Blueprint: Following the Digital Trail of Criminal Cash and the Human Cost of Cybercrime | An Infosecurity Europe 2025 Conversation with Geoff White | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Geoff White</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:04</itunes:duration>
      <itunes:summary>Investigative journalist Geoff White unpacks the true scale and structure of cybercrime, from lightning-fast billion-dollar crypto heists to the intricate global networks used to launder stolen funds. This episode reveals the hidden human toll behind ransomware attacks and explains why understanding these stories is key to confronting modern crime.</itunes:summary>
      <itunes:subtitle>Investigative journalist Geoff White unpacks the true scale and structure of cybercrime, from lightning-fast billion-dollar crypto heists to the intricate global networks used to launder stolen funds. This episode reveals the hidden human toll behind ransomware attacks and explains why understanding these stories is key to confronting modern crime.</itunes:subtitle>
      <itunes:keywords>journalism, marco ciappelli, hacking, sean martin, infosec europe, cybersecurity, conference, geoff white, on location, laundering, event coverage, ransomware, crypto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>251</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7081198b-c917-49f0-8cad-8dd44f6c1e80</guid>
      <title>Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—Rethinking the Role of Humans in Cyber Defense | An Infosecurity Europe 2025 Conversation with Purvi Kay and Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Cybersecurity isn’t just about code, controls, or compliance—it’s about people. That’s the core message from Purvi Kay, Head of Cybersecurity for the Future Combat Air System at BAE Systems, and Rob Black, founder of the UK Cyber Leaders Challenge, as they share how genuine collaboration is reshaping security success in high-stakes environments.</p><p>In this InfoSecurity Europe conversation, Purvi emphasizes that cybersecurity is still too often seen as an IT issue, when in reality it cuts across every aspect of business. Her role spans cybersecurity strategy, leadership development, and advocacy—serving also as Chair of BAE’s Women in Cyber program and as a neurodiversity champion. For her, inclusion is more than a policy—it’s essential to mission success, especially when coordinating across trilateral government and industry teams on programs as complex as next-gen fighter aircraft.</p><p>Rob reinforces this point with his focus on developing soft skills in future cybersecurity leaders. His work brings non-traditional talent into cyber, prioritizing communication, empathy, and multidisciplinary collaboration. These human-centric capabilities are crucial when bridging divides between security, legal, HR, and operations.</p><p>Both guests highlight how assumptions, language, and siloed thinking obstruct progress. Purvi shares how cybersecurity has often been seen as a barrier—brought in too late, misunderstood, or left out of key decisions. She now champions “secure by design” practices through early involvement of cross-functional teams. Rob brings a memorable example: using marriage counseling techniques to help auditors and developers understand each other better—not to resolve personal conflict, but to decode cultural and professional misalignments.</p><p>Their conversation also touches on practical methods for building shared understanding, from sketching “river journeys” to map project dynamics, to fostering stakeholder buy-in through intentional communication. Whether aligning three governments or managing internal procurement, they show that collaboration isn’t just a buzzword—it’s a structured, repeatable approach to managing complexity.</p><p>This episode offers a thoughtful and grounded look at how meaningful human connection—across functions, cultures, and roles—forms the foundation of effective cybersecurity. It’s a timely reminder that the path to resilience begins with listening, empathy, and a clear sense of shared purpose.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Purvi Kay</strong>, Head of Cybersecurity for the Future Combat Air System at BAE Systems | <a href="https://www.linkedin.com/in/purvikay/" target="_blank">https://www.linkedin.com/in/purvikay/</a></p><p><strong>Rob Black</strong>, Director, UK Cyber Leaders Challenge | <a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, rob black, purvi kay, cybersecurity, collaboration, communication, leadership, diversity, empathy, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 9 Jun 2025 13:59:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Purvi Kay)</author>
      <link>https://eventcoveragepodcast.com/episodes/collaboration-isnt-fluffy-its-fundamental-to-cybersecurityrethinking-the-role-of-humans-in-cyber-defense-an-infosecurity-europe-2025-conversation-with-purvi-kay-and-rob-black-on-location-coverage-with-sean-martin-and-marco-ciappelli-AUpqzcbn</link>
      <content:encoded><![CDATA[<p>Cybersecurity isn’t just about code, controls, or compliance—it’s about people. That’s the core message from Purvi Kay, Head of Cybersecurity for the Future Combat Air System at BAE Systems, and Rob Black, founder of the UK Cyber Leaders Challenge, as they share how genuine collaboration is reshaping security success in high-stakes environments.</p><p>In this InfoSecurity Europe conversation, Purvi emphasizes that cybersecurity is still too often seen as an IT issue, when in reality it cuts across every aspect of business. Her role spans cybersecurity strategy, leadership development, and advocacy—serving also as Chair of BAE’s Women in Cyber program and as a neurodiversity champion. For her, inclusion is more than a policy—it’s essential to mission success, especially when coordinating across trilateral government and industry teams on programs as complex as next-gen fighter aircraft.</p><p>Rob reinforces this point with his focus on developing soft skills in future cybersecurity leaders. His work brings non-traditional talent into cyber, prioritizing communication, empathy, and multidisciplinary collaboration. These human-centric capabilities are crucial when bridging divides between security, legal, HR, and operations.</p><p>Both guests highlight how assumptions, language, and siloed thinking obstruct progress. Purvi shares how cybersecurity has often been seen as a barrier—brought in too late, misunderstood, or left out of key decisions. She now champions “secure by design” practices through early involvement of cross-functional teams. Rob brings a memorable example: using marriage counseling techniques to help auditors and developers understand each other better—not to resolve personal conflict, but to decode cultural and professional misalignments.</p><p>Their conversation also touches on practical methods for building shared understanding, from sketching “river journeys” to map project dynamics, to fostering stakeholder buy-in through intentional communication. Whether aligning three governments or managing internal procurement, they show that collaboration isn’t just a buzzword—it’s a structured, repeatable approach to managing complexity.</p><p>This episode offers a thoughtful and grounded look at how meaningful human connection—across functions, cultures, and roles—forms the foundation of effective cybersecurity. It’s a timely reminder that the path to resilience begins with listening, empathy, and a clear sense of shared purpose.</p><p><strong>___________</strong><br /><br /><strong>Guests:</strong></p><p><strong>Purvi Kay</strong>, Head of Cybersecurity for the Future Combat Air System at BAE Systems | <a href="https://www.linkedin.com/in/purvikay/" target="_blank">https://www.linkedin.com/in/purvikay/</a></p><p><strong>Rob Black</strong>, Director, UK Cyber Leaders Challenge | <a href="https://www.linkedin.com/in/rob-black-30440819/" target="_blank">https://www.linkedin.com/in/rob-black-30440819/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, rob black, purvi kay, cybersecurity, collaboration, communication, leadership, diversity, empathy, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16094856" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4d425490-7cf0-4367-a15a-d3d61e364af6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4d425490-7cf0-4367-a15a-d3d61e364af6&amp;feed=2M86zCcc"/>
      <itunes:title>Collaboration Isn’t Fluffy: It’s Fundamental to Cybersecurity—Rethinking the Role of Humans in Cyber Defense | An Infosecurity Europe 2025 Conversation with Purvi Kay and Rob Black | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Purvi Kay</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:45</itunes:duration>
      <itunes:summary>Cybersecurity leaders Purvi Kay and Rob Black explore why technical controls alone aren’t enough—and how communication, empathy, and collaboration across diverse teams are critical to mission success. From defense projects to boardroom decisions, they show how human connection drives security forward.</itunes:summary>
      <itunes:subtitle>Cybersecurity leaders Purvi Kay and Rob Black explore why technical controls alone aren’t enough—and how communication, empathy, and collaboration across diverse teams are critical to mission success. From defense projects to boardroom decisions, they show how human connection drives security forward.</itunes:subtitle>
      <itunes:keywords>collaboration, infosecurity europe, leadership, purvi kay, sean martin, cybersecurity, communication, conference, on location, diversity, rob black, event coverage, empathy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>250</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">881c72aa-aa76-418f-9002-eb926e42ee29</guid>
      <title>More Than Code: Why Human Skills Matter in AppSec | An OWASP AppSec Global 2025 Conversation with Maria Mora | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Maria Mora, Staff Application Security Engineer and active OWASP lifetime member, shares how her experience at the OWASP AppSec Global conference in Barcelona has reaffirmed the power of community in security. While many attendees chase back-to-back talks and technical training, Maria highlights something often overlooked—connection. Whether at the member lounge ping-pong table, during late-night beach meetups, or over keynote reflections, it’s the relationships and shared purpose that make this event resonate.</p><p>Maria emphasizes how her own journey into OWASP began with uncertainty but evolved into a meaningful path of participation. Through volunteering, serving on the events committee, and mentoring others, she has expanded not only her technical toolkit but also her ability to collaborate and communicate—skills she notes are essential in InfoSec but rarely prioritized. By stepping into the OWASP community, she’s learned that you don’t need decades of experience to contribute—just a willingness to start.</p><p>Keynotes and sessions this year reinforced a similar message: security isn’t just about hard skills. It’s about bridging academia and industry, engaging first-time attendees, and creating welcoming spaces where no one feels like an outsider. Talks like Sarah Jané’s encouraged attendees to find their own ways to give back, whether by submitting to the call for papers, helping with logistics, or simply sparking hallway conversations.</p><p>Maria also points to how OWASP structures participation to make it accessible. Through demo rooms, project hubs, and informal lounge chats, attendees find ways to contribute to global initiatives like the OWASP Top 10 or volunteer-led trainings. Whether it’s your first conference or your tenth, there’s always room to jump in.</p><p>For Maria, OWASP no longer feels like a secret club—it’s a growing, open collective focused on helping people bring their best selves to security. That’s the power of community: not just lifting up software, but lifting up each other.</p><p>And for those thinking of taking the next step, Maria reminds us that the call for papers for OWASP DC is open through June 24th. As she puts it, “We all have something valuable to share—sometimes you just need the nudge to start.”<br /><br /><strong>GUEST: Maria Mora</strong> | Staff Application Security Engineer and OWASP events committee member | <a href="https://www.linkedin.com/in/riamaria/" target="_blank">https://www.linkedin.com/in/riamaria/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 3 Jun 2025 09:14:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Maria Mora)</author>
      <link>https://eventcoveragepodcast.com/episodes/more-than-code-why-human-skills-matter-in-appsec-an-owasp-appsec-global-2025-conversation-with-maria-mora-on-location-coverage-with-sean-martin-and-marco-ciappelli-WSmf7r0D</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Maria Mora, Staff Application Security Engineer and active OWASP lifetime member, shares how her experience at the OWASP AppSec Global conference in Barcelona has reaffirmed the power of community in security. While many attendees chase back-to-back talks and technical training, Maria highlights something often overlooked—connection. Whether at the member lounge ping-pong table, during late-night beach meetups, or over keynote reflections, it’s the relationships and shared purpose that make this event resonate.</p><p>Maria emphasizes how her own journey into OWASP began with uncertainty but evolved into a meaningful path of participation. Through volunteering, serving on the events committee, and mentoring others, she has expanded not only her technical toolkit but also her ability to collaborate and communicate—skills she notes are essential in InfoSec but rarely prioritized. By stepping into the OWASP community, she’s learned that you don’t need decades of experience to contribute—just a willingness to start.</p><p>Keynotes and sessions this year reinforced a similar message: security isn’t just about hard skills. It’s about bridging academia and industry, engaging first-time attendees, and creating welcoming spaces where no one feels like an outsider. Talks like Sarah Jané’s encouraged attendees to find their own ways to give back, whether by submitting to the call for papers, helping with logistics, or simply sparking hallway conversations.</p><p>Maria also points to how OWASP structures participation to make it accessible. Through demo rooms, project hubs, and informal lounge chats, attendees find ways to contribute to global initiatives like the OWASP Top 10 or volunteer-led trainings. Whether it’s your first conference or your tenth, there’s always room to jump in.</p><p>For Maria, OWASP no longer feels like a secret club—it’s a growing, open collective focused on helping people bring their best selves to security. That’s the power of community: not just lifting up software, but lifting up each other.</p><p>And for those thinking of taking the next step, Maria reminds us that the call for papers for OWASP DC is open through June 24th. As she puts it, “We all have something valuable to share—sometimes you just need the nudge to start.”<br /><br /><strong>GUEST: Maria Mora</strong> | Staff Application Security Engineer and OWASP events committee member | <a href="https://www.linkedin.com/in/riamaria/" target="_blank">https://www.linkedin.com/in/riamaria/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14995614" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3433c67d-6e7b-4b07-be0e-bfe9851e25a8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3433c67d-6e7b-4b07-be0e-bfe9851e25a8&amp;feed=2M86zCcc"/>
      <itunes:title>More Than Code: Why Human Skills Matter in AppSec | An OWASP AppSec Global 2025 Conversation with Maria Mora | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Maria Mora</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:37</itunes:duration>
      <itunes:summary>Maria Mora, Staff Application Security Engineer and OWASP events committee member, shares how contributing to the community has shaped her career and expanded both her technical and human skills. From first-time attendees to seasoned volunteers, this conversation highlights the power of showing up, getting involved, and building security together.</itunes:summary>
      <itunes:subtitle>Maria Mora, Staff Application Security Engineer and OWASP events committee member, shares how contributing to the community has shaped her career and expanded both her technical and human skills. From first-time attendees to seasoned volunteers, this conversation highlights the power of showing up, getting involved, and building security together.</itunes:subtitle>
      <itunes:keywords>applicationsecurity, maria mora, sean martin, infosec, cybersecurity, conference, on location, event coverage, appsec global, owasp, community, volunteer, training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>249</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4aadf6b4-ea3d-4170-8e10-a60fc5e9911d</guid>
      <title>From Fraud to Fixes: Designing Usable Security for Financial Applications | An OWASP AppSec Global 2025 Conversation with Wojciech Dworakowski | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sean Martin connects with event speaker, Wojciech Dworakowski, to unpack a critical and underexamined issue in today’s financial systems: the vulnerability of mobile-only banking apps when it comes to transaction authorization.</p><p>Wojciech points out that modern banking has embraced the mobile-first model—sometimes at the cost of fundamental security principles. Most banks now concentrate transaction initiation, security configuration, and transaction authorization into a single device: the user’s smartphone. While this offers unmatched convenience, it also creates a single point of failure. If an attacker successfully pairs their phone with a victim’s account, they can bypass multiple layers of security, often without needing traditional credentials.</p><p>The discussion explores the limitations of relying solely on biometric options like Face ID or Touch ID. These conveniences may appear secure but often weaken the overall security posture when used without additional independent verification mechanisms. Wojciech outlines how common attack strategies have shifted from stealing credit card numbers to full account takeover—enabled by social engineering and weak device-pairing controls.</p><p>He proposes a “raise the bar” strategy rather than relying on a single silver-bullet solution. Suggestions include enhanced device fingerprinting, detection of emulators or rooted environments, and shared interbank databases for device reputation and account pairing anomalies. While some of these are already in motion under new EU and UK regulations, they remain fragmented.</p><p>Wojciech also introduces a bold idea: giving users a slider in the app to adjust their personal balance of convenience vs. security. This kind of usability-driven approach could empower users while still offering layered defense.</p><p>For CISOs, developers, and FinTech leaders, the message is clear—evaluate your app security as if attackers already know the shortcuts. Watch the full conversation to hear Wojciech’s real-world examples, including a cautionary tale from his own family. Catch the episode and learn how to design financial security that’s not just strong—but usable.<br /><br /><strong>GUEST: Wojciech Dworakowski</strong> | OWASP Poland Chapter Board Member and Managing Partner at SecuRing | <a href="https://www.linkedin.com/in/wojciechdworakowski/" target="_blank">https://www.linkedin.com/in/wojciechdworakowski/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 2 Jun 2025 11:31:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Wojciech Dworakowski)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-fraud-to-fixes-designing-usable-security-for-financial-applications-an-owasp-appsec-global-2025-conversation-with-wojciech-dworakowski-on-location-coverage-with-sean-martin-and-marco-ciappelli-GkVkSEB2</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sean Martin connects with event speaker, Wojciech Dworakowski, to unpack a critical and underexamined issue in today’s financial systems: the vulnerability of mobile-only banking apps when it comes to transaction authorization.</p><p>Wojciech points out that modern banking has embraced the mobile-first model—sometimes at the cost of fundamental security principles. Most banks now concentrate transaction initiation, security configuration, and transaction authorization into a single device: the user’s smartphone. While this offers unmatched convenience, it also creates a single point of failure. If an attacker successfully pairs their phone with a victim’s account, they can bypass multiple layers of security, often without needing traditional credentials.</p><p>The discussion explores the limitations of relying solely on biometric options like Face ID or Touch ID. These conveniences may appear secure but often weaken the overall security posture when used without additional independent verification mechanisms. Wojciech outlines how common attack strategies have shifted from stealing credit card numbers to full account takeover—enabled by social engineering and weak device-pairing controls.</p><p>He proposes a “raise the bar” strategy rather than relying on a single silver-bullet solution. Suggestions include enhanced device fingerprinting, detection of emulators or rooted environments, and shared interbank databases for device reputation and account pairing anomalies. While some of these are already in motion under new EU and UK regulations, they remain fragmented.</p><p>Wojciech also introduces a bold idea: giving users a slider in the app to adjust their personal balance of convenience vs. security. This kind of usability-driven approach could empower users while still offering layered defense.</p><p>For CISOs, developers, and FinTech leaders, the message is clear—evaluate your app security as if attackers already know the shortcuts. Watch the full conversation to hear Wojciech’s real-world examples, including a cautionary tale from his own family. Catch the episode and learn how to design financial security that’s not just strong—but usable.<br /><br /><strong>GUEST: Wojciech Dworakowski</strong> | OWASP Poland Chapter Board Member and Managing Partner at SecuRing | <a href="https://www.linkedin.com/in/wojciechdworakowski/" target="_blank">https://www.linkedin.com/in/wojciechdworakowski/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="11030037" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4979a55e-fd62-4887-9dec-ed9e0ed80161/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4979a55e-fd62-4887-9dec-ed9e0ed80161&amp;feed=2M86zCcc"/>
      <itunes:title>From Fraud to Fixes: Designing Usable Security for Financial Applications | An OWASP AppSec Global 2025 Conversation with Wojciech Dworakowski | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Wojciech Dworakowski</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:29</itunes:duration>
      <itunes:summary>Wojciech Dworakowski breaks down the hidden risks in mobile-only banking, where convenience often compromises transaction security. From real-world attack methods to practical solutions, this episode challenges FinTech leaders to rethink how they protect users in a smartphone-driven world.</itunes:summary>
      <itunes:subtitle>Wojciech Dworakowski breaks down the hidden risks in mobile-only banking, where convenience often compromises transaction security. From real-world attack methods to practical solutions, this episode challenges FinTech leaders to rethink how they protect users in a smartphone-driven world.</itunes:subtitle>
      <itunes:keywords>authorization, banking, sean martin, cybersecurity, authentication, conference, on location, wojciech dworakowski, event coverage, mobile, fraud, fintech, appsec global</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>248</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dba5797d-ec16-4051-bb0b-6dfcd9ae7661</guid>
      <title>From Dashboards to Decisions: Why Your Security Metrics Might Be Leading You Astray | An OWASP AppSec Global 2025 Conversation with Aram Hovsepyan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Aram Hovsepyan, an active contributor to the OWASP SAMM project, brings a critical perspective to how the industry approaches security metrics, especially in vulnerability management. His message is clear: the way we collect and use metrics needs a serious rethink if we want to make real progress in reducing risk.</p><p>Too often, organizations rely on readily available tool-generated metrics—like vulnerability counts—without pausing to ask what those numbers actually mean in context. These metrics may look impressive in a dashboard or board report, but as Aram points out, they’re often disconnected from business goals. Worse, they can drive the wrong behaviors, such as trying to reduce raw vulnerability counts without considering exploitability or actual impact.</p><p>Aram emphasizes the importance of starting with organizational goals, formulating questions that reflect progress toward those goals, and only then identifying metrics that provide meaningful answers. It’s a research-backed approach that has been known for decades but is often ignored in favor of convenience.</p><p>False positives, inflated dashboards, and a lack of alignment between metrics and strategy are recurring issues. Aram notes that many tools err on the side of overreporting to avoid false negatives, which leads to overwhelming—and often irrelevant—volumes of data. In some cases, up to 80% of identified vulnerabilities may be false positives, leaving security teams drowning in noise and chasing issues that may not matter.</p><p>What’s missing, he argues, is a strategic lens. Vulnerability management should be one component of a broader application security program, not the centerpiece. The OWASP Software Assurance Maturity Model (SAMM) offers a framework for evaluating and improving across a range of practices—strategy, risk analysis, and threat modeling among them—that collectively support better decision-making.</p><p>To move forward, organizations need to stop treating vulnerability data as a performance metric and start treating it as a signal in a larger conversation about risk, impact, and architectural choices. Aram’s call to action is simple: ask better questions, use tools more purposefully, and build security strategies that actually serve the business.<br /><br /><strong>GUEST: Aram Hovsepyan</strong> | OWASP SAMM Project Core Team member and CEO/Founder at CODIFIC | <a href="https://www.linkedin.com/in/aramhovsep/" target="_blank">https://www.linkedin.com/in/aramhovsep/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 31 May 2025 07:59:21 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Aram Hovsepyan)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-dashboards-to-decisions-why-your-security-metrics-might-be-leading-you-astray-an-owasp-appsec-global-2025-conversation-with-aram-hovsepyan-on-location-coverage-with-sean-martin-and-marco-ciappelli-sNVGILPD</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Aram Hovsepyan, an active contributor to the OWASP SAMM project, brings a critical perspective to how the industry approaches security metrics, especially in vulnerability management. His message is clear: the way we collect and use metrics needs a serious rethink if we want to make real progress in reducing risk.</p><p>Too often, organizations rely on readily available tool-generated metrics—like vulnerability counts—without pausing to ask what those numbers actually mean in context. These metrics may look impressive in a dashboard or board report, but as Aram points out, they’re often disconnected from business goals. Worse, they can drive the wrong behaviors, such as trying to reduce raw vulnerability counts without considering exploitability or actual impact.</p><p>Aram emphasizes the importance of starting with organizational goals, formulating questions that reflect progress toward those goals, and only then identifying metrics that provide meaningful answers. It’s a research-backed approach that has been known for decades but is often ignored in favor of convenience.</p><p>False positives, inflated dashboards, and a lack of alignment between metrics and strategy are recurring issues. Aram notes that many tools err on the side of overreporting to avoid false negatives, which leads to overwhelming—and often irrelevant—volumes of data. In some cases, up to 80% of identified vulnerabilities may be false positives, leaving security teams drowning in noise and chasing issues that may not matter.</p><p>What’s missing, he argues, is a strategic lens. Vulnerability management should be one component of a broader application security program, not the centerpiece. The OWASP Software Assurance Maturity Model (SAMM) offers a framework for evaluating and improving across a range of practices—strategy, risk analysis, and threat modeling among them—that collectively support better decision-making.</p><p>To move forward, organizations need to stop treating vulnerability data as a performance metric and start treating it as a signal in a larger conversation about risk, impact, and architectural choices. Aram’s call to action is simple: ask better questions, use tools more purposefully, and build security strategies that actually serve the business.<br /><br /><strong>GUEST: Aram Hovsepyan</strong> | OWASP SAMM Project Core Team member and CEO/Founder at CODIFIC | <a href="https://www.linkedin.com/in/aramhovsep/" target="_blank">https://www.linkedin.com/in/aramhovsep/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="15661437" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/75a2eec9-7c89-4e46-b9b6-56d2c972248d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=75a2eec9-7c89-4e46-b9b6-56d2c972248d&amp;feed=2M86zCcc"/>
      <itunes:title>From Dashboards to Decisions: Why Your Security Metrics Might Be Leading You Astray | An OWASP AppSec Global 2025 Conversation with Aram Hovsepyan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Aram Hovsepyan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:18</itunes:duration>
      <itunes:summary>Aram Hovsepyan challenges the security industry’s overreliance on tool-generated vulnerability metrics and advocates for a goal-driven approach grounded in risk and business context. In this episode, he shares how organizations can shift from reactive dashboards to purposeful measurement strategies that truly support secure software development.</itunes:summary>
      <itunes:subtitle>Aram Hovsepyan challenges the security industry’s overreliance on tool-generated vulnerability metrics and advocates for a goal-driven approach grounded in risk and business context. In this episode, he shares how organizations can shift from reactive dashboards to purposeful measurement strategies that truly support secure software development.</itunes:subtitle>
      <itunes:keywords>samm, measurement, sean martin, aram hovsepyan, conference, vulnerabilities, on location, metrics, event coverage, appsec, appsec global, owasp, risk, softwaresecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>247</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4829cec3-596e-491e-9ecd-4b5be64b4e37</guid>
      <title>Why Global Community-Led Innovation Is Driving Real Application Security Progress | An OWASP AppSec Global 2025 Conversation with Starr Brown | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Starr Brown, Director of Open Source Projects and Programs at OWASP, unpacks the real engine behind the organization’s impact: the projects and the people driving them forward.</p><p>With over 130 active projects, OWASP continues to expand its open source contributions to improve software security across the board. While the OWASP Top 10 remains its most recognized initiative, Starr points out that it’s just one among many. Other significant projects include the Application Security Verification Standard (ASVS), the Software Assurance Maturity Model (SAMM), and the increasingly popular security games like Cornucopia, which use gamification to bring security concepts into business conversations and development workflows.</p><p>AI is playing an increasingly prominent role in OWASP’s work. Starr highlights the GenAI Security Project as a focal point, encompassing tools and guidance for LLM use, agentic AI, red teaming, and more. The scale of community engagement is equally impressive: around 33,000 people are active on Slack, and hundreds contribute to individual initiatives, reflecting the organization’s truly global and grassroots structure.</p><p>Beyond tools and documentation, OWASP is influencing regulation and policy through initiatives like the AI Exchange and the Transparency Exchange. These projects connect with government entities and standards bodies such as the European Commission and CEN/CENELEC to help shape responsible governance frameworks around software, AI, and cybersecurity.</p><p>Listeners also get a glimpse into what’s ahead. From upcoming events in Washington, D.C., to the OWASP Community Room at DEF CON in Las Vegas, the goal is to keep fostering connections and hands-on engagement. These gatherings not only showcase flagship tools and frameworks but create space for open dialogue, prototyping, and collaboration—whether you’re breaking things or building them.</p><p>To get involved, Starr encourages exploring the OWASP Projects page and joining their Slack community. The conversation makes it clear: OWASP is not just a collection of tools—it’s a living, breathing network of contributors shaping the future of secure software.<br /><br /><strong>GUEST: Starr Brown</strong> | Director of Open Source Projects and Programs at OWASP | <a href="https://www.linkedin.com/in/starr-brown-8837547/" target="_blank">https://www.linkedin.com/in/starr-brown-8837547/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 May 2025 12:45:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Starr Brown)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-global-community-led-innovation-is-driving-real-application-security-progress-an-owasp-appsec-global-2025-conversation-with-starr-brown-on-location-coverage-with-sean-martin-and-marco-ciappelli-UqGWvH_K</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Starr Brown, Director of Open Source Projects and Programs at OWASP, unpacks the real engine behind the organization’s impact: the projects and the people driving them forward.</p><p>With over 130 active projects, OWASP continues to expand its open source contributions to improve software security across the board. While the OWASP Top 10 remains its most recognized initiative, Starr points out that it’s just one among many. Other significant projects include the Application Security Verification Standard (ASVS), the Software Assurance Maturity Model (SAMM), and the increasingly popular security games like Cornucopia, which use gamification to bring security concepts into business conversations and development workflows.</p><p>AI is playing an increasingly prominent role in OWASP’s work. Starr highlights the GenAI Security Project as a focal point, encompassing tools and guidance for LLM use, agentic AI, red teaming, and more. The scale of community engagement is equally impressive: around 33,000 people are active on Slack, and hundreds contribute to individual initiatives, reflecting the organization’s truly global and grassroots structure.</p><p>Beyond tools and documentation, OWASP is influencing regulation and policy through initiatives like the AI Exchange and the Transparency Exchange. These projects connect with government entities and standards bodies such as the European Commission and CEN/CENELEC to help shape responsible governance frameworks around software, AI, and cybersecurity.</p><p>Listeners also get a glimpse into what’s ahead. From upcoming events in Washington, D.C., to the OWASP Community Room at DEF CON in Las Vegas, the goal is to keep fostering connections and hands-on engagement. These gatherings not only showcase flagship tools and frameworks but create space for open dialogue, prototyping, and collaboration—whether you’re breaking things or building them.</p><p>To get involved, Starr encourages exploring the OWASP Projects page and joining their Slack community. The conversation makes it clear: OWASP is not just a collection of tools—it’s a living, breathing network of contributors shaping the future of secure software.<br /><br /><strong>GUEST: Starr Brown</strong> | Director of Open Source Projects and Programs at OWASP | <a href="https://www.linkedin.com/in/starr-brown-8837547/" target="_blank">https://www.linkedin.com/in/starr-brown-8837547/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="8740866" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/beb3f4e1-72b1-4153-88b6-76d315f74cca/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=beb3f4e1-72b1-4153-88b6-76d315f74cca&amp;feed=2M86zCcc"/>
      <itunes:title>Why Global Community-Led Innovation Is Driving Real Application Security Progress | An OWASP AppSec Global 2025 Conversation with Starr Brown | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Starr Brown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:06</itunes:duration>
      <itunes:summary>Starr Brown, Director of Open Source Projects and Programs at OWASP, shares how the organization’s global community is powering over 130 open source initiatives aimed at eliminating insecure software. From AI-focused security projects to interactive tools and policy-shaping efforts, this conversation reveals the scale and impact of OWASP’s mission.</itunes:summary>
      <itunes:subtitle>Starr Brown, Director of Open Source Projects and Programs at OWASP, shares how the organization’s global community is powering over 130 open source initiatives aimed at eliminating insecure software. From AI-focused security projects to interactive tools and policy-shaping efforts, this conversation reveals the scale and impact of OWASP’s mission.</itunes:subtitle>
      <itunes:keywords>applicationsecurity, sean martin, conference, starr brown, on location, opensource, event coverage, appsec global, owasp, ai, community, softwaresecurity, genai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>246</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cf02b40f-c192-4d80-8f36-d221ddbe1f7f</guid>
      <title>Holding the Line on Quality in an AI-Driven SDLC | An OWASP AppSec Global 2025 Conversation with Sarah-Jane Madden | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sarah-Jane Madden brings a unique lens to application security, shaped by her journey from developer to security leader and CSO. Speaking at OWASP AppSec Global, she tackles one of today’s most pressing concerns: how AI is reshaping software engineering—and how we must respond without compromising core values like quality and security.</p><p>Madden emphasizes that AI is only the latest in a series of major disruptions, comparing it to shifts like remote work triggered by COVID. Her message is clear: organizations must prepare for continuous change, not just chase the current trend. That means prioritizing adaptability and ensuring critical practices like application security are not sacrificed in the rush to speed up delivery.</p><p>She makes the case for a layered, iterative approach to development—rejecting the outdated linear mindset. Developers, she argues, should leverage AI as an accelerator, not a replacement. Think of AI as your digital intern: handling the drudgery, automating boilerplate code, and even applying internal security standards to code before it reaches human hands. This frees developers to focus on creative problem-solving and thoughtful architecture.</p><p>However, Madden cautions against blind enthusiasm. While experimentation is healthy, organizations must be discerning about outcomes. Speed is meaningless without quality, and quality includes security. She calls on developers to advocate for high standards and reminds business leaders not to fall for the allure of shortcut statistics or flashy claims that promise results without skilled labor. Her analogy of microwave dinners vs. proper cuisine illustrates the risk of prioritizing convenience over substance—especially in complex problem-solving environments.</p><p>For line-of-business leaders, Madden urges realistic expectations. AI can enhance productivity, but it doesn’t eliminate the need for thoughtful development. Ultimately, customers will notice if quality drops, and reputational damage is hard to undo.</p><p>In closing, Madden celebrates OWASP as more than an organization—it’s a source of support, camaraderie, and genuine community for those working to build secure, reliable systems. Her message? Embrace change, use tools wisely, protect your standards, and never forget the human side of engineering.<br /><br /><strong>GUEST: Sarah-Jane Madden</strong> | Global Director of Cyber Defense at Fortive | <a href="https://www.linkedin.com/in/sarahjanemadden/" target="_blank">https://www.linkedin.com/in/sarahjanemadden/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 May 2025 12:12:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sarah-Jane Madden)</author>
      <link>https://eventcoveragepodcast.com/episodes/holding-the-line-on-quality-in-an-ai-driven-sdlc-an-owasp-appsec-global-2025-conversation-with-sarah-jane-madden-on-location-coverage-with-sean-martin-and-marco-ciappelli-FKR2wgwk</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Sarah-Jane Madden brings a unique lens to application security, shaped by her journey from developer to security leader and CSO. Speaking at OWASP AppSec Global, she tackles one of today’s most pressing concerns: how AI is reshaping software engineering—and how we must respond without compromising core values like quality and security.</p><p>Madden emphasizes that AI is only the latest in a series of major disruptions, comparing it to shifts like remote work triggered by COVID. Her message is clear: organizations must prepare for continuous change, not just chase the current trend. That means prioritizing adaptability and ensuring critical practices like application security are not sacrificed in the rush to speed up delivery.</p><p>She makes the case for a layered, iterative approach to development—rejecting the outdated linear mindset. Developers, she argues, should leverage AI as an accelerator, not a replacement. Think of AI as your digital intern: handling the drudgery, automating boilerplate code, and even applying internal security standards to code before it reaches human hands. This frees developers to focus on creative problem-solving and thoughtful architecture.</p><p>However, Madden cautions against blind enthusiasm. While experimentation is healthy, organizations must be discerning about outcomes. Speed is meaningless without quality, and quality includes security. She calls on developers to advocate for high standards and reminds business leaders not to fall for the allure of shortcut statistics or flashy claims that promise results without skilled labor. Her analogy of microwave dinners vs. proper cuisine illustrates the risk of prioritizing convenience over substance—especially in complex problem-solving environments.</p><p>For line-of-business leaders, Madden urges realistic expectations. AI can enhance productivity, but it doesn’t eliminate the need for thoughtful development. Ultimately, customers will notice if quality drops, and reputational damage is hard to undo.</p><p>In closing, Madden celebrates OWASP as more than an organization—it’s a source of support, camaraderie, and genuine community for those working to build secure, reliable systems. Her message? Embrace change, use tools wisely, protect your standards, and never forget the human side of engineering.<br /><br /><strong>GUEST: Sarah-Jane Madden</strong> | Global Director of Cyber Defense at Fortive | <a href="https://www.linkedin.com/in/sarahjanemadden/" target="_blank">https://www.linkedin.com/in/sarahjanemadden/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14221153" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3e972c5b-ff5e-4ebe-9c48-43fd390088cf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3e972c5b-ff5e-4ebe-9c48-43fd390088cf&amp;feed=2M86zCcc"/>
      <itunes:title>Holding the Line on Quality in an AI-Driven SDLC | An OWASP AppSec Global 2025 Conversation with Sarah-Jane Madden | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sarah-Jane Madden</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:48</itunes:duration>
      <itunes:summary>Sarah-Jane Madden shares a practical and passionate take on how AI can enhance—not replace—secure software development, urging developers and business leaders alike to rethink how they balance speed, quality, and security. From architecture to code to culture, she challenges us to embrace change without leaving critical values behind.</itunes:summary>
      <itunes:subtitle>Sarah-Jane Madden shares a practical and passionate take on how AI can enhance—not replace—secure software development, urging developers and business leaders alike to rethink how they balance speed, quality, and security. From architecture to code to culture, she challenges us to embrace change without leaving critical values behind.</itunes:subtitle>
      <itunes:keywords>architecture, sean martin, owasp appsec global, automation, software, conference, on location, sarah-jane madden, event coverage, developers, appsec, standards, security, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>245</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6bbaec64-3118-416e-a7fe-1b051acf34f2</guid>
      <title>When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.</p><p>Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren’t hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.</p><p>Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren’t traditional security practitioners.</p><p>Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there’s a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.</p><p>Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That’s why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it’s a path to protection that doesn’t require breaking the budget.</p><p>Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.</p><p>This episode is a reminder that effective cybersecurity isn’t only about innovation; it’s about inclusion, practicality, and trust... both in your tools and your team.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 May 2025 05:02:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-simplicity-meets-strategy-making-immutability-accessible-for-all-a-brand-story-with-sterling-wilson-from-object-first-an-rsac-conference-2025-post-event-brand-story-_XNE82q1</link>
      <content:encoded><![CDATA[<p>When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.</p><p>Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren’t hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.</p><p>Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren’t traditional security practitioners.</p><p>Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there’s a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.</p><p>Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That’s why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it’s a path to protection that doesn’t require breaking the budget.</p><p>Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.</p><p>This episode is a reminder that effective cybersecurity isn’t only about innovation; it’s about inclusion, practicality, and trust... both in your tools and your team.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14015935" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/281b57d1-66bd-499c-b395-82b673a04269/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=281b57d1-66bd-499c-b395-82b673a04269&amp;feed=2M86zCcc"/>
      <itunes:title>When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:35</itunes:duration>
      <itunes:summary>Sterling Wilson joins us to unpack why immutability isn’t just for large enterprises and how Object First is making secure backup accessible, fast, and budget-friendly — all with a little help from their mascot, OOTBI. From agentic AI to cyber insurance pressures, this conversation breaks down the critical role of proactive, simple data protection in today’s security strategy.</itunes:summary>
      <itunes:subtitle>Sterling Wilson joins us to unpack why immutability isn’t just for large enterprises and how Object First is making secure backup accessible, fast, and budget-friendly — all with a little help from their mascot, OOTBI. From agentic AI to cyber insurance pressures, this conversation breaks down the critical role of proactive, simple data protection in today’s security strategy.</itunes:subtitle>
      <itunes:keywords>sterling wilson, immutability, marketing podcast, marco ciappelli, agentic, insurance, sean martin, cybersecurity, brand marketing, ai, brand story podcast, recovery, brand story, backup</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>244</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ba73bd84-8db9-47ea-a92d-ab4d65820830</guid>
      <title>Redefining What Secure Application Development Looks Like: Bringing Application Security into Focus with ASVS v5 | An OWASP AppSec Global 2025 Conversation with Josh Grossman | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Josh Grossman, co-leader of the OWASP Application Security Verification Standard (ASVS) project, shares key updates and strategic thinking behind the release of ASVS version 5. This release, years in the making, reflects a renewed focus on making the standard more approachable, practical, and actionable for development teams and security leaders alike.</p><p>ASVS is designed to provide a comprehensive and verifiable set of security requirements for building and maintaining secure applications. More than just a checklist, it offers a clear blueprint for what a secure application <i>should</i> look like—making it easier to benchmark progress, develop secure design requirements, and implement effective controls. Version 5 emphasizes accessibility, particularly by lowering the barrier to entry for organizations adopting Level 1 of the standard, reducing the threshold of required controls from nearly 50% to under 30%.</p><p>One of the major shifts in this new version is the tighter focus on the application itself, moving away from system-level topics like backup policies that tend to fall outside the scope of app development teams. This makes the standard more relevant to software architects, developers, and QA engineers—providing requirements that fall within their sphere of influence, while still covering the full software lifecycle from design to deployment.</p><p>Grossman explains how organizations can customize ASVS to include their internal controls and build out secure coding checklists, implementation guides, and requirements documents tailored to their environments. He also highlights how ASVS aligns with other OWASP projects, like the Cheat Sheet Series and SAMM, for both control-level guidance and organizational process development.</p><p>For security leaders looking to improve their application security programs, ASVS v5 offers a foundation to build on—clear, community-driven, and extensible. And true to OWASP’s spirit, the project is backed by a passionate community, from project co-leads like Grossman and Elar Lang to contributors around the world. As Grossman puts it, OWASP is about connection—people tackling similar challenges, working together to make software safer.</p><p>If you’re looking for a way to bring practical, standards-based security into your software lifecycle, this conversation is your starting point.<br /><br /><strong>GUEST: Josh Grossman</strong> | CTO of Bounce Security and co-leader of the OWASP Application Security Verification Standard (ASVS) project | <a href="https://www.linkedin.com/in/joshcgrossman/" target="_blank">https://www.linkedin.com/in/joshcgrossman/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>OWASP Application Security Verification Standard (ASVS): <a href="https://owasp.org/www-project-application-security-verification-standard/" target="_blank">https://owasp.org/www-project-application-security-verification-standard/</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 May 2025 14:35:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Josh Grossman)</author>
      <link>https://eventcoveragepodcast.com/episodes/redefining-what-secure-application-development-looks-like-bringing-application-security-into-focus-with-asvs-v5-an-owasp-appsec-global-2025-conversation-with-josh-grossman-on-location-coverage-with-sean-martin-and-marco-ciappelli-vP7_YrYG</link>
      <content:encoded><![CDATA[<p>In this On Location episode during OWASP AppSec Global 2025 in Barcelona, Josh Grossman, co-leader of the OWASP Application Security Verification Standard (ASVS) project, shares key updates and strategic thinking behind the release of ASVS version 5. This release, years in the making, reflects a renewed focus on making the standard more approachable, practical, and actionable for development teams and security leaders alike.</p><p>ASVS is designed to provide a comprehensive and verifiable set of security requirements for building and maintaining secure applications. More than just a checklist, it offers a clear blueprint for what a secure application <i>should</i> look like—making it easier to benchmark progress, develop secure design requirements, and implement effective controls. Version 5 emphasizes accessibility, particularly by lowering the barrier to entry for organizations adopting Level 1 of the standard, reducing the threshold of required controls from nearly 50% to under 30%.</p><p>One of the major shifts in this new version is the tighter focus on the application itself, moving away from system-level topics like backup policies that tend to fall outside the scope of app development teams. This makes the standard more relevant to software architects, developers, and QA engineers—providing requirements that fall within their sphere of influence, while still covering the full software lifecycle from design to deployment.</p><p>Grossman explains how organizations can customize ASVS to include their internal controls and build out secure coding checklists, implementation guides, and requirements documents tailored to their environments. He also highlights how ASVS aligns with other OWASP projects, like the Cheat Sheet Series and SAMM, for both control-level guidance and organizational process development.</p><p>For security leaders looking to improve their application security programs, ASVS v5 offers a foundation to build on—clear, community-driven, and extensible. And true to OWASP’s spirit, the project is backed by a passionate community, from project co-leads like Grossman and Elar Lang to contributors around the world. As Grossman puts it, OWASP is about connection—people tackling similar challenges, working together to make software safer.</p><p>If you’re looking for a way to bring practical, standards-based security into your software lifecycle, this conversation is your starting point.<br /><br /><strong>GUEST: Josh Grossman</strong> | CTO of Bounce Security and co-leader of the OWASP Application Security Verification Standard (ASVS) project | <a href="https://www.linkedin.com/in/joshcgrossman/" target="_blank">https://www.linkedin.com/in/joshcgrossman/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>OWASP Application Security Verification Standard (ASVS): <a href="https://owasp.org/www-project-application-security-verification-standard/" target="_blank">https://owasp.org/www-project-application-security-verification-standard/</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="13004896" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a427f0cd-0bfd-4179-b31e-22a2faef4370/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a427f0cd-0bfd-4179-b31e-22a2faef4370&amp;feed=2M86zCcc"/>
      <itunes:title>Redefining What Secure Application Development Looks Like: Bringing Application Security into Focus with ASVS v5 | An OWASP AppSec Global 2025 Conversation with Josh Grossman | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Josh Grossman</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:32</itunes:duration>
      <itunes:summary>Josh Grossman, co-leader of the OWASP ASVS project, shares how version 5 makes secure application development more accessible, actionable, and aligned with real-world engineering workflows. If you’re building or managing software security programs, this episode offers practical insight into how ASVS can become your foundational tool.</itunes:summary>
      <itunes:subtitle>Josh Grossman, co-leader of the OWASP ASVS project, shares how version 5 makes secure application development more accessible, actionable, and aligned with real-world engineering workflows. If you’re building or managing software security programs, this episode offers practical insight into how ASVS can become your foundational tool.</itunes:subtitle>
      <itunes:keywords>applicationsecurity, sean martin, verification, conference, on location, softwaredevelopment, barcelona, event coverage, josh grossman, standards, asvs, owasp, securecoding</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>243</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec02c0f2-b902-4182-b7fe-6ca7e83947bd</guid>
      <title>From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>Jim Manico’s passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.</p><p>While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can’t easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.</p><p>Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That’s where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.</p><p>Beyond teaching, he’s building. With 200 volunteers, he’s leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.</p><p>For Manico, this isn’t just a technical evolution—it’s a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he’s just getting started.</p><p>This episode isn’t just about where AppSec is going. It’s a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Jim's OWASP Session: <a href="https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering" target="_blank">https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering</a></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 May 2025 12:07:16 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Manicode Security, Jim Manico)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-appsec-training-to-ai-standards-teaching-ai-to-code-securely-a-brand-story-with-jim-manico-from-manicode-security-an-owasp-global-appsec-eu-2025-conference-on-location-brand-story-gPSsecOp</link>
      <content:encoded><![CDATA[<p>Jim Manico’s passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.</p><p>While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can’t easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.</p><p>Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That’s where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.</p><p>Beyond teaching, he’s building. With 200 volunteers, he’s leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.</p><p>For Manico, this isn’t just a technical evolution—it’s a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he’s just getting started.</p><p>This episode isn’t just about where AppSec is going. It’s a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Jim's OWASP Session: <a href="https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering" target="_blank">https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering</a></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17449880" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c14347ef-2f4a-43de-9206-b0a92d4f755f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c14347ef-2f4a-43de-9206-b0a92d4f755f&amp;feed=2M86zCcc"/>
      <itunes:title>From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Manicode Security, Jim Manico</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:10</itunes:duration>
      <itunes:summary>Jim Manico shares how his decades of secure coding experience are shaping a new era of AI-assisted development, revealing both the risks of insecure code generation and the potential to teach AI to do better. From developer training to launching the AISVS project, this episode highlights a personal and professional journey at the forefront of application security innovation.</itunes:summary>
      <itunes:subtitle>Jim Manico shares how his decades of secure coding experience are shaping a new era of AI-assisted development, revealing both the risks of insecure code generation and the potential to teach AI to do better. From developer training to launching the AISVS project, this episode highlights a personal and professional journey at the forefront of application security innovation.</itunes:subtitle>
      <itunes:keywords>marketing podcast, react, sean martin, jim manico, developers, appsec, brand marketing, owasp, aisvs, ai, securecoding, brand story podcast, brand story, training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>242</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">19a2347a-de31-4ee1-b6a2-6c2ac16e660e</guid>
      <title>The API That Could Transform Software Transparency | An OWASP AppSec Global 2025 Conversation with Olle E Johansson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The introduction of the Cyber Resilience Act (CRA) marks a major shift for the software industry: for the first time, manufacturers are being held accountable for the cybersecurity of their products. Olle E. Johansson, a long-time open source developer and contributor to the Asterisk PBX project, explains how this new regulation reshapes the role of software creators and introduces the need for transparency across the entire supply chain.</p><p>In this episode, Johansson breaks down the complexity of today’s software supply ecosystems—where manufacturers rely heavily on open source components, and end users struggle to identify vulnerabilities buried deep in third-party dependencies. With the CRA in place, the burden now falls on manufacturers to not only track but also report on the components in their products. That includes actively communicating which vulnerabilities affect users—and which do not.</p><p>To make this manageable, Johansson introduces the Transparency Exchange API (TEA), a project rooted in the OWASP CycloneDX standard. What started as a simple Software Bill of Materials (SBOM) delivery mechanism has evolved into a broader platform for sharing vulnerability information, attestations, documentation, and even cryptographic data necessary for the post-quantum transition. Standardizing this API through Ecma International is a major step toward a scalable, automated supply chain security infrastructure.</p><p>The episode also highlights the importance of automation and shared data formats in enabling companies to react quickly to threats like Log4j. Johansson notes that, historically, security teams spent countless hours manually assessing whether they were affected by a specific vulnerability. The Transparency Exchange API aims to change that by automating the entire feedback loop from developer to manufacturer to end user.</p><p>Although still in beta, the project is gaining traction with organizations like the Apache Foundation integrating it into their release processes. Johansson emphasizes that community feedback is essential and invites listeners to engage through GitHub to help shape the project’s future.</p><p>For Johansson, OWASP stands for global knowledge and collaboration in application security. As Europe’s regulatory influence grows, initiatives like this are essential to build a stronger, more accountable software ecosystem.<br /><br /><strong>GUEST: Olle E Johansson</strong> | Co-Founder, SBOM Europe | <a href="https://www.linkedin.com/in/ollejohansson/" target="_blank">https://www.linkedin.com/in/ollejohansson/</a></p><p><strong>HOST:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p><a href="https://github.com/CycloneDX">CycloneDX</a>/<a href="https://github.com/CycloneDX/transparency-exchange-api"><strong>transparency-exchange-api on GitHub:</strong></a> <a href="https://github.com/CycloneDX/transparency-exchange-api" target="_blank">https://github.com/CycloneDX/transparency-exchange-api</a></p><p>VIDEO: The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | With Sarah Fluchs: <a href="https://youtu.be/c30eG5kzqnY" target="_blank">https://youtu.be/c30eG5kzqnY</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 May 2025 08:43:38 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Olle E Johansson)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-api-that-could-transform-software-transparency-an-owasp-appsec-global-2025-conversation-with-olle-e-johansson-on-location-coverage-with-sean-martin-and-marco-ciappelli-2Wikdmvc</link>
      <content:encoded><![CDATA[<p>The introduction of the Cyber Resilience Act (CRA) marks a major shift for the software industry: for the first time, manufacturers are being held accountable for the cybersecurity of their products. Olle E. Johansson, a long-time open source developer and contributor to the Asterisk PBX project, explains how this new regulation reshapes the role of software creators and introduces the need for transparency across the entire supply chain.</p><p>In this episode, Johansson breaks down the complexity of today’s software supply ecosystems—where manufacturers rely heavily on open source components, and end users struggle to identify vulnerabilities buried deep in third-party dependencies. With the CRA in place, the burden now falls on manufacturers to not only track but also report on the components in their products. That includes actively communicating which vulnerabilities affect users—and which do not.</p><p>To make this manageable, Johansson introduces the Transparency Exchange API (TEA), a project rooted in the OWASP CycloneDX standard. What started as a simple Software Bill of Materials (SBOM) delivery mechanism has evolved into a broader platform for sharing vulnerability information, attestations, documentation, and even cryptographic data necessary for the post-quantum transition. Standardizing this API through Ecma International is a major step toward a scalable, automated supply chain security infrastructure.</p><p>The episode also highlights the importance of automation and shared data formats in enabling companies to react quickly to threats like Log4j. Johansson notes that, historically, security teams spent countless hours manually assessing whether they were affected by a specific vulnerability. The Transparency Exchange API aims to change that by automating the entire feedback loop from developer to manufacturer to end user.</p><p>Although still in beta, the project is gaining traction with organizations like the Apache Foundation integrating it into their release processes. Johansson emphasizes that community feedback is essential and invites listeners to engage through GitHub to help shape the project’s future.</p><p>For Johansson, OWASP stands for global knowledge and collaboration in application security. As Europe’s regulatory influence grows, initiatives like this are essential to build a stronger, more accountable software ecosystem.<br /><br /><strong>GUEST: Olle E Johansson</strong> | Co-Founder, SBOM Europe | <a href="https://www.linkedin.com/in/ollejohansson/" target="_blank">https://www.linkedin.com/in/ollejohansson/</a></p><p><strong>HOST:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p><a href="https://github.com/CycloneDX">CycloneDX</a>/<a href="https://github.com/CycloneDX/transparency-exchange-api"><strong>transparency-exchange-api on GitHub:</strong></a> <a href="https://github.com/CycloneDX/transparency-exchange-api" target="_blank">https://github.com/CycloneDX/transparency-exchange-api</a></p><p>VIDEO: The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | With Sarah Fluchs: <a href="https://youtu.be/c30eG5kzqnY" target="_blank">https://youtu.be/c30eG5kzqnY</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="13918550" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c5b28bf9-ff51-427c-8bbd-1877b3983943/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c5b28bf9-ff51-427c-8bbd-1877b3983943&amp;feed=2M86zCcc"/>
      <itunes:title>The API That Could Transform Software Transparency | An OWASP AppSec Global 2025 Conversation with Olle E Johansson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Olle E Johansson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:29</itunes:duration>
      <itunes:summary>Olle E Johansson shares how Europe’s Cyber Resilience Act is transforming the software industry by making manufacturers responsible for the security of their products—and how automation through the Transparency Exchange API can help meet that demand. Learn how this OWASP-backed project is reshaping supply chain transparency, enabling faster, smarter responses to vulnerabilities like Log4j.</itunes:summary>
      <itunes:subtitle>Olle E Johansson shares how Europe’s Cyber Resilience Act is transforming the software industry by making manufacturers responsible for the security of their products—and how automation through the Transparency Exchange API can help meet that demand. Learn how this OWASP-backed project is reshaping supply chain transparency, enabling faster, smarter responses to vulnerabilities like Log4j.</itunes:subtitle>
      <itunes:keywords>transparency, sean martin, automation, cybersecurity, conference, absec barcelona, on location, resilience, event coverage, sbom, regulation, owasp, olle e johansson, supplychain</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>241</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2adcb274-ba81-4856-aa9e-06c336c3c4e3</guid>
      <title>Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually Want to Use | An OWASP AppSec Global 2025 Conversation with Spyros Gasteratos | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During the upcoming OWASP Global AppSec EU in Barcelona, Spyros Gasteratos, long-time OWASP contributor and co-founder of Smithy, to explore how automation, collaboration, and community resources are shaping the future of application security. Spyros shares the foundation of his talk at OWASP AppSec Global: building a DevSecOps program from scratch using existing community tools—blending technical guidance with a celebration of open-source achievements.</p><p>Spyros emphasizes that true progress in security stems not from an ever-growing stack of tools, but from aligning the humans behind them. According to him, security failures often stem from fragmented information and misaligned incentives across teams. His solution? Bring the teams together with a shared, streamlined flow of information and automate wherever possible to reduce wasted cycles and miscommunication.</p><p>At the core of Spyros’ philosophy is the need to turn AppSec from a blocker into a builder. Rather than overwhelming developers with endless bug reports, or security leaders with red dashboards, programs need to reflect the actual risk appetite of the business—prioritizing issues dynamically based on impact, timing, and operational goals. He challenges the one-size-fits-all approach, advocating instead for tagging systems that defer certain risks and encode organizational priorities in automation logic.</p><p>A major part of that transformation lies in Smithy, the platform he’s helping build. It’s designed to be “Zapier for security”—an automation engine rooted in open-source standards that allows for custom workflows without creating a tangle of fragile scripts. The idea is to let teams focus on what’s unique to them, while relying on battle-tested components for the rest.</p><p>Looking ahead, Spyros doesn’t buy into the doom-and-gloom narrative about AI limiting developer creativity. On the contrary, he argues that AI-enabled coding frees up cognitive space for better architecture and secure design thinking. In his view, creativity doesn’t die—it just shifts from syntax to strategy.</p><p>This episode is more than a discussion—it’s a blueprint for how teams can rally around a common goal, and how OWASP’s community can be the catalyst. Tune in to hear how open-source, automation, and human alignment are redefining AppSec from the ground up.<br /><br /><strong>GUEST: Spyros Gasteratos | </strong>OpenCRE co-lead and Founder of smithy.security | <a href="https://www.linkedin.com/in/spyr/" target="_blank">https://www.linkedin.com/in/spyr/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Spyros' Session: <a href="https://owasp2025globalappseceu.sched.com/#">A completely pluggable DevSecOps programme, for free, using community resources (</a><a href="https://owasp2025globalappseceu.sched.com/event/1whCB/a-completely-pluggable-devsecops-programme-for-free-using-community-resources" target="_blank">https://owasp2025globalappseceu.sched.com/event/1whCB/a-completely-pluggable-devsecops-programme-for-free-using-community-resources</a><a href="https://owasp2025globalappseceu.sched.com/#">)</a></p><p>Learn more and catch more stories from OWASP Global AppSec EU 2025 Conference coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 May 2025 06:04:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Spyros Gasteratos)</author>
      <link>https://eventcoveragepodcast.com/episodes/turning-appsec-into-a-workflow-not-a-roadblock-building-security-programs-that-teams-actually-want-to-use-an-owasp-appsec-global-2025-conversation-with-spyros-gasteratos-on-location-coverage-with-sean-martin-and-marco-ciappelli-aO1HnPZC</link>
      <content:encoded><![CDATA[<p>During the upcoming OWASP Global AppSec EU in Barcelona, Spyros Gasteratos, long-time OWASP contributor and co-founder of Smithy, to explore how automation, collaboration, and community resources are shaping the future of application security. Spyros shares the foundation of his talk at OWASP AppSec Global: building a DevSecOps program from scratch using existing community tools—blending technical guidance with a celebration of open-source achievements.</p><p>Spyros emphasizes that true progress in security stems not from an ever-growing stack of tools, but from aligning the humans behind them. According to him, security failures often stem from fragmented information and misaligned incentives across teams. His solution? Bring the teams together with a shared, streamlined flow of information and automate wherever possible to reduce wasted cycles and miscommunication.</p><p>At the core of Spyros’ philosophy is the need to turn AppSec from a blocker into a builder. Rather than overwhelming developers with endless bug reports, or security leaders with red dashboards, programs need to reflect the actual risk appetite of the business—prioritizing issues dynamically based on impact, timing, and operational goals. He challenges the one-size-fits-all approach, advocating instead for tagging systems that defer certain risks and encode organizational priorities in automation logic.</p><p>A major part of that transformation lies in Smithy, the platform he’s helping build. It’s designed to be “Zapier for security”—an automation engine rooted in open-source standards that allows for custom workflows without creating a tangle of fragile scripts. The idea is to let teams focus on what’s unique to them, while relying on battle-tested components for the rest.</p><p>Looking ahead, Spyros doesn’t buy into the doom-and-gloom narrative about AI limiting developer creativity. On the contrary, he argues that AI-enabled coding frees up cognitive space for better architecture and secure design thinking. In his view, creativity doesn’t die—it just shifts from syntax to strategy.</p><p>This episode is more than a discussion—it’s a blueprint for how teams can rally around a common goal, and how OWASP’s community can be the catalyst. Tune in to hear how open-source, automation, and human alignment are redefining AppSec from the ground up.<br /><br /><strong>GUEST: Spyros Gasteratos | </strong>OpenCRE co-lead and Founder of smithy.security | <a href="https://www.linkedin.com/in/spyr/" target="_blank">https://www.linkedin.com/in/spyr/</a></p><p><strong>HOST: Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Spyros' Session: <a href="https://owasp2025globalappseceu.sched.com/#">A completely pluggable DevSecOps programme, for free, using community resources (</a><a href="https://owasp2025globalappseceu.sched.com/event/1whCB/a-completely-pluggable-devsecops-programme-for-free-using-community-resources" target="_blank">https://owasp2025globalappseceu.sched.com/event/1whCB/a-completely-pluggable-devsecops-programme-for-free-using-community-resources</a><a href="https://owasp2025globalappseceu.sched.com/#">)</a></p><p>Learn more and catch more stories from OWASP Global AppSec EU 2025 Conference coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16769450" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7ddaa19d-aa87-4750-b550-8b02999f3acc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7ddaa19d-aa87-4750-b550-8b02999f3acc&amp;feed=2M86zCcc"/>
      <itunes:title>Turning AppSec into a Workflow, Not a Roadblock – Building Security Programs That Teams Actually Want to Use | An OWASP AppSec Global 2025 Conversation with Spyros Gasteratos | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Spyros Gasteratos</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:28</itunes:duration>
      <itunes:summary>What if your AppSec program could be both deeply technical and deeply human? In this On Location episode from OWASP Global AppSec EU 2025 Conference, Spyros Gasteratos shares how automation, open-source tools, and community collaboration can unify fragmented efforts and turn security into a strategic advantage, not a bottleneck.</itunes:summary>
      <itunes:subtitle>What if your AppSec program could be both deeply technical and deeply human? In this On Location episode from OWASP Global AppSec EU 2025 Conference, Spyros Gasteratos shares how automation, open-source tools, and community collaboration can unify fragmented efforts and turn security into a strategic advantage, not a bottleneck.</itunes:subtitle>
      <itunes:keywords>sean martin, owasp appsec global, automation, conference, on location, open source, smithy, event coverage, appsec, owasp, ai, risk, devsecops, spyros gasteratos</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>240</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">106076eb-e355-48bf-b54b-233d1c37ddc1</guid>
      <title>Outside the Ivory Tower: Connecting Practice and Science — Why Human-Centered Cybersecurity Needs Both | OWASP AppSec Global 2025 Pre-Event Keynote Conversation with Kate Labunets | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During the upcoming OWASP Global AppSec EU in Barcelona, Kate Labunets, a cybersecurity researcher focused on human factors and usable security, takes the stage to confront a disconnect that too often holds the industry back: the gap between academic research and real-world cybersecurity practice.</p><p>In her keynote, “Outside the Ivory Tower: Connecting Practice and Science,” Kate invites practitioners to reconsider their relationship with academic research—not as something removed from their daily reality, but as a vital tool that can lead to better decisions, more targeted security programs, and improved organizational resilience.</p><p>Drawing from her current research, Kate shares how interviews and surveys with employees reveal the hidden motivations behind the use of shadow IT—tools and technologies adopted without formal approval. These aren’t simply acts of rebellion or ignorance. They reflect misalignments between human behavior, workplace needs, and policy communication. By understanding these mindsets, organizations can move beyond one-size-fits-all training and begin designing interventions grounded in evidence.</p><p>This is where science meets practice. Kate’s work isn’t about generating abstract theories. It’s about applying research methods—like anonymous interviews and behavior-focused surveys—to surface insights that security leaders can act on. But for this to happen, researchers need access, and that depends on building trust with practitioners.</p><p>The keynote also raises a critical point about time. In industries like medicine, the gap between a published discovery and its application in the real world can be 15 years. Kate argues that cybersecurity faces a similar delay, citing the example of multi-factor authentication: patented in 1998, but still not universally adopted today. Her goal is to accelerate this timeline by helping practitioners see themselves as contributors to science—not just consumers of its outcomes.</p><p>By inviting companies to participate in research and engage with universities, Kate’s message is clear: collaboration benefits everyone. The path to smarter, more human-aligned cybersecurity isn’t gated behind academic walls. It’s open to any team curious enough to ask better questions—and brave enough to challenge assumptions.<br /><br /><strong>GUEST: Kate Labunets | </strong>Assistant Professor (UD1) in Cyber Security at Utrecht University | <a href="https://www.linkedin.com/in/klabunets/" target="_blank">https://www.linkedin.com/in/klabunets/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Kate's Session: <a href="https://owasp2025globalappseceu.sched.com/event/1v86U/keynote-outside-the-ivory-tower-connecting-practice-and-science" target="_blank">https://owasp2025globalappseceu.sched.com/event/1v86U/keynote-outside-the-ivory-tower-connecting-practice-and-science</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 26 May 2025 10:47:12 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kate Labunets)</author>
      <link>https://eventcoveragepodcast.com/episodes/outside-the-ivory-tower-connecting-practice-and-science-why-human-centered-cybersecurity-needs-both-owasp-appsec-global-2025-pre-event-keynote-conversation-with-kate-labunets-on-location-coverage-with-sean-martin-and-marco-ciappelli-zdiTbIxT</link>
      <content:encoded><![CDATA[<p>During the upcoming OWASP Global AppSec EU in Barcelona, Kate Labunets, a cybersecurity researcher focused on human factors and usable security, takes the stage to confront a disconnect that too often holds the industry back: the gap between academic research and real-world cybersecurity practice.</p><p>In her keynote, “Outside the Ivory Tower: Connecting Practice and Science,” Kate invites practitioners to reconsider their relationship with academic research—not as something removed from their daily reality, but as a vital tool that can lead to better decisions, more targeted security programs, and improved organizational resilience.</p><p>Drawing from her current research, Kate shares how interviews and surveys with employees reveal the hidden motivations behind the use of shadow IT—tools and technologies adopted without formal approval. These aren’t simply acts of rebellion or ignorance. They reflect misalignments between human behavior, workplace needs, and policy communication. By understanding these mindsets, organizations can move beyond one-size-fits-all training and begin designing interventions grounded in evidence.</p><p>This is where science meets practice. Kate’s work isn’t about generating abstract theories. It’s about applying research methods—like anonymous interviews and behavior-focused surveys—to surface insights that security leaders can act on. But for this to happen, researchers need access, and that depends on building trust with practitioners.</p><p>The keynote also raises a critical point about time. In industries like medicine, the gap between a published discovery and its application in the real world can be 15 years. Kate argues that cybersecurity faces a similar delay, citing the example of multi-factor authentication: patented in 1998, but still not universally adopted today. Her goal is to accelerate this timeline by helping practitioners see themselves as contributors to science—not just consumers of its outcomes.</p><p>By inviting companies to participate in research and engage with universities, Kate’s message is clear: collaboration benefits everyone. The path to smarter, more human-aligned cybersecurity isn’t gated behind academic walls. It’s open to any team curious enough to ask better questions—and brave enough to challenge assumptions.<br /><br /><strong>GUEST: Kate Labunets | </strong>Assistant Professor (UD1) in Cyber Security at Utrecht University | <a href="https://www.linkedin.com/in/klabunets/" target="_blank">https://www.linkedin.com/in/klabunets/</a></p><p><strong>HOSTS:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>SPONSORS</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>RESOURCES</strong></p><p>Kate's Session: <a href="https://owasp2025globalappseceu.sched.com/event/1v86U/keynote-outside-the-ivory-tower-connecting-practice-and-science" target="_blank">https://owasp2025globalappseceu.sched.com/event/1v86U/keynote-outside-the-ivory-tower-connecting-practice-and-science</a></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18877261" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/eb56d095-e188-4930-bbf0-e8b5fe90be7e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=eb56d095-e188-4930-bbf0-e8b5fe90be7e&amp;feed=2M86zCcc"/>
      <itunes:title>Outside the Ivory Tower: Connecting Practice and Science — Why Human-Centered Cybersecurity Needs Both | OWASP AppSec Global 2025 Pre-Event Keynote Conversation with Kate Labunets | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kate Labunets</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:39</itunes:duration>
      <itunes:summary>In this On Location episode, Kate Labunets explores how bridging the gap between cybersecurity research and real-world practice can lead to more effective, human-centered security solutions. In this conversation, she shares how understanding employee behavior—like shadow IT use—can inform better policies, communication, and collaboration between academia and industry.</itunes:summary>
      <itunes:subtitle>In this On Location episode, Kate Labunets explores how bridging the gap between cybersecurity research and real-world practice can lead to more effective, human-centered security solutions. In this conversation, she shares how understanding employee behavior—like shadow IT use—can inform better policies, communication, and collaboration between academia and industry.</itunes:subtitle>
      <itunes:keywords>behavior, marco ciappelli, research, sean martin, cybersecurity, conference, on location, barcelona, event coverage, appsec, kate labunets, owasp, shadowit</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>239</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f0c3aea4-8503-4962-837b-604fb141a053</guid>
      <title>What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story</title>
      <description><![CDATA[<p>As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.</p><p>ThreatLocker’s mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia’s Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what’s working and where they need help.</p><p><strong>Why Being There Matters</strong></p><p>Different regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it’s conversations about Cyber Essentials that shape booth discussions. Regulations aren’t just compliance checklists; they’re also conversation starters that change how organizations prioritize security.</p><p>The ThreatLocker team doesn’t rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what’s necessary, and blocking what isn’t.</p><p><strong>Booth D90 and Beyond</strong></p><p>Rob Allen invites anyone—whether they’re new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It’s not just about showcasing technology; it’s about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.</p><p>If you’re at InfoSecurity Europe, stop by. If you’re not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Cyber Essentials Guide: <a href="https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast">https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast</a></p><p>Australia's Essential Eight Guide: <a href="https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi">https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi</a></p><p>Learn more and catch more event coverage stories from Infosecurity Europe 2025 in London: <a href="https://www.itspmagazine.com/infosec25 ">https://www.itspmagazine.com/infosec25 </a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 22 May 2025 23:31:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen)</author>
      <link>https://eventcoveragepodcast.com/episodes/what-helps-you-sleep-better-at-night-a-practical-take-on-zero-trust-a-brand-story-with-rob-allen-from-threatlocker-an-infosecurity-europe-2025-pre-event-brand-story-JjVWqZoi</link>
      <content:encoded><![CDATA[<p>As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.</p><p>ThreatLocker’s mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia’s Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what’s working and where they need help.</p><p><strong>Why Being There Matters</strong></p><p>Different regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it’s conversations about Cyber Essentials that shape booth discussions. Regulations aren’t just compliance checklists; they’re also conversation starters that change how organizations prioritize security.</p><p>The ThreatLocker team doesn’t rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what’s necessary, and blocking what isn’t.</p><p><strong>Booth D90 and Beyond</strong></p><p>Rob Allen invites anyone—whether they’re new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It’s not just about showcasing technology; it’s about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.</p><p>If you’re at InfoSecurity Europe, stop by. If you’re not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Cyber Essentials Guide: <a href="https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast">https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast</a></p><p>Australia's Essential Eight Guide: <a href="https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi">https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi</a></p><p>Learn more and catch more event coverage stories from Infosecurity Europe 2025 in London: <a href="https://www.itspmagazine.com/infosec25 ">https://www.itspmagazine.com/infosec25 </a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22141127" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/89ff16e4-0d12-4e52-9f46-da8949c6cff7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=89ff16e4-0d12-4e52-9f46-da8949c6cff7&amp;feed=2M86zCcc"/>
      <itunes:title>What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:03</itunes:duration>
      <itunes:summary>Rob Allen, Chief Product Officer at ThreatLocker, shares how their proactive, Zero Trust-driven approach is helping organizations around the world secure their environments—without unnecessary complexity. From region-specific regulations to universal security gaps, this episode explores what really drives meaningful conversations at events like InfoSecurity Europe.</itunes:summary>
      <itunes:subtitle>Rob Allen, Chief Product Officer at ThreatLocker, shares how their proactive, Zero Trust-driven approach is helping organizations around the world secure their environments—without unnecessary complexity. From region-specific regulations to universal security gaps, this episode explores what really drives meaningful conversations at events like InfoSecurity Europe.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, sean martin, infosec, rob allen, cybersecurity, endpoint, ransomware, brand marketing, regulation, brand story podcast, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>238</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b268893a-ee6a-4f04-b116-ebf60ef03952</guid>
      <title>When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe 2025 Pre-Event Conversation with Peter Garraghan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode of our InfoSecurity Europe 2024 On Location coverage, Marco Ciappelli and Sean Martin sit down with Professor Peter Garraghan, Chair in Computer Science at Lancaster University and co-founder of the AI security startup Mindgard. Peter shares a grounded view of the current AI moment—one where attention-grabbing capabilities often distract from fundamental truths about software security.</p><p>At the heart of the discussion is the question: Can my AI be hacked? Peter’s answer is a firm “yes”—but not for the reasons most might expect. He explains that AI is still software, and the risks it introduces are extensions of those we’ve seen for decades. The real difference lies not in the nature of the threats, but in how these new interfaces behave and how we, as humans, interact with them. Natural language interfaces, in particular, make it easier to introduce confusion and harder to contain behaviors, especially when people overestimate the intelligence of the systems.</p><p>Peter highlights that prompt injection, model poisoning, and opaque logic flows are not entirely new challenges. They mirror known classes of vulnerabilities like SQL injection or insecure APIs—only now they come wrapped in the hype of generative AI. He encourages teams to reframe the conversation: replace the word “AI” with “software” and see how the risk profile becomes more recognizable and manageable.</p><p>A key takeaway is that the issue isn’t just technical. Many organizations are integrating AI capabilities without understanding what they’re introducing. As Peter puts it, “You’re plugging in software filled with features you don’t need, which makes your risk modeling much harder.” Guardrails are often mistaken for full protections, and foundational practices in application development and threat modeling are being sidelined by excitement and speed to market.</p><p>Peter’s upcoming session at InfoSecurity Europe—Can My AI Be Hacked?—aims to bring this discussion to life with real-world attack examples, systems-level analysis, and a practical call to action: retool, retrain, and reframe your approach to AI security. Whether you’re in development, operations, or governance, this session promises perspective that cuts through the noise and anchors your strategy in reality.</p><p><strong>___________</strong><br /><br /><strong>Guest: Peter Garraghan</strong>, Professor in Computer Science at Lancaster University, Fellow of the UK Engineering Physical Sciences and Research Council (EPSRC), and CEO & CTO of Mindgard | <a href="https://www.linkedin.com/in/pgarraghan/ ">https://www.linkedin.com/in/pgarraghan/ </a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Peter’s Session: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4355.239479.can-my-ai-be-hacked.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4355.239479.can-my-ai-be-hacked.html</a></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, peter garraghan, ai, cybersecurity, software, risk, threat, prompt, injection, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 22 May 2025 22:14:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Peter Garraghan)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-guardrails-arent-enough-how-to-handle-ais-hidden-vulnerabilities-an-infosecurity-europe-2025-pre-event-conversation-with-peter-garraghan-on-location-coverage-with-sean-martin-and-marco-ciappelli-aeZqCWf7</link>
      <content:encoded><![CDATA[<p>In this episode of our InfoSecurity Europe 2024 On Location coverage, Marco Ciappelli and Sean Martin sit down with Professor Peter Garraghan, Chair in Computer Science at Lancaster University and co-founder of the AI security startup Mindgard. Peter shares a grounded view of the current AI moment—one where attention-grabbing capabilities often distract from fundamental truths about software security.</p><p>At the heart of the discussion is the question: Can my AI be hacked? Peter’s answer is a firm “yes”—but not for the reasons most might expect. He explains that AI is still software, and the risks it introduces are extensions of those we’ve seen for decades. The real difference lies not in the nature of the threats, but in how these new interfaces behave and how we, as humans, interact with them. Natural language interfaces, in particular, make it easier to introduce confusion and harder to contain behaviors, especially when people overestimate the intelligence of the systems.</p><p>Peter highlights that prompt injection, model poisoning, and opaque logic flows are not entirely new challenges. They mirror known classes of vulnerabilities like SQL injection or insecure APIs—only now they come wrapped in the hype of generative AI. He encourages teams to reframe the conversation: replace the word “AI” with “software” and see how the risk profile becomes more recognizable and manageable.</p><p>A key takeaway is that the issue isn’t just technical. Many organizations are integrating AI capabilities without understanding what they’re introducing. As Peter puts it, “You’re plugging in software filled with features you don’t need, which makes your risk modeling much harder.” Guardrails are often mistaken for full protections, and foundational practices in application development and threat modeling are being sidelined by excitement and speed to market.</p><p>Peter’s upcoming session at InfoSecurity Europe—Can My AI Be Hacked?—aims to bring this discussion to life with real-world attack examples, systems-level analysis, and a practical call to action: retool, retrain, and reframe your approach to AI security. Whether you’re in development, operations, or governance, this session promises perspective that cuts through the noise and anchors your strategy in reality.</p><p><strong>___________</strong><br /><br /><strong>Guest: Peter Garraghan</strong>, Professor in Computer Science at Lancaster University, Fellow of the UK Engineering Physical Sciences and Research Council (EPSRC), and CEO & CTO of Mindgard | <a href="https://www.linkedin.com/in/pgarraghan/ ">https://www.linkedin.com/in/pgarraghan/ </a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Peter’s Session: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4355.239479.can-my-ai-be-hacked.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.4355.239479.can-my-ai-be-hacked.html</a></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, peter garraghan, ai, cybersecurity, software, risk, threat, prompt, injection, infosecurity europe, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22809329" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c22c7f9c-1bb4-4cf7-a0c8-85091fb70494/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c22c7f9c-1bb4-4cf7-a0c8-85091fb70494&amp;feed=2M86zCcc"/>
      <itunes:title>When Guardrails Aren’t Enough: How to Handle AI’s Hidden Vulnerabilities | An Infosecurity Europe 2025 Pre-Event Conversation with Peter Garraghan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Peter Garraghan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:45</itunes:duration>
      <itunes:summary>AI isn’t magic—it’s still software, and with that comes familiar risks that too often get overlooked in the hype. In this episode, Professor Peter Garraghan breaks down how traditional security thinking still applies, and why understanding the nuances of AI systems is essential to keeping them secure.</itunes:summary>
      <itunes:subtitle>AI isn’t magic—it’s still software, and with that comes familiar risks that too often get overlooked in the hype. In this episode, Professor Peter Garraghan breaks down how traditional security thinking still applies, and why understanding the nuances of AI systems is essential to keeping them secure.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, infosecurity europe, sean martin, peter garraghan, cybersecurity, software, prompt, conference, on location, event coverage, injection, threat, ai, risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>237</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">92bad134-7e3d-43c2-a06e-d547d8b32386</guid>
      <title>Celebrating 30 Years of Connection, Innovation, and Community at Infosecurity Europe in London | Our Traditional Pre-Event Kick-Off Conversation with Saima Poorghobad | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.</p><p><strong>The Power of the Crowd: Community, Policy, and Lifelong Learning</strong></p><p>This year’s programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.</p><p><strong>Tackling Today’s and Tomorrow’s Threats—From Quantum to Geopolitics</strong></p><p>Infosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC’s Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.</p><p><strong>Maximizing the Experience: Prep, Participate, and Party</strong></p><p>From hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.</p><p>The message is clear: cybersecurity is no longer just a technical field—it’s a societal one.</p><p><strong>___________</strong><br /><br /><strong>Guest: Saima Poorghobad</strong>, Portfolio Director at Reed Exhibitions | <a href="https://www.linkedin.com/in/saima-poorghobad-6a37791b/ ">https://www.linkedin.com/in/saima-poorghobad-6a37791b/ </a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, saima poorghobad, infosecurity europe, cybersecurity, quantum, ai, policy, community, innovation, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 22 May 2025 21:23:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Saima Poorghobad)</author>
      <link>https://eventcoveragepodcast.com/episodes/celebrating-30-years-of-connection-innovation-and-community-at-infosecurity-europe-in-london-our-traditional-pre-event-kick-off-conversation-with-saima-poorghobad-on-location-coverage-with-sean-martin-and-marco-ciappelli-tpAm9dtI</link>
      <content:encoded><![CDATA[<p>As Infosecurity Europe prepares to mark its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event continues to evolve to meet the needs of cybersecurity professionals across industries, sectors, and career stages. What began in 1996 as a niche IT gathering has grown into a strategic hub for over 14,000 visitors, offering much more than just vendor booths and keynotes. Saima outlines how the event has become a dynamic space for learning, collaboration, and strategic alignment—balancing deep technical insight with the broader social, political, and technological shifts impacting the cybersecurity community.</p><p><strong>The Power of the Crowd: Community, Policy, and Lifelong Learning</strong></p><p>This year’s programming reflects the diverse needs of the cybersecurity community. Attendees range from early-career practitioners to seasoned decision-makers, with representation growing from academia and public policy. The UK government will participate in sessions designed to engage with the community and gather feedback to inform future regulation—a sign of how the show has expanded beyond its commercial roots. Universities are also getting special attention, with new student guides and tailored experiences to help emerging professionals find their place in the ecosystem.</p><p><strong>Tackling Today’s and Tomorrow’s Threats—From Quantum to Geopolitics</strong></p><p>Infosecurity Europe 2024 is not shying away from bold topics. Professor Brian Cox will open the event by exploring the intersection of quantum science and cybersecurity, setting the tone for a future-facing agenda. Immediately following, BBC’s Joe Tidy will moderate a session on how organizations can prepare for the cryptographic disruption quantum computing could bring. Rory Stewart will bring a geopolitical lens to the conversation, examining how shifting alliances, global trade tensions, and international conflicts are reshaping the threat landscape and influencing cybersecurity priorities across regions.</p><p><strong>Maximizing the Experience: Prep, Participate, and Party</strong></p><p>From hands-on tech demos to peer-led table talks and new formats like the AI and Cloud Security Theater, the show is designed to be navigable—even for first-time attendees. Saima emphasizes preparation, networking, and follow-up as keys to success, with a new content download feature helping attendees retain insights post-event. The celebration culminates with a 90s-themed 30th anniversary party and a strong sense of pride in what this event has helped the community build—and protect—over three decades.</p><p>The message is clear: cybersecurity is no longer just a technical field—it’s a societal one.</p><p><strong>___________</strong><br /><br /><strong>Guest: Saima Poorghobad</strong>, Portfolio Director at Reed Exhibitions | <a href="https://www.linkedin.com/in/saima-poorghobad-6a37791b/ ">https://www.linkedin.com/in/saima-poorghobad-6a37791b/ </a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: <a href="https://www.itspmagazine.com/infosec25">https://www.itspmagazine.com/infosec25</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, saima poorghobad, infosecurity europe, cybersecurity, quantum, ai, policy, community, innovation, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23840133" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b397bbd4-6c74-4a19-8a37-7e85c9348303/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b397bbd4-6c74-4a19-8a37-7e85c9348303&amp;feed=2M86zCcc"/>
      <itunes:title>Celebrating 30 Years of Connection, Innovation, and Community at Infosecurity Europe in London | Our Traditional Pre-Event Kick-Off Conversation with Saima Poorghobad | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Saima Poorghobad</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0a4b2110-17f7-47d2-ac77-a3424ab7edf1/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:49</itunes:duration>
      <itunes:summary>As Infosecurity Europe celebrates its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event has grown into a vital hub for innovation, policy collaboration, and community building across the cybersecurity ecosystem. From quantum computing and geopolitics to student engagement and AI-focused programming, this episode offers a preview of what’s shaping one of the industry’s most anticipated gatherings.</itunes:summary>
      <itunes:subtitle>As Infosecurity Europe celebrates its 30th anniversary, Portfolio Director Saima Poorghobad shares how the event has grown into a vital hub for innovation, policy collaboration, and community building across the cybersecurity ecosystem. From quantum computing and geopolitics to student engagement and AI-focused programming, this episode offers a preview of what’s shaping one of the industry’s most anticipated gatherings.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, infosecurity europe, saima poorghobad, sean martin, cybersecurity, conference, on location, innovation, policy, event coverage, quantum, ai, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>236</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">033264fc-da96-4884-a56c-c4788e8263da</guid>
      <title>Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable.</p><p>During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-to-face conversations with customers and prospects. Their booth was an open, no-frills space—designed for real dialogue, not distractions. What caught people’s attention, though, wasn’t the booth layout—it was a live demonstration of a PowerShell-based attack using a rubber ducky device. It visually captured how traditional tools often miss malicious scripts and how ThreatLocker’s controls shut it down immediately. That kind of simplicity, Rob explains, is the real differentiator.</p><p><strong>Zero Trust Is a Journey—But It Doesn’t Have to Be Complicated</strong></p><p>One key message Rob emphasizes is that true security doesn’t come from piling on more tools. Too many organizations rely on overlapping detection and response solutions, which leads to confusion and technical debt. “If you have five different jackets and they’re all winter coats, you’re not prepared for summer,” Sean Martin jokes, reinforcing Rob’s point that layers should be distinct, not redundant.</p><p>ThreatLocker’s approach simplifies Zero Trust by focusing on proactive control—limiting what can execute or communicate in the first place. Rob also points to the importance of vendor consolidation—not just from a purchasing standpoint but from an operational one. With ThreatLocker, multiple security capabilities are built natively into a single platform with one agent and one portal, avoiding the chaos of disjointed systems.</p><p><strong>From Technical Wins to Human Connections</strong></p><p>The conversation wraps with a reminder that cybersecurity isn’t just about tools—it’s about the people and community that make the work worthwhile. Rob, Marco Ciappelli, and Sean Martin reflect on their shared experiences around the event and even the lessons learned over a slice of Detroit-style pizza. While the crust may have been debatable, the camaraderie and commitment to doing security better were not.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, threat prevention, powerShell, vendor consolidation, rsac2025, endpoint security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 20:17:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-simplicity-might-be-the-missing-ingredient-in-your-zero-trust-strategy-a-brand-story-with-rob-allen-from-threatlocker-an-rsac-conference-2025-post-event-brand-story-F4zmOx87</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable.</p><p>During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-to-face conversations with customers and prospects. Their booth was an open, no-frills space—designed for real dialogue, not distractions. What caught people’s attention, though, wasn’t the booth layout—it was a live demonstration of a PowerShell-based attack using a rubber ducky device. It visually captured how traditional tools often miss malicious scripts and how ThreatLocker’s controls shut it down immediately. That kind of simplicity, Rob explains, is the real differentiator.</p><p><strong>Zero Trust Is a Journey—But It Doesn’t Have to Be Complicated</strong></p><p>One key message Rob emphasizes is that true security doesn’t come from piling on more tools. Too many organizations rely on overlapping detection and response solutions, which leads to confusion and technical debt. “If you have five different jackets and they’re all winter coats, you’re not prepared for summer,” Sean Martin jokes, reinforcing Rob’s point that layers should be distinct, not redundant.</p><p>ThreatLocker’s approach simplifies Zero Trust by focusing on proactive control—limiting what can execute or communicate in the first place. Rob also points to the importance of vendor consolidation—not just from a purchasing standpoint but from an operational one. With ThreatLocker, multiple security capabilities are built natively into a single platform with one agent and one portal, avoiding the chaos of disjointed systems.</p><p><strong>From Technical Wins to Human Connections</strong></p><p>The conversation wraps with a reminder that cybersecurity isn’t just about tools—it’s about the people and community that make the work worthwhile. Rob, Marco Ciappelli, and Sean Martin reflect on their shared experiences around the event and even the lessons learned over a slice of Detroit-style pizza. While the crust may have been debatable, the camaraderie and commitment to doing security better were not.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, threat prevention, powerShell, vendor consolidation, rsac2025, endpoint security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16791238" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/138da74f-75c2-4a70-9517-fd5ab2c499b6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=138da74f-75c2-4a70-9517-fd5ab2c499b6&amp;feed=2M86zCcc"/>
      <itunes:title>Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:29</itunes:duration>
      <itunes:summary>This episode explores how ThreatLocker is reshaping Zero Trust by focusing on proactive control, operational simplicity, and the elimination of redundant security layers. Rob Allen shares real-world examples from RSAC 2025, including live attack demos and candid feedback from customers, to highlight why manageability is the true key to effective cybersecurity.</itunes:summary>
      <itunes:subtitle>This episode explores how ThreatLocker is reshaping Zero Trust by focusing on proactive control, operational simplicity, and the elimination of redundant security layers. Rob Allen shares real-world examples from RSAC 2025, including live attack demos and candid feedback from customers, to highlight why manageability is the true key to effective cybersecurity.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, rob allen, cybersecurity, endpoint security, vendor consolidation, rsac2025, powershell, threat prevention, brand marketing, brand story podcast, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>235</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bfa75a88-e3a0-455c-9b8e-417762d0f1da</guid>
      <title>Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.</p><p><strong>More Than a Job: Why Community Matters</strong></p><p>Rob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It’s not just about certifications—though Clyde notes that employers often value them more than degrees—it’s also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.</p><p>Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It’s your career,” he says. “Take back control.”</p><p><strong>Facing Burnout and Legal Risk Head-On</strong></p><p>The group also addresses a growing issue: burnout. ISACA’s latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.</p><p>To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.</p><p><strong>The Silent Threat of Quantum</strong></p><p>While AI dominated RSAC’s headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don’t know when.”</p><p>From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn’t just a technology issue—it’s a people issue. Listen to the full episode to hear what else we’re missing.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Clyde</strong>, Board Director, Chair, Past Chair of the Board Directors at ISACA | <a href="https://www.linkedin.com/in/robclyde/">https://www.linkedin.com/in/robclyde/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Stay tuned for an upcoming ITSPmagazine Webinar with ISACA: <a href="https://www.itspmagazine.com/webinars">https://www.itspmagazine.com/webinars</a></p><p>ISACA Quantum Pulse Poll 2025 and related resources: <a href="https://www.isaca.org/quantum-pulse-poll">https://www.isaca.org/quantum-pulse-poll</a></p><p>ISACA State of Cybersecurity 2024 survey report: <a href="https://www.isaca.org/resources/reports/state-of-cybersecurity-2024">https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 18:57:41 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Clyde, ISACA)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-community-could-be-the-strongest-defense-in-cybersecurity-a-brand-story-with-rob-clyde-from-isaca-an-rsac-conference-2025-post-event-brand-story-X_t9NJfT</link>
      <content:encoded><![CDATA[<p>At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.</p><p><strong>More Than a Job: Why Community Matters</strong></p><p>Rob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It’s not just about certifications—though Clyde notes that employers often value them more than degrees—it’s also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.</p><p>Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It’s your career,” he says. “Take back control.”</p><p><strong>Facing Burnout and Legal Risk Head-On</strong></p><p>The group also addresses a growing issue: burnout. ISACA’s latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.</p><p>To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.</p><p><strong>The Silent Threat of Quantum</strong></p><p>While AI dominated RSAC’s headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don’t know when.”</p><p>From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn’t just a technology issue—it’s a people issue. Listen to the full episode to hear what else we’re missing.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Clyde</strong>, Board Director, Chair, Past Chair of the Board Directors at ISACA | <a href="https://www.linkedin.com/in/robclyde/">https://www.linkedin.com/in/robclyde/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Stay tuned for an upcoming ITSPmagazine Webinar with ISACA: <a href="https://www.itspmagazine.com/webinars">https://www.itspmagazine.com/webinars</a></p><p>ISACA Quantum Pulse Poll 2025 and related resources: <a href="https://www.isaca.org/quantum-pulse-poll">https://www.isaca.org/quantum-pulse-poll</a></p><p>ISACA State of Cybersecurity 2024 survey report: <a href="https://www.isaca.org/resources/reports/state-of-cybersecurity-2024">https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22739208" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/497ec480-cd0c-4340-8440-90675bb5e5f8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=497ec480-cd0c-4340-8440-90675bb5e5f8&amp;feed=2M86zCcc"/>
      <itunes:title>Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Clyde, ISACA</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:41</itunes:duration>
      <itunes:summary>This episode explores why cybersecurity must be more than just tools and tactics, highlighting the importance of community, continuous learning, and mental health in sustaining the profession. Rob Clyde joins Sean Martin and Marco Ciappelli to unpack the personal and industry-wide stakes of quantum risk, burnout, and the true value of professional connection.</itunes:summary>
      <itunes:subtitle>This episode explores why cybersecurity must be more than just tools and tactics, highlighting the importance of community, continuous learning, and mental health in sustaining the profession. Rob Clyde joins Sean Martin and Marco Ciappelli to unpack the personal and industry-wide stakes of quantum risk, burnout, and the true value of professional connection.</itunes:subtitle>
      <itunes:keywords>burnout, rob clyde, marketing podcast, marco ciappelli, sean martin, cybersecurity, isaca, cryptography, rsac2025, brand marketing, certification, quantum, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>234</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aab82e85-feaa-4613-a2d6-943fc54d1e58</guid>
      <title>Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.</p><p><strong>Not All AI Is Created Equal: The Archer Approach</strong></p><p>RSAC 2025 was buzzing with innovation, but for Steve Schlarman and the Archer team, it wasn’t about showing off shiny new toys—it was about proving that AI, when used with purpose and context, can truly enhance the risk and compliance function.</p><p>Steve, <strong>Senior Director of Product Management at Archer</strong>, breaks down how Archer Evolve and the recent integration of Compliance.ai are helping organizations address regulatory change in a more holistic, automated, and scalable way. With silos still slowing down many companies, the need for tools that actually <i>do</i> something is more urgent than ever.</p><p><strong>From Policy Generation to Risk Narratives</strong></p><p>One of the most practical applications discussed? Using AI not just to detect risk, but to help write better risk statements, control documentation, and even policy language that actually communicates clearly. Steve explains how Archer is focused on closing the loop between data and business impact—translating technical risk outputs into narratives the business can actually act on.</p><p><strong>AI with a Human Touch</strong></p><p>As Marco notes, AI in cybersecurity has moved from hype to hesitation to strategy. Steve is candid: some customers are still on the fence. But when AI is delivered in a contextual way, backed by customer-driven innovation, it becomes a bridge—not a wedge—between people and process. The key is not AI for the sake of AI, but for solving real, grounded problems.</p><p><strong>What’s Next in Risk? Better Conversations</strong></p><p>Looking ahead, Schlarman sees a shift from “no, we can’t” to “yes, and here’s how.” With a better grasp on loss exposure and control costs, the business conversation is changing. AI-powered storytelling and smart interfaces might just help risk teams have their most effective conversations yet.</p><p>From regulatory change to real-time translation of risk data, this is where tech meets trust.</p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>steve schlarman, marco ciappelli, rsac2025, archer evolve, compliance.ai, regulatory change, grc, risk management, ai storytelling, cybersecurity, compliance, brand story, rsa conference, cybersecurity strategy, risk communication, ai in compliance, automation, contextual ai, integrated risk management, business risk narrative, itspmagazine</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 02:36:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-ai-needs-context-not-just-hype-a-conversation-with-steve-schlarman-senior-director-product-management-at-archer-an-rsac-conference-2025-post-event-brand-story-KHTgjFqN</link>
      <content:encoded><![CDATA[<p>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.</p><p><strong>Not All AI Is Created Equal: The Archer Approach</strong></p><p>RSAC 2025 was buzzing with innovation, but for Steve Schlarman and the Archer team, it wasn’t about showing off shiny new toys—it was about proving that AI, when used with purpose and context, can truly enhance the risk and compliance function.</p><p>Steve, <strong>Senior Director of Product Management at Archer</strong>, breaks down how Archer Evolve and the recent integration of Compliance.ai are helping organizations address regulatory change in a more holistic, automated, and scalable way. With silos still slowing down many companies, the need for tools that actually <i>do</i> something is more urgent than ever.</p><p><strong>From Policy Generation to Risk Narratives</strong></p><p>One of the most practical applications discussed? Using AI not just to detect risk, but to help write better risk statements, control documentation, and even policy language that actually communicates clearly. Steve explains how Archer is focused on closing the loop between data and business impact—translating technical risk outputs into narratives the business can actually act on.</p><p><strong>AI with a Human Touch</strong></p><p>As Marco notes, AI in cybersecurity has moved from hype to hesitation to strategy. Steve is candid: some customers are still on the fence. But when AI is delivered in a contextual way, backed by customer-driven innovation, it becomes a bridge—not a wedge—between people and process. The key is not AI for the sake of AI, but for solving real, grounded problems.</p><p><strong>What’s Next in Risk? Better Conversations</strong></p><p>Looking ahead, Schlarman sees a shift from “no, we can’t” to “yes, and here’s how.” With a better grasp on loss exposure and control costs, the business conversation is changing. AI-powered storytelling and smart interfaces might just help risk teams have their most effective conversations yet.</p><p>From regulatory change to real-time translation of risk data, this is where tech meets trust.</p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>steve schlarman, marco ciappelli, rsac2025, archer evolve, compliance.ai, regulatory change, grc, risk management, ai storytelling, cybersecurity, compliance, brand story, rsa conference, cybersecurity strategy, risk communication, ai in compliance, automation, contextual ai, integrated risk management, business risk narrative, itspmagazine</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7217857" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a3e1e898-b933-47f3-a74f-5a3990765ad2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a3e1e898-b933-47f3-a74f-5a3990765ad2&amp;feed=2M86zCcc"/>
      <itunes:title>Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:31</itunes:duration>
      <itunes:summary>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.
</itunes:summary>
      <itunes:subtitle>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.
</itunes:subtitle>
      <itunes:keywords>workflow, compliance, compliance.ai, data, marketing podcast, marco ciappelli, controls, rsa conference, archer evolve, grc, contextual ai, sean martin, rsa, automation, cybersecurity, business risk narrative, risk management, ai in compliance, integrated risk management, cybersecurity strategy, regulatory change, resilience, rsac2025, steve schlarman, brand marketing, ai storytelling, risk communication, regulation, ai, risk, business continuity, itspmagazine, product management, brand story podcast, audit, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>233</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e514d395-7c8d-4b5c-9040-eaef1aa334f1</guid>
      <title>Building, Breaking, Defending: Inside a Global AppSec Movement | OWASP AppSec Global 2025 Pre-Event Conversation with Avi Douglen | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At OWASP AppSec Global in Barcelona, the focus is clear: building secure software with and for the community. But it’s not just about code or compliance. As Avi Douglen, OWASP Foundation board member, describes it, this gathering is a “hot tub” experience in contrast to the overwhelming scale of mega conferences. It’s warm, immersive, and welcoming—designed for people who want to contribute, connect, and create.</p><p>OWASP is more than just another security organization. It’s a community-driven foundation that enables builders, breakers, defenders, and leaders to come together in pursuit of secure product development. This year’s conference reflects that same inclusive energy. Whether you’re a software engineer, architect, DevOps professional, security champion, or product manager, the sessions and networking spaces are built to meet you where you are—and help you grow.</p><p><strong>Beyond the Buzzwords</strong></p><p>Unsurprisingly, AI will have a strong presence this year. But the conversations aren’t limited to hype. Two flagship OWASP projects now focus on AI and LLMs—one on securing applications that use AI, the other on building secure AI systems themselves. Talks will unpack familiar problems in new contexts, like prompt injection mirroring the dynamics of older injection vulnerabilities. In other words: the technology shifts, but the core principles remain relevant.</p><p><strong>Diverse Tracks, Real Conversations</strong></p><p>Attendees can engage across five curated tracks: builders, breakers, defenders, managers & culture, and project showcases. Topics range from threat modeling and DevSecOps to scaling security programs and fostering team culture. A dedicated training program, including hands-on sessions in secure coding and security champions, ensures practical takeaways—not just theory.</p><p>Plus, the event embraces connection. A newcomer orientation, Women in AppSec gathering, hallway chats, evening socials, and even speed mentoring sessions all contribute to a vibrant, accessible experience where everyone—from seasoned leaders to curious newcomers—can find their place.</p><p><strong>A Truly Global Community</strong></p><p>With participants flying in from all corners of the world, OWASP AppSec Global lives up to its name. The conversations, relationships, and tools that emerge from this event ripple far beyond Barcelona. If you build, secure, or manage software, this is one conference where showing up matters—not just for what you’ll learn, but for who you’ll meet.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Avi Douglen | </strong>Global Board of Directors at OWASP Foundation<strong> </strong>&<strong> </strong>Founder and CEO at Bounce Security<br /><a href="https://www.linkedin.com/in/avidouglen/" target="_blank">https://www.linkedin.com/in/avidouglen/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 15 May 2025 20:24:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Avi Douglen)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-breaking-defending-inside-a-global-appsec-movement-owasp-appsec-global-2025-pre-event-conversation-with-avi-douglen-on-location-coverage-with-sean-martin-and-marco-ciappelli-XhxHje7U</link>
      <content:encoded><![CDATA[<p>At OWASP AppSec Global in Barcelona, the focus is clear: building secure software with and for the community. But it’s not just about code or compliance. As Avi Douglen, OWASP Foundation board member, describes it, this gathering is a “hot tub” experience in contrast to the overwhelming scale of mega conferences. It’s warm, immersive, and welcoming—designed for people who want to contribute, connect, and create.</p><p>OWASP is more than just another security organization. It’s a community-driven foundation that enables builders, breakers, defenders, and leaders to come together in pursuit of secure product development. This year’s conference reflects that same inclusive energy. Whether you’re a software engineer, architect, DevOps professional, security champion, or product manager, the sessions and networking spaces are built to meet you where you are—and help you grow.</p><p><strong>Beyond the Buzzwords</strong></p><p>Unsurprisingly, AI will have a strong presence this year. But the conversations aren’t limited to hype. Two flagship OWASP projects now focus on AI and LLMs—one on securing applications that use AI, the other on building secure AI systems themselves. Talks will unpack familiar problems in new contexts, like prompt injection mirroring the dynamics of older injection vulnerabilities. In other words: the technology shifts, but the core principles remain relevant.</p><p><strong>Diverse Tracks, Real Conversations</strong></p><p>Attendees can engage across five curated tracks: builders, breakers, defenders, managers & culture, and project showcases. Topics range from threat modeling and DevSecOps to scaling security programs and fostering team culture. A dedicated training program, including hands-on sessions in secure coding and security champions, ensures practical takeaways—not just theory.</p><p>Plus, the event embraces connection. A newcomer orientation, Women in AppSec gathering, hallway chats, evening socials, and even speed mentoring sessions all contribute to a vibrant, accessible experience where everyone—from seasoned leaders to curious newcomers—can find their place.</p><p><strong>A Truly Global Community</strong></p><p>With participants flying in from all corners of the world, OWASP AppSec Global lives up to its name. The conversations, relationships, and tools that emerge from this event ripple far beyond Barcelona. If you build, secure, or manage software, this is one conference where showing up matters—not just for what you’ll learn, but for who you’ll meet.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Avi Douglen | </strong>Global Board of Directors at OWASP Foundation<strong> </strong>&<strong> </strong>Founder and CEO at Bounce Security<br /><a href="https://www.linkedin.com/in/avidouglen/" target="_blank">https://www.linkedin.com/in/avidouglen/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Manicode Security: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OWASP AppSec Global 2025 Barcelona coverage: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain" target="_blank">https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21636209" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3e964d1e-e116-4fab-995e-f5401f8c9cf6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3e964d1e-e116-4fab-995e-f5401f8c9cf6&amp;feed=2M86zCcc"/>
      <itunes:title>Building, Breaking, Defending: Inside a Global AppSec Movement | OWASP AppSec Global 2025 Pre-Event Conversation with Avi Douglen | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Avi Douglen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/c2a13fcf-f910-4a61-b2f3-f1c709f0498a/3000x3000/owasp-20global-20appsec-20barcelona-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:32</itunes:duration>
      <itunes:summary>This On Location episode offers a firsthand look at what makes a tight-knit application security community so impactful, especially when the conversations go beyond tools and tactics to focus on real collaboration and growth. From AI risks to culture shifts, you’ll hear what to expect at this year’s global gathering and why it’s more than just another security conference.</itunes:summary>
      <itunes:subtitle>This On Location episode offers a firsthand look at what makes a tight-knit application security community so impactful, especially when the conversations go beyond tools and tactics to focus on real collaboration and growth. From AI risks to culture shifts, you’ll hear what to expect at this year’s global gathering and why it’s more than just another security conference.</itunes:subtitle>
      <itunes:keywords>avi douglen, productsecurity, marco ciappelli, sean martin, conference, mentorship, on location, barcelona, event coverage, appsec, owasp, ai, devsecops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>232</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">113e0a42-3ecf-4d28-b19b-7d5036bb857e</guid>
      <title>From Isolation to Collaboration: Rethinking Cyber Resilience for the Real World of Small and Medium Enterprise | Infosecurity Europe 2025 Pre-Event Conversation with Steven Furnell | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Small and medium-sized enterprises (SMEs) continue to be at a disadvantage when it comes to cybersecurity—not because the risks are unclear, but because the means to address them remain out of reach for many. In this episode, Professor Steven Furnell of the University of Nottingham highlights the real barriers SMEs face and shares the thinking behind a new approach: creating cybersecurity communities of support.</p><p>The research behind this project, supported by the University and its partners, explores how different types of SMEs—micro, small, and medium-sized—struggle with limited time, budget, and expertise. Many rely on third-party service providers, but often don’t have enough cybersecurity knowledge to evaluate what “good” looks like. It’s not just a resource problem—it’s a visibility and literacy problem.</p><p>Furnell emphasizes the potential of automation to lift some of the burden, from automated updates to scheduled malware scans. But he also makes it clear that automated tools can’t fully replace the need for human judgment, especially in scenarios like phishing or social engineering attacks. People still need cybersecurity literacy to recognize and resist threats.</p><p>That’s where the idea of communities of support comes in. Rather than each SME navigating cybersecurity alone, the goal is to create local or sector-based communities where businesses and cybersecurity practitioners can engage in open, non-commercial conversations. These communities would offer SMEs a space to ask questions, share challenges, and exchange practical advice—without pressure, cost, or fear of judgment.</p><p>The initiative isn’t about replacing regulation or mandating compliance. It’s about raising the baseline first. Communities of support can serve as a step toward greater awareness and capability—something that’s especially critical in a world where supply chains are interconnected, and security failures in one small link can ripple outward.</p><p>The message is clear: cybersecurity isn’t just a technical issue—it’s a social one. And it starts by creating room for dialogue, connection, and shared responsibility. Want to know what this model could look like in your community? Tune in to find out.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Steven Furnell | </strong>Professor of Cyber Security at University of Nottingham<br /><a href="https://www.linkedin.com/in/stevenfurnell/" target="_blank">https://www.linkedin.com/in/stevenfurnell/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 15 May 2025 15:28:15 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steven Furnell)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-isolation-to-collaboration-rethinking-cyber-resilience-for-the-real-world-of-small-and-medium-enterprise-infosecurity-europe-2025-pre-event-conversation-with-steven-furnell-on-location-coverage-with-sean-martin-and-marco-ciappelli-ijshWZlK</link>
      <content:encoded><![CDATA[<p>Small and medium-sized enterprises (SMEs) continue to be at a disadvantage when it comes to cybersecurity—not because the risks are unclear, but because the means to address them remain out of reach for many. In this episode, Professor Steven Furnell of the University of Nottingham highlights the real barriers SMEs face and shares the thinking behind a new approach: creating cybersecurity communities of support.</p><p>The research behind this project, supported by the University and its partners, explores how different types of SMEs—micro, small, and medium-sized—struggle with limited time, budget, and expertise. Many rely on third-party service providers, but often don’t have enough cybersecurity knowledge to evaluate what “good” looks like. It’s not just a resource problem—it’s a visibility and literacy problem.</p><p>Furnell emphasizes the potential of automation to lift some of the burden, from automated updates to scheduled malware scans. But he also makes it clear that automated tools can’t fully replace the need for human judgment, especially in scenarios like phishing or social engineering attacks. People still need cybersecurity literacy to recognize and resist threats.</p><p>That’s where the idea of communities of support comes in. Rather than each SME navigating cybersecurity alone, the goal is to create local or sector-based communities where businesses and cybersecurity practitioners can engage in open, non-commercial conversations. These communities would offer SMEs a space to ask questions, share challenges, and exchange practical advice—without pressure, cost, or fear of judgment.</p><p>The initiative isn’t about replacing regulation or mandating compliance. It’s about raising the baseline first. Communities of support can serve as a step toward greater awareness and capability—something that’s especially critical in a world where supply chains are interconnected, and security failures in one small link can ripple outward.</p><p>The message is clear: cybersecurity isn’t just a technical issue—it’s a social one. And it starts by creating room for dialogue, connection, and shared responsibility. Want to know what this model could look like in your community? Tune in to find out.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Steven Furnell | </strong>Professor of Cyber Security at University of Nottingham<br /><a href="https://www.linkedin.com/in/stevenfurnell/" target="_blank">https://www.linkedin.com/in/stevenfurnell/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infosecurity Europe 2025 London coverage: https://www.itspmagazine.com/infosec25</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23153822" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/85b427d9-0976-412f-8765-0d5894807d9c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=85b427d9-0976-412f-8765-0d5894807d9c&amp;feed=2M86zCcc"/>
      <itunes:title>From Isolation to Collaboration: Rethinking Cyber Resilience for the Real World of Small and Medium Enterprise | Infosecurity Europe 2025 Pre-Event Conversation with Steven Furnell | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steven Furnell</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/49ae3186-f46b-479c-ade5-3db9a1fcf665/3000x3000/infosecurity-20eu-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:07</itunes:duration>
      <itunes:summary>Small businesses are often left to navigate cybersecurity alone—but what if they didn’t have to? In this episode, Professor Steven Furnell shares how building local communities of support can empower SMEs to better understand, manage, and collaborate on cybersecurity without needing to be experts themselves.</itunes:summary>
      <itunes:subtitle>Small businesses are often left to navigate cybersecurity alone—but what if they didn’t have to? In this episode, Professor Steven Furnell shares how building local communities of support can empower SMEs to better understand, manage, and collaborate on cybersecurity without needing to be experts themselves.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, infosecurity europe, steven furnell, sean martin, supply chain, automation, cybersecurity, conference, on location, literacy, event coverage, awareness, smes, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>231</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ea4f23e2-175f-4ccc-880c-dd5c93501217</guid>
      <title>The Future Is a Place We Visit, But Never Stay | A Post RSAC Conference 2025 Reflection | A Musing On Society &amp; Technology Newsletter with Marco Ciappelli and TAPE3 | Read by TAPE3</title>
      <description><![CDATA[<p><strong>The Future Is a Place We Visit, But Never Stay</strong><br /><br />May 9, 2025<br /><br /><i><strong>A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other.</strong></i></p><p><i>By Marco Ciappelli | Musing on Society and Technology</i></p><p>Here we are — once again, back from RSAC. Back from the future. Or at least the version of the future that fits inside a conference badge, a branded tote bag, and a hotel bill that makes you wonder if your wallet just got hacked.</p><p>San Francisco is still buzzing with innovation — or at least that’s what the <i>hundreds</i> of self-driving cars swarming the city would have you believe. It’s hard to feel like you’re floating into a Jetsons-style future when your shuttle ride is bouncing through potholes that feel more 1984 than 2049.</p><p>I have to admit, there’s something oddly poetic about hosting a massive cybersecurity event in a city where most attendees would probably rather not be — and yet, here we are. Not for the scenery. Not for the affordability. But because, somehow, for a few intense days, this becomes <i>the place where the future lives</i>.</p><p>And yes, it sometimes looks like a carnival. There are goats. There are puppies. There are LED-lit booths that could double as rave stages. Is this how cybersecurity sells the feeling of safety now? Warm fuzzies and swag you’ll never use? I’m not sure.</p><p>But again: here we are.</p><p>There’s a certain beauty in it. Even the ridiculous bits. Especially the ridiculous bits.</p><p>Personally, I’m grateful for my press badge — it’s not just a backstage pass; it’s a magical talisman that wards off the pitch-slingers. The power of not having a budget is strong with this one.</p><p>But let’s set aside the Frankensteins in the expo hall for a moment.</p><p>Because underneath the spectacle — behind the snacks, the popcorns, the scanners and the sales demos — there is something deeply valuable happening. Something that matters to me. Something that has kept me coming back, year after year, not for the products but for the people. Not for the tech, but for the stories.</p><p>What RSAC Conference gives us — what all good conferences give us — is a window. A quick glimpse through the curtain at what <i>might be</i>.</p><p>And sometimes, if you’re lucky and paying attention, that glimpse stays with you long after the lights go down.</p><p>We have quantum startups talking about cryptographic agility while schools are still banning phones. We have generative AI writing software — code that writes code — while lawmakers print bills that read like they were faxed in from 1992. We have cybersecurity vendors pitching zero trust to rooms full of people still clinging to the fantasy of perimeter defense — not just in networks, but in their thinking.</p><p>We’re trying to build the future on top of a mindset that refuses to update.</p><p>That’s the real threat. Not AI and quantum. Not ransomware. Not the next zero-day.</p><p>It’s the human operating system. It hasn’t been patched in a while.</p><p>And so I ask myself — what are these conferences for, really?</p><p>Because yes, of course, they matter.</p><p>Of course I believe in them — otherwise I wouldn’t be there, recording stories, chasing conversations, sharing a couch and a mic with whoever is bold enough to speak not just about <i>how</i> we fix things, but <i>why</i> we should care at all.</p><p>But I’m also starting to believe that unless we do something more — unless we act on what we learn, build on what we imagine, challenge what we assume — these gatherings will become time capsules. Beautiful, well-produced, highly caffeinated, blinking, noisy time capsules.</p><p>We don’t need more predictions. We need more decisions.</p><p>One of the most compelling conversations I had wasn’t about tech at all. It was about behavior. Human behavior.</p><p>Dr. Jason Nurse reminded us that most people are not just confused by cybersecurity — they’re afraid of it.</p><p>They’re tired.</p><p>They’re overwhelmed.</p><p>And in their confusion, they become unpredictable. Vulnerable.</p><p>Not because they don’t care — but because we haven’t built a system that makes it easy to care.</p><p>That’s a design flaw.</p><p>Elsewhere, I heard the term “AI security debt.” That one stayed with me.</p><p>Because it’s not just technical debt anymore. It’s existential.</p><p>We are creating systems that evolve faster than our ability to understand them — and we’re doing it with the same blind trust we used to install browser toolbars in the ‘90s.</p><p>“Sure, it seems useful. Click accept.”</p><p>We’ve never needed collective wisdom more than we do right now.</p><p>And yet, most of what we build is designed for speed, not wisdom.</p><p>So what do we do?</p><p>We pause. We reflect. We resist the urge to just “move on” to the next conference, the next buzzword, the next promised fix.</p><p>Because the real value of RSAC isn’t in the badge or the swag or the keynotes.</p><p>It’s in the aftershock.</p><p>It’s in what we carry forward, what we refuse to forget, what we dare to question even when the conference is over, the blinking booths vanish, the future packs up early, and the lanyards go into the drawer of forgotten epiphanies — right next to the stress balls, the branded socks and the beautiful prize that you didn't win.</p><p>We’ll be in Barcelona soon. Then London. Then Vegas.</p><p>We’ll gather again. We’ll talk again. But maybe — just maybe — we can start to shift the story.</p><p>From visiting the future… To staying a while.</p><p>Let’s build something we don’t want to walk away from.</p><p><br /> </p><p><i>And now, ladies and gentlemen… the show is over.</i></p><p><i>The lights dim, the music fades, and the future exits stage left...</i></p><p><i>Until we meet again.</i></p><p>—Marco</p><p> </p><p><strong>Resources</strong></p><p><strong>Read first newsletter about RSAC 2025 I wrote last week " </strong>Securing Our Future Without Leaving Half Our Minds in the Past" <a href="https://www.linkedin.com/pulse/securing-our-future-without-leaving-half-minds-past-marco-ciappelli-cry1c/?trackingId=hEUm4XEYQU6kZtzlSCSwPA%3D%3D">https://www.linkedin.com/pulse/securing-our-future-without-leaving-half-minds-past-marco-ciappelli-cry1c/</a></p><p>🎙️ <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage"><strong>Explore Our Full RSAC 2025 Coverage on ITSPmagazine</strong></a></p><p> </p><h3>We would like to thank our full event coverage sponsors and look forward to our On Location conversations</h3><p>Minimize image</p><p>Edit image</p><p>Delete image</p><img src="https://media.licdn.com/dms/image/v2/D5612AQE67tHhDEuQUg/article-inline_image-shrink_1000_1488/B56ZaDPodvGoAQ-/0/1745958639672?e=1752105600&v=beta&t=cy7qDl9h62b9oppO9aKVNleLV61ZWbZFG4XKYBXWE-Q" alt="" /><p><a href="https://www.linkedin.com/company/threatlockerinc/"><strong>ThreatLocker</strong></a>: <a href="https://itspm.ag/threatlocker-r974"><strong>https://itspm.ag/threatlocker-r974</strong></a></p><p><a href="https://www.linkedin.com/company/akamai-technologies/"><strong>Akamai Technologies</strong></a>: <a href="https://itspm.ag/akamailbwc"><strong>https://itspm.ag/akamailbwc</strong></a></p><p><a href="https://www.linkedin.com/company/blackcloak/"><strong>BLACKCLOAK</strong></a>: <a href="https://itspm.ag/itspbcweb"><strong>https://itspm.ag/itspbcweb</strong></a></p><p><a href="https://www.linkedin.com/company/sandboxaq/"><strong>SandboxAQ</strong></a>: <a href="https://itspm.ag/sandboxaq-j2en"><strong>https://itspm.ag/sandboxaq-j2en</strong></a></p><p><a href="https://www.linkedin.com/company/archer-integrated-risk-management/"><strong>Archer Integrated Risk Management</strong></a>: <a href="https://itspm.ag/rsaarchweb"><strong>https://itspm.ag/rsaarchweb</strong></a></p><p><a href="https://www.linkedin.com/company/isaca/"><strong>ISACA</strong></a>: <a href="https://itspm.ag/isaca-96808"><strong>https://itspm.ag/isaca-96808</strong></a></p><p><a href="https://www.linkedin.com/company/objectfirst/"><strong>Object First</strong></a>: <a href="https://itspm.ag/object-first-2gjl"><strong>https://itspm.ag/object-first-2gjl</strong></a></p><p><a href="https://www.linkedin.com/company/edera-dev/"><strong>Edera</strong></a>: <a href="https://itspm.ag/edera-434868"><strong>https://itspm.ag/edera-434868</strong></a></p><p><br /> </p><p><strong>... and thank you to our event briefing partners, with whom we will also record On Location briefings</strong></p><img src="https://media.licdn.com/dms/image/v2/D5612AQH_JDURSTuK0w/article-inline_image-shrink_1500_2232/B56ZaDPodmGoAU-/0/1745958637341?e=1752105600&v=beta&t=p1d5IOf8O2FZX4ZSrn78P2gd6dGaLuEOBLqCO2q4deg" alt="" /><p><a href="https://www.linkedin.com/company/infinidat/"><strong>Infinidat</strong></a>: <a href="https://itspm.ag/infini3o5d"><strong>https://itspm.ag/infini3o5d</strong></a></p><p><a href="https://www.linkedin.com/company/coalfire/"><strong>Coalfire</strong></a>: <a href="https://itspm.ag/coalfire-yj4w"><strong>https://itspm.ag/coalfire-yj4w</strong></a></p><p><a href="https://www.linkedin.com/company/manageengine/"><strong>ManageEngine</strong></a>: <a href="https://itspm.ag/manageen-631623"><strong>https://itspm.ag/manageen-631623</strong></a></p><p><a href="https://www.linkedin.com/company/detecteam/"><strong>Detecteam</strong></a>: <a href="https://itspm.ag/detecteam-21686"><strong>https://itspm.ag/detecteam-21686</strong></a></p><p><a href="https://www.linkedin.com/company/stellarcyber/"><strong>Stellar Cyber</strong></a>: <a href="https://itspm.ag/stellar-cyber--inc--357947"><strong>https://itspm.ag/stellar-cyber--inc--357947</strong></a></p><p><a href="https://www.linkedin.com/company/qualys/"><strong>Qualys</strong></a>: <a href="https://itspm.ag/qualys-908446"><strong>https://itspm.ag/qualys-908446</strong></a></p><p><a href="https://www.linkedin.com/company/corelight/"><strong>Corelight</strong></a>: <a href="https://itspm.ag/coreligh-954270"><strong>https://itspm.ag/coreligh-954270</strong></a></p><p><a href="https://www.linkedin.com/company/anomali/"><strong>Anomali</strong></a>: <a href="https://itspm.ag/anomali-bdz393"><strong>https://itspm.ag/anomali-bdz393</strong></a></p><p> </p><p>And ... <strong>we're not done yet</strong> ... stay tuned and follow <strong>Sean and Marco</strong> as they will be <strong>On Location</strong> at the following conferences over the next few months:</p><p>➤ <a href="https://www.linkedin.com/company/infosecurity-europe/"><strong>Infosecurity Europe</strong></a> in London in June: <a href="https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage"><strong>https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage</strong></a></p><p>➤ <a href="https://www.linkedin.com/company/owasp/"><strong>OWASP® Foundation</strong></a> AppSec Global in Barcelona in May: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain"><strong>https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</strong></a></p><p>➤ <a href="https://www.linkedin.com/company/black-hat/"><strong>Black Hat</strong></a><strong> </strong>USA in Las Vegas in August: <a href="https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas"><strong>https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas</strong></a></p><p> </p><h3>FOLLOW ALL OF OUR ON LOCATION CONFERENCE COVERAGE</h3><p><a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p> </p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>As always, let's keep thinking!</p><p>— Marco [<a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a>]</p><p>_________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 10 May 2025 00:58:50 +0000</pubDate>
      <author>contact@itspmagazine.com (tape3, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-future-is-a-place-we-visit-but-never-stay-a-post-rsac-conference-2025-reflection-a-musing-on-society-technology-newsletter-with-marco-ciappelli-and-tape3-read-by-tape3-vnevbknY</link>
      <content:encoded><![CDATA[<p><strong>The Future Is a Place We Visit, But Never Stay</strong><br /><br />May 9, 2025<br /><br /><i><strong>A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other.</strong></i></p><p><i>By Marco Ciappelli | Musing on Society and Technology</i></p><p>Here we are — once again, back from RSAC. Back from the future. Or at least the version of the future that fits inside a conference badge, a branded tote bag, and a hotel bill that makes you wonder if your wallet just got hacked.</p><p>San Francisco is still buzzing with innovation — or at least that’s what the <i>hundreds</i> of self-driving cars swarming the city would have you believe. It’s hard to feel like you’re floating into a Jetsons-style future when your shuttle ride is bouncing through potholes that feel more 1984 than 2049.</p><p>I have to admit, there’s something oddly poetic about hosting a massive cybersecurity event in a city where most attendees would probably rather not be — and yet, here we are. Not for the scenery. Not for the affordability. But because, somehow, for a few intense days, this becomes <i>the place where the future lives</i>.</p><p>And yes, it sometimes looks like a carnival. There are goats. There are puppies. There are LED-lit booths that could double as rave stages. Is this how cybersecurity sells the feeling of safety now? Warm fuzzies and swag you’ll never use? I’m not sure.</p><p>But again: here we are.</p><p>There’s a certain beauty in it. Even the ridiculous bits. Especially the ridiculous bits.</p><p>Personally, I’m grateful for my press badge — it’s not just a backstage pass; it’s a magical talisman that wards off the pitch-slingers. The power of not having a budget is strong with this one.</p><p>But let’s set aside the Frankensteins in the expo hall for a moment.</p><p>Because underneath the spectacle — behind the snacks, the popcorns, the scanners and the sales demos — there is something deeply valuable happening. Something that matters to me. Something that has kept me coming back, year after year, not for the products but for the people. Not for the tech, but for the stories.</p><p>What RSAC Conference gives us — what all good conferences give us — is a window. A quick glimpse through the curtain at what <i>might be</i>.</p><p>And sometimes, if you’re lucky and paying attention, that glimpse stays with you long after the lights go down.</p><p>We have quantum startups talking about cryptographic agility while schools are still banning phones. We have generative AI writing software — code that writes code — while lawmakers print bills that read like they were faxed in from 1992. We have cybersecurity vendors pitching zero trust to rooms full of people still clinging to the fantasy of perimeter defense — not just in networks, but in their thinking.</p><p>We’re trying to build the future on top of a mindset that refuses to update.</p><p>That’s the real threat. Not AI and quantum. Not ransomware. Not the next zero-day.</p><p>It’s the human operating system. It hasn’t been patched in a while.</p><p>And so I ask myself — what are these conferences for, really?</p><p>Because yes, of course, they matter.</p><p>Of course I believe in them — otherwise I wouldn’t be there, recording stories, chasing conversations, sharing a couch and a mic with whoever is bold enough to speak not just about <i>how</i> we fix things, but <i>why</i> we should care at all.</p><p>But I’m also starting to believe that unless we do something more — unless we act on what we learn, build on what we imagine, challenge what we assume — these gatherings will become time capsules. Beautiful, well-produced, highly caffeinated, blinking, noisy time capsules.</p><p>We don’t need more predictions. We need more decisions.</p><p>One of the most compelling conversations I had wasn’t about tech at all. It was about behavior. Human behavior.</p><p>Dr. Jason Nurse reminded us that most people are not just confused by cybersecurity — they’re afraid of it.</p><p>They’re tired.</p><p>They’re overwhelmed.</p><p>And in their confusion, they become unpredictable. Vulnerable.</p><p>Not because they don’t care — but because we haven’t built a system that makes it easy to care.</p><p>That’s a design flaw.</p><p>Elsewhere, I heard the term “AI security debt.” That one stayed with me.</p><p>Because it’s not just technical debt anymore. It’s existential.</p><p>We are creating systems that evolve faster than our ability to understand them — and we’re doing it with the same blind trust we used to install browser toolbars in the ‘90s.</p><p>“Sure, it seems useful. Click accept.”</p><p>We’ve never needed collective wisdom more than we do right now.</p><p>And yet, most of what we build is designed for speed, not wisdom.</p><p>So what do we do?</p><p>We pause. We reflect. We resist the urge to just “move on” to the next conference, the next buzzword, the next promised fix.</p><p>Because the real value of RSAC isn’t in the badge or the swag or the keynotes.</p><p>It’s in the aftershock.</p><p>It’s in what we carry forward, what we refuse to forget, what we dare to question even when the conference is over, the blinking booths vanish, the future packs up early, and the lanyards go into the drawer of forgotten epiphanies — right next to the stress balls, the branded socks and the beautiful prize that you didn't win.</p><p>We’ll be in Barcelona soon. Then London. Then Vegas.</p><p>We’ll gather again. We’ll talk again. But maybe — just maybe — we can start to shift the story.</p><p>From visiting the future… To staying a while.</p><p>Let’s build something we don’t want to walk away from.</p><p><br /> </p><p><i>And now, ladies and gentlemen… the show is over.</i></p><p><i>The lights dim, the music fades, and the future exits stage left...</i></p><p><i>Until we meet again.</i></p><p>—Marco</p><p> </p><p><strong>Resources</strong></p><p><strong>Read first newsletter about RSAC 2025 I wrote last week " </strong>Securing Our Future Without Leaving Half Our Minds in the Past" <a href="https://www.linkedin.com/pulse/securing-our-future-without-leaving-half-minds-past-marco-ciappelli-cry1c/?trackingId=hEUm4XEYQU6kZtzlSCSwPA%3D%3D">https://www.linkedin.com/pulse/securing-our-future-without-leaving-half-minds-past-marco-ciappelli-cry1c/</a></p><p>🎙️ <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage"><strong>Explore Our Full RSAC 2025 Coverage on ITSPmagazine</strong></a></p><p> </p><h3>We would like to thank our full event coverage sponsors and look forward to our On Location conversations</h3><p>Minimize image</p><p>Edit image</p><p>Delete image</p><img src="https://media.licdn.com/dms/image/v2/D5612AQE67tHhDEuQUg/article-inline_image-shrink_1000_1488/B56ZaDPodvGoAQ-/0/1745958639672?e=1752105600&v=beta&t=cy7qDl9h62b9oppO9aKVNleLV61ZWbZFG4XKYBXWE-Q" alt="" /><p><a href="https://www.linkedin.com/company/threatlockerinc/"><strong>ThreatLocker</strong></a>: <a href="https://itspm.ag/threatlocker-r974"><strong>https://itspm.ag/threatlocker-r974</strong></a></p><p><a href="https://www.linkedin.com/company/akamai-technologies/"><strong>Akamai Technologies</strong></a>: <a href="https://itspm.ag/akamailbwc"><strong>https://itspm.ag/akamailbwc</strong></a></p><p><a href="https://www.linkedin.com/company/blackcloak/"><strong>BLACKCLOAK</strong></a>: <a href="https://itspm.ag/itspbcweb"><strong>https://itspm.ag/itspbcweb</strong></a></p><p><a href="https://www.linkedin.com/company/sandboxaq/"><strong>SandboxAQ</strong></a>: <a href="https://itspm.ag/sandboxaq-j2en"><strong>https://itspm.ag/sandboxaq-j2en</strong></a></p><p><a href="https://www.linkedin.com/company/archer-integrated-risk-management/"><strong>Archer Integrated Risk Management</strong></a>: <a href="https://itspm.ag/rsaarchweb"><strong>https://itspm.ag/rsaarchweb</strong></a></p><p><a href="https://www.linkedin.com/company/isaca/"><strong>ISACA</strong></a>: <a href="https://itspm.ag/isaca-96808"><strong>https://itspm.ag/isaca-96808</strong></a></p><p><a href="https://www.linkedin.com/company/objectfirst/"><strong>Object First</strong></a>: <a href="https://itspm.ag/object-first-2gjl"><strong>https://itspm.ag/object-first-2gjl</strong></a></p><p><a href="https://www.linkedin.com/company/edera-dev/"><strong>Edera</strong></a>: <a href="https://itspm.ag/edera-434868"><strong>https://itspm.ag/edera-434868</strong></a></p><p><br /> </p><p><strong>... and thank you to our event briefing partners, with whom we will also record On Location briefings</strong></p><img src="https://media.licdn.com/dms/image/v2/D5612AQH_JDURSTuK0w/article-inline_image-shrink_1500_2232/B56ZaDPodmGoAU-/0/1745958637341?e=1752105600&v=beta&t=p1d5IOf8O2FZX4ZSrn78P2gd6dGaLuEOBLqCO2q4deg" alt="" /><p><a href="https://www.linkedin.com/company/infinidat/"><strong>Infinidat</strong></a>: <a href="https://itspm.ag/infini3o5d"><strong>https://itspm.ag/infini3o5d</strong></a></p><p><a href="https://www.linkedin.com/company/coalfire/"><strong>Coalfire</strong></a>: <a href="https://itspm.ag/coalfire-yj4w"><strong>https://itspm.ag/coalfire-yj4w</strong></a></p><p><a href="https://www.linkedin.com/company/manageengine/"><strong>ManageEngine</strong></a>: <a href="https://itspm.ag/manageen-631623"><strong>https://itspm.ag/manageen-631623</strong></a></p><p><a href="https://www.linkedin.com/company/detecteam/"><strong>Detecteam</strong></a>: <a href="https://itspm.ag/detecteam-21686"><strong>https://itspm.ag/detecteam-21686</strong></a></p><p><a href="https://www.linkedin.com/company/stellarcyber/"><strong>Stellar Cyber</strong></a>: <a href="https://itspm.ag/stellar-cyber--inc--357947"><strong>https://itspm.ag/stellar-cyber--inc--357947</strong></a></p><p><a href="https://www.linkedin.com/company/qualys/"><strong>Qualys</strong></a>: <a href="https://itspm.ag/qualys-908446"><strong>https://itspm.ag/qualys-908446</strong></a></p><p><a href="https://www.linkedin.com/company/corelight/"><strong>Corelight</strong></a>: <a href="https://itspm.ag/coreligh-954270"><strong>https://itspm.ag/coreligh-954270</strong></a></p><p><a href="https://www.linkedin.com/company/anomali/"><strong>Anomali</strong></a>: <a href="https://itspm.ag/anomali-bdz393"><strong>https://itspm.ag/anomali-bdz393</strong></a></p><p> </p><p>And ... <strong>we're not done yet</strong> ... stay tuned and follow <strong>Sean and Marco</strong> as they will be <strong>On Location</strong> at the following conferences over the next few months:</p><p>➤ <a href="https://www.linkedin.com/company/infosecurity-europe/"><strong>Infosecurity Europe</strong></a> in London in June: <a href="https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage"><strong>https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage</strong></a></p><p>➤ <a href="https://www.linkedin.com/company/owasp/"><strong>OWASP® Foundation</strong></a> AppSec Global in Barcelona in May: <a href="https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain"><strong>https://www.itspmagazine.com/owasp-global-appsec-barcelona-2025-application-security-event-coverage-in-catalunya-spain</strong></a></p><p>➤ <a href="https://www.linkedin.com/company/black-hat/"><strong>Black Hat</strong></a><strong> </strong>USA in Las Vegas in August: <a href="https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas"><strong>https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas</strong></a></p><p> </p><h3>FOLLOW ALL OF OUR ON LOCATION CONFERENCE COVERAGE</h3><p><a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage"><strong>https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</strong></a></p><p> </p><p><strong>Share this newsletter and invite anyone you think would enjoy it!</strong></p><p>As always, let's keep thinking!</p><p>— Marco [<a href="https://www.marcociappelli.com/">https://www.marcociappelli.com</a>]</p><p>_________________________________________________</p><p>This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p><a href="https://www.linkedin.com/in/marco-ciappelli/">Marco Ciappelli</a> | Co-Founder, Creative Director & CMO <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#">ITSPmagazine</a>  | Dr. in Political Science / Sociology of Communication l Branding | Content Marketing | Storyteller | My Podcasts: Redefining Society & Technology / Audio Signals / + | <a href="https://www.marcociappelli.com/">MarcoCiappelli.com</a></p><p><strong>TAPE3</strong> is the Artificial Intelligence behind ITSPmagazine—created to be a personal assistant, writing and design collaborator, research companion, brainstorming partner… and, apparently, something new every single day.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/">subscribe</a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/">Musing On Society & Technology</a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7224049" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/87004c57-3374-4ffe-8d43-8d0f668d4a74/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=87004c57-3374-4ffe-8d43-8d0f668d4a74&amp;feed=2M86zCcc"/>
      <itunes:title>The Future Is a Place We Visit, But Never Stay | A Post RSAC Conference 2025 Reflection | A Musing On Society &amp; Technology Newsletter with Marco Ciappelli and TAPE3 | Read by TAPE3</itunes:title>
      <itunes:author>tape3, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/b5cf6086-bbe2-4027-890a-5db8d5fb1d72/3000x3000/rsac-202025-20recap-20newsletter-20m.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:31</itunes:duration>
      <itunes:summary>The Future Is a Place We Visit, But Never Stay | May 9, 2025 | A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other. | 
By Marco Ciappelli | Musing on Society and Technology</itunes:summary>
      <itunes:subtitle>The Future Is a Place We Visit, But Never Stay | May 9, 2025 | A Post-RSAC 2025 Reflection on the Kinda Funny and Pretty Weird Ways Society, Technology, and Cybersecurity Intersect, Interact, and Often Simply Ignore Each Other. | 
By Marco Ciappelli | Musing on Society and Technology</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, tech, infosec, cybersecurity, technology podcast, rsac conference 2025, rsac, cybersecurity conference, rsac2025, podcast, society &amp; technology, cybersecurity &amp; society</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>230</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b1b9daf7-fdcd-4acd-91ed-9e85dec0822a</guid>
      <title>Why We Can’t Completely Trust the Intern (Even If It’s AI) | An RSAC Conference 2025 Conversation with Alex Kreilein and John Sapp Jr. | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>When artificial intelligence can generate code, write tests, and even simulate threat models, how do we still ensure security? That’s the question John Sapp Jr. and Alex Kreilein examine in this energizing conversation about trust, risk management, and the future of application security.</p><p>The conversation opens with a critical concern: not just how to adopt AI securely, but how to use it responsibly. Alex underscores the importance of asking a simple question often overlooked—why do you trust this output? That mindset, he argues, is fundamental to building responsible systems, especially when models are generating code or influencing decisions at scale.</p><p>Their conversation surfaces an emerging gap between automation and assurance. AI tools promise speed and performance, but that speed introduces risk if teams are too quick to assume accuracy or ignore validation. John and Alex discuss this trust gap and how the zero trust mindset—so common in network security—must now apply to AI models and agents, too.</p><p>They share a key concern: technical debt is back, this time in the form of “AI security debt”—risk accumulating faster than most teams can keep up with. But it’s not all gloom. They highlight real opportunities for security and development teams to reprioritize: moving away from chasing every CVE and toward higher-value work like architecture reviews and resiliency planning.</p><p>The conversation then shifts to the foundation of true resilience. For Alex, resilience isn’t about perfection—it’s about recovery and response. He pushes for embedding threat modeling into unit testing, not just as an afterthought but as part of modern development. John emphasizes traceability and governance across the organization: ensuring the top understands what’s at stake at the bottom, and vice versa.</p><p>One message is clear: context matters. CVSS scores, AI outputs, scanner alerts—all of it must be interpreted through the lens of business impact. That’s the art of security today.</p><p>Ready to challenge your assumptions about secure AI and modern AppSec? This episode will make you question what you trust—and how you build.</p><p><strong>___________</strong><br /><br /><strong>Guests: </strong></p><p><strong>Alex Kreilein</strong>, Vice President of Product Security, Qualys | <a href="https://www.linkedin.com/in/alexkreilein/">https://www.linkedin.com/in/alexkreilein/</a></p><p><strong>John Sapp Jr.</strong>, Vice President, Information Security & CISO, Texas Mutual Insurance Company | <a href="https://www.linkedin.com/in/johnbsappjr/">https://www.linkedin.com/in/johnbsappjr/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>JP Morgan Chase Open Letter: An open letter to third-party suppliers: <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, phillip miller, rsac 2025, cybersecurity, ciso, startups, risk, marketplace, leadership, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 May 2025 19:29:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, John Sapp Jr., Alex Kreilein)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-we-cant-completely-trust-the-intern-even-if-its-ai-an-rsac-conference-2025-conversation-with-alex-kreilein-and-john-sapp-jr-on-location-coverage-with-sean-martin-and-marco-ciappelli-JZYXkRT1</link>
      <content:encoded><![CDATA[<p>When artificial intelligence can generate code, write tests, and even simulate threat models, how do we still ensure security? That’s the question John Sapp Jr. and Alex Kreilein examine in this energizing conversation about trust, risk management, and the future of application security.</p><p>The conversation opens with a critical concern: not just how to adopt AI securely, but how to use it responsibly. Alex underscores the importance of asking a simple question often overlooked—why do you trust this output? That mindset, he argues, is fundamental to building responsible systems, especially when models are generating code or influencing decisions at scale.</p><p>Their conversation surfaces an emerging gap between automation and assurance. AI tools promise speed and performance, but that speed introduces risk if teams are too quick to assume accuracy or ignore validation. John and Alex discuss this trust gap and how the zero trust mindset—so common in network security—must now apply to AI models and agents, too.</p><p>They share a key concern: technical debt is back, this time in the form of “AI security debt”—risk accumulating faster than most teams can keep up with. But it’s not all gloom. They highlight real opportunities for security and development teams to reprioritize: moving away from chasing every CVE and toward higher-value work like architecture reviews and resiliency planning.</p><p>The conversation then shifts to the foundation of true resilience. For Alex, resilience isn’t about perfection—it’s about recovery and response. He pushes for embedding threat modeling into unit testing, not just as an afterthought but as part of modern development. John emphasizes traceability and governance across the organization: ensuring the top understands what’s at stake at the bottom, and vice versa.</p><p>One message is clear: context matters. CVSS scores, AI outputs, scanner alerts—all of it must be interpreted through the lens of business impact. That’s the art of security today.</p><p>Ready to challenge your assumptions about secure AI and modern AppSec? This episode will make you question what you trust—and how you build.</p><p><strong>___________</strong><br /><br /><strong>Guests: </strong></p><p><strong>Alex Kreilein</strong>, Vice President of Product Security, Qualys | <a href="https://www.linkedin.com/in/alexkreilein/">https://www.linkedin.com/in/alexkreilein/</a></p><p><strong>John Sapp Jr.</strong>, Vice President, Information Security & CISO, Texas Mutual Insurance Company | <a href="https://www.linkedin.com/in/johnbsappjr/">https://www.linkedin.com/in/johnbsappjr/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>JP Morgan Chase Open Letter: An open letter to third-party suppliers: <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, phillip miller, rsac 2025, cybersecurity, ciso, startups, risk, marketplace, leadership, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14805869" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/020202dd-1674-4c76-ae5f-2d757c52b4f0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=020202dd-1674-4c76-ae5f-2d757c52b4f0&amp;feed=2M86zCcc"/>
      <itunes:title>Why We Can’t Completely Trust the Intern (Even If It’s AI) | An RSAC Conference 2025 Conversation with Alex Kreilein and John Sapp Jr. | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, John Sapp Jr., Alex Kreilein</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:25</itunes:duration>
      <itunes:summary>What happens when AI writes your code—but you’re not sure you can trust it? In this episode, Sean Martin sits down with Alex Kreilein and John Sapp Jr. to unpack how zero trust thinking, threat modeling, and quality management are essential to building resilient, secure systems in an AI-driven world.</itunes:summary>
      <itunes:subtitle>What happens when AI writes your code—but you’re not sure you can trust it? In this episode, Sean Martin sits down with Alex Kreilein and John Sapp Jr. to unpack how zero trust thinking, threat modeling, and quality management are essential to building resilient, secure systems in an AI-driven world.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, leadership, rsac 2025, ciso, sean martin, marketplace, cybersecurity, phillip miller, conference, on location, event coverage, startups, risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>229</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5fb7c8cd-c102-499a-8291-24a00f389a70</guid>
      <title>The Hidden Cost of Closing the Door on Innovation | An RSAC Conference 2025 Conversation with Phillip Miller | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode of On Location at RSAC Conference 2025, Phillip Miller—Chief Information Security Officer and founder of Corporal—offers a candid and practical look at the current realities of cybersecurity leadership, innovation ecosystems, and the business-first mindset required to drive effective security outcomes.</p><p>With a unique background that blends enterprise cybersecurity leadership and hands-on work on his Virginia farm, Miller brings a grounded perspective to the CISO role. Over the past 18 months, he stepped away from a traditional enterprise seat to work directly with startups through his company, advising them on how to align their offerings with the real needs of security teams. His return to a full-time CISO position follows that immersive experience, giving him a renewed sense of what enterprise security leaders are missing when they close themselves off from emerging technology vendors.</p><p><strong>Shifting the Buying Conversation</strong></p><p>One of Miller’s strongest messages is that buying decisions should start with the security team—not just the CISO. Too often, tools are purchased at the top and handed down without enough input from those who will actually use them. Miller stresses that founders who are selling into the enterprise need to solve real problems with real people—and CISOs should invite that dialogue rather than block it.</p><p>He also encourages CISOs to think beyond the big names. While legacy providers are often the default, marketplace ecosystems (like AWS or GCP) and accelerator programs (such as those run by CrowdStrike) offer curated, credible entry points to newer solutions. These platforms can streamline the validation process while introducing fresh capabilities that legacy tools may lack.</p><p><strong>Lead With the Business, Not the Tech</strong></p><p>For Miller, the CISO’s most valuable contribution is helping business leaders understand their own risks—especially the ones they don’t associate with cybersecurity. By starting with “What are your biggest non-cyber risks?” Miller helps organizations connect the dots between core operations and digital exposure.</p><p>Whether working in manufacturing, retail, or financial services, his approach remains consistent: understand how the business creates value, then align security programs and tooling accordingly. The tech, he reminds us, comes second.</p><p>Catch the full conversation to hear more on third-party risk, building high-functioning teams, and why peer conversations at conferences like RSAC are essential to the health of the cybersecurity community.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong></p><p><strong>Phillip Miller,</strong> CISO and founder of Qurple | https://www.linkedin.com/in/pemiller/</p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, phillip miller, rsac 2025, cybersecurity, ciso, startups, risk, marketplace, leadership, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 23:13:01 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Marco Ciappelli, ITSpmagazine, Phillip Miller)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-hidden-cost-of-closing-the-door-on-innovation-an-rsac-conference-2025-conversation-with-phillip-miller-on-location-coverage-with-sean-martin-and-marco-ciappelli-R6QgwO14</link>
      <content:encoded><![CDATA[<p>In this episode of On Location at RSAC Conference 2025, Phillip Miller—Chief Information Security Officer and founder of Corporal—offers a candid and practical look at the current realities of cybersecurity leadership, innovation ecosystems, and the business-first mindset required to drive effective security outcomes.</p><p>With a unique background that blends enterprise cybersecurity leadership and hands-on work on his Virginia farm, Miller brings a grounded perspective to the CISO role. Over the past 18 months, he stepped away from a traditional enterprise seat to work directly with startups through his company, advising them on how to align their offerings with the real needs of security teams. His return to a full-time CISO position follows that immersive experience, giving him a renewed sense of what enterprise security leaders are missing when they close themselves off from emerging technology vendors.</p><p><strong>Shifting the Buying Conversation</strong></p><p>One of Miller’s strongest messages is that buying decisions should start with the security team—not just the CISO. Too often, tools are purchased at the top and handed down without enough input from those who will actually use them. Miller stresses that founders who are selling into the enterprise need to solve real problems with real people—and CISOs should invite that dialogue rather than block it.</p><p>He also encourages CISOs to think beyond the big names. While legacy providers are often the default, marketplace ecosystems (like AWS or GCP) and accelerator programs (such as those run by CrowdStrike) offer curated, credible entry points to newer solutions. These platforms can streamline the validation process while introducing fresh capabilities that legacy tools may lack.</p><p><strong>Lead With the Business, Not the Tech</strong></p><p>For Miller, the CISO’s most valuable contribution is helping business leaders understand their own risks—especially the ones they don’t associate with cybersecurity. By starting with “What are your biggest non-cyber risks?” Miller helps organizations connect the dots between core operations and digital exposure.</p><p>Whether working in manufacturing, retail, or financial services, his approach remains consistent: understand how the business creates value, then align security programs and tooling accordingly. The tech, he reminds us, comes second.</p><p>Catch the full conversation to hear more on third-party risk, building high-functioning teams, and why peer conversations at conferences like RSAC are essential to the health of the cybersecurity community.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong></p><p><strong>Phillip Miller,</strong> CISO and founder of Qurple | https://www.linkedin.com/in/pemiller/</p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, phillip miller, rsac 2025, cybersecurity, ciso, startups, risk, marketplace, leadership, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25148693" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9392ad02-2d6e-4b0c-839d-4ed80c031bf3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9392ad02-2d6e-4b0c-839d-4ed80c031bf3&amp;feed=2M86zCcc"/>
      <itunes:title>The Hidden Cost of Closing the Door on Innovation | An RSAC Conference 2025 Conversation with Phillip Miller | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, Marco Ciappelli, ITSpmagazine, Phillip Miller</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:11</itunes:duration>
      <itunes:summary>Phillip Miller, CISO and founder of Qurple, shares how stepping outside the enterprise helped him reconnect with what security teams and startups really need—and why that perspective is critical for making better cybersecurity decisions. This episode explores how CISOs can better engage their teams, understand the business, and unlock the value of emerging tech without getting lost in feature sprawl.</itunes:summary>
      <itunes:subtitle>Phillip Miller, CISO and founder of Qurple, shares how stepping outside the enterprise helped him reconnect with what security teams and startups really need—and why that perspective is critical for making better cybersecurity decisions. This episode explores how CISOs can better engage their teams, understand the business, and unlock the value of emerging tech without getting lost in feature sprawl.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, leadership, rsac 2025, ciso, sean martin, marketplace, cybersecurity, phillip miller, conference, on location, event coverage, startups, risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>228</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ba51109-46a4-4300-a290-8f0a2ff3458f</guid>
      <title>Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity’s detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?</p><p>The Detecteam founders challenge the industry’s obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.</p><p>At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It’s about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.</p><p>Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they’ve built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.</p><p>Fred explains the benefit in terms any CISO can understand: this isn’t just detection—it’s readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That’s a tangible advantage, especially when operating with limited personnel.</p><p>This conversation isn’t about a silver bullet or more noise—it’s about clarity. What’s working? What’s not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that’s faster, smarter, and grounded in reality.</p><p>Learn more about Detecteam: <a href="https://itspm.ag/detecteam-21686">https://itspm.ag/detecteam-21686</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Fred Wilmot</strong>, Co-Founder & CEO, Detecteam | <a href="https://www.linkedin.com/in/fredwilmot/">https://www.linkedin.com/in/fredwilmot/</a></p><p><strong>Sebastien Tricaud</strong>, Co-Founder & CTO, Detecteam | <a href="https://www.linkedin.com/in/tricaud/">https://www.linkedin.com/in/tricaud/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Detecteam: <a href="https://www.itspmagazine.com/directory/detecteam">https://www.itspmagazine.com/directory/detecteam</a></p><p>Webinar: Rethink, Don’t Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | <a href="https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634">https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 04:28:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Detecteam, Sebastien Tricaud, Fred Wilmot)</author>
      <link>https://eventcoveragepodcast.com/episodes/fixing-the-detection-disconnect-and-rethinking-detection-from-static-rules-to-living-signals-a-brand-story-with-fred-wilmot-from-detecteam-an-on-location-rsac-conference-2025-brand-story-246IMRNr</link>
      <content:encoded><![CDATA[<p>Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity’s detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?</p><p>The Detecteam founders challenge the industry’s obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.</p><p>At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It’s about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.</p><p>Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they’ve built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.</p><p>Fred explains the benefit in terms any CISO can understand: this isn’t just detection—it’s readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That’s a tangible advantage, especially when operating with limited personnel.</p><p>This conversation isn’t about a silver bullet or more noise—it’s about clarity. What’s working? What’s not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that’s faster, smarter, and grounded in reality.</p><p>Learn more about Detecteam: <a href="https://itspm.ag/detecteam-21686">https://itspm.ag/detecteam-21686</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Fred Wilmot</strong>, Co-Founder & CEO, Detecteam | <a href="https://www.linkedin.com/in/fredwilmot/">https://www.linkedin.com/in/fredwilmot/</a></p><p><strong>Sebastien Tricaud</strong>, Co-Founder & CTO, Detecteam | <a href="https://www.linkedin.com/in/tricaud/">https://www.linkedin.com/in/tricaud/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Detecteam: <a href="https://www.itspmagazine.com/directory/detecteam">https://www.itspmagazine.com/directory/detecteam</a></p><p>Webinar: Rethink, Don’t Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | <a href="https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634">https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20699512" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4b70abe4-2e76-404e-a6c2-4a330238cbfe/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4b70abe4-2e76-404e-a6c2-4a330238cbfe&amp;feed=2M86zCcc"/>
      <itunes:title>Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Detecteam, Sebastien Tricaud, Fred Wilmot</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:33</itunes:duration>
      <itunes:summary>Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay ahead of adversaries, this conversation is for you.</itunes:summary>
      <itunes:subtitle>Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay ahead of adversaries, this conversation is for you.</itunes:subtitle>
      <itunes:keywords>behavior, blue team, marketing podcast, sean martin, automation, cybersecurity, detection, detecteam, fred wilmot, brand marketing, sebastien tricaud, red team, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>227</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9cc7f136-6d10-4818-9c4e-45985848dd44</guid>
      <title>Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this episode, Subo Guha, Senior Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber’s mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.</p><p>Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform’s modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.</p><p>One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.</p><p>The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber’s strong commitment to ecosystem support and customer-centric growth.</p><p>Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It’s a clear statement: powerful security doesn’t need to be out of reach for smaller teams or companies.</p><p>This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.</p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 03:12:05 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Subo Guha, Stellar Cyber)</author>
      <link>https://eventcoveragepodcast.com/episodes/simplifying-cybersecurity-operations-at-scale-automation-with-a-human-touch-a-brand-story-with-subo-guha-from-stellar-cyber-an-on-location-rsac-conference-2025-brand-story-OI6tgcAJ</link>
      <content:encoded><![CDATA[<p>In this episode, Subo Guha, Senior Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber’s mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.</p><p>Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform’s modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.</p><p>One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.</p><p>The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber’s strong commitment to ecosystem support and customer-centric growth.</p><p>Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It’s a clear statement: powerful security doesn’t need to be out of reach for smaller teams or companies.</p><p>This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.</p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18863838" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1b268ff5-4873-4e1e-950c-4b1c99870df4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1b268ff5-4873-4e1e-950c-4b1c99870df4&amp;feed=2M86zCcc"/>
      <itunes:title>Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Subo Guha, Stellar Cyber</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:38</itunes:duration>
      <itunes:summary>Stellar Cyber’s Subo Guha outlines how their open XDR platform and new autonomous SOC features are making enterprise-grade cybersecurity achievable for MSSPs and the organizations they support. By combining flexible integrations, case-based alerting, and hyper automation, Stellar Cyber is redefining how security operations can scale without overwhelming human teams.</itunes:summary>
      <itunes:subtitle>Stellar Cyber’s Subo Guha outlines how their open XDR platform and new autonomous SOC features are making enterprise-grade cybersecurity achievable for MSSPs and the organizations they support. By combining flexible integrations, case-based alerting, and hyper automation, Stellar Cyber is redefining how security operations can scale without overwhelming human teams.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, automation, threat detection, subo guha, cybersecurity, ot, soc, brand marketing, ai, brand story podcast, brand story, mssp, xdr</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>226</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce1b7584-2984-48f4-b824-e8455a61da89</guid>
      <title>From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes.</p><p>ManageEngine, a division of Zoho Corporation, now offers a suite of over 60 products that span identity and access management, SIEM, endpoint protection, service management, and analytics. These components don’t just coexist—they interact contextually. Vivin outlines a real-world example from the healthcare sector, where a SIM tool detects abnormal login behavior, triggers an identity system to challenge access, and then logs the incident for IT service resolution. This integrated chain reflects a philosophy where response is not just fast, but connected and accountable.</p><p>At the heart of the platform’s effectiveness is contextual intelligence—layered between artificial intelligence and business insights—to power decision-making that aligns with enterprise risk and compliance needs. Whether it’s SOC analysts triaging events, CIS admins handling system hygiene, or CISOs aligning actions with corporate goals, the tools are tailored to fit roles, not just generic functions. According to Vivin, this role-based approach is critical to eliminating silos and ensuring teams speak the same operational and risk language.</p><p>AI continues to play a role in enhancing that coordination, but ManageEngine is cautious not to follow hype for its own sake. The company has invested in its own AI and ML capabilities since 2012, and recently launched an agent studio—but only after evaluating how new models can meaningfully add value. Vivin points out that enterprise use cases often benefit more from small, purpose-built language models than from massive general-purpose ones.</p><p>Perhaps most compelling is ManageEngine’s global-first strategy. With operations in nearly 190 countries and 18+ of its own data centers, the company prioritizes proximity to customers—not just for technical support, but for cultural understanding and local compliance. That closeness informs both product design and customer trust, especially as regulations around data sovereignty intensify.</p><p>This episode challenges listeners to consider whether their tools are merely present—or actually connected. Are you enabling collaboration through context, or just stitching systems together and calling it a platform?</p><p>Learn more about ManageEngine: <a href="https://itspm.ag/manageen-631623">https://itspm.ag/manageen-631623</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Vivin Sathyan</strong>, Senior Technology Evangelist, ManageEngine | https://www.linkedin.com/in/vivin-sathyan/</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ManageEngine: <a href="https://www.itspmagazine.com/directory/manageengine">https://www.itspmagazine.com/directory/manageengine</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, vivin sathyan, cybersecurity, ai, siem, identity, analytics, integration, platform, risk, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 02:37:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivin Sathyan, ManageEngine)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-tools-to-trust-why-integration-beats-innovation-hype-in-cybersecurity-a-brand-story-with-vivin-sathyan-from-manageengine-an-on-location-rsac-conference-2025-brand-story-2PsMB6UI</link>
      <content:encoded><![CDATA[<p>Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes.</p><p>ManageEngine, a division of Zoho Corporation, now offers a suite of over 60 products that span identity and access management, SIEM, endpoint protection, service management, and analytics. These components don’t just coexist—they interact contextually. Vivin outlines a real-world example from the healthcare sector, where a SIM tool detects abnormal login behavior, triggers an identity system to challenge access, and then logs the incident for IT service resolution. This integrated chain reflects a philosophy where response is not just fast, but connected and accountable.</p><p>At the heart of the platform’s effectiveness is contextual intelligence—layered between artificial intelligence and business insights—to power decision-making that aligns with enterprise risk and compliance needs. Whether it’s SOC analysts triaging events, CIS admins handling system hygiene, or CISOs aligning actions with corporate goals, the tools are tailored to fit roles, not just generic functions. According to Vivin, this role-based approach is critical to eliminating silos and ensuring teams speak the same operational and risk language.</p><p>AI continues to play a role in enhancing that coordination, but ManageEngine is cautious not to follow hype for its own sake. The company has invested in its own AI and ML capabilities since 2012, and recently launched an agent studio—but only after evaluating how new models can meaningfully add value. Vivin points out that enterprise use cases often benefit more from small, purpose-built language models than from massive general-purpose ones.</p><p>Perhaps most compelling is ManageEngine’s global-first strategy. With operations in nearly 190 countries and 18+ of its own data centers, the company prioritizes proximity to customers—not just for technical support, but for cultural understanding and local compliance. That closeness informs both product design and customer trust, especially as regulations around data sovereignty intensify.</p><p>This episode challenges listeners to consider whether their tools are merely present—or actually connected. Are you enabling collaboration through context, or just stitching systems together and calling it a platform?</p><p>Learn more about ManageEngine: <a href="https://itspm.ag/manageen-631623">https://itspm.ag/manageen-631623</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Vivin Sathyan</strong>, Senior Technology Evangelist, ManageEngine | https://www.linkedin.com/in/vivin-sathyan/</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ManageEngine: <a href="https://www.itspmagazine.com/directory/manageengine">https://www.itspmagazine.com/directory/manageengine</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, vivin sathyan, cybersecurity, ai, siem, identity, analytics, integration, platform, risk, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19293090" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b7a49ee9-5c8c-4a5c-b133-1041c793f4d4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b7a49ee9-5c8c-4a5c-b133-1041c793f4d4&amp;feed=2M86zCcc"/>
      <itunes:title>From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivin Sathyan, ManageEngine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:05</itunes:duration>
      <itunes:summary>In this episode, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how contextual integration across IT management tools is reshaping how organizations respond to threats, align with business goals, and deliver measurable value. He also explains why thoughtful AI adoption, role-specific functionality, and global proximity to customers are essential to building trust and delivering results.</itunes:summary>
      <itunes:subtitle>In this episode, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how contextual integration across IT management tools is reshaping how organizations respond to threats, align with business goals, and deliver measurable value. He also explains why thoughtful AI adoption, role-specific functionality, and global proximity to customers are essential to building trust and delivering results.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, siem, sean martin, cybersecurity, vivin sathyan, analytics, platform, integration, brand marketing, identity, ai, risk, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>225</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">962e1a40-9d4d-4702-86f2-6eb704354228</guid>
      <title>From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management together with defensive services and managed offerings to address full-spectrum cybersecurity needs. The focus isn’t on commoditized services—it’s on what actually makes a difference.</p><p>At the heart of the conversation is the idea that cybersecurity is a team sport. Henderson draws parallels between the improvisation of music and the tactics of both attackers and defenders. Both require rhythm, creativity, and cohesion. The myth of the lone hero doesn’t hold up anymore—effective cybersecurity programs are driven by collaboration across specialties and by combining services in ways that amplify their value.</p><p>Coalfire’s evolution reflects this shift. It’s not just about running a penetration test or red team operation in isolation. It’s about integrating those efforts into a broader mission-focused program, tailored to real threats and measured against what matters most. Henderson emphasizes that CISOs are no longer content with piecemeal assessments; they’re seeking simplified, strategic programs with measurable outcomes.</p><p>The conversation also touches on the importance of storytelling in cybersecurity reporting. Henderson underscores the need for findings to be communicated in ways that resonate with technical teams, security leaders, and the board. It’s about enabling CISOs to own the narrative, armed with context, clarity, and confidence.</p><p>Henderson’s reflections on the early days of hacker culture—when gatherings like HoCon and early Def Cons were more about curiosity and camaraderie than business—bring a human dimension to the discussion. That same passion still fuels many practitioners today, and Coalfire is committed to nurturing it through talent development and internships, helping the next generation find their voice, their challenge, and yes, even their hacker handle.</p><p>This episode offers a look at how to build programs, teams, and mindsets that are ready to lead—not follow—on the cybersecurity front.</p><p>Learn more about Coalfire: <a href="https://itspm.ag/coalfire-yj4w">https://itspm.ag/coalfire-yj4w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Charles Henderson</strong>, Executive Vice President of Cyber Security Services, Coalfire | <a href="https://www.linkedin.com/in/angustx/">https://www.linkedin.com/in/angustx/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Coalfire: <a href="https://www.itspmagazine.com/directory/coalfire">https://www.itspmagazine.com/directory/coalfire</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>charles henderson, sean martin, coalfire, red teaming, penetration testing, cybersecurity services, exposure management, ciso, threat intelligence, hacker culture, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 23:47:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Charles Henderson, Coalfire)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-red-teams-to-real-impact-bringing-artistry-and-precision-to-cybersecurity-programs-a-brand-story-with-charles-henderson-from-coalfire-an-on-location-rsac-conference-2025-brand-story-PTmBtL3u</link>
      <content:encoded><![CDATA[<p>Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management together with defensive services and managed offerings to address full-spectrum cybersecurity needs. The focus isn’t on commoditized services—it’s on what actually makes a difference.</p><p>At the heart of the conversation is the idea that cybersecurity is a team sport. Henderson draws parallels between the improvisation of music and the tactics of both attackers and defenders. Both require rhythm, creativity, and cohesion. The myth of the lone hero doesn’t hold up anymore—effective cybersecurity programs are driven by collaboration across specialties and by combining services in ways that amplify their value.</p><p>Coalfire’s evolution reflects this shift. It’s not just about running a penetration test or red team operation in isolation. It’s about integrating those efforts into a broader mission-focused program, tailored to real threats and measured against what matters most. Henderson emphasizes that CISOs are no longer content with piecemeal assessments; they’re seeking simplified, strategic programs with measurable outcomes.</p><p>The conversation also touches on the importance of storytelling in cybersecurity reporting. Henderson underscores the need for findings to be communicated in ways that resonate with technical teams, security leaders, and the board. It’s about enabling CISOs to own the narrative, armed with context, clarity, and confidence.</p><p>Henderson’s reflections on the early days of hacker culture—when gatherings like HoCon and early Def Cons were more about curiosity and camaraderie than business—bring a human dimension to the discussion. That same passion still fuels many practitioners today, and Coalfire is committed to nurturing it through talent development and internships, helping the next generation find their voice, their challenge, and yes, even their hacker handle.</p><p>This episode offers a look at how to build programs, teams, and mindsets that are ready to lead—not follow—on the cybersecurity front.</p><p>Learn more about Coalfire: <a href="https://itspm.ag/coalfire-yj4w">https://itspm.ag/coalfire-yj4w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Charles Henderson</strong>, Executive Vice President of Cyber Security Services, Coalfire | <a href="https://www.linkedin.com/in/angustx/">https://www.linkedin.com/in/angustx/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Coalfire: <a href="https://www.itspmagazine.com/directory/coalfire">https://www.itspmagazine.com/directory/coalfire</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>charles henderson, sean martin, coalfire, red teaming, penetration testing, cybersecurity services, exposure management, ciso, threat intelligence, hacker culture, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27232213" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9db097f4-e3c0-4272-ba4e-a8f5b3ede169/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9db097f4-e3c0-4272-ba4e-a8f5b3ede169&amp;feed=2M86zCcc"/>
      <itunes:title>From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Charles Henderson, Coalfire</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:21</itunes:duration>
      <itunes:summary>Charles Henderson of Coalfire shares how cybersecurity programs can become more impactful by moving beyond tactical testing and toward coordinated, threat-driven operations that tell a complete story—from red teaming to executive reporting. He also reflects on the human side of the industry, from musical creativity to hacker culture, and why nurturing talent is key to long-term success.</itunes:summary>
      <itunes:subtitle>Charles Henderson of Coalfire shares how cybersecurity programs can become more impactful by moving beyond tactical testing and toward coordinated, threat-driven operations that tell a complete story—from red teaming to executive reporting. He also reflects on the human side of the industry, from musical creativity to hacker culture, and why nurturing talent is key to long-term success.</itunes:subtitle>
      <itunes:keywords>exposure management, marketing podcast, marco ciappelli, hacker culture, ciso, sean martin, cybersecurity, cybersecurity services, penetration testing, threat intelligence, red teaming, coalfire, brand marketing, charles henderson, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>224</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">37762464-1969-402e-8531-96357ae4bb54</guid>
      <title>Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate software delivery has now left security and infrastructure teams scrambling to contain risks that were never part of Kubernetes’ original design.</p><p>Emily outlines a critical flaw: Kubernetes wasn’t built for multi-tenancy. As a result, shared kernels across workloads—whether across customers or internal environments—introduce lateral movement risks. In her words, “A container isn’t real—it’s just a set of processes.” And when containers share a kernel, a single exploit can become a system-wide threat.</p><p>Edera addresses this gap by rethinking how containers are run—not rebuilt. Drawing from hypervisor tech like Xen and modernizing it with memory-safe Rust, Edera creates isolated “zones” for containers that enforce true separation without the overhead and complexity of traditional virtual machines. This isolation doesn’t disrupt developer workflows, integrates easily at the infrastructure layer, and doesn’t require retraining or restructuring CI/CD pipelines. It’s secure by design, without compromising performance or portability.</p><p>The impact is significant. Infrastructure teams gain the ability to enforce security policies without sacrificing cost efficiency. Developers keep their flow. And security professionals get something rare in today’s ecosystem: true prevention. Instead of chasing billions of alerts and layering multiple observability tools in hopes of finding the needle in the haystack, teams using Edera can reduce the noise and gain context that actually matters.</p><p>Emily also touches on the future—including the role of AI and “vibe coding,” and why true infrastructure-level security is essential as code generation becomes more automated and complex. With GPU security on their radar and a hardware-agnostic architecture, Edera is preparing not just for today’s container sprawl, but tomorrow’s AI-powered compute environments.</p><p>This is more than a product pitch—it’s a reframing of how we define and implement security at the container level. The full conversation reveals what’s possible when performance, portability, and protection are no longer at odds.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, emily long, containers, kubernetes, hypervisor, multi-tenancy, devsecops, infrastructure, virtualization, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 21:55:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Edera, Emily Long)</author>
      <link>https://eventcoveragepodcast.com/episodes/not-so-contained-when-container-isolation-is-just-an-illusion-a-brand-story-with-emily-long-from-edera-an-on-location-rsac-conference-2025-brand-story-9aaMxToa</link>
      <content:encoded><![CDATA[<p>Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate software delivery has now left security and infrastructure teams scrambling to contain risks that were never part of Kubernetes’ original design.</p><p>Emily outlines a critical flaw: Kubernetes wasn’t built for multi-tenancy. As a result, shared kernels across workloads—whether across customers or internal environments—introduce lateral movement risks. In her words, “A container isn’t real—it’s just a set of processes.” And when containers share a kernel, a single exploit can become a system-wide threat.</p><p>Edera addresses this gap by rethinking how containers are run—not rebuilt. Drawing from hypervisor tech like Xen and modernizing it with memory-safe Rust, Edera creates isolated “zones” for containers that enforce true separation without the overhead and complexity of traditional virtual machines. This isolation doesn’t disrupt developer workflows, integrates easily at the infrastructure layer, and doesn’t require retraining or restructuring CI/CD pipelines. It’s secure by design, without compromising performance or portability.</p><p>The impact is significant. Infrastructure teams gain the ability to enforce security policies without sacrificing cost efficiency. Developers keep their flow. And security professionals get something rare in today’s ecosystem: true prevention. Instead of chasing billions of alerts and layering multiple observability tools in hopes of finding the needle in the haystack, teams using Edera can reduce the noise and gain context that actually matters.</p><p>Emily also touches on the future—including the role of AI and “vibe coding,” and why true infrastructure-level security is essential as code generation becomes more automated and complex. With GPU security on their radar and a hardware-agnostic architecture, Edera is preparing not just for today’s container sprawl, but tomorrow’s AI-powered compute environments.</p><p>This is more than a product pitch—it’s a reframing of how we define and implement security at the container level. The full conversation reveals what’s possible when performance, portability, and protection are no longer at odds.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, emily long, containers, kubernetes, hypervisor, multi-tenancy, devsecops, infrastructure, virtualization, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28673333" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/78318271-ffc4-4aec-a4c3-da3274781a99/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=78318271-ffc4-4aec-a4c3-da3274781a99&amp;feed=2M86zCcc"/>
      <itunes:title>Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Edera, Emily Long</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:52</itunes:duration>
      <itunes:summary>Containerization transformed development speed—but at what cost to security? In this episode, Emily Long, co-founder and CEO of Edera, explains how rethinking infrastructure from the kernel up is making true container isolation possible without sacrificing developer velocity or platform flexibility.</itunes:summary>
      <itunes:subtitle>Containerization transformed development speed—but at what cost to security? In this episode, Emily Long, co-founder and CEO of Edera, explains how rethinking infrastructure from the kernel up is making true container isolation possible without sacrificing developer velocity or platform flexibility.</itunes:subtitle>
      <itunes:keywords>kubernetes, marketing podcast, marco ciappelli, hypervisor, sean martin, containers, emily long, cybersecurity, virtualization, brand marketing, multi-tenancy, infrastructure, devsecops, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>223</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">15798153-982f-418e-b6c5-d266da4de2ba</guid>
      <title>This is what Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this episode, Sean Martin speaks with Richard Seiersen, Chief Risk Technology Officer at Qualys, about a new way to think about cybersecurity—one that puts value and business resilience at the center, not just threats.</p><p>Richard shares the thinking behind Qualys’ Risk Operations Center, a new approach that responds directly to a common pain point: organizations struggling to manage vast amounts of telemetry from dozens of security tools without clear direction on how to act. Instead of forcing companies to build and maintain massive internal platforms just to piece together asset, vulnerability, and threat data, Qualys is creating a system to operationalize risk as a real-time, measurable business function.</p><p>With a background that includes serving as Chief Risk Officer at a cyber insurance firm and co-authoring foundational books like How to Measure Anything in Cybersecurity Risk and The Metrics Manifesto, Richard frames the conversation in practical business terms. He emphasizes that success is not just about detecting threats, but about understanding where value exists in the business, and how to protect it efficiently.</p><p><strong>From Security Operations to Risk Operations</strong></p><p>While a traditional SOC focuses on attack surface and compromise detection, the Risk Operations Center is designed to understand, prioritize, and mitigate value at risk. Richard describes how this involves normalizing data across environments, connecting asset identities—including ephemeral and composite digital assets—and aligning technical activity to business impact.</p><p>The Risk Operations Center enables teams to think in terms of risk surface, not just threat surface, by giving security leaders visibility into what matters most—and the tools to act accordingly. And importantly, it does so without increasing headcount.</p><p><strong>A CISO’s Role in the Business of Risk</strong></p><p>Richard challenges security leaders to break away from purely tactical work and lean into business alignment. He argues that boards want CISOs who think strategically—who can talk about capital reserves, residual risk, and how mitigation and transfer can be measured against business outcomes. In his words, “A successful business is in the business of exposing more value to more people… security must understand and support that mission.”</p><p>This episode is packed with ideas worth listening to and sharing. What would your version of a Risk Operations Center look like?</p><p>Learn more about Qualys: <a href="https://itspm.ag/qualys-908446">https://itspm.ag/qualys-908446</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rich Seiersen</strong>, Chief Risk Technology Officer, Qualys | <a href="https://www.linkedin.com/in/richardseiersen/">https://www.linkedin.com/in/richardseiersen/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Qualys: <a href="https://www.itspmagazine.com/directory/qualys">https://www.itspmagazine.com/directory/qualys</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, richard seiersen, risk, cybersecurity, data, resilience, telemetry, automation, ciso, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 19:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rich Seiersen, Qualys)</author>
      <link>https://eventcoveragepodcast.com/episodes/this-is-what-happens-when-security-stops-chasing-threats-and-starts-managing-risk-a-brand-story-with-rich-seiersen-from-qualys-an-on-location-rsac-conference-2025-brand-story-RgGWlicq</link>
      <content:encoded><![CDATA[<p>In this episode, Sean Martin speaks with Richard Seiersen, Chief Risk Technology Officer at Qualys, about a new way to think about cybersecurity—one that puts value and business resilience at the center, not just threats.</p><p>Richard shares the thinking behind Qualys’ Risk Operations Center, a new approach that responds directly to a common pain point: organizations struggling to manage vast amounts of telemetry from dozens of security tools without clear direction on how to act. Instead of forcing companies to build and maintain massive internal platforms just to piece together asset, vulnerability, and threat data, Qualys is creating a system to operationalize risk as a real-time, measurable business function.</p><p>With a background that includes serving as Chief Risk Officer at a cyber insurance firm and co-authoring foundational books like How to Measure Anything in Cybersecurity Risk and The Metrics Manifesto, Richard frames the conversation in practical business terms. He emphasizes that success is not just about detecting threats, but about understanding where value exists in the business, and how to protect it efficiently.</p><p><strong>From Security Operations to Risk Operations</strong></p><p>While a traditional SOC focuses on attack surface and compromise detection, the Risk Operations Center is designed to understand, prioritize, and mitigate value at risk. Richard describes how this involves normalizing data across environments, connecting asset identities—including ephemeral and composite digital assets—and aligning technical activity to business impact.</p><p>The Risk Operations Center enables teams to think in terms of risk surface, not just threat surface, by giving security leaders visibility into what matters most—and the tools to act accordingly. And importantly, it does so without increasing headcount.</p><p><strong>A CISO’s Role in the Business of Risk</strong></p><p>Richard challenges security leaders to break away from purely tactical work and lean into business alignment. He argues that boards want CISOs who think strategically—who can talk about capital reserves, residual risk, and how mitigation and transfer can be measured against business outcomes. In his words, “A successful business is in the business of exposing more value to more people… security must understand and support that mission.”</p><p>This episode is packed with ideas worth listening to and sharing. What would your version of a Risk Operations Center look like?</p><p>Learn more about Qualys: <a href="https://itspm.ag/qualys-908446">https://itspm.ag/qualys-908446</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rich Seiersen</strong>, Chief Risk Technology Officer, Qualys | <a href="https://www.linkedin.com/in/richardseiersen/">https://www.linkedin.com/in/richardseiersen/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Qualys: <a href="https://www.itspmagazine.com/directory/qualys">https://www.itspmagazine.com/directory/qualys</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, richard seiersen, risk, cybersecurity, data, resilience, telemetry, automation, ciso, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23975055" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7b6833f1-af62-456d-9d0e-fe0c45c330e3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7b6833f1-af62-456d-9d0e-fe0c45c330e3&amp;feed=2M86zCcc"/>
      <itunes:title>This is what Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rich Seiersen, Qualys</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:58</itunes:duration>
      <itunes:summary>Richard Seiersen, Chief Risk Technology Officer at Qualys, introduces the concept of a Risk Operations Center—a transformative shift from traditional threat-focused security operations to a model centered on managing business value and reducing risk at scale. In this episode, he explains how organizations can move beyond detection to strategic risk mitigation, automation, and board-level alignment.</itunes:summary>
      <itunes:subtitle>Richard Seiersen, Chief Risk Technology Officer at Qualys, introduces the concept of a Risk Operations Center—a transformative shift from traditional threat-focused security operations to a model centered on managing business value and reducing risk at scale. In this episode, he explains how organizations can move beyond detection to strategic risk mitigation, automation, and board-level alignment.</itunes:subtitle>
      <itunes:keywords>data, marketing podcast, marco ciappelli, ciso, sean martin, automation, cybersecurity, resilience, telemetry, soc, richard seiersen, brand marketing, risk, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>222</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">857cb09b-af82-45aa-a195-1f1824d54397</guid>
      <title>From Term Sheets to Trust: What Mergers &amp; Acquisitions Trends Reveal About Cybersecurity’s Future | An On Location RSAC Conference 2025 Conversation with Yair Geva</title>
      <description><![CDATA[<p>In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.</p><p>More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.</p><p><strong>AI Acceleration and M&A Hesitation</strong></p><p>According to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks’ move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.</p><p><strong>Cyber Due Diligence Is Now Table Stakes</strong></p><p>Across all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.</p><p><strong>From Global Hubs to Human Connections</strong></p><p>While San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.</p><p>With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.</p><p>Listen to the full conversation to hear what’s shaping the deals behind tomorrow’s cybersecurity innovations.<i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Yair Geva</strong>, Attorney and Investor | <a href="https://www.linkedin.com/in/yairgeva/">https://www.linkedin.com/in/yairgeva/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 18:14:13 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Yair Geva)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-term-sheets-to-trust-what-ma-trends-reveal-about-cybersecuritys-future-an-on-location-rsac-conference-2025-conversation-with-yair-geva-xfA7oG0P</link>
      <content:encoded><![CDATA[<p>In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.</p><p>More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.</p><p><strong>AI Acceleration and M&A Hesitation</strong></p><p>According to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks’ move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.</p><p><strong>Cyber Due Diligence Is Now Table Stakes</strong></p><p>Across all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.</p><p><strong>From Global Hubs to Human Connections</strong></p><p>While San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.</p><p>With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.</p><p>Listen to the full conversation to hear what’s shaping the deals behind tomorrow’s cybersecurity innovations.<i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Yair Geva</strong>, Attorney and Investor | <a href="https://www.linkedin.com/in/yairgeva/">https://www.linkedin.com/in/yairgeva/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19493711" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/39b5b331-a97d-4a88-8c2a-3bd2ae6cea48/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=39b5b331-a97d-4a88-8c2a-3bd2ae6cea48&amp;feed=2M86zCcc"/>
      <itunes:title>From Term Sheets to Trust: What Mergers &amp; Acquisitions Trends Reveal About Cybersecurity’s Future | An On Location RSAC Conference 2025 Conversation with Yair Geva</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Yair Geva</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:18</itunes:duration>
      <itunes:summary>Yair Geva joins us to unpack how cybersecurity, AI, and M&amp;A are converging—and what that means for startups, investors, and global deal flow. From the rise of cyber due diligence to the shifting confidence of VCs in the age of AI, this episode offers a rare view into the business side of cyber innovation.</itunes:summary>
      <itunes:subtitle>Yair Geva joins us to unpack how cybersecurity, AI, and M&amp;A are converging—and what that means for startups, investors, and global deal flow. From the rise of cyber due diligence to the shifting confidence of VCs in the age of AI, this episode offers a rare view into the business side of cyber innovation.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, cybersecurity, venture, innovation, resilience, yair geva, m&amp;a, brand marketing, investment, ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>221</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">53f452bd-0c32-41e5-b641-6a342d0e01f5</guid>
      <title>From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this on-location episode recorded at the RSAC Conference, Sean Martin and Marco Ciappelli sit down once again with Rob Allen, Chief Product Officer at ThreatLocker, to unpack what Zero Trust really looks like in practice—and how organizations can actually get started without feeling buried by complexity.</p><p>Rather than focusing on theory or buzzwords, Rob lays out a clear path that begins with visibility. “You can’t control what you can’t see,” he explains. The first step toward Zero Trust is deploying lightweight agents that automatically build a view of the software running across your environment. From there, policies can be crafted to default-deny unknown applications, while still enabling legitimate business needs through controlled exceptions.</p><p><strong>The Zero Trust Mindset: Assume Breach, Limit Access</strong></p><p>Rob echoes the federal mandate definition of Zero Trust: assume a breach has already occurred and limit access to only what is needed. This assumption flips the defensive posture from reactive to proactive. It’s not about waiting to detect bad behavior—it’s about blocking the behavior before it starts.</p><p>The ThreatLocker approach stands out because it focuses on removing the traditional “heavy lift” often associated with Zero Trust implementations. Rob highlights how some organizations have spent years trying (and failing) to activate overly complex systems, only to end up stuck with unused tools and endless false positives. ThreatLocker’s automation is designed to lower that barrier and get organizations to meaningful control faster.</p><p><strong>Modern Threats, Simplified Defenses</strong></p><p>As AI accelerates the creation of polymorphic malware and low-code attack scripts, Zero Trust offers a counterweight. Deny-by-default policies don’t require knowing every new threat—just clear guardrails that prevent unauthorized activity, no matter how it’s created. Whether it’s PowerShell scripts exfiltrating data or AI-generated exploits, proactive controls make it harder for attackers to operate undetected.</p><p>This episode reframes Zero Trust from an overwhelming project into a series of achievable, common-sense steps. If you’re ready to hear what it takes to stop chasing false positives and start building a safer, more controlled environment, this conversation is for you.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, zero trust, cybersecurity, visibility, access control, proactive defense, ai threats, policy automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 19:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-reactive-to-proactive-building-guardrails-that-actually-protect-a-brand-story-with-rob-allen-from-threatlocker-an-on-location-rsac-conference-2025-brand-story-p5BYKHiK</link>
      <content:encoded><![CDATA[<p>In this on-location episode recorded at the RSAC Conference, Sean Martin and Marco Ciappelli sit down once again with Rob Allen, Chief Product Officer at ThreatLocker, to unpack what Zero Trust really looks like in practice—and how organizations can actually get started without feeling buried by complexity.</p><p>Rather than focusing on theory or buzzwords, Rob lays out a clear path that begins with visibility. “You can’t control what you can’t see,” he explains. The first step toward Zero Trust is deploying lightweight agents that automatically build a view of the software running across your environment. From there, policies can be crafted to default-deny unknown applications, while still enabling legitimate business needs through controlled exceptions.</p><p><strong>The Zero Trust Mindset: Assume Breach, Limit Access</strong></p><p>Rob echoes the federal mandate definition of Zero Trust: assume a breach has already occurred and limit access to only what is needed. This assumption flips the defensive posture from reactive to proactive. It’s not about waiting to detect bad behavior—it’s about blocking the behavior before it starts.</p><p>The ThreatLocker approach stands out because it focuses on removing the traditional “heavy lift” often associated with Zero Trust implementations. Rob highlights how some organizations have spent years trying (and failing) to activate overly complex systems, only to end up stuck with unused tools and endless false positives. ThreatLocker’s automation is designed to lower that barrier and get organizations to meaningful control faster.</p><p><strong>Modern Threats, Simplified Defenses</strong></p><p>As AI accelerates the creation of polymorphic malware and low-code attack scripts, Zero Trust offers a counterweight. Deny-by-default policies don’t require knowing every new threat—just clear guardrails that prevent unauthorized activity, no matter how it’s created. Whether it’s PowerShell scripts exfiltrating data or AI-generated exploits, proactive controls make it harder for attackers to operate undetected.</p><p>This episode reframes Zero Trust from an overwhelming project into a series of achievable, common-sense steps. If you’re ready to hear what it takes to stop chasing false positives and start building a safer, more controlled environment, this conversation is for you.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, zero trust, cybersecurity, visibility, access control, proactive defense, ai threats, policy automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20253553" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/65aa214e-8355-43ee-beca-ee040d3d8dfe/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=65aa214e-8355-43ee-beca-ee040d3d8dfe&amp;feed=2M86zCcc"/>
      <itunes:title>From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:05</itunes:duration>
      <itunes:summary>Rob Allen, Chief Product Officer at ThreatLocker, shares how organizations can move from theory to action with Zero Trust by starting with visibility and enforcing practical controls that actually work. This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder—without making yours more complex.</itunes:summary>
      <itunes:subtitle>Rob Allen, Chief Product Officer at ThreatLocker, shares how organizations can move from theory to action with Zero Trust by starting with visibility and enforcing practical controls that actually work. This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder—without making yours more complex.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, policy automation, proactive defense, sean martin, rob allen, cybersecurity, brand marketing, visibility, access control, brand story podcast, zero trust, ai threats, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>220</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">898ae664-1bfd-437b-8ed4-cc0f7c9aacb3</guid>
      <title>Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Quantum computing and AI are no longer theoretical concepts for tomorrow—they’re shaping how organizations must secure their infrastructure today. In this episode of the podcast, Mark Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.</p><p>SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.</p><p><strong>Post-Quantum Migration and Cryptographic Agility</strong></p><p>Manzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It’s not just about surviving the post-quantum era—it’s about staying ready for whatever comes next.</p><p><strong>Taming the Complexity of AI Agents and Non-Human Identities</strong></p><p>The second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ’s platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.</p><p><strong>Real Use Cases with Measurable Impact</strong></p><p>Manzano shares practical examples of how SandboxAQ’s technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.</p><p>Whether it’s quantum cryptography, AI risk, or identity control—this isn’t a vision for 2030. It’s a call to action for today.</p><p>Learn more about SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en">https://itspm.ag/sandboxaq-j2en</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Marc Manzano</strong>, General Manager of Cybersecurity at SandboxAQ | <a href="https://www.linkedin.com/in/marcmanzano/">https://www.linkedin.com/in/marcmanzano/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SandboxAQ: <a href="https://www.itspmagazine.com/directory/sandboxaq">https://www.itspmagazine.com/directory/sandboxaq</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>mark manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 18:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, SandboxAQ, Marc Manzano)</author>
      <link>https://eventcoveragepodcast.com/episodes/security-at-the-edge-of-change-preparing-for-the-cryptographic-and-ai-tipping-point-a-brand-story-with-marc-manzano-from-sandboxaq-an-on-location-rsac-conference-2025-brand-story-L_a8bLMl</link>
      <content:encoded><![CDATA[<p>Quantum computing and AI are no longer theoretical concepts for tomorrow—they’re shaping how organizations must secure their infrastructure today. In this episode of the podcast, Mark Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.</p><p>SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.</p><p><strong>Post-Quantum Migration and Cryptographic Agility</strong></p><p>Manzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It’s not just about surviving the post-quantum era—it’s about staying ready for whatever comes next.</p><p><strong>Taming the Complexity of AI Agents and Non-Human Identities</strong></p><p>The second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ’s platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.</p><p><strong>Real Use Cases with Measurable Impact</strong></p><p>Manzano shares practical examples of how SandboxAQ’s technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.</p><p>Whether it’s quantum cryptography, AI risk, or identity control—this isn’t a vision for 2030. It’s a call to action for today.</p><p>Learn more about SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en">https://itspm.ag/sandboxaq-j2en</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Marc Manzano</strong>, General Manager of Cybersecurity at SandboxAQ | <a href="https://www.linkedin.com/in/marcmanzano/">https://www.linkedin.com/in/marcmanzano/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SandboxAQ: <a href="https://www.itspmagazine.com/directory/sandboxaq">https://www.itspmagazine.com/directory/sandboxaq</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>mark manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19376671" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d0906bc6-104a-4c83-a6cf-77b24016bc8b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d0906bc6-104a-4c83-a6cf-77b24016bc8b&amp;feed=2M86zCcc"/>
      <itunes:title>Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, SandboxAQ, Marc Manzano</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:11</itunes:duration>
      <itunes:summary>Mark Manzano, General Manager of Cybersecurity at SandboxAQ, shares how his team is tackling the urgent challenges of quantum-era cryptography and the explosion of AI agents across enterprise environments. From real-time cryptographic agility to continuous non-human identity management, this episode reveals how organizations can modernize security before it’s too late.</itunes:summary>
      <itunes:subtitle>Mark Manzano, General Manager of Cybersecurity at SandboxAQ, shares how his team is tackling the urgent challenges of quantum-era cryptography and the explosion of AI agents across enterprise environments. From real-time cryptographic agility to continuous non-human identity management, this episode reveals how organizations can modernize security before it’s too late.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, cybersecurity, keymanagement, mark manzano, cryptography, rsac2025, brand marketing, quantum, nonhuman, ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>219</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">42cb0140-01c3-4a36-b2da-5f65b7b4f74c</guid>
      <title>When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In today’s threat environment, it’s not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That’s the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.</p><p>Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.</p><p><strong>Immutability as a Foundation—Not a Feature</strong></p><p>The conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn’t enough. Backup policies, storage access, and data workflows must be segmented and secured.</p><p><strong>Zero Trust for Backup Infrastructure</strong></p><p>Zero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can’t alter storage configurations.</p><p><strong>A Real-World Test: Marysville School District</strong></p><p>When Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn’t access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can’t be assumed; it must be enforced by design.</p><p><strong>Meeting Customers Where They Are</strong></p><p>To support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Object First, Sterling Wilson)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-ransomware-strikes-will-your-backups-hold-the-line-a-brand-story-with-sterling-wilson-from-object-first-an-on-location-rsac-conference-2025-brand-story-RYewumaV</link>
      <content:encoded><![CDATA[<p>In today’s threat environment, it’s not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That’s the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.</p><p>Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.</p><p><strong>Immutability as a Foundation—Not a Feature</strong></p><p>The conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn’t enough. Backup policies, storage access, and data workflows must be segmented and secured.</p><p><strong>Zero Trust for Backup Infrastructure</strong></p><p>Zero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can’t alter storage configurations.</p><p><strong>A Real-World Test: Marysville School District</strong></p><p>When Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn’t access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can’t be assumed; it must be enforced by design.</p><p><strong>Meeting Customers Where They Are</strong></p><p>To support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17237141" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/fc56e58b-6e97-4c02-9977-5ae1b61b9e4b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=fc56e58b-6e97-4c02-9977-5ae1b61b9e4b&amp;feed=2M86zCcc"/>
      <itunes:title>When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Object First, Sterling Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:57</itunes:duration>
      <itunes:summary>In this episode from RSAC Conference 2025, Sterling Wilson, Field CTO at Object First, explains why true immutability and zero trust principles must be built into your backup architecture—not just your network. He shares real-world insights, including how one school district was able to recover from a ransomware attack because their immutable backups were untouchable.</itunes:summary>
      <itunes:subtitle>In this episode from RSAC Conference 2025, Sterling Wilson, Field CTO at Object First, explains why true immutability and zero trust principles must be built into your backup architecture—not just your network. He shares real-world insights, including how one school district was able to recover from a ransomware attack because their immutable backups were untouchable.</itunes:subtitle>
      <itunes:keywords>sterling wilson, immutability, marketing podcast, marco ciappelli, backups, sean martin, cybersecurity, data protection, veeam, ransomware, brand marketing, brand story podcast, recovery, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>218</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">feb132f0-d7d9-4c0a-b0cf-6733d424cef9</guid>
      <title>From Overhead to Advantage: Turning Compliance into a Strategic Asset | A Brand Story with Steve Schlarman from Archer | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this RSAC 2025 episode, Sean Martin sits down with Steve Schlarman, Senior Director of Product Management at Archer, to explore how organizations are rethinking compliance and risk—not just as a box to check, but as a business enabler.</p><p>At the center of the conversation is Archer Evolv, a new platform intentionally designed to move beyond legacy GRC workflows. Built on years of insight from customers and aligned with the company’s post-RSA independence, Evolv aims to modernize how compliance and risk teams operate. That includes automating burdensome regulatory processes, surfacing business-relevant risk insights, and supporting more strategic decision-making.</p><p>Leveraging technology developed by Compliance.ai, acquired by Archer last year, Archer applies AI tuned specifically for the language of compliance, helping customers reduce review time per regulatory obligation from 100 hours to just a few. That’s more than a productivity gain—it’s a structural shift in how companies adapt to nonstop regulatory change.</p><p>Another critical area is quantifying risk. Rather than relying on subjective heat maps, Archer enables organizations to calculate loss exposure in real terms. This creates a foundation for executive conversations rooted in financial and operational impact, not just abstract threat levels. That same quantitative view can be applied to understanding the cost of controls—ensuring that investments align with real business risk, rather than piling on complexity for the sake of coverage.</p><p>The conversation closes on a powerful shift: risk and compliance teams freeing up time and brainpower to collaborate directly with the business. With the manual grunt work automated and controls mapped more intelligently, these teams can help shape new services and strategic initiatives—safely and confidently.</p><p>This episode isn’t just about software or frameworks. It’s about what happens when governance becomes a driver of value, not just a reaction to fear.</p><p>Listen in to hear how Archer is helping turn risk and compliance from operational drag into business advantage.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb">https://itspm.ag/rsaarchweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer Integrated Risk Management: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, steve schlarman, risk, compliance, ai, governance, grc, quantification, controls, automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 16:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-overhead-to-advantage-turning-compliance-into-a-strategic-asset-a-brand-story-with-steve-schlarman-from-archer-an-on-location-rsac-conference-2025-brand-story-Y8SbNx7p</link>
      <content:encoded><![CDATA[<p>In this RSAC 2025 episode, Sean Martin sits down with Steve Schlarman, Senior Director of Product Management at Archer, to explore how organizations are rethinking compliance and risk—not just as a box to check, but as a business enabler.</p><p>At the center of the conversation is Archer Evolv, a new platform intentionally designed to move beyond legacy GRC workflows. Built on years of insight from customers and aligned with the company’s post-RSA independence, Evolv aims to modernize how compliance and risk teams operate. That includes automating burdensome regulatory processes, surfacing business-relevant risk insights, and supporting more strategic decision-making.</p><p>Leveraging technology developed by Compliance.ai, acquired by Archer last year, Archer applies AI tuned specifically for the language of compliance, helping customers reduce review time per regulatory obligation from 100 hours to just a few. That’s more than a productivity gain—it’s a structural shift in how companies adapt to nonstop regulatory change.</p><p>Another critical area is quantifying risk. Rather than relying on subjective heat maps, Archer enables organizations to calculate loss exposure in real terms. This creates a foundation for executive conversations rooted in financial and operational impact, not just abstract threat levels. That same quantitative view can be applied to understanding the cost of controls—ensuring that investments align with real business risk, rather than piling on complexity for the sake of coverage.</p><p>The conversation closes on a powerful shift: risk and compliance teams freeing up time and brainpower to collaborate directly with the business. With the manual grunt work automated and controls mapped more intelligently, these teams can help shape new services and strategic initiatives—safely and confidently.</p><p>This episode isn’t just about software or frameworks. It’s about what happens when governance becomes a driver of value, not just a reaction to fear.</p><p>Listen in to hear how Archer is helping turn risk and compliance from operational drag into business advantage.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb">https://itspm.ag/rsaarchweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer Integrated Risk Management: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, steve schlarman, risk, compliance, ai, governance, grc, quantification, controls, automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14941703" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b525656f-9f0a-4b60-8737-6892d4853c62/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b525656f-9f0a-4b60-8737-6892d4853c62&amp;feed=2M86zCcc"/>
      <itunes:title>From Overhead to Advantage: Turning Compliance into a Strategic Asset | A Brand Story with Steve Schlarman from Archer | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:33</itunes:duration>
      <itunes:summary>Steve Schlarman, Senior Director of Product Management at Archer, shares how the new Archer Evolve platform is transforming compliance and risk management from a manual, reactive burden into a streamlined, AI-enhanced business enabler. Discover how quantifying risk and automating regulatory processes empowers teams to make smarter decisions and drive real business impact.</itunes:summary>
      <itunes:subtitle>Steve Schlarman, Senior Director of Product Management at Archer, shares how the new Archer Evolve platform is transforming compliance and risk management from a manual, reactive burden into a streamlined, AI-enhanced business enabler. Discover how quantifying risk and automating regulatory processes empowers teams to make smarter decisions and drive real business impact.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, controls, grc, sean martin, automation, cybersecurity, quantification, steve schlarman, brand marketing, ai, risk, brand story podcast, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>217</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1a4b24da-2363-4715-bd4d-c12acea26115</guid>
      <title>The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.</p><p>Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it’s also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.</p><p><strong>The API and Web Application Threat Surge</strong></p><p>Referencing Akamai’s latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they’re exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.</p><p>Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren’t actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.</p><p><strong>Introducing Akamai’s Firewall for AI</strong></p><p>Akamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.</p><p>In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.</p><p><strong>Enabling Security Leadership</strong></p><p>Chokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai’s goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 15:40:09 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Akamai, Rupesh Chokshi)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-new-front-line-runtime-protection-for-ai-and-api-driven-attacks-a-brand-story-with-rupesh-chokshi-from-akamai-an-on-location-rsac-conference-2025-brand-story-8oDPZDai</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.</p><p>Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it’s also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.</p><p><strong>The API and Web Application Threat Surge</strong></p><p>Referencing Akamai’s latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they’re exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.</p><p>Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren’t actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.</p><p><strong>Introducing Akamai’s Firewall for AI</strong></p><p>Akamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.</p><p>In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.</p><p><strong>Enabling Security Leadership</strong></p><p>Chokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai’s goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16797860" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/409c1ad5-b421-445e-be60-8652a10fce83/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=409c1ad5-b421-445e-be60-8652a10fce83&amp;feed=2M86zCcc"/>
      <itunes:title>The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Akamai, Rupesh Chokshi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:29</itunes:duration>
      <itunes:summary>In this episode, Rupesh Chokshi of Akamai breaks down the surge in API and AI-driven threats and explains how Akamai’s new Firewall for AI helps CISOs manage risk without slowing innovation. With real-world data, sharp insights, and practical solutions, this episode is a must-listen.</itunes:summary>
      <itunes:subtitle>In this episode, Rupesh Chokshi of Akamai breaks down the surge in API and AI-driven threats and explains how Akamai’s new Firewall for AI helps CISOs manage risk without slowing innovation. With real-world data, sharp insights, and practical solutions, this episode is a must-listen.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, akamai, cybersecurity, rsac, api, firewall, security, brand marketing, ai, cisos, brand story podcast, llm, brand story, rupesh chokshi</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>216</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9efd0017-fd69-4d99-a5f3-ce0a61cd261a</guid>
      <title>RSAC 2025 Coverage is done! It&apos;s a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We’re working on it.” That exchange captured the spirit of the entire event — security is not a destination, it’s an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. </p><p><strong>___________</strong><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 3 May 2025 23:41:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/rsac-2025-coverage-is-done-its-a-wrap-we-are-good-to-go-but-the-musings-are-just-getting-started-an-rsac-conference-2025-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-0zafu_u8</link>
      <content:encoded><![CDATA[<p>RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning. Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies. But one moment stood out. While we were recording outside the conference, someone walking by asked us, “Is the world secure now?” Our answer was simple: “We’re working on it.” That exchange captured the spirit of the entire event — security is not a destination, it’s an ongoing effort. We learn, we adapt, and we move forward faster than the future is coming at us. Thank you to everyone who made RSAC 2025 such a meaningful experience. Next stops: AppSec Global in Barcelona, Infosec Europe in London, Black Hat and DEF CON in Las Vegas — and more conversations across the hybrid analog digital society we all share. Until next time, keep building, keep connecting, and keep moving forward. </p><p><strong>___________</strong><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5004084" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ca2f8ec4-36e9-4f1d-b66b-75cf1bc36cbc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ca2f8ec4-36e9-4f1d-b66b-75cf1bc36cbc&amp;feed=2M86zCcc"/>
      <itunes:title>RSAC 2025 Coverage is done! It&apos;s a wrap, we are good to go, but The Musings Are Just Getting Started | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/124dc846-35dd-4797-84ca-4d63c7e43ab2/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:12</itunes:duration>
      <itunes:summary>RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning.
Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies.</itunes:summary>
      <itunes:subtitle>RSAC 2025 is a wrap. The expo floor is closed, the conversations have ended, and the gear is packed — but the reflections are just beginning.
Throughout the week, Sean Martin and Marco Ciappelli had powerful discussions around AI, identity, platform security, partnerships, the evolving legal and VC landscapes, and the growing importance of multi-layered defense strategies.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, rsac 2025, grc, sean martin, infosec, infosecurity, cybersecurity, conference, on location, resilience, rsac, event coverage, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>215</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3495cb6f-ba1e-4384-9880-626331469ab4</guid>
      <title>Mindset Matters: Rethinking How We Teach and Design Cybersecurity | An RSAC Conference 2025 Conversation with Jason R.C. Nurse | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent and Director of Science and Research at CybSafe, joins ITSPmagazine at RSAC 2025 to discuss how people’s attitudes shape their cybersecurity behaviors—at home, at work, and everywhere in between.</p><p>Drawing from a global survey of over 7,000 individuals, Dr. Nurse presents data that reveals a fundamental challenge: while many individuals recognize the importance of cybersecurity, a significant number also find it intimidating and frustrating. Nearly 43% of participants shared that they feel overwhelmed by security measures, highlighting a persistent disconnect between the intent of security protocols and the lived experience of users.</p><p>This disconnect manifests in inconsistent behaviors. At home, people may take extra precautions to protect their personal lives and families. At work, however, there’s a tendency to outsource responsibility to the employer. This duality—heightened vigilance in personal spaces and relaxed caution in professional environments—creates vulnerabilities in a world where attackers don’t care where the device or user happens to be.</p><p>The conversation emphasizes the need to rethink how we approach cybersecurity education, awareness, and design. Dr. Nurse advocates for a “usable security” model—systems that protect users without demanding overly technical knowledge or creating friction. He uses the example of biometrics and seamless phone authentication to show how good design can improve both security and user satisfaction.</p><p>To illustrate the connection between knowledge, attitude, and behavior, Dr. Nurse brings humor into the mix with a memorable analogy involving Kit Kats. Just as knowing something is delicious can shape our cravings and actions, understanding security in relatable terms can lead to more proactive behaviors.</p><p>The episode wraps with a candid reflection on trust and novelty in the face of emerging AI systems—like self-driving cars. Dr. Nurse questions whether people truly trust new technologies or if they’re simply seduced by convenience and innovation.</p><p>This is a conversation about what it really takes to build a security-conscious society—one that understands people as much as it understands threats.</p><p>Listen to the full episode to hear how mindset, usability, and cultural attitudes are reshaping the human side of cybersecurity.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong></p><p><strong>Dr. Jason R.C. Nurse</strong>, Associate Professor in Cybersecurity at the University of Kent | <a href="https://www.linkedin.com/in/jasonrcnurse/">https://www.linkedin.com/in/jasonrcnurse/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p> </p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, jason r c nurse, rsac 2025, cybersecurity, behavior, mindset, usability, ai, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 16:45:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dr. Jason R.C. Nurse)</author>
      <link>https://eventcoveragepodcast.com/episodes/mindset-matters-rethinking-how-we-teach-and-design-cybersecurity-an-rsac-conference-2025-conversation-with-jason-rc-nurse-on-location-coverage-with-sean-martin-and-marco-ciappelli-qDlX1N_C</link>
      <content:encoded><![CDATA[<p>Dr. Jason R.C. Nurse, Associate Professor in Cybersecurity at the University of Kent and Director of Science and Research at CybSafe, joins ITSPmagazine at RSAC 2025 to discuss how people’s attitudes shape their cybersecurity behaviors—at home, at work, and everywhere in between.</p><p>Drawing from a global survey of over 7,000 individuals, Dr. Nurse presents data that reveals a fundamental challenge: while many individuals recognize the importance of cybersecurity, a significant number also find it intimidating and frustrating. Nearly 43% of participants shared that they feel overwhelmed by security measures, highlighting a persistent disconnect between the intent of security protocols and the lived experience of users.</p><p>This disconnect manifests in inconsistent behaviors. At home, people may take extra precautions to protect their personal lives and families. At work, however, there’s a tendency to outsource responsibility to the employer. This duality—heightened vigilance in personal spaces and relaxed caution in professional environments—creates vulnerabilities in a world where attackers don’t care where the device or user happens to be.</p><p>The conversation emphasizes the need to rethink how we approach cybersecurity education, awareness, and design. Dr. Nurse advocates for a “usable security” model—systems that protect users without demanding overly technical knowledge or creating friction. He uses the example of biometrics and seamless phone authentication to show how good design can improve both security and user satisfaction.</p><p>To illustrate the connection between knowledge, attitude, and behavior, Dr. Nurse brings humor into the mix with a memorable analogy involving Kit Kats. Just as knowing something is delicious can shape our cravings and actions, understanding security in relatable terms can lead to more proactive behaviors.</p><p>The episode wraps with a candid reflection on trust and novelty in the face of emerging AI systems—like self-driving cars. Dr. Nurse questions whether people truly trust new technologies or if they’re simply seduced by convenience and innovation.</p><p>This is a conversation about what it really takes to build a security-conscious society—one that understands people as much as it understands threats.</p><p>Listen to the full episode to hear how mindset, usability, and cultural attitudes are reshaping the human side of cybersecurity.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong></p><p><strong>Dr. Jason R.C. Nurse</strong>, Associate Professor in Cybersecurity at the University of Kent | <a href="https://www.linkedin.com/in/jasonrcnurse/">https://www.linkedin.com/in/jasonrcnurse/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p> </p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, jason r c nurse, rsac 2025, cybersecurity, behavior, mindset, usability, ai, trust, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20093055" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/acdd22b8-96a6-4091-a6e3-576bd59ad58f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=acdd22b8-96a6-4091-a6e3-576bd59ad58f&amp;feed=2M86zCcc"/>
      <itunes:title>Mindset Matters: Rethinking How We Teach and Design Cybersecurity | An RSAC Conference 2025 Conversation with Jason R.C. Nurse | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dr. Jason R.C. Nurse</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:55</itunes:duration>
      <itunes:summary>Dr. Jason R.C. Nurse explores how our attitudes toward cybersecurity—shaped by personal experience, workplace culture, and even convenience—directly influence our day-to-day behaviors. This episode uncovers why making security feel approachable, not intimidating, may be the key to building a safer digital world.</itunes:summary>
      <itunes:subtitle>Dr. Jason R.C. Nurse explores how our attitudes toward cybersecurity—shaped by personal experience, workplace culture, and even convenience—directly influence our day-to-day behaviors. This episode uncovers why making security feel approachable, not intimidating, may be the key to building a safer digital world.</itunes:subtitle>
      <itunes:keywords>jason r c nurse, behavior, marco ciappelli, rsac 2025, sean martin, trust, cybersecurity, conference, on location, mindset, usability, event coverage, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>214</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fdb504c5-5000-4bad-94e8-44a60780ead1</guid>
      <title>From Certification to Confidence: The Future of Cybersecurity Starts with the First Job | A Brand Story with Jamie Norton from ISACA | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>The cybersecurity workforce shortage isn’t a new problem—but according to Jamie Norton, Board Director at ISACA, it’s one that’s getting worse. In this on-location conversation during RSAC Conference 2025, Norton shares how ISACA is not only acknowledging this persistent gap but actively building pathways to close it, especially for early-career professionals.</p><p>While many know ISACA for its certifications and events, Norton emphasizes that the organization’s mission goes much deeper—supporting digital trust through education, community, and career development. One key area of focus: helping individuals navigate every phase of their professional journey, from new graduates to seasoned leaders. That includes new offerings like the Certified Cyber Operations Analyst (CCOA) credential, designed specifically to meet the growing demand for technical, hands-on skills in security operations roles.</p><p>What’s driving this shift? Norton points to employer demand for candidates who can walk into SOC and technical analyst roles with practical experience. The CCOA was created based on feedback from ISACA’s 185,000+ global members and a wide network of hiring organizations, all highlighting the same pain point: early-stage roles are difficult to fill, not because people aren’t interested, but because too many can’t prove their skills in ways hiring managers understand.</p><p>ISACA’s response is both strategic and community-driven. Certification development is rooted in large-scale data analysis and enhanced by input from members around the world, ensuring each program reflects real-world needs. At the same time, ISACA recognizes that certifications alone don’t create confidence. Community and mentorship matter—especially for those struggling with imposter syndrome or breaking into the field from non-traditional backgrounds.</p><p>Looking ahead, ISACA is investing in career journey tools, AI-focused certifications, and guidance for post-quantum readiness—all while continuing to support members through local chapters and global programs.</p><p>For those hiring, job-seeking, or guiding others into the field, this episode offers a grounded, forward-looking view into how one organization is equipping the cybersecurity workforce for the work that matters now—and what’s coming next.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Jamie Norton</strong>, Director Board of Directors, ISACA | <a href="https://www.linkedin.com/in/jamienorton/">https://www.linkedin.com/in/jamienorton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>jamie norton, sean martin, marco ciappelli, cybersecurity, certifications, workforce, skills, governance, community, careers, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 15:43:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jamie Norton, ISACA)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-certification-to-confidence-the-future-of-cybersecurity-starts-with-the-first-job-a-brand-story-with-jamie-norton-from-isaca-an-on-location-rsac-conference-2025-brand-story-Jq55EifC</link>
      <content:encoded><![CDATA[<p>The cybersecurity workforce shortage isn’t a new problem—but according to Jamie Norton, Board Director at ISACA, it’s one that’s getting worse. In this on-location conversation during RSAC Conference 2025, Norton shares how ISACA is not only acknowledging this persistent gap but actively building pathways to close it, especially for early-career professionals.</p><p>While many know ISACA for its certifications and events, Norton emphasizes that the organization’s mission goes much deeper—supporting digital trust through education, community, and career development. One key area of focus: helping individuals navigate every phase of their professional journey, from new graduates to seasoned leaders. That includes new offerings like the Certified Cyber Operations Analyst (CCOA) credential, designed specifically to meet the growing demand for technical, hands-on skills in security operations roles.</p><p>What’s driving this shift? Norton points to employer demand for candidates who can walk into SOC and technical analyst roles with practical experience. The CCOA was created based on feedback from ISACA’s 185,000+ global members and a wide network of hiring organizations, all highlighting the same pain point: early-stage roles are difficult to fill, not because people aren’t interested, but because too many can’t prove their skills in ways hiring managers understand.</p><p>ISACA’s response is both strategic and community-driven. Certification development is rooted in large-scale data analysis and enhanced by input from members around the world, ensuring each program reflects real-world needs. At the same time, ISACA recognizes that certifications alone don’t create confidence. Community and mentorship matter—especially for those struggling with imposter syndrome or breaking into the field from non-traditional backgrounds.</p><p>Looking ahead, ISACA is investing in career journey tools, AI-focused certifications, and guidance for post-quantum readiness—all while continuing to support members through local chapters and global programs.</p><p>For those hiring, job-seeking, or guiding others into the field, this episode offers a grounded, forward-looking view into how one organization is equipping the cybersecurity workforce for the work that matters now—and what’s coming next.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Jamie Norton</strong>, Director Board of Directors, ISACA | <a href="https://www.linkedin.com/in/jamienorton/">https://www.linkedin.com/in/jamienorton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>jamie norton, sean martin, marco ciappelli, cybersecurity, certifications, workforce, skills, governance, community, careers, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20517703" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7463a7d7-1ec3-4c98-aa95-9193f3b97968/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7463a7d7-1ec3-4c98-aa95-9193f3b97968&amp;feed=2M86zCcc"/>
      <itunes:title>From Certification to Confidence: The Future of Cybersecurity Starts with the First Job | A Brand Story with Jamie Norton from ISACA | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jamie Norton, ISACA</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:22</itunes:duration>
      <itunes:summary>Jamie Norton, Board Director at ISACA, shares how the organization is tackling the cybersecurity skills gap by focusing on career development, hands-on certifications, and community support for professionals at every stage. This episode explores how ISACA is aligning real-world workforce needs with practical solutions to help individuals enter, grow, and thrive in the field.</itunes:summary>
      <itunes:subtitle>Jamie Norton, Board Director at ISACA, shares how the organization is tackling the cybersecurity skills gap by focusing on career development, hands-on certifications, and community support for professionals at every stage. This episode explores how ISACA is aligning real-world workforce needs with practical solutions to help individuals enter, grow, and thrive in the field.</itunes:subtitle>
      <itunes:keywords>workforce, marketing podcast, marco ciappelli, sean martin, skills, cybersecurity, jamie norton, brand marketing, certifications, careers, community, brand story podcast, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>213</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1d1906d4-cbf0-4605-a6b7-351b8ae35fb6</guid>
      <title>Home Is Where the Threat Is: Protecting Executives in Their Personal Lives | A Brand Story with Chris Pierson from BlackCloak | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>When it comes to cybersecurity, corporate executives are often the most targeted individuals—but their greatest vulnerabilities may lie beyond the office walls. In this episode recorded live at RSAC Conference 2025, Dr. Chris Pierson, Founder and CEO of BlackCloak, joins hosts Sean Martin and Marco Ciappelli to unpack why digital executive protection is now a business necessity, not a luxury.</p><p>Dr. Pierson—a former two-time CISO, DHS cybersecurity advisor, and chief privacy officer—explains how BlackCloak addresses a long-ignored problem: the personal digital exposure of high-profile individuals and their families. From compromised home networks and identity theft to impersonation scams powered by deepfake technology, today’s cyber threats easily bypass corporate defenses by exploiting softer targets at home.</p><p>Digital Protection That Mirrors Physical Security</p><p>Just as companies rely on third-party providers for health insurance or physical executive protection, Dr. Pierson advocates for a dedicated, privacy-conscious solution for securing personal digital lives. BlackCloak functions as a concierge-style service, guiding individuals through essential steps like securing high-risk accounts, managing privacy settings, shrinking their attack surface, and implementing a modern, multifactor verification system to prevent impersonation attacks.</p><p>A Framework for Action</p><p>At RSAC, Dr. Pierson unveiled BlackCloak’s Digital Executive Protection Framework—a practical tool that includes 14 tenets and over 100 specific actions to assess and improve personal digital security maturity. The goal: help organizations prioritize what matters most. Instead of trying to secure every account or device equally, the framework focuses attention on high-value targets like banking credentials, communication platforms, and personal data exposed via data brokers.</p><p>From Deepfakes to Real-World Consequences</p><p>Pierson also highlights the alarming growth of AI-powered impersonation attacks. With 42% of surveyed CISOs reporting executive-targeted deepfake incidents, and financial losses climbing, companies must think differently. It’s not just about technology—it’s about trust, relationships, and verification at every level of communication.</p><p>This episode sheds light on how executive protection is evolving—and why your organization should consider extending its security strategy beyond the boardroom. To see how BlackCloak is redefining protection for the C-suite and their families, listen to the full episode.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/ ">https://www.linkedin.com/in/drchristopherpierson/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, chris pierson, cybersecurity, privacy, deepfakes, identity, executives, framework, protection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 14:31:55 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, BlackCloak, Chris Pierson)</author>
      <link>https://eventcoveragepodcast.com/episodes/home-is-where-the-threat-is-protecting-executives-in-their-personal-lives-a-brand-story-with-chris-pierson-from-blackcloak-an-on-location-rsac-conference-2025-brand-story-sjeBGapC</link>
      <content:encoded><![CDATA[<p>When it comes to cybersecurity, corporate executives are often the most targeted individuals—but their greatest vulnerabilities may lie beyond the office walls. In this episode recorded live at RSAC Conference 2025, Dr. Chris Pierson, Founder and CEO of BlackCloak, joins hosts Sean Martin and Marco Ciappelli to unpack why digital executive protection is now a business necessity, not a luxury.</p><p>Dr. Pierson—a former two-time CISO, DHS cybersecurity advisor, and chief privacy officer—explains how BlackCloak addresses a long-ignored problem: the personal digital exposure of high-profile individuals and their families. From compromised home networks and identity theft to impersonation scams powered by deepfake technology, today’s cyber threats easily bypass corporate defenses by exploiting softer targets at home.</p><p>Digital Protection That Mirrors Physical Security</p><p>Just as companies rely on third-party providers for health insurance or physical executive protection, Dr. Pierson advocates for a dedicated, privacy-conscious solution for securing personal digital lives. BlackCloak functions as a concierge-style service, guiding individuals through essential steps like securing high-risk accounts, managing privacy settings, shrinking their attack surface, and implementing a modern, multifactor verification system to prevent impersonation attacks.</p><p>A Framework for Action</p><p>At RSAC, Dr. Pierson unveiled BlackCloak’s Digital Executive Protection Framework—a practical tool that includes 14 tenets and over 100 specific actions to assess and improve personal digital security maturity. The goal: help organizations prioritize what matters most. Instead of trying to secure every account or device equally, the framework focuses attention on high-value targets like banking credentials, communication platforms, and personal data exposed via data brokers.</p><p>From Deepfakes to Real-World Consequences</p><p>Pierson also highlights the alarming growth of AI-powered impersonation attacks. With 42% of surveyed CISOs reporting executive-targeted deepfake incidents, and financial losses climbing, companies must think differently. It’s not just about technology—it’s about trust, relationships, and verification at every level of communication.</p><p>This episode sheds light on how executive protection is evolving—and why your organization should consider extending its security strategy beyond the boardroom. To see how BlackCloak is redefining protection for the C-suite and their families, listen to the full episode.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/ ">https://www.linkedin.com/in/drchristopherpierson/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, chris pierson, cybersecurity, privacy, deepfakes, identity, executives, framework, protection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23277909" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/464cea82-3c8d-4e9e-b9a3-d85b3306ad53/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=464cea82-3c8d-4e9e-b9a3-d85b3306ad53&amp;feed=2M86zCcc"/>
      <itunes:title>Home Is Where the Threat Is: Protecting Executives in Their Personal Lives | A Brand Story with Chris Pierson from BlackCloak | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, BlackCloak, Chris Pierson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:14</itunes:duration>
      <itunes:summary>Corporate cybersecurity doesn’t stop at the office door—Dr. Chris Pierson, CEO of BlackCloak, reveals how personal digital exposure is becoming one of the biggest threats to executives and their families. In this episode, discover why protecting high-profile individuals at home requires a new framework, new thinking, and a trusted partner.</itunes:summary>
      <itunes:subtitle>Corporate cybersecurity doesn’t stop at the office door—Dr. Chris Pierson, CEO of BlackCloak, reveals how personal digital exposure is becoming one of the biggest threats to executives and their families. In this episode, discover why protecting high-profile individuals at home requires a new framework, new thinking, and a trusted partner.</itunes:subtitle>
      <itunes:keywords>chris pierson, marketing podcast, marco ciappelli, sean martin, framework, cybersecurity, deepfakes, brand marketing, executives, identity, privacy, brand story podcast, brand story, protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>212</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c6dc706e-1f2f-4b40-b4bc-a7a6adc756f4</guid>
      <title>Resilience Is the Destination, Innovation Is the Path | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this closing update for the day from the RSAC conference show floor, Sean Martin and Marco Ciappelli reflect on the energy, conversations, and technology shaping cybersecurity today—and what’s coming next. With dozens of interviews under their belts, the duo shares what’s standing out across sessions and show-floor discussions.</p><p>Resilience has become a key destination, with innovation—especially around AI and quantum technologies—paving the way forward. Conversations touch on how security leaders are adjusting to new threat models, merging traditional disciplines like AppSec and DevSecOps with emerging areas such as vibe coding and container security. There’s a clear sense that the dialogue has shifted: zero trust isn’t just a topic; it’s embedded across many conversations. AI is no longer speculative—it’s embedded in discussions about GRC, automation, and security architecture.</p><p>Sean brings a technical and operational lens, while Marco plans to explore the societal implications in future conversations—something noticeably less discussed this year, but still deeply relevant. With more content being edited and released over the next few days, the team invites listeners to stay tuned for articles, panels, and post-conference reflections.</p><p>From San Francisco to London, Vegas, and maybe even Australia—this conversation is just getting started.</p><p><strong>___________</strong><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 00:23:26 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/resilience-is-the-destination-innovation-is-the-path-an-rsac-conference-2025-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-yYpDVkoC</link>
      <content:encoded><![CDATA[<p>In this closing update for the day from the RSAC conference show floor, Sean Martin and Marco Ciappelli reflect on the energy, conversations, and technology shaping cybersecurity today—and what’s coming next. With dozens of interviews under their belts, the duo shares what’s standing out across sessions and show-floor discussions.</p><p>Resilience has become a key destination, with innovation—especially around AI and quantum technologies—paving the way forward. Conversations touch on how security leaders are adjusting to new threat models, merging traditional disciplines like AppSec and DevSecOps with emerging areas such as vibe coding and container security. There’s a clear sense that the dialogue has shifted: zero trust isn’t just a topic; it’s embedded across many conversations. AI is no longer speculative—it’s embedded in discussions about GRC, automation, and security architecture.</p><p>Sean brings a technical and operational lens, while Marco plans to explore the societal implications in future conversations—something noticeably less discussed this year, but still deeply relevant. With more content being edited and released over the next few days, the team invites listeners to stay tuned for articles, panels, and post-conference reflections.</p><p>From San Francisco to London, Vegas, and maybe even Australia—this conversation is just getting started.</p><p><strong>___________</strong><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, rsac 2025, quantum, ai, grc, devsecops, zero trust, appsec, resilience, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="4386566" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c2ed76a5-ccf5-4a0b-990e-8b9beb54ee43/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c2ed76a5-ccf5-4a0b-990e-8b9beb54ee43&amp;feed=2M86zCcc"/>
      <itunes:title>Resilience Is the Destination, Innovation Is the Path | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:04:34</itunes:duration>
      <itunes:summary>Sean Martin and Marco Ciappelli walk the buzzing RSAC 2025 show floor to reflect on the real conversations shaping cybersecurity today—from quantum resilience and AI integration to the steady rise of zero trust and DevSecOps. With dozens of interviews recorded and more content on the way, this episode gives a quick but sharp pulse check on where the industry is headed next.</itunes:summary>
      <itunes:subtitle>Sean Martin and Marco Ciappelli walk the buzzing RSAC 2025 show floor to reflect on the real conversations shaping cybersecurity today—from quantum resilience and AI integration to the steady rise of zero trust and DevSecOps. With dozens of interviews recorded and more content on the way, this episode gives a quick but sharp pulse check on where the industry is headed next.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsac 2025, grc, sean martin, conference, on location, resilience, event coverage, appsec, quantum, ai, devsecops, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>211</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">57df483e-1b76-4125-9b49-1ccd4333f8ee</guid>
      <title>From Overwhelmed to Informed: The Future of Threat Detection Isn’t Just Faster—It’s Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this On Location Brand Story episode, Sean Martin speaks with Hugh Njemanze, President and Founder at Anomali, who has been at the center of cybersecurity operations since the early days of SIEM. Known for his prior work at ArcSight and now leading Anomali, Hugh shares what’s driving a dramatic shift in how security teams access, analyze, and act on data.</p><p>Anomali’s latest offering—a native cloud-based next-generation SIEM—goes beyond traditional detection. It combines high-performance threat intelligence with agentic AI to deliver answers and take action in ways that legacy platforms simply cannot. Rather than querying data manually or relying on slow pipelines, the system dynamically spins up thousands of cloud resources to answer complex security questions in seconds.</p><p><strong>Agentic AI Meets Threat Intelligence</strong></p><p>Hugh walks through how agentic AI, purpose-built for security, breaks new ground. Unlike general-purpose models, Anomali’s AI operates within a secure, bounded dataset tailored to the customer’s environment. It can ingest a hundred-page threat briefing, extract references to actors and tactics, map those to the MITRE ATT&CK framework, and assess the organization’s specific exposure—all in moments. Then it goes a step further: evaluating past events, checking defenses, and recommending mitigations. This isn’t just contextual awareness—it’s operational intelligence at speed and scale.</p><p><strong>Making Security More Human-Centric</strong></p><p>One clear theme emerges: the democratization of security tools. With Anomali’s design, teams no longer need to rely on a few highly trained specialists. Broader teams can engage directly with the platform, reducing burnout and turnover, and increasing organizational resilience. Managers and security leaders now shift focus to prioritization, strategic decision-making, and meaningful business conversations—like aligning defenses to M&A activity or reporting to the board with clarity on risk.</p><p><strong>Real-World Results and Risk Insights</strong></p><p>Customers are already seeing measurable benefits: an 88% reduction in incidents and an increase in team-wide tool adoption. Anomali’s system doesn’t just detect—it correlates attack surface data with threat activity to highlight what’s both vulnerable and actively targeted. This enables targeted response, cost-effective scaling, and better use of resources.</p><p>Learn more about Anomali: <a href="https://itspm.ag/anomali-bdz393">https://itspm.ag/anomali-bdz393</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Hugh Njemanze</strong>, President and Founder at Anomali | <a href="https://www.linkedin.com/in/hugh-njemanze-603721/">https://www.linkedin.com/in/hugh-njemanze-603721/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Anomali: <a href="https://www.itspmagazine.com/directory/anomali">https://www.itspmagazine.com/directory/anomali</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, hugh njemanze, siem, cybersecurity, ai, threat intelligence, agentic ai, risk management, soc, cloud security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 20:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Hugh Njemanze, Anomali)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-overwhelmed-to-informed-the-future-of-threat-detection-isnt-just-fasterits-strategic-a-brand-story-with-hugh-njemanze-from-anomali-an-on-location-rsac-conference-2025-brand-story-bAV_KFXF</link>
      <content:encoded><![CDATA[<p>In this On Location Brand Story episode, Sean Martin speaks with Hugh Njemanze, President and Founder at Anomali, who has been at the center of cybersecurity operations since the early days of SIEM. Known for his prior work at ArcSight and now leading Anomali, Hugh shares what’s driving a dramatic shift in how security teams access, analyze, and act on data.</p><p>Anomali’s latest offering—a native cloud-based next-generation SIEM—goes beyond traditional detection. It combines high-performance threat intelligence with agentic AI to deliver answers and take action in ways that legacy platforms simply cannot. Rather than querying data manually or relying on slow pipelines, the system dynamically spins up thousands of cloud resources to answer complex security questions in seconds.</p><p><strong>Agentic AI Meets Threat Intelligence</strong></p><p>Hugh walks through how agentic AI, purpose-built for security, breaks new ground. Unlike general-purpose models, Anomali’s AI operates within a secure, bounded dataset tailored to the customer’s environment. It can ingest a hundred-page threat briefing, extract references to actors and tactics, map those to the MITRE ATT&CK framework, and assess the organization’s specific exposure—all in moments. Then it goes a step further: evaluating past events, checking defenses, and recommending mitigations. This isn’t just contextual awareness—it’s operational intelligence at speed and scale.</p><p><strong>Making Security More Human-Centric</strong></p><p>One clear theme emerges: the democratization of security tools. With Anomali’s design, teams no longer need to rely on a few highly trained specialists. Broader teams can engage directly with the platform, reducing burnout and turnover, and increasing organizational resilience. Managers and security leaders now shift focus to prioritization, strategic decision-making, and meaningful business conversations—like aligning defenses to M&A activity or reporting to the board with clarity on risk.</p><p><strong>Real-World Results and Risk Insights</strong></p><p>Customers are already seeing measurable benefits: an 88% reduction in incidents and an increase in team-wide tool adoption. Anomali’s system doesn’t just detect—it correlates attack surface data with threat activity to highlight what’s both vulnerable and actively targeted. This enables targeted response, cost-effective scaling, and better use of resources.</p><p>Learn more about Anomali: <a href="https://itspm.ag/anomali-bdz393">https://itspm.ag/anomali-bdz393</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Hugh Njemanze</strong>, President and Founder at Anomali | <a href="https://www.linkedin.com/in/hugh-njemanze-603721/">https://www.linkedin.com/in/hugh-njemanze-603721/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Anomali: <a href="https://www.itspmagazine.com/directory/anomali">https://www.itspmagazine.com/directory/anomali</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, hugh njemanze, siem, cybersecurity, ai, threat intelligence, agentic ai, risk management, soc, cloud security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20317495" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4cee623f-889a-46c3-96c9-8b3e68e4e7c3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4cee623f-889a-46c3-96c9-8b3e68e4e7c3&amp;feed=2M86zCcc"/>
      <itunes:title>From Overwhelmed to Informed: The Future of Threat Detection Isn’t Just Faster—It’s Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Hugh Njemanze, Anomali</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:09</itunes:duration>
      <itunes:summary>Hugh Njemanze, President and Founder at Anomali, reveals how a purpose-built, cloud-native SIEM infused with agentic AI is transforming how security teams detect threats, reduce incidents, and prioritize risk. From faster investigations to board-ready insights, this conversation challenges outdated assumptions and showcases what modern security operations can truly achieve.</itunes:summary>
      <itunes:subtitle>Hugh Njemanze, President and Founder at Anomali, reveals how a purpose-built, cloud-native SIEM infused with agentic AI is transforming how security teams detect threats, reduce incidents, and prioritize risk. From faster investigations to board-ready insights, this conversation challenges outdated assumptions and showcases what modern security operations can truly achieve.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, siem, sean martin, hugh njemanze, cybersecurity, risk management, threat intelligence, soc, cloud security, brand marketing, ai, agentic ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>210</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b1e17a65-b875-4440-b30a-cde4404980b7</guid>
      <title>From Space to AI: Expanding the Cybersecurity Conversation with Cyber Unity | An RSAC Conference 2025 Conversation with Luigi Martino and Luca Tagliaretti | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At RSAC Conference 2025 in San Francisco, the message is clear: cybersecurity must be a shared endeavor—across nations, disciplines, and sectors. In this episode, Marco Ciappelli and Sean Martin welcome two distinguished voices from Italy who are helping shape this collective path forward: Luigi Martino, Director of the Center for Cybersecurity and International Relations Studies at the University of Florence, and Luca Tagliaretti, Executive Director of the European Cybersecurity Competence Centre (ECCC).</p><p><strong>Cybersecurity as a Multinational, Multidimensional Effort</strong></p><p>Luigi Martino, who also holds roles at the University of Bologna and Khalifa University in Abu Dhabi, underscores the growing global awareness that cybersecurity is no longer a niche concern—it’s embedded in everything, from space to artificial intelligence. He emphasizes that cyber cannot be treated in isolation and must be considered alongside advancements in quantum technologies, AI, and the systems that govern our modern society.</p><p>For Luca Tagliaretti, leading the EU’s newly autonomous cybersecurity body, this interconnected view plays out through policy and community-building. The ECCC’s role spans everything from shaping long-term cybersecurity strategies across Europe to investing in innovation and skilling up the current workforce. He describes this as a community-first mission—building cohesion not just across EU member states, but eventually through global alignment.</p><p><strong>Regulation: Guardrail or Roadblock?</strong></p><p>A major theme discussed is the role of regulation in fostering or hindering innovation. Both guests agree that thoughtful regulation—especially in AI—is not the enemy of progress. Rather, it can be a mechanism for building trust, ensuring ethical use, and creating market conditions where all players, not just the biggest, can thrive. Bureaucracy, not regulation itself, is called out as the more significant challenge—particularly when public institutions aren’t equipped to implement modern governance.</p><p><strong>What They’re Taking Home from RSAC</strong></p><p>Asked what they’ll bring back from the conference, Luca points to the “sense of unity”—the opportunity to build on shared knowledge and collaborate across borders. Luigi highlights the spirit of open innovation and trust that defines the RSAC community: a willingness to share, experiment, and move forward together.</p><p>Both perspectives offer a powerful reminder—cybersecurity isn’t just about defending systems, it’s about building connections.</p><p><strong>___________</strong><br /><br /><strong>Guest:s </strong><br /><strong>Luigi Martino</strong>, Principal Research Scientist at Khalifa University and Head at the Center for Cyber Security and International Relations Studies | <a href="https://www.linkedin.com/in/luigi-martino-07515364/">https://www.linkedin.com/in/luigi-martino-07515364/</a></p><p><strong>Luca Tagliaretti</strong>, Executive Director at ECCC | <a href="https://www.linkedin.com/in/luca-tagliaretti-564a703/">https://www.linkedin.com/in/luca-tagliaretti-564a703/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, sean martin, luigi martino, luca tagliaretti, rsac 2025, cybersecurity, regulation, ai, quantum, collaboration, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 19:45:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Luigi Martino, Luca Tagliaretti)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-space-to-ai-expanding-the-cybersecurity-conversation-with-cyber-unity-an-rsac-conference-2025-conversation-with-luigi-martino-and-luca-tagliaretti-on-location-coverage-with-sean-martin-and-marco-ciappelli-t_3eNJQl</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025 in San Francisco, the message is clear: cybersecurity must be a shared endeavor—across nations, disciplines, and sectors. In this episode, Marco Ciappelli and Sean Martin welcome two distinguished voices from Italy who are helping shape this collective path forward: Luigi Martino, Director of the Center for Cybersecurity and International Relations Studies at the University of Florence, and Luca Tagliaretti, Executive Director of the European Cybersecurity Competence Centre (ECCC).</p><p><strong>Cybersecurity as a Multinational, Multidimensional Effort</strong></p><p>Luigi Martino, who also holds roles at the University of Bologna and Khalifa University in Abu Dhabi, underscores the growing global awareness that cybersecurity is no longer a niche concern—it’s embedded in everything, from space to artificial intelligence. He emphasizes that cyber cannot be treated in isolation and must be considered alongside advancements in quantum technologies, AI, and the systems that govern our modern society.</p><p>For Luca Tagliaretti, leading the EU’s newly autonomous cybersecurity body, this interconnected view plays out through policy and community-building. The ECCC’s role spans everything from shaping long-term cybersecurity strategies across Europe to investing in innovation and skilling up the current workforce. He describes this as a community-first mission—building cohesion not just across EU member states, but eventually through global alignment.</p><p><strong>Regulation: Guardrail or Roadblock?</strong></p><p>A major theme discussed is the role of regulation in fostering or hindering innovation. Both guests agree that thoughtful regulation—especially in AI—is not the enemy of progress. Rather, it can be a mechanism for building trust, ensuring ethical use, and creating market conditions where all players, not just the biggest, can thrive. Bureaucracy, not regulation itself, is called out as the more significant challenge—particularly when public institutions aren’t equipped to implement modern governance.</p><p><strong>What They’re Taking Home from RSAC</strong></p><p>Asked what they’ll bring back from the conference, Luca points to the “sense of unity”—the opportunity to build on shared knowledge and collaborate across borders. Luigi highlights the spirit of open innovation and trust that defines the RSAC community: a willingness to share, experiment, and move forward together.</p><p>Both perspectives offer a powerful reminder—cybersecurity isn’t just about defending systems, it’s about building connections.</p><p><strong>___________</strong><br /><br /><strong>Guest:s </strong><br /><strong>Luigi Martino</strong>, Principal Research Scientist at Khalifa University and Head at the Center for Cyber Security and International Relations Studies | <a href="https://www.linkedin.com/in/luigi-martino-07515364/">https://www.linkedin.com/in/luigi-martino-07515364/</a></p><p><strong>Luca Tagliaretti</strong>, Executive Director at ECCC | <a href="https://www.linkedin.com/in/luca-tagliaretti-564a703/">https://www.linkedin.com/in/luca-tagliaretti-564a703/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>marco ciappelli, sean martin, luigi martino, luca tagliaretti, rsac 2025, cybersecurity, regulation, ai, quantum, collaboration, event coverage, on location, conference</p><p><strong>___________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20185445" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ad85ae1a-d5e7-4602-a2de-2c20b837ffb1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ad85ae1a-d5e7-4602-a2de-2c20b837ffb1&amp;feed=2M86zCcc"/>
      <itunes:title>From Space to AI: Expanding the Cybersecurity Conversation with Cyber Unity | An RSAC Conference 2025 Conversation with Luigi Martino and Luca Tagliaretti | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Luigi Martino, Luca Tagliaretti</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:01</itunes:duration>
      <itunes:summary>In this episode recorded live at RSAC, Luigi Martino from the University of Florence and Luca Tagliaretti from the European Cybersecurity Competence Centre explore how international collaboration, regulation, and innovation intersect to shape the future of cybersecurity. Their conversation highlights the need for community-driven strategies that balance technological advancement with ethical responsibility and global cooperation.</itunes:summary>
      <itunes:subtitle>In this episode recorded live at RSAC, Luigi Martino from the University of Florence and Luca Tagliaretti from the European Cybersecurity Competence Centre explore how international collaboration, regulation, and innovation intersect to shape the future of cybersecurity. Their conversation highlights the need for community-driven strategies that balance technological advancement with ethical responsibility and global cooperation.</itunes:subtitle>
      <itunes:keywords>collaboration, marco ciappelli, rsac 2025, sean martin, luca tagliaretti, cybersecurity, conference, on location, luigi martino, event coverage, quantum, regulation, ai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>209</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">93aeb39b-805d-4ace-8b25-6e43e57c777b</guid>
      <title>When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.</p><p><strong>Cyber Resilience, Not Just Storage</strong></p><p>According to Herzog, today’s enterprise buyers—especially those in the Global Fortune 2000—aren’t just asking how to store data. They’re asking how to protect it when things go wrong. That’s why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.</p><p><strong>Built-In Defense and Blazing-Fast Recovery</strong></p><p>The integration isn’t cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.</p><p><strong>Real-World Scenarios, Real Business Outcomes</strong></p><p>Herzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.</p><p><strong>Simplified Operations, Smarter Security</strong></p><p>The message is clear: storage can’t be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Eric Herzog</strong>, Chief Marketing Officer, Infinidat | <a href="https://www.linkedin.com/in/erherzog/">https://www.linkedin.com/in/erherzog/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat">https://www.itspmagazine.com/directory/infinidat</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 19:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Eric Herzog, Infinidat)</author>
      <link>https://eventcoveragepodcast.com/episodes/when-every-second-counts-building-cyber-resilience-through-a-smarter-approach-to-data-protection-a-brand-story-with-eric-herzog-from-infinidat-an-on-location-rsac-conference-2025-brand-story-fgfUlTkF</link>
      <content:encoded><![CDATA[<p>Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.</p><p><strong>Cyber Resilience, Not Just Storage</strong></p><p>According to Herzog, today’s enterprise buyers—especially those in the Global Fortune 2000—aren’t just asking how to store data. They’re asking how to protect it when things go wrong. That’s why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.</p><p><strong>Built-In Defense and Blazing-Fast Recovery</strong></p><p>The integration isn’t cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.</p><p><strong>Real-World Scenarios, Real Business Outcomes</strong></p><p>Herzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.</p><p><strong>Simplified Operations, Smarter Security</strong></p><p>The message is clear: storage can’t be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Eric Herzog</strong>, Chief Marketing Officer, Infinidat | <a href="https://www.linkedin.com/in/erherzog/">https://www.linkedin.com/in/erherzog/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat">https://www.itspmagazine.com/directory/infinidat</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18324668" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/59119f91-df6e-47c7-9860-6a772c82dd77/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=59119f91-df6e-47c7-9860-6a772c82dd77&amp;feed=2M86zCcc"/>
      <itunes:title>When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Eric Herzog, Infinidat</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:05</itunes:duration>
      <itunes:summary>In this episode, Infinidat CMO Eric Herzog breaks down how storage can be a frontline player in cybersecurity—automating threat response, integrating with SOC tools, and guaranteeing ultra-fast data recovery. If you’re still treating storage as passive infrastructure, this conversation will change your perspective.</itunes:summary>
      <itunes:subtitle>In this episode, Infinidat CMO Eric Herzog breaks down how storage can be a frontline player in cybersecurity—automating threat response, integrating with SOC tools, and guaranteeing ultra-fast data recovery. If you’re still treating storage as passive infrastructure, this conversation will change your perspective.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, automation, storage, cybersecurity, eric herzog, resilience, soc, enterprise, ransomware, brand marketing, brand story podcast, recovery, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>208</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3f3d89fe-8319-43d5-927f-4ed6bd7e0d96</guid>
      <title>Building Trust Through AI and Software Transparency: The Real Value of SBOMs and AISBOMs | An RSAC Conference 2025 Conversation with Helen Oakley and Dmitry Raidman | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Helen Oakley, Senior Director of Product Security at SAP, and Dmitry Raidman, Co-founder and CTO of Cybeats, joined us live at the RSAC Conference to bring clarity to one of the most urgent topics in cybersecurity: transparency in the software and AI supply chain. Their message is direct—organizations not only need to understand what’s in their software, they need to understand the origin, integrity, and impact of those components, especially as artificial intelligence becomes more deeply integrated into business operations.</p><p><strong>SBOMs Are Not Optional Anymore</strong></p><p>Software Bills of Materials (SBOMs) have long been a recommended best practice, but they’re now reaching a point of necessity. As Dmitry noted, organizations are increasingly requiring SBOMs before making purchase decisions—“If you’re not going to give me an SBOM, I’m not going to buy your product.” With regulatory pressure mounting through frameworks like the EU Cyber Resilience Act (CRA), the demand for transparency is being driven not just by compliance, but by real operational value. Companies adopting SBOMs are seeing tangible returns—saving hundreds of hours on risk analysis and response, while also improving internal visibility.</p><p><strong>Bringing AI into the SBOM Fold</strong></p><p>But what happens when the software includes AI models, data pipelines, and autonomous agents? Helen and Dmitry are leading a community-driven initiative to create AI-specific SBOMs—referred to as AI SBOMs or AISBOMs—to capture critical metadata beyond just the code. This includes model architectures, training data, energy consumption, and more. These elements are vital for risk management, especially when organizations may be unknowingly deploying models with embedded vulnerabilities or opaque dependencies.</p><p><strong>A Tool for the Community, Built by the Community</strong></p><p>In an important milestone for the industry, Helen and Dmitry also introduced the first open source tool capable of generating CycloneDX-formatted AISBOMs for models hosted on Hugging Face. This practical step bridges the gap between standards and implementation—helping organizations move from theoretical compliance to actionable insight. The community’s response has been overwhelmingly positive, signaling a clear demand for tools that turn complexity into clarity.</p><p><strong>Why Security Leaders Should Pay Attention</strong></p><p>The real value of an SBOM—whether for software or AI—is not just external compliance. It’s about knowing what you have, recognizing your crown jewels, and understanding where your risks lie. As AI compounds existing vulnerabilities and introduces new ones, starting with transparency is no longer a suggestion—it’s a strategic necessity.</p><p>Want to see how this all fits together? Hear it directly from Helen and Dmitry in this episode.</p><p><strong>___________</strong><br /><br /><strong>Guests: </strong><br /><strong>Helen Oakley</strong>, Senior Director of Product Security at SAP | <a href="https://www.linkedin.com/in/helen-oakley/">https://www.linkedin.com/in/helen-oakley/</a></p><p><strong>Dmitry Raidman</strong>, Co-founder and CTO of Cybeats | <a href="https://www.linkedin.com/in/draidman/">https://www.linkedin.com/in/draidman/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>LinkedIn Post with Links: <a href="https://www.linkedin.com/posts/helen-oakley_ai-sbom-aisbom-activity-7323123172852015106-TJea">https://www.linkedin.com/posts/helen-oakley_ai-sbom-aisbom-activity-7323123172852015106-TJea</a></p><p>An open letter to third-party suppliers: <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>______________________</p><p>KEYWORDS</p><p>helen oakley, dmitry raidman, sean martin, rsac 2025, sbom, aisbom, ai security, software supply chain, transparency, open source, event coverage, on location, conference</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 18:15:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dmitry Raidman, Helen Oakley)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-trust-through-ai-and-software-transparency-the-real-value-of-sboms-and-aisboms-an-rsac-conference-2025-conversation-with-helen-oakley-and-dmitry-raidman-on-location-coverage-with-sean-martin-and-marco-ciappelli-GfqGmzuq</link>
      <content:encoded><![CDATA[<p>Helen Oakley, Senior Director of Product Security at SAP, and Dmitry Raidman, Co-founder and CTO of Cybeats, joined us live at the RSAC Conference to bring clarity to one of the most urgent topics in cybersecurity: transparency in the software and AI supply chain. Their message is direct—organizations not only need to understand what’s in their software, they need to understand the origin, integrity, and impact of those components, especially as artificial intelligence becomes more deeply integrated into business operations.</p><p><strong>SBOMs Are Not Optional Anymore</strong></p><p>Software Bills of Materials (SBOMs) have long been a recommended best practice, but they’re now reaching a point of necessity. As Dmitry noted, organizations are increasingly requiring SBOMs before making purchase decisions—“If you’re not going to give me an SBOM, I’m not going to buy your product.” With regulatory pressure mounting through frameworks like the EU Cyber Resilience Act (CRA), the demand for transparency is being driven not just by compliance, but by real operational value. Companies adopting SBOMs are seeing tangible returns—saving hundreds of hours on risk analysis and response, while also improving internal visibility.</p><p><strong>Bringing AI into the SBOM Fold</strong></p><p>But what happens when the software includes AI models, data pipelines, and autonomous agents? Helen and Dmitry are leading a community-driven initiative to create AI-specific SBOMs—referred to as AI SBOMs or AISBOMs—to capture critical metadata beyond just the code. This includes model architectures, training data, energy consumption, and more. These elements are vital for risk management, especially when organizations may be unknowingly deploying models with embedded vulnerabilities or opaque dependencies.</p><p><strong>A Tool for the Community, Built by the Community</strong></p><p>In an important milestone for the industry, Helen and Dmitry also introduced the first open source tool capable of generating CycloneDX-formatted AISBOMs for models hosted on Hugging Face. This practical step bridges the gap between standards and implementation—helping organizations move from theoretical compliance to actionable insight. The community’s response has been overwhelmingly positive, signaling a clear demand for tools that turn complexity into clarity.</p><p><strong>Why Security Leaders Should Pay Attention</strong></p><p>The real value of an SBOM—whether for software or AI—is not just external compliance. It’s about knowing what you have, recognizing your crown jewels, and understanding where your risks lie. As AI compounds existing vulnerabilities and introduces new ones, starting with transparency is no longer a suggestion—it’s a strategic necessity.</p><p>Want to see how this all fits together? Hear it directly from Helen and Dmitry in this episode.</p><p><strong>___________</strong><br /><br /><strong>Guests: </strong><br /><strong>Helen Oakley</strong>, Senior Director of Product Security at SAP | <a href="https://www.linkedin.com/in/helen-oakley/">https://www.linkedin.com/in/helen-oakley/</a></p><p><strong>Dmitry Raidman</strong>, Co-founder and CTO of Cybeats | <a href="https://www.linkedin.com/in/draidman/">https://www.linkedin.com/in/draidman/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>LinkedIn Post with Links: <a href="https://www.linkedin.com/posts/helen-oakley_ai-sbom-aisbom-activity-7323123172852015106-TJea">https://www.linkedin.com/posts/helen-oakley_ai-sbom-aisbom-activity-7323123172852015106-TJea</a></p><p>An open letter to third-party suppliers: <a href="https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers">https://www.jpmorgan.com/technology/technology-blog/open-letter-to-our-suppliers</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>______________________</p><p>KEYWORDS</p><p>helen oakley, dmitry raidman, sean martin, rsac 2025, sbom, aisbom, ai security, software supply chain, transparency, open source, event coverage, on location, conference</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18845034" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9f92140b-b173-474f-b643-dfb29c27bd5d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9f92140b-b173-474f-b643-dfb29c27bd5d&amp;feed=2M86zCcc"/>
      <itunes:title>Building Trust Through AI and Software Transparency: The Real Value of SBOMs and AISBOMs | An RSAC Conference 2025 Conversation with Helen Oakley and Dmitry Raidman | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dmitry Raidman, Helen Oakley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:37</itunes:duration>
      <itunes:summary>Helen Oakley and Dmitry Raidman reveal how Software and AI Bills of Materials (SBOMs and AISBOMs) are transforming supply chain transparency from a compliance checkbox into a business advantage. In this episode, they unveil a new open-source tool and explain why understanding what’s inside your AI and software stack is critical for trust, security, and operational clarity.</itunes:summary>
      <itunes:subtitle>Helen Oakley and Dmitry Raidman reveal how Software and AI Bills of Materials (SBOMs and AISBOMs) are transforming supply chain transparency from a compliance checkbox into a business advantage. In this episode, they unveil a new open-source tool and explain why understanding what’s inside your AI and software stack is critical for trust, security, and operational clarity.</itunes:subtitle>
      <itunes:keywords>transparency, marco ciappelli, ai security, rsac 2025, sean martin, cybersecurity, conference, on location, aisbom, dmitry raidman, open source, event coverage, helen oakley, sbom, software supply chain</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>207</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">699d5481-2591-49c4-98d2-8cbe0ff08b5c</guid>
      <title>What Endpoint Security Isn’t Catching: Why Network Visibility Still Matters | A Brand Story with Brian Dye from Corelight | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, Sean Martin catches up with Brian Dye, CEO of Corelight, to explore a recurring truth in cybersecurity: attackers adapt, and defenders must follow suit. In this episode, Dye lays out why traditional perimeter defenses and endpoint controls alone are no longer sufficient—and why it’s time for security teams to look back toward the network for answers.</p><p>Beyond the Perimeter: Visibility as a Force Multiplier</p><p>According to Dye, many organizations are still relying on security architectures that were top-of-the-line a decade ago. But attackers have already moved on. They’re bypassing endpoint detection and response (EDR) tools, exploiting unmanaged devices, IoT, and edge vulnerabilities. What’s left exposed is the network itself—and that’s where Corelight positions itself: providing what Dye calls “ground truth” through network-based visibility.</p><p>Rather than rearchitecting environments or pushing intrusive solutions, Corelight integrates passively through out-of-line methods like packet brokers or traffic mirroring. The goal? Rich, contextual, retrospective visibility—without disrupting the network. This capability has proven essential for responding to advanced threats, including lateral movement and ransomware campaigns where knowing exactly what happened and when can mean the difference between paying a ransom or proving there’s no real damage.</p><p>Three Layers of Network Insight</p><p>Dye outlines a layered approach to detection:</p><p>1. Baseline Network Activity – High-fidelity summaries of what’s happening.</p><p>2. Raw Detections – Behavioral rules, signatures, and machine learning.</p><p>3. Anomaly Detection – Identifying “new and unusual” activity with clustering math that filters out noise and highlights what truly matters.</p><p>This model supports teams who need to correlate signals across endpoints, identities, and cloud environments—especially as AI-driven operations expand the attack surface with non-human behavior patterns.</p><p>The Metrics That Matter</p><p>Dye points to three critical success metrics for teams:</p><p>• Visibility coverage over time.</p><p>• MITRE ATT&CK coverage, especially around lateral movement.</p><p>• The percentage of unresolved cases—those embarrassing unknowns that drain time and confidence.</p><p>As Dye shares, organizations that prioritize network-level visibility not only reduce uncertainty, but also strengthen every other layer of their detection and response strategy.</p><p>Learn more about Corelight: <a href="https://itspm.ag/coreligh-954270">https://itspm.ag/coreligh-954270</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p>Brian Dye, Chief Executive Officer, Corelight | <a href="https://www.linkedin.com/in/brdye/">https://www.linkedin.com/in/brdye/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Corelight: <a href="https://www.itspmagazine.com/directory/corelight">https://www.itspmagazine.com/directory/corelight</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, brian dye, network, visibility, ransomware, detection, cybersecurity, soc, anomalies, baselining, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 17:32:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Dye, Corelight)</author>
      <link>https://eventcoveragepodcast.com/episodes/what-endpoint-security-isnt-catching-why-network-visibility-still-matters-a-brand-story-with-brian-dye-from-corelight-an-on-location-rsac-conference-2025-brand-story-PxsTqJnU</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, Sean Martin catches up with Brian Dye, CEO of Corelight, to explore a recurring truth in cybersecurity: attackers adapt, and defenders must follow suit. In this episode, Dye lays out why traditional perimeter defenses and endpoint controls alone are no longer sufficient—and why it’s time for security teams to look back toward the network for answers.</p><p>Beyond the Perimeter: Visibility as a Force Multiplier</p><p>According to Dye, many organizations are still relying on security architectures that were top-of-the-line a decade ago. But attackers have already moved on. They’re bypassing endpoint detection and response (EDR) tools, exploiting unmanaged devices, IoT, and edge vulnerabilities. What’s left exposed is the network itself—and that’s where Corelight positions itself: providing what Dye calls “ground truth” through network-based visibility.</p><p>Rather than rearchitecting environments or pushing intrusive solutions, Corelight integrates passively through out-of-line methods like packet brokers or traffic mirroring. The goal? Rich, contextual, retrospective visibility—without disrupting the network. This capability has proven essential for responding to advanced threats, including lateral movement and ransomware campaigns where knowing exactly what happened and when can mean the difference between paying a ransom or proving there’s no real damage.</p><p>Three Layers of Network Insight</p><p>Dye outlines a layered approach to detection:</p><p>1. Baseline Network Activity – High-fidelity summaries of what’s happening.</p><p>2. Raw Detections – Behavioral rules, signatures, and machine learning.</p><p>3. Anomaly Detection – Identifying “new and unusual” activity with clustering math that filters out noise and highlights what truly matters.</p><p>This model supports teams who need to correlate signals across endpoints, identities, and cloud environments—especially as AI-driven operations expand the attack surface with non-human behavior patterns.</p><p>The Metrics That Matter</p><p>Dye points to three critical success metrics for teams:</p><p>• Visibility coverage over time.</p><p>• MITRE ATT&CK coverage, especially around lateral movement.</p><p>• The percentage of unresolved cases—those embarrassing unknowns that drain time and confidence.</p><p>As Dye shares, organizations that prioritize network-level visibility not only reduce uncertainty, but also strengthen every other layer of their detection and response strategy.</p><p>Learn more about Corelight: <a href="https://itspm.ag/coreligh-954270">https://itspm.ag/coreligh-954270</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p>Brian Dye, Chief Executive Officer, Corelight | <a href="https://www.linkedin.com/in/brdye/">https://www.linkedin.com/in/brdye/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Corelight: <a href="https://www.itspmagazine.com/directory/corelight">https://www.itspmagazine.com/directory/corelight</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, brian dye, network, visibility, ransomware, detection, cybersecurity, soc, anomalies, baselining, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18073905" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c9266192-d0d6-48a3-8ff0-44288f579e99/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c9266192-d0d6-48a3-8ff0-44288f579e99&amp;feed=2M86zCcc"/>
      <itunes:title>What Endpoint Security Isn’t Catching: Why Network Visibility Still Matters | A Brand Story with Brian Dye from Corelight | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Dye, Corelight</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:49</itunes:duration>
      <itunes:summary>In this On Location Brand Story episode, Corelight CEO Brian Dye explains why network visibility is becoming the most critical—and often overlooked—layer in modern cybersecurity defense. He breaks down how organizations can detect what endpoint tools miss, measure success more effectively, and avoid costly blind spots during attacks like ransomware.</itunes:summary>
      <itunes:subtitle>In this On Location Brand Story episode, Corelight CEO Brian Dye explains why network visibility is becoming the most critical—and often overlooked—layer in modern cybersecurity defense. He breaks down how organizations can detect what endpoint tools miss, measure success more effectively, and avoid costly blind spots during attacks like ransomware.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, network, cybersecurity, detection, brian dye, soc, ransomware, brand marketing, anomalies, visibility, baselining, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>206</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0604cca1-d965-43b9-bc5d-a15b0daa51e9</guid>
      <title>Security at a Crossroads: Innovation, Risk, and the Relationship Between the CISO and the Vendor Community | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this closing conversation from Day One at RSAC Conference 2025, ITSPmagazine co-founders Sean Martin and Marco Ciappelli reflect on what they’re hearing in the halls, on the show floor, and in conversations with attendees—and the picture they’re painting may surprise you.</p><p>Sean Martin raises a recurring theme that’s come up in multiple off-camera discussions: the increasing hesitancy among CISOs to engage with new vendors or consider new technologies unless they come from familiar sources. The concern isn’t about the technology itself—it’s about time, trust, and the overwhelming volume of noise. In many cases, CISOs prefer to rely on their peer network rather than explore unknown options, potentially limiting their exposure to different ways of thinking about risk and security.</p><p>But this isn’t just a “vendor fatigue” issue. It’s a structural one.</p><p>Martin points to a conversation with Philip Miller, who emphasized the need for vendors to connect with the security team—not just the CISO. That shift could unlock a healthier, more scalable way to evaluate solutions without overloading leadership. When security teams are empowered to explore, test, and validate, it changes the decision-making dynamic and may lead to more open-minded program development—especially as AI begins reshaping how data and security interact.</p><p>Meanwhile, Marco Ciappelli looks at this cultural tension from a societal perspective. He draws parallels between the speed of technological progress and the slower-moving nature of regulation, governance, and even human behavior. If security programs are stuck in reactive modes—bound by risk aversion, budget constraints, or outdated expectations—how can they support the innovation their businesses (and society) demand?</p><p>The two hosts conclude that change isn’t just needed—it’s already underway, albeit unevenly. The key may lie in empowering the broader security ecosystem, from frontline analysts to policy makers, to think and act with more agility.</p><p>For those wrestling with how security can lead rather than lag, this conversation offers a timely reflection—and a few provocations worth sitting with.</p><p>What does a future-ready security program really look like?</p><p>Learn more and catch more stories from RSAC Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p><strong>___________</strong></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, ciso, ai, cybersecurity, risk, decisionmaking, innovation, rsac 2025, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 01:36:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/security-at-a-crossroads-innovation-risk-and-the-relationship-between-the-ciso-and-the-vendor-community-an-rsac-conference-2025-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-6Yu_LTvR</link>
      <content:encoded><![CDATA[<p>In this closing conversation from Day One at RSAC Conference 2025, ITSPmagazine co-founders Sean Martin and Marco Ciappelli reflect on what they’re hearing in the halls, on the show floor, and in conversations with attendees—and the picture they’re painting may surprise you.</p><p>Sean Martin raises a recurring theme that’s come up in multiple off-camera discussions: the increasing hesitancy among CISOs to engage with new vendors or consider new technologies unless they come from familiar sources. The concern isn’t about the technology itself—it’s about time, trust, and the overwhelming volume of noise. In many cases, CISOs prefer to rely on their peer network rather than explore unknown options, potentially limiting their exposure to different ways of thinking about risk and security.</p><p>But this isn’t just a “vendor fatigue” issue. It’s a structural one.</p><p>Martin points to a conversation with Philip Miller, who emphasized the need for vendors to connect with the security team—not just the CISO. That shift could unlock a healthier, more scalable way to evaluate solutions without overloading leadership. When security teams are empowered to explore, test, and validate, it changes the decision-making dynamic and may lead to more open-minded program development—especially as AI begins reshaping how data and security interact.</p><p>Meanwhile, Marco Ciappelli looks at this cultural tension from a societal perspective. He draws parallels between the speed of technological progress and the slower-moving nature of regulation, governance, and even human behavior. If security programs are stuck in reactive modes—bound by risk aversion, budget constraints, or outdated expectations—how can they support the innovation their businesses (and society) demand?</p><p>The two hosts conclude that change isn’t just needed—it’s already underway, albeit unevenly. The key may lie in empowering the broader security ecosystem, from frontline analysts to policy makers, to think and act with more agility.</p><p>For those wrestling with how security can lead rather than lag, this conversation offers a timely reflection—and a few provocations worth sitting with.</p><p>What does a future-ready security program really look like?</p><p>Learn more and catch more stories from RSAC Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p><strong>___________</strong></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>sean martin, marco ciappelli, ciso, ai, cybersecurity, risk, decisionmaking, innovation, rsac 2025, technology, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16970911" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b1e61e0a-a97b-4990-ad5b-102b12c16d73/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b1e61e0a-a97b-4990-ad5b-102b12c16d73&amp;feed=2M86zCcc"/>
      <itunes:title>Security at a Crossroads: Innovation, Risk, and the Relationship Between the CISO and the Vendor Community | An RSAC Conference 2025 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:40</itunes:duration>
      <itunes:summary>This episode captures a candid reflection on how the cybersecurity community—particularly CISOs—are navigating risk, innovation, and decision-making in an environment saturated with noise and pressure. Sean Martin and Marco Ciappelli explore why true progress may require shifting who gets to evaluate new ideas and how we collectively think about security’s role in shaping the future.</itunes:summary>
      <itunes:subtitle>This episode captures a candid reflection on how the cybersecurity community—particularly CISOs—are navigating risk, innovation, and decision-making in an environment saturated with noise and pressure. Sean Martin and Marco Ciappelli explore why true progress may require shifting who gets to evaluate new ideas and how we collectively think about security’s role in shaping the future.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, rsac 2025, ciso, sean martin, cybersecurity, conference, on location, innovation, event coverage, ai, risk, decisionmaking</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>205</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7142b959-dbe3-4b5c-a2a5-c64cfff668e3</guid>
      <title>Rethinking Container Security from the Kernel Up | A Brand Story with Emily Long and Kaylin Trychon from Edera | An RSAC Conference 2025 Pre-Event Conversation</title>
      <description><![CDATA[<p>In this pre-event Brand Story On Location conversation recorded live from RSAC Conference 2025, Emily Long, Co-Founder and CEO of Edera, and Kaylin Trychon, Head of Communications, introduce a new approach to container security—one that doesn’t just patch problems, but prevents them entirely.</p><p>Edera, just over a year old, is focused on reimagining how containers are built and run by taking a hardware-up approach rather than layering security on from the top down. Their system eliminates lateral movement and living-off-the-land attacks from the outset by operating below the kernel, resulting in simplified, proactive protection across cloud and on-premises environments.</p><p>What’s notable is not just the technology, but the philosophy behind it. As Emily explains, organizations have grown accustomed to the limitations of containerization and the technical debt that comes with it. Edera challenges this assumption by revisiting foundational virtualization principles, drawing inspiration from technologies like Xen hypervisors, and applying them in modern ways to support today’s use cases, including AI and GPU-driven environments.</p><p>Kaylin adds that this design-first approach means security isn’t bolted on later—it’s embedded from the start. And yet, it’s done without disruption. Teams don’t need to scrap what they have or undertake complex rebuilds. The system works with existing environments to reduce complexity and ease compliance burdens like FedRAMP.</p><p>For those grappling with infrastructure pain points—whether you’re in product security, DevOps, or infrastructure—this conversation is worth a listen. Edera’s vision is bold, but their delivery is practical. And yes, you’ll find them roaming the show floor in bold pink—“mobile booth,” zero fluff.</p><p>Listen to the episode to hear what it really means to be “secure by design” in the age of AI and container sprawl.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Emily Long,</strong> Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Kaylin Trychon</strong>, Head of Communications, Edera | <a href="https://www.linkedin.com/in/kaylintrychon/">https://www.linkedin.com/in/kaylintrychon/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>emily long, kaylin trychon, sean martin, marco ciappelli, containers, virtualization, cloud, infrastructure, security, fedramp, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 29 Apr 2025 20:37:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Emily Long, Kaylin Trychon, Edera)</author>
      <link>https://eventcoveragepodcast.com/episodes/rethinking-container-security-from-the-kernel-up-a-brand-story-with-emily-long-and-kaylin-trychon-from-edera-an-rsac-conference-2025-pre-event-conversation-bICihzYW</link>
      <content:encoded><![CDATA[<p>In this pre-event Brand Story On Location conversation recorded live from RSAC Conference 2025, Emily Long, Co-Founder and CEO of Edera, and Kaylin Trychon, Head of Communications, introduce a new approach to container security—one that doesn’t just patch problems, but prevents them entirely.</p><p>Edera, just over a year old, is focused on reimagining how containers are built and run by taking a hardware-up approach rather than layering security on from the top down. Their system eliminates lateral movement and living-off-the-land attacks from the outset by operating below the kernel, resulting in simplified, proactive protection across cloud and on-premises environments.</p><p>What’s notable is not just the technology, but the philosophy behind it. As Emily explains, organizations have grown accustomed to the limitations of containerization and the technical debt that comes with it. Edera challenges this assumption by revisiting foundational virtualization principles, drawing inspiration from technologies like Xen hypervisors, and applying them in modern ways to support today’s use cases, including AI and GPU-driven environments.</p><p>Kaylin adds that this design-first approach means security isn’t bolted on later—it’s embedded from the start. And yet, it’s done without disruption. Teams don’t need to scrap what they have or undertake complex rebuilds. The system works with existing environments to reduce complexity and ease compliance burdens like FedRAMP.</p><p>For those grappling with infrastructure pain points—whether you’re in product security, DevOps, or infrastructure—this conversation is worth a listen. Edera’s vision is bold, but their delivery is practical. And yes, you’ll find them roaming the show floor in bold pink—“mobile booth,” zero fluff.</p><p>Listen to the episode to hear what it really means to be “secure by design” in the age of AI and container sprawl.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Emily Long,</strong> Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Kaylin Trychon</strong>, Head of Communications, Edera | <a href="https://www.linkedin.com/in/kaylintrychon/">https://www.linkedin.com/in/kaylintrychon/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>emily long, kaylin trychon, sean martin, marco ciappelli, containers, virtualization, cloud, infrastructure, security, fedramp, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="11030925" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7b31feaf-c1f7-4b28-a5fb-0675cebcdff7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7b31feaf-c1f7-4b28-a5fb-0675cebcdff7&amp;feed=2M86zCcc"/>
      <itunes:title>Rethinking Container Security from the Kernel Up | A Brand Story with Emily Long and Kaylin Trychon from Edera | An RSAC Conference 2025 Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Emily Long, Kaylin Trychon, Edera</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:29</itunes:duration>
      <itunes:summary>What if container security didn’t just detect problems—but stopped them before they ever happened? In this episode, Edera’s Emily Long and Kaylin Trychon share how they’re flipping the traditional container model by building from the hardware up to deliver true security by design.</itunes:summary>
      <itunes:subtitle>What if container security didn’t just detect problems—but stopped them before they ever happened? In this episode, Edera’s Emily Long and Kaylin Trychon share how they’re flipping the traditional container model by building from the hardware up to deliver true security by design.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, containers, emily long, cybersecurity, kaylin trychon, virtualization, fedramp, cloud, security, brand marketing, infrastructure, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>204</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1eba7b0-c91e-47d2-b1db-e66718b3cd88</guid>
      <title>Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrastructure through the DARPA-led AI Cyber Challenge.</p><p><strong>Inside Northbridge: The Stakes Are Real</strong></p><p>Northbridge simulates the future of cybersecurity, blending AI, infrastructure, and human collaboration. It’s not just a walkthrough — it’s a call to action. Through simulated attacks on water systems, healthcare networks, and cyber operations, visitors witness firsthand the tangible impacts of vulnerabilities in critical systems. Dr. Fisher emphasizes that the AI Cyber Challenge isn’t theoretical: the vulnerabilities competitors find and fix directly apply to real open-source software relied on by society today.</p><p><strong>The AI Cyber Challenge: Pairing Generative AI with Cyber Reasoning</strong></p><p>The AI Cyber Challenge (AIxCC) invites teams from universities, small businesses, and consortiums to create cyber reasoning systems capable of autonomously identifying and fixing vulnerabilities. Leveraging leading foundation models from Anthropic, Google, Microsoft, and OpenAI, the teams operate with tight constraints—working with limited time, compute, and LLM credits—to uncover and patch vulnerabilities at scale. Remarkably, during semifinals, teams found and fixed nearly half of the synthetic vulnerabilities, and even discovered a real-world zero-day in SQLite.</p><p><strong>Building Toward DEFCON Finals and Beyond</strong></p><p>The journey doesn’t end at RSA. As the teams prepare for the AIxCC finals at DEFCON 2025, DARPA is increasing the complexity of the challenge—and the available resources. Beyond the competition, a core goal is public benefit: all cyber reasoning systems developed through AIxCC will be open-sourced under permissive licenses, encouraging widespread adoption across industries and government sectors.</p><p><strong>From Competition to Collaboration</strong></p><p>Carney and Fisher stress that the ultimate victory isn’t in individual wins, but in strengthening cybersecurity collectively. Whether securing hospitals, water plants, or financial institutions, the future demands cooperation across public and private sectors.</p><p>The Northbridge experience offers a powerful reminder: resilience in cybersecurity is built not through fear, but through innovation, collaboration, and a relentless drive to secure the systems we all depend on.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong><br />Andrew Carney, AI Cyber Challenge Program Manager, Defense Advanced Research Projects Agency (DARPA) | <a href="https://www.linkedin.com/in/andrew-carney-945458a6/">https://www.linkedin.com/in/andrew-carney-945458a6/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p>______________________</p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>The DARPA AIxCC Experience at RSAC 2025 Innovation Sandbox: <a href="https://www.rsaconference.com/usa/programs/sandbox/darpa">https://www.rsaconference.com/usa/programs/sandbox/darpa</a></p><p>Learn more and catch more stories from RSAC Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>andrew carney, kathleen fisher, marco ciappelli, sean martin, darpa, aixcc, cybersecurity, rsac 2025, defcon, ai cybersecurity, event coverage, on location, conference</p><p>______________________</p><p>Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf</p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 28 Apr 2025 20:09:19 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Andrew Carney)</author>
      <link>https://eventcoveragepodcast.com/episodes/inside-the-darpa-ai-cyber-challenge-securing-tomorrows-critical-infrastructure-through-ai-and-healthy-competition-an-rsac-conference-2025-conversation-with-andrew-carney-on-location-coverage-with-sean-martin-and-marco-ciappelli-kt9mkNM4</link>
      <content:encoded><![CDATA[<p>During RSAC Conference 2025, Andrew Carney, Program Manager at DARPA, and (remotely via video) Dr. Kathleen Fisher, Professor at Tufts University and Program Manager for the AI Cyber Challenge (AIxCC), guide attendees through an immersive experience called Northbridge—a fictional city designed to showcase the critical role of AI in securing infrastructure through the DARPA-led AI Cyber Challenge.</p><p><strong>Inside Northbridge: The Stakes Are Real</strong></p><p>Northbridge simulates the future of cybersecurity, blending AI, infrastructure, and human collaboration. It’s not just a walkthrough — it’s a call to action. Through simulated attacks on water systems, healthcare networks, and cyber operations, visitors witness firsthand the tangible impacts of vulnerabilities in critical systems. Dr. Fisher emphasizes that the AI Cyber Challenge isn’t theoretical: the vulnerabilities competitors find and fix directly apply to real open-source software relied on by society today.</p><p><strong>The AI Cyber Challenge: Pairing Generative AI with Cyber Reasoning</strong></p><p>The AI Cyber Challenge (AIxCC) invites teams from universities, small businesses, and consortiums to create cyber reasoning systems capable of autonomously identifying and fixing vulnerabilities. Leveraging leading foundation models from Anthropic, Google, Microsoft, and OpenAI, the teams operate with tight constraints—working with limited time, compute, and LLM credits—to uncover and patch vulnerabilities at scale. Remarkably, during semifinals, teams found and fixed nearly half of the synthetic vulnerabilities, and even discovered a real-world zero-day in SQLite.</p><p><strong>Building Toward DEFCON Finals and Beyond</strong></p><p>The journey doesn’t end at RSA. As the teams prepare for the AIxCC finals at DEFCON 2025, DARPA is increasing the complexity of the challenge—and the available resources. Beyond the competition, a core goal is public benefit: all cyber reasoning systems developed through AIxCC will be open-sourced under permissive licenses, encouraging widespread adoption across industries and government sectors.</p><p><strong>From Competition to Collaboration</strong></p><p>Carney and Fisher stress that the ultimate victory isn’t in individual wins, but in strengthening cybersecurity collectively. Whether securing hospitals, water plants, or financial institutions, the future demands cooperation across public and private sectors.</p><p>The Northbridge experience offers a powerful reminder: resilience in cybersecurity is built not through fear, but through innovation, collaboration, and a relentless drive to secure the systems we all depend on.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong><br />Andrew Carney, AI Cyber Challenge Program Manager, Defense Advanced Research Projects Agency (DARPA) | <a href="https://www.linkedin.com/in/andrew-carney-945458a6/">https://www.linkedin.com/in/andrew-carney-945458a6/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p>______________________</p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>The DARPA AIxCC Experience at RSAC 2025 Innovation Sandbox: <a href="https://www.rsaconference.com/usa/programs/sandbox/darpa">https://www.rsaconference.com/usa/programs/sandbox/darpa</a></p><p>Learn more and catch more stories from RSAC Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>andrew carney, kathleen fisher, marco ciappelli, sean martin, darpa, aixcc, cybersecurity, rsac 2025, defcon, ai cybersecurity, event coverage, on location, conference</p><p>______________________</p><p>Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf</p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26492856" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/729562e1-f83e-4296-bf8a-488cdcffe900/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=729562e1-f83e-4296-bf8a-488cdcffe900&amp;feed=2M86zCcc"/>
      <itunes:title>Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Andrew Carney</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:35</itunes:duration>
      <itunes:summary>Step into Northbridge at RSAC Conference 2025, where Andrew Carney and Dr. Kathleen Fisher reveal how the AI Cyber Challenge is driving real-world advances in securing critical infrastructure through the power of AI and autonomous systems. Discover how competition, collaboration, and open innovation are shaping a more resilient digital future.</itunes:summary>
      <itunes:subtitle>Step into Northbridge at RSAC Conference 2025, where Andrew Carney and Dr. Kathleen Fisher reveal how the AI Cyber Challenge is driving real-world advances in securing critical infrastructure through the power of AI and autonomous systems. Discover how competition, collaboration, and open innovation are shaping a more resilient digital future.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsac 2025, sean martin, andrew carney, darpa, cybersecurity, conference, on location, defcon, event coverage, aixcc, kathleen fisher, ai cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>203</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">58121d92-af19-4683-b702-6a16ad6e90eb</guid>
      <title>Why CISOs Should Still Say Yes to the Role—Even Now | A RSAC Conference 2025 Conversation with Tim Brown | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Chats on the Road to RSAC 2025, , Sean Martin and Marco Ciappelli connect with Tim Brown, Chief Information Security Officer at SolarWinds, to unpack the critical issues facing CISOs today—and why the role remains worth pursuing.</p><p>Brown is participating in multiple sessions at RSAC Conference 2025, including the CISO Bootcamp and Cyber Leaders Forum. Both are closed-door conversations designed to surface real concerns in a confidential, supportive setting. These aren’t theoretical discussions—they’re rooted in hard-earned experience. Brown, who has faced high-profile scrutiny and legal fallout from a past incident at SolarWinds, brings a uniquely personal perspective to these sessions.</p><p>He points out that fear and hesitation are keeping many deputy CISOs from stepping up into the top role. His message to them: don’t be afraid of the position. Despite the weight of responsibility, the role offers real influence, the ability to shape enterprise architecture, and the opportunity to drive meaningful business decisions. Brown emphasizes the importance of community support and collective growth, noting that the cybersecurity industry—still relatively young—is maturing and finding its footing when it comes to accountability and resilience.</p><p>Beyond leadership development, mental health and stress management are key themes in the Cyber Leaders Forum. Brown acknowledges the toll the job can take, even sharing that his own health suffered despite thinking he was managing stress well. This honest reflection opens the door for deeper conversations about personal well-being in high-pressure roles.</p><p>He’s also appearing at the Cloud Security Alliance Summit with Chris Hoff, Chief Security Officer at LastPass, where they’ll discuss incident response and field questions from the audience. On Wednesday, Brown joins a breakfast session with Tactic and Hyperwise, guiding attendees through a crisis simulation based on lessons from the Sunburst attack. His focus? Helping others avoid being unprepared in a moment of chaos.</p><p>From insider threat modeling to supply chain transparency and the challenges of monitoring runtime behavior, Brown is clear-eyed about where CISOs need to focus next.</p><p>This episode isn’t just a preview of conference sessions—it’s a call to future security leaders to lean in, not back.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong><br />Tim Brown, CISO, Solarwinds | On LinkedIn: <a href="https://www.linkedin.com/in/tim-brown-ciso/" target="_blank">https://www.linkedin.com/in/tim-brown-ciso/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>RSAC Session: CLF Ask Me Anything Session with Tim Brown, CISO, SolarWinds: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MH" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MH</a></p><p>RSAC Session: CISO Boot Camp Exclusive Fireside Chat with Tim Brown, CISO, SolarWinds: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXh" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXh</a></p><p>CSA Summit at RSAC 2025: Fireside Chat with Tim Brown and Chris Hoff: <a href="https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247b" target="_blank">https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247b</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>tim brown, sean martin, marco ciappelli, solarwinds, rsac 2025, ciso, cybersecurity, leadership, liability, stress, mental health, insider, resilience, incident, response, supply, chain, simulation, cloud, security, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 24 Apr 2025 05:03:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Brown)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-cisos-should-still-say-yes-to-the-roleeven-now-a-rsac-conference-2025-conversation-with-tim-brown-on-location-coverage-with-sean-martin-and-marco-ciappelli-mQ6tHaT8</link>
      <content:encoded><![CDATA[<p>In this Chats on the Road to RSAC 2025, , Sean Martin and Marco Ciappelli connect with Tim Brown, Chief Information Security Officer at SolarWinds, to unpack the critical issues facing CISOs today—and why the role remains worth pursuing.</p><p>Brown is participating in multiple sessions at RSAC Conference 2025, including the CISO Bootcamp and Cyber Leaders Forum. Both are closed-door conversations designed to surface real concerns in a confidential, supportive setting. These aren’t theoretical discussions—they’re rooted in hard-earned experience. Brown, who has faced high-profile scrutiny and legal fallout from a past incident at SolarWinds, brings a uniquely personal perspective to these sessions.</p><p>He points out that fear and hesitation are keeping many deputy CISOs from stepping up into the top role. His message to them: don’t be afraid of the position. Despite the weight of responsibility, the role offers real influence, the ability to shape enterprise architecture, and the opportunity to drive meaningful business decisions. Brown emphasizes the importance of community support and collective growth, noting that the cybersecurity industry—still relatively young—is maturing and finding its footing when it comes to accountability and resilience.</p><p>Beyond leadership development, mental health and stress management are key themes in the Cyber Leaders Forum. Brown acknowledges the toll the job can take, even sharing that his own health suffered despite thinking he was managing stress well. This honest reflection opens the door for deeper conversations about personal well-being in high-pressure roles.</p><p>He’s also appearing at the Cloud Security Alliance Summit with Chris Hoff, Chief Security Officer at LastPass, where they’ll discuss incident response and field questions from the audience. On Wednesday, Brown joins a breakfast session with Tactic and Hyperwise, guiding attendees through a crisis simulation based on lessons from the Sunburst attack. His focus? Helping others avoid being unprepared in a moment of chaos.</p><p>From insider threat modeling to supply chain transparency and the challenges of monitoring runtime behavior, Brown is clear-eyed about where CISOs need to focus next.</p><p>This episode isn’t just a preview of conference sessions—it’s a call to future security leaders to lean in, not back.</p><p><strong>___________</strong><br /><br /><strong>Guest: </strong><br />Tim Brown, CISO, Solarwinds | On LinkedIn: <a href="https://www.linkedin.com/in/tim-brown-ciso/" target="_blank">https://www.linkedin.com/in/tim-brown-ciso/</a></p><p><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>___________</strong></p><p><strong>Episode Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p>ObjectFirst: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a></p><p>Edera: <a href="https://itspm.ag/edera-434868" target="_blank">https://itspm.ag/edera-434868</a></p><p><strong>___________</strong></p><p><strong>Resources</strong></p><p>RSAC Session: CLF Ask Me Anything Session with Tim Brown, CISO, SolarWinds: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MH" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739404173721001x1MH</a></p><p>RSAC Session: CISO Boot Camp Exclusive Fireside Chat with Tim Brown, CISO, SolarWinds: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXh" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739403254724001isXh</a></p><p>CSA Summit at RSAC 2025: Fireside Chat with Tim Brown and Chris Hoff: <a href="https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247b" target="_blank">https://www.csasummitrsac.com/event/5b3547c2-c652-4f77-97de-5b094e746626/agenda?session=1452408b-c822-4664-87b8-38ce1276247b</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><p><strong>___________</strong></p><p>KEYWORDS</p><p>tim brown, sean martin, marco ciappelli, solarwinds, rsac 2025, ciso, cybersecurity, leadership, liability, stress, mental health, insider, resilience, incident, response, supply, chain, simulation, cloud, security, event coverage, on location, conference</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21234546" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3d294f66-560f-4682-8c8a-d0f4bad7f570/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3d294f66-560f-4682-8c8a-d0f4bad7f570&amp;feed=2M86zCcc"/>
      <itunes:title>Why CISOs Should Still Say Yes to the Role—Even Now | A RSAC Conference 2025 Conversation with Tim Brown | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Brown</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:07</itunes:duration>
      <itunes:summary>Tim Brown, CISO at SolarWinds, shares why the CISO role—despite its pressures—is more important and rewarding than ever, offering a candid look at leadership, liability, and resilience in today’s cybersecurity environment. From personal lessons learned to critical conversations on stress, insider threats, and supply chain security, this episode brings clarity to what it truly means to lead in security.</itunes:summary>
      <itunes:subtitle>Tim Brown, CISO at SolarWinds, shares why the CISO role—despite its pressures—is more important and rewarding than ever, offering a candid look at leadership, liability, and resilience in today’s cybersecurity environment. From personal lessons learned to critical conversations on stress, insider threats, and supply chain security, this episode brings clarity to what it truly means to lead in security.</itunes:subtitle>
      <itunes:keywords>incident, chain, marco ciappelli, leadership, rsac 2025, ciso, mental health, sean martin, insider, response, cybersecurity, conference, on location, resilience, event coverage, stress, tim brown, cloud, security, simulation, liability, solarwinds, supply</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>202</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3cbe020a-a856-46c4-81f2-3762597e91fd</guid>
      <title>Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo’Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.</p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she’s co-presenting with Dooshima Dabo’Adzuana: <i>Third-Party AI: What Are You Really Buying?</i> Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.</p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.</p><p>Alongside the AI focus, visitors to the booth can explore results from ISACA’s Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.</p><p>The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.</p><p>This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.</p><p>Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p><strong>Guests:</strong></p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter | <a href="https://www.linkedin.com/in/carmichaelmary/" target="_blank">https://www.linkedin.com/in/carmichaelmary/</a></p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter | <a href="https://www.linkedin.com/in/dooshima-dabo-adzuana/" target="_blank">https://www.linkedin.com/in/dooshima-dabo-adzuana/</a></p><p><strong>Resources</strong></p><p>Mary and Dooshima's session at RSA Conference: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq</a></p><p>Learn more about ISACA's AI resources: <a href="https://www.isaca.org/resources/artificial-intelligence">https://www.isaca.org/resources/artificial-intelligence</a></p><p>Learn more about ISACA's credentials: <a href="https://www.isaca.org/credentialing">https://www.isaca.org/credentialing</a></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca" target="_blank">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Apr 2025 05:32:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Carmichael, Dooshima Dabo’Adzuana)</author>
      <link>https://eventcoveragepodcast.com/episodes/community-certification-and-the-questions-that-matter-most-in-quantum-readiness-and-ai-governance-a-brand-story-with-mary-carmichael-and-dooshima-daboadzuana-from-isaca-a-rsac-conference-2025-brand-story-pre-event-conversation-KvdeFzKd</link>
      <content:encoded><![CDATA[<p>As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.</p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she’s co-presenting with Dooshima Dabo’Adzuana: <i>Third-Party AI: What Are You Really Buying?</i> Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.</p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.</p><p>Alongside the AI focus, visitors to the booth can explore results from ISACA’s Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.</p><p>The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.</p><p>This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.</p><p>Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p><strong>Guests:</strong></p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter | <a href="https://www.linkedin.com/in/carmichaelmary/" target="_blank">https://www.linkedin.com/in/carmichaelmary/</a></p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter | <a href="https://www.linkedin.com/in/dooshima-dabo-adzuana/" target="_blank">https://www.linkedin.com/in/dooshima-dabo-adzuana/</a></p><p><strong>Resources</strong></p><p>Mary and Dooshima's session at RSA Conference: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq</a></p><p>Learn more about ISACA's AI resources: <a href="https://www.isaca.org/resources/artificial-intelligence">https://www.isaca.org/resources/artificial-intelligence</a></p><p>Learn more about ISACA's credentials: <a href="https://www.isaca.org/credentialing">https://www.isaca.org/credentialing</a></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca" target="_blank">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22506827" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/637990cb-762c-479d-9ab1-55c78054175b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=637990cb-762c-479d-9ab1-55c78054175b&amp;feed=2M86zCcc"/>
      <itunes:title>Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo’Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Carmichael, Dooshima Dabo’Adzuana</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:26</itunes:duration>
      <itunes:summary>How do you evaluate the risks of third-party AI solutions—and what does quantum readiness really look like? In this episode, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana share practical guidance, global perspectives, and a vision for building a stronger cybersecurity community through education, conversation, and connection.</itunes:summary>
      <itunes:subtitle>How do you evaluate the risks of third-party AI solutions—and what does quantum readiness really look like? In this episode, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana share practical guidance, global perspectives, and a vision for building a stronger cybersecurity community through education, conversation, and connection.</itunes:subtitle>
      <itunes:keywords>career, compliance, marketing podcast, marco ciappelli, dooshima dabo’adzuana, sean martin, rsa, skills, education, cybersecurity, third-party, rsac, brand marketing, certification, quantum, encryption, ai, risk, mary carmichael, community, brand story podcast, audit, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>201</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e38d8e63-b482-48ef-9a33-17a3821a17e0</guid>
      <title>What’s Driving the Next Generation of Risk Management? | A Brand Story with Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>Ahead of the RSAC Conference, Sean Martin and Marco Ciappelli sit down with Steve Schlarman, Director of Product Management at Archer, to talk risk, regulation, and where governance fits into the broader cybersecurity conversation.</p><p>Steve represents a company that’s been at the center of governance, risk, and compliance (GRC) for nearly 25 years. But don’t mistake tenure for inertia—Archer is actively reshaping how organizations think about integrated risk management, especially through its latest platform, Archer Evolv. Steve shares how his team is focused on rethinking compliance not as a checkbox, but as a foundation for smarter, more strategic business decisions.</p><p>What sets Archer Evolv apart? For one, the platform doesn’t just cater to full-time risk professionals. It’s built for anyone in the organization who touches compliance—even occasionally. Steve explains how the user experience has been redesigned to make it easier for non-experts to contribute, pulling in relevant data without bogging down daily operations.</p><p>AI also plays a major role. After acquiring Compliance.AI, Archer has embedded large language models and automation into its compliance workflows—cutting down the time it takes to process regulatory updates and map controls. This means compliance professionals can spend less time scanning documents and more time advising the business.</p><p>But this isn’t about technology for technology’s sake. Steve underscores the bigger question facing companies today: how much risk are they truly willing to accept? Regulation might kickstart the conversation, but it’s risk management that sustains it—and that requires clarity, context, and collaboration across the business.</p><p>Archer’s team will be on site at RSAC, ready to demo the platform and share stories from the field. With over 1,200 customers worldwide, the company has no shortage of real-world examples to pull from. From frontline vulnerability assessments to strategic compliance mapping, Archer’s approach is centered on enabling better decisions—not just better dashboards.</p><p>Stop by booth 3117 (<a href="https://itspm.ag/archervn5f" target="_blank">https://itspm.ag/archervn5f</a>) to see how they’re turning compliance into an engine for risk-aware growth—and how your team might benefit from a more purposeful approach to GRC.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p><strong>Guest: Steve Schlarman</strong>, Senior Director, Product Management at Archer Integrated Risk Management | <a href="https://www.linkedin.com/in/steveschlarman/" target="_blank">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer" target="_blank">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: risk, compliance, governance, cybersecurity, ai, automation, regulation, grc, audit, resilience, controls, workflow, data, business continuity, product management, rsa, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 23:55:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman)</author>
      <link>https://eventcoveragepodcast.com/episodes/whats-driving-the-next-generation-of-risk-management-a-brand-story-with-steve-schlarman-senior-director-product-management-at-archer-integrated-risk-management-a-rsac-conference-2025-brand-story-pre-event-conversation-MzFr_LS6</link>
      <content:encoded><![CDATA[<p>Ahead of the RSAC Conference, Sean Martin and Marco Ciappelli sit down with Steve Schlarman, Director of Product Management at Archer, to talk risk, regulation, and where governance fits into the broader cybersecurity conversation.</p><p>Steve represents a company that’s been at the center of governance, risk, and compliance (GRC) for nearly 25 years. But don’t mistake tenure for inertia—Archer is actively reshaping how organizations think about integrated risk management, especially through its latest platform, Archer Evolv. Steve shares how his team is focused on rethinking compliance not as a checkbox, but as a foundation for smarter, more strategic business decisions.</p><p>What sets Archer Evolv apart? For one, the platform doesn’t just cater to full-time risk professionals. It’s built for anyone in the organization who touches compliance—even occasionally. Steve explains how the user experience has been redesigned to make it easier for non-experts to contribute, pulling in relevant data without bogging down daily operations.</p><p>AI also plays a major role. After acquiring Compliance.AI, Archer has embedded large language models and automation into its compliance workflows—cutting down the time it takes to process regulatory updates and map controls. This means compliance professionals can spend less time scanning documents and more time advising the business.</p><p>But this isn’t about technology for technology’s sake. Steve underscores the bigger question facing companies today: how much risk are they truly willing to accept? Regulation might kickstart the conversation, but it’s risk management that sustains it—and that requires clarity, context, and collaboration across the business.</p><p>Archer’s team will be on site at RSAC, ready to demo the platform and share stories from the field. With over 1,200 customers worldwide, the company has no shortage of real-world examples to pull from. From frontline vulnerability assessments to strategic compliance mapping, Archer’s approach is centered on enabling better decisions—not just better dashboards.</p><p>Stop by booth 3117 (<a href="https://itspm.ag/archervn5f" target="_blank">https://itspm.ag/archervn5f</a>) to see how they’re turning compliance into an engine for risk-aware growth—and how your team might benefit from a more purposeful approach to GRC.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p><strong>Guest: Steve Schlarman</strong>, Senior Director, Product Management at Archer Integrated Risk Management | <a href="https://www.linkedin.com/in/steveschlarman/" target="_blank">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer" target="_blank">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: risk, compliance, governance, cybersecurity, ai, automation, regulation, grc, audit, resilience, controls, workflow, data, business continuity, product management, rsa, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21283467" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/fec6856d-be53-4511-8121-c648d691eada/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=fec6856d-be53-4511-8121-c648d691eada&amp;feed=2M86zCcc"/>
      <itunes:title>What’s Driving the Next Generation of Risk Management? | A Brand Story with Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:10</itunes:duration>
      <itunes:summary>Steve Schlarman, Director of Product Management at Archer, joins the conversation to explore how risk and compliance programs can become business enablers rather than check-the-box obligations. From AI-powered regulatory intelligence to redesigned user experiences, he shares how Archer is helping organizations manage risk with clarity, purpose, and impact.</itunes:summary>
      <itunes:subtitle>Steve Schlarman, Director of Product Management at Archer, joins the conversation to explore how risk and compliance programs can become business enablers rather than check-the-box obligations. From AI-powered regulatory intelligence to redesigned user experiences, he shares how Archer is helping organizations manage risk with clarity, purpose, and impact.</itunes:subtitle>
      <itunes:keywords>workflow, compliance, data, marketing podcast, marco ciappelli, controls, grc, sean martin, rsa, automation, cybersecurity, resilience, rsac2025, steve schlarman, brand marketing, regulation, ai, risk, business continuity, product management, brand story podcast, audit, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>200</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">78673071-ea7c-4d74-aeb9-6500224150a6</guid>
      <title>Why “Permit by Exception” Might Be the Key to Business Resilience | A Brand Story with Rob Allen, Chief Product Officer at ThreatLocker | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>At this year’s RSAC Conference, the team from ThreatLocker isn’t just bringing tech—they’re bringing a challenge. Rob Allen, Chief Product Officer at ThreatLocker, joins Sean Martin and Marco Ciappelli for a lively pre-conference episode that previews what attendees can expect at booth #854 in the South Expo Hall.</p><p>From rubber ducky hacks to reframing how we think about Zero Trust, the conversation highlights the ways ThreatLocker moves beyond the industry’s typical focus on reactive detection. Allen shares how most cybersecurity approaches still default to allowing access unless a threat is known, and why that mindset continues to leave organizations vulnerable. Instead, ThreatLocker’s philosophy is to “deny by default and permit by exception”—a strategy that, when managed effectively, provides maximum protection without slowing down business operations.</p><p>ThreatLocker’s presence at the conference will feature live demos, short presentations, and hands-on challenges—including their popular Ducky Challenge, where participants test whether their endpoint defenses can prevent a rogue USB (disguised as a keyboard) from stealing their data. If your system passes, you win the rubber ducky. If it doesn’t? They (temporarily) get your data. It’s a simple but powerful reminder that what you think is secure might not be.</p><p>The booth won’t just be about tech. The team is focused on conversations—reconnecting with customers, engaging new audiences, and exploring how the community is responding to a threat landscape that’s growing more sophisticated by the day. Allen emphasizes the importance of in-person dialogue, not only to share what ThreatLocker is building but to learn how security leaders are adapting and where gaps still exist.</p><p>And yes, there will be merch—high-quality socks, t-shirts, and even a few surprise giveaways dropped at hotel doors (if you resist the temptation to open the envelope before visiting the booth).</p><p>For those looking to rethink endpoint protection or better understand how proactive controls can complement detection-based tools, this episode is your preview into a very different kind of cybersecurity conversation—one that starts with a challenge and ends with community.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: rsac conference, cybersecurity, endpoint, zero trust, rubber ducky, threat detection, data exfiltration, security strategy, deny by default, permit by exception, proactive security, security demos, usb attack, cyber resilience, network control, security mindset, rsac 2025, event coverage, on location, conference</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 20:48:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://eventcoveragepodcast.com/episodes/why-permit-by-exception-might-be-the-key-to-business-resilience-a-brand-story-with-rob-allen-chief-product-officer-at-threatlocker-a-rsac-conference-2025-brand-story-pre-event-conversation-xanll2N1</link>
      <content:encoded><![CDATA[<p>At this year’s RSAC Conference, the team from ThreatLocker isn’t just bringing tech—they’re bringing a challenge. Rob Allen, Chief Product Officer at ThreatLocker, joins Sean Martin and Marco Ciappelli for a lively pre-conference episode that previews what attendees can expect at booth #854 in the South Expo Hall.</p><p>From rubber ducky hacks to reframing how we think about Zero Trust, the conversation highlights the ways ThreatLocker moves beyond the industry’s typical focus on reactive detection. Allen shares how most cybersecurity approaches still default to allowing access unless a threat is known, and why that mindset continues to leave organizations vulnerable. Instead, ThreatLocker’s philosophy is to “deny by default and permit by exception”—a strategy that, when managed effectively, provides maximum protection without slowing down business operations.</p><p>ThreatLocker’s presence at the conference will feature live demos, short presentations, and hands-on challenges—including their popular Ducky Challenge, where participants test whether their endpoint defenses can prevent a rogue USB (disguised as a keyboard) from stealing their data. If your system passes, you win the rubber ducky. If it doesn’t? They (temporarily) get your data. It’s a simple but powerful reminder that what you think is secure might not be.</p><p>The booth won’t just be about tech. The team is focused on conversations—reconnecting with customers, engaging new audiences, and exploring how the community is responding to a threat landscape that’s growing more sophisticated by the day. Allen emphasizes the importance of in-person dialogue, not only to share what ThreatLocker is building but to learn how security leaders are adapting and where gaps still exist.</p><p>And yes, there will be merch—high-quality socks, t-shirts, and even a few surprise giveaways dropped at hotel doors (if you resist the temptation to open the envelope before visiting the booth).</p><p>For those looking to rethink endpoint protection or better understand how proactive controls can complement detection-based tools, this episode is your preview into a very different kind of cybersecurity conversation—one that starts with a challenge and ends with community.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: rsac conference, cybersecurity, endpoint, zero trust, rubber ducky, threat detection, data exfiltration, security strategy, deny by default, permit by exception, proactive security, security demos, usb attack, cyber resilience, network control, security mindset, rsac 2025, event coverage, on location, conference</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18213974" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bc913b43-5117-4315-9ccd-ba05f8ebba51/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bc913b43-5117-4315-9ccd-ba05f8ebba51&amp;feed=2M86zCcc"/>
      <itunes:title>Why “Permit by Exception” Might Be the Key to Business Resilience | A Brand Story with Rob Allen, Chief Product Officer at ThreatLocker | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:58</itunes:duration>
      <itunes:summary>What if your endpoint defenses aren’t as strong as you think they are? In this episode, ThreatLocker Chief Product Officer Rob Allen challenges conventional security thinking and invites RSA attendees to test their systems in real-time—with a rubber ducky and a radically different approach to Zero Trust.</itunes:summary>
      <itunes:subtitle>What if your endpoint defenses aren’t as strong as you think they are? In this episode, ThreatLocker Chief Product Officer Rob Allen challenges conventional security thinking and invites RSA attendees to test their systems in real-time—with a rubber ducky and a radically different approach to Zero Trust.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, ai security, rsa conference, rsac 2025, web attacks, sean martin, reconnaissance, automation, llm scraping, akamai, cybersecurity, enterprise resilience, application security, generative ai, malware, threat intelligence, hybrid digital world, guardicore, data privacy, ransomware, brand marketing, state of the internet report, prompt injection, api protection, brand story podcast, zero trust, phishing, brand story, security operations, cobalt strike</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>199</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9dfabe73-3ca7-4957-a540-9f4d2a6aa1d7</guid>
      <title>Quantum Security, Real Problems, and the Unifying Layer Behind It All | A Brand Story Conversation with Marc Manzano, General Manager of the Cybersecurity Group at SandboxAQ | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>We’re on the road to RSAC 2025 — or maybe on a quantum-powered highway — and this time, Sean and I had the pleasure of chatting with someone who’s not just riding the future wave, but actually building it.</p><p>Marc Manzano, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong>, joined us for this Brand Story conversation ahead of the big conference in San Francisco. For those who haven’t heard of SandboxAQ yet, here’s a quick headline: they’re a spin-out from Google, operating at the intersection of <strong>AI and quantum technologies</strong>. Yes — that intersection.</p><p>But let’s keep our feet on the ground for a second, because this story isn’t just about tech that sounds cool. It’s about solving the very real, very painful problems that security teams face every day.</p><p>Marc laid out their mission clearly: <strong>Active Guard</strong>, their flagship platform, is built to simplify and modernize two massive pain points in enterprise security — <strong>cryptographic asset management</strong> and <strong>non-human identity management</strong>. Think: rotating certificates without manual effort. Managing secrets and keys across cloud-native infrastructure. Automating compliance reporting for quantum-readiness. No fluff — just value, right out of the box.</p><p>And it’s not just about plugging a new tool into your already overloaded stack. What impressed us is how SandboxAQ sees themselves as the <strong>unifying layer</strong> — enhancing <strong>interoperability</strong> across existing systems, extracting more intelligence from the tools you already use, and giving teams a unified view through a single pane of glass.</p><p>And yes, we also touched on <strong>AI SecOps</strong> — because as AI becomes a standard part of infrastructure, so must security for it. Active Guard is already poised to give security teams visibility and control over this evolving layer.</p><p>Want to see it in action? <strong>Booth 6578, North Expo Hall.</strong> Swag will be there. Demos will be live. Conversations will be real.</p><p>We’ll be there too — recording a deeper Brand Story episode On Location during the event.</p><p>Until then, enjoy this preview — and get ready to meet the future of cybersecurity.</p><p>⸻</p><p><strong>Keywords:</strong></p><p>sandboxaq, active guard, rsa conference 2025, quantum cybersecurity, ai secops, cryptographic asset management, non-human identity, cybersecurity automation, security compliance, rsa 2025, cybersecurity innovation, certificate lifecycle management, secrets management, security operations, quantum readiness, rsa sandbox, cybersecurity saas, devsecops, interoperability, digital transformation</p><p><strong>______________________</strong><br /><br /><strong>Guest: Marc Manzano,</strong>, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong></p><p><a href="https://www.linkedin.com/in/marcmanzano/">Marc Manzano on LinkedIn</a></p><p>🌐 <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">SandboxAQ Website</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>SandboxAQ:<br /><a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 17:49:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/quantum-security-real-problems-and-the-unifying-layer-behind-it-all-a-brand-story-conversation-with-marc-manzano-general-manager-of-the-cybersecurity-group-at-sandboxaq-a-rsac-conference-2025-brand-story-pre-event-conversation-h013UkcF</link>
      <content:encoded><![CDATA[<p>We’re on the road to RSAC 2025 — or maybe on a quantum-powered highway — and this time, Sean and I had the pleasure of chatting with someone who’s not just riding the future wave, but actually building it.</p><p>Marc Manzano, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong>, joined us for this Brand Story conversation ahead of the big conference in San Francisco. For those who haven’t heard of SandboxAQ yet, here’s a quick headline: they’re a spin-out from Google, operating at the intersection of <strong>AI and quantum technologies</strong>. Yes — that intersection.</p><p>But let’s keep our feet on the ground for a second, because this story isn’t just about tech that sounds cool. It’s about solving the very real, very painful problems that security teams face every day.</p><p>Marc laid out their mission clearly: <strong>Active Guard</strong>, their flagship platform, is built to simplify and modernize two massive pain points in enterprise security — <strong>cryptographic asset management</strong> and <strong>non-human identity management</strong>. Think: rotating certificates without manual effort. Managing secrets and keys across cloud-native infrastructure. Automating compliance reporting for quantum-readiness. No fluff — just value, right out of the box.</p><p>And it’s not just about plugging a new tool into your already overloaded stack. What impressed us is how SandboxAQ sees themselves as the <strong>unifying layer</strong> — enhancing <strong>interoperability</strong> across existing systems, extracting more intelligence from the tools you already use, and giving teams a unified view through a single pane of glass.</p><p>And yes, we also touched on <strong>AI SecOps</strong> — because as AI becomes a standard part of infrastructure, so must security for it. Active Guard is already poised to give security teams visibility and control over this evolving layer.</p><p>Want to see it in action? <strong>Booth 6578, North Expo Hall.</strong> Swag will be there. Demos will be live. Conversations will be real.</p><p>We’ll be there too — recording a deeper Brand Story episode On Location during the event.</p><p>Until then, enjoy this preview — and get ready to meet the future of cybersecurity.</p><p>⸻</p><p><strong>Keywords:</strong></p><p>sandboxaq, active guard, rsa conference 2025, quantum cybersecurity, ai secops, cryptographic asset management, non-human identity, cybersecurity automation, security compliance, rsa 2025, cybersecurity innovation, certificate lifecycle management, secrets management, security operations, quantum readiness, rsa sandbox, cybersecurity saas, devsecops, interoperability, digital transformation</p><p><strong>______________________</strong><br /><br /><strong>Guest: Marc Manzano,</strong>, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong></p><p><a href="https://www.linkedin.com/in/marcmanzano/">Marc Manzano on LinkedIn</a></p><p>🌐 <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">SandboxAQ Website</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>SandboxAQ:<br /><a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="9137117" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/20cc24bb-641f-4d84-b348-81de0bbe3744/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=20cc24bb-641f-4d84-b348-81de0bbe3744&amp;feed=2M86zCcc"/>
      <itunes:title>Quantum Security, Real Problems, and the Unifying Layer Behind It All | A Brand Story Conversation with Marc Manzano, General Manager of the Cybersecurity Group at SandboxAQ | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:31</itunes:duration>
      <itunes:summary>Quantum meets reality at RSAC 2025. In this Brand Story preview, we speak with SandboxAQ about Active Guard — a SaaS platform designed to be the unifying layer across cryptographic and identity management systems. Marc Manzano joins us to share how they’re solving real problems, enabling automation, and redefining how security teams prepare for the future.
</itunes:summary>
      <itunes:subtitle>Quantum meets reality at RSAC 2025. In this Brand Story preview, we speak with SandboxAQ about Active Guard — a SaaS platform designed to be the unifying layer across cryptographic and identity management systems. Marc Manzano joins us to share how they’re solving real problems, enabling automation, and redefining how security teams prepare for the future.
</itunes:subtitle>
      <itunes:keywords>rsa conference 2025, certificate lifecycle management, cybersecurity saas, marketing podcast, marco ciappelli, ai security, rsa conference, ai secops, rsac 2025, web attacks, sean martin, automation, non-human identity, sandboxaq, rsa sandbox, cybersecurity, enterprise resilience, cybersecurity automation, generative ai, secrets management, threat intelligence, quantum cybersecurity, cryptographic asset management, hybrid digital world, data privacy, ransomware, security compliance, rsa 2025, quantum readiness, active guard, cybersecurity innovation, digital transformation, devsecops, brand story podcast, zero trust, phishing, security operations, interoperability</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>198</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d2438140-85d2-433f-bf3f-69f87adc8f93</guid>
      <title>AI, Security, and the Hybrid World: Akamai’s Vision for RSAC 2025 With Rupesh Chokshi, SVP &amp; GM Application Security Akamai | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>The RSA Conference has long served as a meeting point for innovation and collaboration in cybersecurity—and in this pre-RSAC episode, ITSPmagazine co-founders Marco Ciappelli and Sean Martin welcome Akamai’s Rupesh Chokshi to the conversation. With RSAC 2025 on the horizon, they discuss Akamai’s presence at the event and dig into the challenges and opportunities surrounding AI, threat intelligence, and enterprise security.</p><p>Chokshi, who leads Akamai’s Application Security business, describes a landscape marked by explosive growth in web and API attacks—and a parallel shift as enterprises embrace generative AI. The double-edged nature of AI is central to the discussion: while it offers breakthrough productivity and automation, it also creates new vulnerabilities. Akamai’s dual focus, says Chokshi, is both using AI to strengthen defenses and securing AI-powered applications themselves.</p><p>The conversation touches on the scale and sophistication of modern threats, including an eye-opening stat: Akamai is now tracking over 500 million large language model (LLM)-driven scraping requests per day. As these threats extend from e-commerce to healthcare and beyond, Chokshi emphasizes the need for layered defense strategies and real-time adaptability.</p><p>Ciappelli brings a sociological lens to the AI discussion, noting the hype-to-reality shift the industry is experiencing. “We’re no longer asking if AI will change the game,” he suggests. “We’re asking how to implement it responsibly—and how to protect it.”</p><p>At RSAC 2025, Akamai will showcase a range of innovations, including updates to its Guardicore platform and new App & API Protection Hybrid solutions. Their booth (6245) will feature interactive demos, theater sessions, and one-on-one briefings. The Akamai team will also release a new edition of their State of the Internet report, packed with actionable threat data and insights.</p><p>The episode closes with a reminder: in a world that’s both accelerating and fragmenting, cybersecurity must serve not just as a barrier—but as a catalyst. “Security,” says Chokshi, “has to enable innovation, not hinder it.”</p><p>⸻</p><p>Keywords: RSAC 2025, Akamai, cybersecurity, generative AI, API protection, web attacks, application security, LLM scraping, Guardicore, State of the Internet report, Zero Trust, hybrid digital world, enterprise resilience, AI security, threat intelligence, prompt injection, data privacy, RSA Conference, Sean Martin, Marco Ciappelli</p><p><strong>______________________</strong><br /><br /><strong>Guest: </strong><a href="https://www.linkedin.com/in/rupeshchokshi/overlay/about-this-profile/">Rupesh Chokshi</a>, SVP & GM, Akamai <br /><a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>AKAMAI: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Rupesh Chokshi Session at RSAC 2025<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737648101765001Ekkq">The New Attack Frontier: Research Shows Apps & APIs Are the Targets - [<i>PART1-W09</i>]</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 16:51:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-security-and-the-hybrid-world-akamais-vision-for-rsac-2025-with-rupesh-chokshi-svp-gm-application-security-akamai-a-rsac-conference-2025-brand-story-pre-event-conversation-JrCF4_RU</link>
      <content:encoded><![CDATA[<p>The RSA Conference has long served as a meeting point for innovation and collaboration in cybersecurity—and in this pre-RSAC episode, ITSPmagazine co-founders Marco Ciappelli and Sean Martin welcome Akamai’s Rupesh Chokshi to the conversation. With RSAC 2025 on the horizon, they discuss Akamai’s presence at the event and dig into the challenges and opportunities surrounding AI, threat intelligence, and enterprise security.</p><p>Chokshi, who leads Akamai’s Application Security business, describes a landscape marked by explosive growth in web and API attacks—and a parallel shift as enterprises embrace generative AI. The double-edged nature of AI is central to the discussion: while it offers breakthrough productivity and automation, it also creates new vulnerabilities. Akamai’s dual focus, says Chokshi, is both using AI to strengthen defenses and securing AI-powered applications themselves.</p><p>The conversation touches on the scale and sophistication of modern threats, including an eye-opening stat: Akamai is now tracking over 500 million large language model (LLM)-driven scraping requests per day. As these threats extend from e-commerce to healthcare and beyond, Chokshi emphasizes the need for layered defense strategies and real-time adaptability.</p><p>Ciappelli brings a sociological lens to the AI discussion, noting the hype-to-reality shift the industry is experiencing. “We’re no longer asking if AI will change the game,” he suggests. “We’re asking how to implement it responsibly—and how to protect it.”</p><p>At RSAC 2025, Akamai will showcase a range of innovations, including updates to its Guardicore platform and new App & API Protection Hybrid solutions. Their booth (6245) will feature interactive demos, theater sessions, and one-on-one briefings. The Akamai team will also release a new edition of their State of the Internet report, packed with actionable threat data and insights.</p><p>The episode closes with a reminder: in a world that’s both accelerating and fragmenting, cybersecurity must serve not just as a barrier—but as a catalyst. “Security,” says Chokshi, “has to enable innovation, not hinder it.”</p><p>⸻</p><p>Keywords: RSAC 2025, Akamai, cybersecurity, generative AI, API protection, web attacks, application security, LLM scraping, Guardicore, State of the Internet report, Zero Trust, hybrid digital world, enterprise resilience, AI security, threat intelligence, prompt injection, data privacy, RSA Conference, Sean Martin, Marco Ciappelli</p><p><strong>______________________</strong><br /><br /><strong>Guest: </strong><a href="https://www.linkedin.com/in/rupeshchokshi/overlay/about-this-profile/">Rupesh Chokshi</a>, SVP & GM, Akamai <br /><a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>AKAMAI: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Rupesh Chokshi Session at RSAC 2025<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737648101765001Ekkq">The New Attack Frontier: Research Shows Apps & APIs Are the Targets - [<i>PART1-W09</i>]</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22361788" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/83ce0d48-5228-4302-bb6b-1af68de910f5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=83ce0d48-5228-4302-bb6b-1af68de910f5&amp;feed=2M86zCcc"/>
      <itunes:title>AI, Security, and the Hybrid World: Akamai’s Vision for RSAC 2025 With Rupesh Chokshi, SVP &amp; GM Application Security Akamai | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:17</itunes:duration>
      <itunes:summary>In this pre-RSAC 2025 episode, Akamai’s Rupesh Chokshi joins Sean Martin and Marco Ciappelli to explore the evolving intersection of cybersecurity, AI, and enterprise resilience. From API protection to LLM-driven threats, they preview what Akamai is bringing to San Francisco—and why security must become an enabler in the hybrid digital world.</itunes:summary>
      <itunes:subtitle>In this pre-RSAC 2025 episode, Akamai’s Rupesh Chokshi joins Sean Martin and Marco Ciappelli to explore the evolving intersection of cybersecurity, AI, and enterprise resilience. From API protection to LLM-driven threats, they preview what Akamai is bringing to San Francisco—and why security must become an enabler in the hybrid digital world.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, ai security, rsa conference, rsac 2025, web attacks, sean martin, reconnaissance, automation, llm scraping, akamai, cybersecurity, enterprise resilience, application security, generative ai, malware, threat intelligence, hybrid digital world, guardicore, data privacy, ransomware, brand marketing, state of the internet report, prompt injection, api protection, brand story podcast, zero trust, phishing, brand story, security operations, cobalt strike</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>197</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6544c353-c325-45ba-ad54-637e3fc98fcb</guid>
      <title>RSAC 2025 Preview: All Aboard the Innovation Express: RSAC Conference 2025 On Track for Cybersecurity’s Future with Cecilia Mariner | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>All Aboard the Innovation Express: RSAC 2025 On Track for Cybersecurity’s Future</p><p>Let’s face it—RSAC isn’t just a conference anymore. It’s a movement. A ritual. A block party for cybersecurity. And this year, it’s pulling into the station with more tracks than ever before—figuratively and literally.</p><p>In this On Location episode, we reconnect with Cecilia Murtagh Marinier, Vice President of Innovation and Scholars at RSAC, to dive into what makes the 2025 edition a can’t-miss experience. And as always, Sean and Marco kick things off with a bit of improvisation, some travel jokes, and a whole lot of heart.</p><p>From the 20th Anniversary of the Innovation Sandbox (with a massive $50M investment boost from Crosspoint Capital) to the growing Early Stage Expo, LaunchPad’s Shark-Tank-style sessions, and the new Investor & Entrepreneur track, RSAC continues to set the stage for cybersecurity’s next big thing.</p><p>And this year, they’re going bigger—literally. The expansion into the Yerba Buena Center for the Arts brings with it a mind-blowing immersive experience: DARPA’s AI Cyber City, a physically interactive train ride through smart city scenarios, designed to show how cybersecurity touches everything—from water plants to hospitals, satellites to firmware.</p><p>Add in eight hands-on villages, security scholars programs, coffee-fueled networking zones, and a renewed focus on inclusion, mentorship, and accessibility, and you’ve got something that feels less like an event and more like a living, breathing community.</p><p>Cecilia also reminds us that RSAC is a place for everyone—from first-timers unsure where to begin to seasoned veterans ready to innovate and invest. It’s about showing up, making a plan (or not), and being open to the unexpected conversations that happen in hallways, lounges, or over espresso in the sandbox village.</p><p>And if you can’t make it in person? RSAC has made sure that everything is accessible online—600 speakers, 600 vendors, and endless ways to engage, reflect, and be part of the global cybersecurity story.</p><p>So whether you’re hopping in the car, boarding a flight, or—who knows—riding a miniature DARPA train through Northridge City, one thing’s for sure: RSAC 2025 is going full speed ahead—and we’re bringing you along for the ride.</p><p>⸻<br /> </p><p>📺 FULL VIDEO</p><p>👉 <a href="https://youtu.be/59mW2XNz0CE" target="_blank">https://youtu.be/59mW2XNz0CE</a></p><p>🧭 EXPLORE RSAC COVERAGE</p><p>👉 <a href="https://www.itspmagazine.com/rsac" target="_blank">https://www.itspmagazine.com/rsac</a></p><p> </p><p>⸻</p><p>KEYWORDS</p><p>RSAC 2025, cybersecurity innovation, DARPA Cyber City, AI in security, startup funding, Innovation Sandbox, LaunchPad, Early Stage Expo, cybersecurity community, security scholars, investor track, immersive tech experiences, smart cities, cyber education, cyber startup pitch, interactive cybersecurity, RSAC sandbox, CTFs, AI-powered defense, infosec industry trends</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/overlay/about-this-profile/">Cecilia Murtagh Marinier </a>| Cybersecurity Advisor - Strategy, Innovation & Scholars at RSA Conference<br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society & Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-and-technology-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 15 Apr 2025 16:55:54 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Cecilia Murtagh Marinier)</author>
      <link>https://eventcoveragepodcast.com/episodes/rsac-2025-preview-all-aboard-the-innovation-express-rsac-conference-2025-on-track-for-cybersecuritys-future-with-cecilia-mariner-on-location-coverage-with-sean-martin-and-marco-ciappelli-sfcQii7b</link>
      <content:encoded><![CDATA[<p>All Aboard the Innovation Express: RSAC 2025 On Track for Cybersecurity’s Future</p><p>Let’s face it—RSAC isn’t just a conference anymore. It’s a movement. A ritual. A block party for cybersecurity. And this year, it’s pulling into the station with more tracks than ever before—figuratively and literally.</p><p>In this On Location episode, we reconnect with Cecilia Murtagh Marinier, Vice President of Innovation and Scholars at RSAC, to dive into what makes the 2025 edition a can’t-miss experience. And as always, Sean and Marco kick things off with a bit of improvisation, some travel jokes, and a whole lot of heart.</p><p>From the 20th Anniversary of the Innovation Sandbox (with a massive $50M investment boost from Crosspoint Capital) to the growing Early Stage Expo, LaunchPad’s Shark-Tank-style sessions, and the new Investor & Entrepreneur track, RSAC continues to set the stage for cybersecurity’s next big thing.</p><p>And this year, they’re going bigger—literally. The expansion into the Yerba Buena Center for the Arts brings with it a mind-blowing immersive experience: DARPA’s AI Cyber City, a physically interactive train ride through smart city scenarios, designed to show how cybersecurity touches everything—from water plants to hospitals, satellites to firmware.</p><p>Add in eight hands-on villages, security scholars programs, coffee-fueled networking zones, and a renewed focus on inclusion, mentorship, and accessibility, and you’ve got something that feels less like an event and more like a living, breathing community.</p><p>Cecilia also reminds us that RSAC is a place for everyone—from first-timers unsure where to begin to seasoned veterans ready to innovate and invest. It’s about showing up, making a plan (or not), and being open to the unexpected conversations that happen in hallways, lounges, or over espresso in the sandbox village.</p><p>And if you can’t make it in person? RSAC has made sure that everything is accessible online—600 speakers, 600 vendors, and endless ways to engage, reflect, and be part of the global cybersecurity story.</p><p>So whether you’re hopping in the car, boarding a flight, or—who knows—riding a miniature DARPA train through Northridge City, one thing’s for sure: RSAC 2025 is going full speed ahead—and we’re bringing you along for the ride.</p><p>⸻<br /> </p><p>📺 FULL VIDEO</p><p>👉 <a href="https://youtu.be/59mW2XNz0CE" target="_blank">https://youtu.be/59mW2XNz0CE</a></p><p>🧭 EXPLORE RSAC COVERAGE</p><p>👉 <a href="https://www.itspmagazine.com/rsac" target="_blank">https://www.itspmagazine.com/rsac</a></p><p> </p><p>⸻</p><p>KEYWORDS</p><p>RSAC 2025, cybersecurity innovation, DARPA Cyber City, AI in security, startup funding, Innovation Sandbox, LaunchPad, Early Stage Expo, cybersecurity community, security scholars, investor track, immersive tech experiences, smart cities, cyber education, cyber startup pitch, interactive cybersecurity, RSAC sandbox, CTFs, AI-powered defense, infosec industry trends</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/overlay/about-this-profile/">Cecilia Murtagh Marinier </a>| Cybersecurity Advisor - Strategy, Innovation & Scholars at RSA Conference<br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society & Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-and-technology-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26448131" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2e0f01e9-4619-42ac-820a-8fc8f0d8f1da/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2e0f01e9-4619-42ac-820a-8fc8f0d8f1da&amp;feed=2M86zCcc"/>
      <itunes:title>RSAC 2025 Preview: All Aboard the Innovation Express: RSAC Conference 2025 On Track for Cybersecurity’s Future with Cecilia Mariner | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Cecilia Murtagh Marinier</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:32</itunes:duration>
      <itunes:summary>From DARPA’s Cyber City to AI-infused startups, RSAC 2025 is more than a conference—it’s a full-on cyber journey. In this On Location episode, Sean and Marco catch up with Cecilia Marinier to talk trains (yes, literal ones), innovation, and how RSAC is building bridges between generations, industries, and communities to shape the future of cybersecurity.
</itunes:summary>
      <itunes:subtitle>From DARPA’s Cyber City to AI-infused startups, RSAC 2025 is more than a conference—it’s a full-on cyber journey. In this On Location episode, Sean and Marco catch up with Cecilia Marinier to talk trains (yes, literal ones), innovation, and how RSAC is building bridges between generations, industries, and communities to shape the future of cybersecurity.
</itunes:subtitle>
      <itunes:keywords>yerba buena center for the arts, magic johnson, rsac sandbox, data, technology, marco ciappelli, innovation sandbox, cyber startup pitch, keynote speakers, rsa conference, immersive tech experiences, networking, rsac 2025, ciso, continuous learning, sean martin, darpa cyber city, cybersecurity, ai-powered defense, ron howard, conference, security foundations, interactive cybersecurity, ctfs, startup funding, on location, darpa ai cyber challenge, innovation, protecting home and family, community membership platform, ai in security, inclusive community, smart cities, event coverage, immersive experience., cyber education, large language models, cybersecurity community, investor track, sandbox, security scholars, jamie foxx, machine learning, ai, cybersecurity innovation, community, infosec industry trends, early stage expo, launchpad</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>196</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bccf455a-ffa1-4dac-ab9a-6f0e94973fbc</guid>
      <title>Protecting What Matters, With Chris Pierson of BlackCloak | A RSAC Conference 2025 Pre-Event Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As the cybersecurity world gears up for RSAC 2025 in San Francisco, we hit the road again—this time with Chris Pierson, Founder and CEO of BlackCloak, for a pre-event chat packed with insight, community spirit, and some big news.</p><p>Chris is no stranger to the RSA stage—this year marks his 21st year presenting—and he’s bringing his energy to two powerful sessions. The first, titled “Protecting What Matters: Your Family and Home,” kicks off bright and early on Monday, April 28. It’s not about blinky lights or enterprise networks—it’s about us. The cybersecurity community often talks about protecting organizations, but what about protecting ourselves and our families? Chris will explore how security pros can apply their skills at home, covering identity theft, scams, and home network safety. It’s a refreshing and much-needed call to action that connects the personal and professional.</p><p>On Wednesday, Chris returns with co-presenter James Shreve for a two-hour Learning Lab, “When Things Go Boom: Supply Chain Risk.” This Chatham House Rule session dives deep into one of today’s most complex challenges: managing third-party risk without stopping the business in its tracks. Participants will step into different roles—board members, CISOs, legal, finance—to engage in a live, collaborative scenario that pushes them to think beyond checklists. Real talk. Real collaboration. And practical takeaways.</p><p>But that’s not all. BlackCloak is also unveiling its new Digital Executive Protection Framework, designed to help organizations assess and strengthen protections for executives and their families. Chris teases that this framework includes 14 essential tenets that blend physical, digital, and organizational awareness—and he’ll be sitting down with us again at the event to go deeper.</p><p>With 15–20 BlackCloak team members on site, a full schedule of meetings, events, and community conversations, this year is shaping up to be a milestone for BlackCloak at RSAC. If you’re attending, keep an eye on their LinkedIn page for updates, booking links, and suite details.</p><p>As Chris says, it’s about lifting our heads, scanning the horizon, and showing up for our community—and our families.</p><p>Keywords: RSAC2025, Chris Pierson, BlackCloak, cybersecurity, RSA Conference, digital protection, executive protection, supply chain risk, identity theft, privacy, home network security, third-party risk, CISOs, cybersecurity community, digital executive protection framework, GRC, threat intelligence, infosec, personal security, cybersecurity awareness</p><p><strong>______________________</strong><br /><br /><strong>Guest: Chris Pierson</strong>, Founder & CEO of BLACKCLOAK | Digital Executive Protection | Concierge Cybersecurity & Privacy Protection . . . in their Personal Lives | On LinkedIn: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>BLACKCLOAK:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>Chris Sessions</strong> <br />Protecting What Matters—Your Family & Home <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU</a></p><p>When Things Go Boom! Your Supply Chain Risk<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM</a></p><p>BLACKCLOAK WEBSITE:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 9 Apr 2025 06:33:14 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson)</author>
      <link>https://eventcoveragepodcast.com/episodes/protecting-what-matters-with-chris-pierson-of-blackcloak-a-rsac-conference-2025-pre-event-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-gDRgph_x</link>
      <content:encoded><![CDATA[<p>As the cybersecurity world gears up for RSAC 2025 in San Francisco, we hit the road again—this time with Chris Pierson, Founder and CEO of BlackCloak, for a pre-event chat packed with insight, community spirit, and some big news.</p><p>Chris is no stranger to the RSA stage—this year marks his 21st year presenting—and he’s bringing his energy to two powerful sessions. The first, titled “Protecting What Matters: Your Family and Home,” kicks off bright and early on Monday, April 28. It’s not about blinky lights or enterprise networks—it’s about us. The cybersecurity community often talks about protecting organizations, but what about protecting ourselves and our families? Chris will explore how security pros can apply their skills at home, covering identity theft, scams, and home network safety. It’s a refreshing and much-needed call to action that connects the personal and professional.</p><p>On Wednesday, Chris returns with co-presenter James Shreve for a two-hour Learning Lab, “When Things Go Boom: Supply Chain Risk.” This Chatham House Rule session dives deep into one of today’s most complex challenges: managing third-party risk without stopping the business in its tracks. Participants will step into different roles—board members, CISOs, legal, finance—to engage in a live, collaborative scenario that pushes them to think beyond checklists. Real talk. Real collaboration. And practical takeaways.</p><p>But that’s not all. BlackCloak is also unveiling its new Digital Executive Protection Framework, designed to help organizations assess and strengthen protections for executives and their families. Chris teases that this framework includes 14 essential tenets that blend physical, digital, and organizational awareness—and he’ll be sitting down with us again at the event to go deeper.</p><p>With 15–20 BlackCloak team members on site, a full schedule of meetings, events, and community conversations, this year is shaping up to be a milestone for BlackCloak at RSAC. If you’re attending, keep an eye on their LinkedIn page for updates, booking links, and suite details.</p><p>As Chris says, it’s about lifting our heads, scanning the horizon, and showing up for our community—and our families.</p><p>Keywords: RSAC2025, Chris Pierson, BlackCloak, cybersecurity, RSA Conference, digital protection, executive protection, supply chain risk, identity theft, privacy, home network security, third-party risk, CISOs, cybersecurity community, digital executive protection framework, GRC, threat intelligence, infosec, personal security, cybersecurity awareness</p><p><strong>______________________</strong><br /><br /><strong>Guest: Chris Pierson</strong>, Founder & CEO of BLACKCLOAK | Digital Executive Protection | Concierge Cybersecurity & Privacy Protection . . . in their Personal Lives | On LinkedIn: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>BLACKCLOAK:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>Chris Sessions</strong> <br />Protecting What Matters—Your Family & Home <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU</a></p><p>When Things Go Boom! Your Supply Chain Risk<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM</a></p><p>BLACKCLOAK WEBSITE:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16886928" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f3b6d6f3-042b-453e-a20a-ba4d0b7496c2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f3b6d6f3-042b-453e-a20a-ba4d0b7496c2&amp;feed=2M86zCcc"/>
      <itunes:title>Protecting What Matters, With Chris Pierson of BlackCloak | A RSAC Conference 2025 Pre-Event Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:35</itunes:duration>
      <itunes:summary>Ahead of RSAC 2025, we hit the road with BlackCloak’s founder Chris Pierson to explore how cybersecurity pros can protect what matters most—at work and at home. From supply chain risk to executive protection, it’s a powerful conversation about community, leadership, and digital safety.
</itunes:summary>
      <itunes:subtitle>Ahead of RSAC 2025, we hit the road with BlackCloak’s founder Chris Pierson to explore how cybersecurity pros can protect what matters most—at work and at home. From supply chain risk to executive protection, it’s a powerful conversation about community, leadership, and digital safety.
</itunes:subtitle>
      <itunes:keywords>digital protection, data, chris pierson, marco ciappelli, rsa conference, ciso, grc, supply chain risk, sean martin, rsa, automation, threat detection, infosec, blackcloak, personal security, identity theft, home network security, cybersecurity, conference, on location, rsac, threat intelligence, event coverage, executive protection, rsac2025, third-party risk, cybersecurity community, digital executive protection framework, visibility, cybersecurity awareness, ai, alerts, cisos, privacy, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>195</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">442f9ee8-946f-4376-ae3d-ad80ccb9d2df</guid>
      <title>RSAC 2025 Preview: Unite. Innovate. Shine. Join the RSAC 2025 Community.  – Our Traditional Pre-Event Kick Off Conversation with Linda Gray Martin &amp; Britta Glade | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Join Marco and Sean in their annual pre-RSAC conversation with Linda Gray Martin and Britta Glade. Discover what's new and exciting at RSAC 2025—expanded campuses, innovative programming, and compelling guest speakers like Magic Johnson and Ron Howard. Dive into special events, immersive experiences, and the launch of a vibrant community platform aimed at fostering continuous learning and connection among cybersecurity professionals. Get ready for another unforgettable year celebrating many voices within one united community.</p><p><strong>Full Intro/Blog:</strong><br />RSA Conference 2025 is here, and Marco and Sean continue their beloved tradition with a vibrant preview conversation featuring Linda Gray Martin, Chief of Staff and Senior Vice President at RSAC, and Britta Glade, Senior Vice President, Content & Communities. This year's conference theme, "Many Voices, One Community," highlights the collaborative and inclusive spirit driving the cybersecurity world forward.</p><p>In this engaging discussion, Marco and Sean explore the exciting expansions and innovations attendees can anticipate. RSAC is expanding its campus, taking over San Francisco's stunning Yerba Buena Center for the Arts, enhancing the attendee experience with a new keynote auditorium and the DARPA AI Cyber Challenge. The Sandbox area promises captivating interactive experiences, including a fictional town simulation designed to showcase AI's role in safeguarding critical infrastructure.</p><p>Keynotes remain a conference highlight, with influential voices like NBA legend Magic Johnson sharing insights on teamwork, and filmmaker Ron Howard discussing storytelling and human connections in a unique father-daughter interview format. Closing celebrations feature an exciting conversation with Jamie Foxx, alongside vibrant performances from DJ Irie and local sensation Jazz Mafia.</p><p>New educational tracks addressing essential topics such as Protecting Home and Family and Security Foundations ensure that content remains both relevant and accessible. The introduction of a new community membership platform is set to revolutionize ongoing engagement, offering secure messaging, tailored cybersecurity content, and collaborative opportunities long after the conference ends.</p><p>Embrace the spirit of innovation, unity, and continuous growth at RSAC 2025, where the cybersecurity community comes together to drive meaningful change.</p><p><strong>Keywords:</strong><br />RSAC 2025, RSA Conference, cybersecurity, community, innovation, Magic Johnson, Ron Howard, Jamie Foxx, DARPA AI Cyber Challenge, Sandbox, Yerba Buena Center for the Arts, keynote speakers, networking, continuous learning, community membership platform, protecting home and family, security foundations, technology, inclusive community, immersive experience.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Linda Gray Martin | </strong>Chief of Staff, RSAC and Senior Vice President, RSA Conference<br /><a href="https://www.linkedin.com/in/linda-gray-martin-223708/" target="_blank">https://www.linkedin.com/in/linda-gray-martin-223708/</a><br /><br /><strong>Britta Glade | </strong>Senior Vice President, Content & Communities, RSA Conference<br /><a href="https://www.linkedin.com/in/britta-glade-5251003/" target="_blank">https://www.linkedin.com/in/britta-glade-5251003/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society & Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-and-technology-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 7 Apr 2025 04:48:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Linda Gray Martin, Britta Glade)</author>
      <link>https://eventcoveragepodcast.com/episodes/rsac-2025-preview-unite-innovate-shine-join-the-rsac-2025-community-our-traditional-pre-event-kick-off-conversation-with-linda-gray-martin-britta-glade-on-location-coverage-with-sean-martin-and-marco-ciappelli-eRa3j_ZI</link>
      <content:encoded><![CDATA[<p>Join Marco and Sean in their annual pre-RSAC conversation with Linda Gray Martin and Britta Glade. Discover what's new and exciting at RSAC 2025—expanded campuses, innovative programming, and compelling guest speakers like Magic Johnson and Ron Howard. Dive into special events, immersive experiences, and the launch of a vibrant community platform aimed at fostering continuous learning and connection among cybersecurity professionals. Get ready for another unforgettable year celebrating many voices within one united community.</p><p><strong>Full Intro/Blog:</strong><br />RSA Conference 2025 is here, and Marco and Sean continue their beloved tradition with a vibrant preview conversation featuring Linda Gray Martin, Chief of Staff and Senior Vice President at RSAC, and Britta Glade, Senior Vice President, Content & Communities. This year's conference theme, "Many Voices, One Community," highlights the collaborative and inclusive spirit driving the cybersecurity world forward.</p><p>In this engaging discussion, Marco and Sean explore the exciting expansions and innovations attendees can anticipate. RSAC is expanding its campus, taking over San Francisco's stunning Yerba Buena Center for the Arts, enhancing the attendee experience with a new keynote auditorium and the DARPA AI Cyber Challenge. The Sandbox area promises captivating interactive experiences, including a fictional town simulation designed to showcase AI's role in safeguarding critical infrastructure.</p><p>Keynotes remain a conference highlight, with influential voices like NBA legend Magic Johnson sharing insights on teamwork, and filmmaker Ron Howard discussing storytelling and human connections in a unique father-daughter interview format. Closing celebrations feature an exciting conversation with Jamie Foxx, alongside vibrant performances from DJ Irie and local sensation Jazz Mafia.</p><p>New educational tracks addressing essential topics such as Protecting Home and Family and Security Foundations ensure that content remains both relevant and accessible. The introduction of a new community membership platform is set to revolutionize ongoing engagement, offering secure messaging, tailored cybersecurity content, and collaborative opportunities long after the conference ends.</p><p>Embrace the spirit of innovation, unity, and continuous growth at RSAC 2025, where the cybersecurity community comes together to drive meaningful change.</p><p><strong>Keywords:</strong><br />RSAC 2025, RSA Conference, cybersecurity, community, innovation, Magic Johnson, Ron Howard, Jamie Foxx, DARPA AI Cyber Challenge, Sandbox, Yerba Buena Center for the Arts, keynote speakers, networking, continuous learning, community membership platform, protecting home and family, security foundations, technology, inclusive community, immersive experience.</p><p><strong>__________________________________</strong><br /><br /><strong>Guest: </strong><br /><strong>Linda Gray Martin | </strong>Chief of Staff, RSAC and Senior Vice President, RSA Conference<br /><a href="https://www.linkedin.com/in/linda-gray-martin-223708/" target="_blank">https://www.linkedin.com/in/linda-gray-martin-223708/</a><br /><br /><strong>Britta Glade | </strong>Senior Vice President, Content & Communities, RSA Conference<br /><a href="https://www.linkedin.com/in/britta-glade-5251003/" target="_blank">https://www.linkedin.com/in/britta-glade-5251003/</a><br /><br /><strong>Hosts:</strong><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society & Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-and-technology-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29204634" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2821c858-894f-4933-8f02-67a4076087d4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2821c858-894f-4933-8f02-67a4076087d4&amp;feed=2M86zCcc"/>
      <itunes:title>RSAC 2025 Preview: Unite. Innovate. Shine. Join the RSAC 2025 Community.  – Our Traditional Pre-Event Kick Off Conversation with Linda Gray Martin &amp; Britta Glade | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Linda Gray Martin, Britta Glade</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:25</itunes:duration>
      <itunes:summary>Join Marco and Sean in their annual pre-RSAC conversation with Linda Gray Martin and Britta Glade. Discover what&apos;s new and exciting at RSAC 2025—expanded campuses, innovative programming, and compelling guest speakers like Magic Johnson and Ron Howard. Dive into special events, immersive experiences, and the launch of a vibrant community platform aimed at fostering continuous learning and connection among cybersecurity professionals. Get ready for another unforgettable year celebrating many voices within one united community.
</itunes:summary>
      <itunes:subtitle>Join Marco and Sean in their annual pre-RSAC conversation with Linda Gray Martin and Britta Glade. Discover what&apos;s new and exciting at RSAC 2025—expanded campuses, innovative programming, and compelling guest speakers like Magic Johnson and Ron Howard. Dive into special events, immersive experiences, and the launch of a vibrant community platform aimed at fostering continuous learning and connection among cybersecurity professionals. Get ready for another unforgettable year celebrating many voices within one united community.
</itunes:subtitle>
      <itunes:keywords>yerba buena center for the arts, magic johnson, data, technology, marco ciappelli, keynote speakers, rsa conference, networking, rsac 2025, ciso, continuous learning, sean martin, cybersecurity, ron howard, conference, security foundations, on location, darpa ai cyber challenge, innovation, protecting home and family, community membership platform, inclusive community, event coverage, immersive experience., large language models, sandbox, jamie foxx, machine learning, ai, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>194</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56625a4d-fea1-4f40-b916-c23eb99d4106</guid>
      <title>From Overload to Insight: Are We Getting Smarter, or Just Letting AI Think for Us? | A RSA Conference 2025 Conversation with Steve Wilson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a conversation that sets the tone for this year’s RSA Conference, Steve Wilson, shares a candid look at how AI is intersecting with cybersecurity in real and measurable ways. Wilson, who also leads the OWASP Top 10 for Large Language Models project and recently authored a book published by O’Reilly on the topic, brings a multi-layered perspective to a discussion that blends strategy, technology, and organizational behavior.</p><p>Wilson’s session title at RSA Conference—<i>“Are the Machines Learning, or Are We?”</i>—asks a timely question. Security teams are inundated with data, but without meaningful visibility—defined not just as seeing, but understanding and acting on what you see—confidence in defense capabilities may be misplaced. Wilson references a study conducted with IDC that highlights this very disconnect: organizations feel secure, yet admit they can’t see enough of their environment to justify that confidence.</p><p>This episode tackles one of the core paradoxes of AI in cybersecurity: it offers the promise of enhanced detection, speed, and insight, but only if applied thoughtfully. Generative AI and large language models (LLMs) aren’t magical fixes, and they struggle with large datasets. But when layered atop refined systems like user and entity behavior analytics (UEBA), they can help junior analysts punch above their weight—or even automate early-stage investigations.</p><p>Wilson doesn’t stop at the tools. He zooms out to the business implications, where visibility, talent shortages, and tech complexity converge. He challenges security leaders to rethink what visibility truly means and to recognize the mounting noise problem. The industry is chasing 40% more CVEs year over year—an unsustainable growth curve that demands better signal-to-noise filtering.</p><p>At its heart, the episode raises important strategic questions: Are businesses merely offloading thinking to machines? Or are they learning how to apply these technologies to think more clearly, act more decisively, and structure teams differently?</p><p>Whether you’re building a SOC strategy, rethinking tooling, or just navigating the AI hype cycle, this conversation with Steve Wilson offers grounded insights with real implications for today—and tomorrow.</p><p>🎧 Tune in to hear how organizations can strike the balance between smart machines and smarter humans.</p><p><strong>Guest: Steve Wilson</strong>, Founder and Co-Chair at OWASP GenAI Security Project | On LinkedIn: <a href="https://www.linkedin.com/in/wilsonsd/" target="_blank">https://www.linkedin.com/in/wilsonsd/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Steve's Session — The Machines Are Learning, But Are We?: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727385607626001Dg4P" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727385607626001Dg4P</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 4 Apr 2025 17:27:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wilson)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-overload-to-insight-are-we-getting-smarter-or-just-letting-ai-think-for-us-a-rsa-conference-2025-conversation-with-steve-wilson-on-location-coverage-with-sean-martin-and-marco-ciappelli-7FX9QSO8</link>
      <content:encoded><![CDATA[<p>In a conversation that sets the tone for this year’s RSA Conference, Steve Wilson, shares a candid look at how AI is intersecting with cybersecurity in real and measurable ways. Wilson, who also leads the OWASP Top 10 for Large Language Models project and recently authored a book published by O’Reilly on the topic, brings a multi-layered perspective to a discussion that blends strategy, technology, and organizational behavior.</p><p>Wilson’s session title at RSA Conference—<i>“Are the Machines Learning, or Are We?”</i>—asks a timely question. Security teams are inundated with data, but without meaningful visibility—defined not just as seeing, but understanding and acting on what you see—confidence in defense capabilities may be misplaced. Wilson references a study conducted with IDC that highlights this very disconnect: organizations feel secure, yet admit they can’t see enough of their environment to justify that confidence.</p><p>This episode tackles one of the core paradoxes of AI in cybersecurity: it offers the promise of enhanced detection, speed, and insight, but only if applied thoughtfully. Generative AI and large language models (LLMs) aren’t magical fixes, and they struggle with large datasets. But when layered atop refined systems like user and entity behavior analytics (UEBA), they can help junior analysts punch above their weight—or even automate early-stage investigations.</p><p>Wilson doesn’t stop at the tools. He zooms out to the business implications, where visibility, talent shortages, and tech complexity converge. He challenges security leaders to rethink what visibility truly means and to recognize the mounting noise problem. The industry is chasing 40% more CVEs year over year—an unsustainable growth curve that demands better signal-to-noise filtering.</p><p>At its heart, the episode raises important strategic questions: Are businesses merely offloading thinking to machines? Or are they learning how to apply these technologies to think more clearly, act more decisively, and structure teams differently?</p><p>Whether you’re building a SOC strategy, rethinking tooling, or just navigating the AI hype cycle, this conversation with Steve Wilson offers grounded insights with real implications for today—and tomorrow.</p><p>🎧 Tune in to hear how organizations can strike the balance between smart machines and smarter humans.</p><p><strong>Guest: Steve Wilson</strong>, Founder and Co-Chair at OWASP GenAI Security Project | On LinkedIn: <a href="https://www.linkedin.com/in/wilsonsd/" target="_blank">https://www.linkedin.com/in/wilsonsd/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Akamai: <a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p>BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p>Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p>Dropzone AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Steve's Session — The Machines Are Learning, But Are We?: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727385607626001Dg4P" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727385607626001Dg4P</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26344552" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/0062d5ac-9994-47ee-a1f7-72289edb1164/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=0062d5ac-9994-47ee-a1f7-72289edb1164&amp;feed=2M86zCcc"/>
      <itunes:title>From Overload to Insight: Are We Getting Smarter, or Just Letting AI Think for Us? | A RSA Conference 2025 Conversation with Steve Wilson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/15269e17-bcc8-48f0-ab4a-cd62348d012a/3000x3000/rsa-20conference-202025-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:26</itunes:duration>
      <itunes:summary>Steve Wilson joins us for our first Chats on the Road to RSA Conference, breaking down how AI is reshaping cybersecurity—not by replacing humans, but by helping them see more, understand faster, and act smarter. This episode challenges assumptions about visibility, automation, and learning, offering a sharp look at what actually works in today’s security operations.</itunes:summary>
      <itunes:subtitle>Steve Wilson joins us for our first Chats on the Road to RSA Conference, breaking down how AI is reshaping cybersecurity—not by replacing humans, but by helping them see more, understand faster, and act smarter. This episode challenges assumptions about visibility, automation, and learning, offering a sharp look at what actually works in today’s security operations.</itunes:subtitle>
      <itunes:keywords>sim, smartsoc, data, marco ciappelli, ciso, sean martin, rsa, automation, threat detection, ueba, cybersecurity, conference, on location, event coverage, generative, large language models, petabytes, visibility, machine learning, ai, alerts, security operations, steve wilson</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>193</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b801bdc-e06a-4e75-a785-6ccfd260930e</guid>
      <title>Vinyl Is Not Just Back—It Never Really Left | Making Vinyl Conference | Guest: Larry Jaffee &amp; Kevin Da Costa | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>🎙️ On Location with Sean Martin & Marco Ciappelli</strong></p><p><strong>Event: Making Vinyl | Guest: Larry Jaffee & Kevin Da Costa</strong></p><p>🎶✨ <strong>Vinyl Is Not Just Back—It Never Really Left</strong></p><p>In this <i>On Location</i> pre-event conversation, Sean Martin and Marco Ciappelli sit down with Larry Jaffee—co-founder and conference director of <i>Making Vinyl</i>—and engineer and vinyl advocate Kevin Da Costa to talk about the past, present, and future of record pressing.</p><p>From Larry’s moment of “vinyl madness” (yes, he sold his entire collection—and spent 12 years rebuilding it), to Kevin’s journey from Tesla engineer to global vinyl plant consultant, this episode captures the spirit behind the event: passion, craftsmanship, and a deep respect for the analog experience.</p><p>Now in its eighth year, <i>Making Vinyl</i> isn’t just an event—it’s a global meeting point for everyone in the record production ecosystem: pressing plants, designers, engineers, record labels, and artists. It’s B2B, it’s hands-on, and it’s growing fast—just like the industry itself, which has gone from around 35 pressing plants in 2017 to nearly 200 today.</p><p>We also touch on something exciting: the emergence of new factories in regions that haven’t pressed records in decades—from India to Africa to the Balkans. As Kevin notes, this isn’t just about nostalgia. It’s about expanding music culture, supporting local creativity, and creating space for new voices.</p><p>This year’s event also dives into innovation—from sustainable materials to smart vinyl—and yes, even a brand-new session on cybersecurity for pressing plants (because even physical formats have digital vulnerabilities now).</p><p>Whether you’re a vinyl lover, a producer, or part of the production chain, this episode sets the tone for what promises to be another unforgettable <i>Making Vinyl</i> experience.</p><p>🗓️ <strong>Event Dates:</strong> June 2–4, 2025</p><p>📍 <strong>Location:</strong> Renasant Convention Center, Memphis, TN</p><p>🌐 <strong>More info:</strong> <a href="https://www.makingvinyl.com/">https://www.makingvinyl.com</a></p><p> </p><p>🎙️ Stay connected with us—subscribe to <i>On Location with Sean Martin and Marco Ciappelli</i> for more in-depth conversations from the world of cybersecurity, technology, and beyond!</p><p><strong>Guest:s </strong><br /><strong>Larry Jaffee</strong>: co-founder and conference director of Making Vinyl <br />On LinkedIn: <a href="https://www.linkedin.com/in/larry-jaffee-1379bb2/" target="_blank">https://www.linkedin.com/in/larry-jaffee-1379bb2/</a><br /><br /><strong>Kevin Da Costa</strong>: Vinyl Record Manufacturing Consultant & Technical Director @ evolution-music.co.uk<br /><br />On LinkedIn: <a href="https://www.linkedin.com/in/kevin-da-costa-349a5046/" target="_blank">https://www.linkedin.com/in/kevin-da-costa-349a5046/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br /><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">______________________________________________</a><br /><strong>Keywords:</strong> vinyl manufacturing, record pressing, music industry, analog revival, pressing plants, vinyl records, sustainability in music, record production, vinyl culture, Making Vinyl conference</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p><strong>Website: </strong><a href="https://makingvinyl.com" target="_blank">https://makingvinyl.com</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 28 Mar 2025 20:50:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kevin Da Costa, Larry Jaffee)</author>
      <link>https://eventcoveragepodcast.com/episodes/vinyl-is-not-just-backit-never-really-left-making-vinyl-conference-guest-larry-jaffee-kevin-da-costa-on-location-coverage-with-sean-martin-and-marco-ciappelli-HTsFfPWb</link>
      <content:encoded><![CDATA[<p><strong>🎙️ On Location with Sean Martin & Marco Ciappelli</strong></p><p><strong>Event: Making Vinyl | Guest: Larry Jaffee & Kevin Da Costa</strong></p><p>🎶✨ <strong>Vinyl Is Not Just Back—It Never Really Left</strong></p><p>In this <i>On Location</i> pre-event conversation, Sean Martin and Marco Ciappelli sit down with Larry Jaffee—co-founder and conference director of <i>Making Vinyl</i>—and engineer and vinyl advocate Kevin Da Costa to talk about the past, present, and future of record pressing.</p><p>From Larry’s moment of “vinyl madness” (yes, he sold his entire collection—and spent 12 years rebuilding it), to Kevin’s journey from Tesla engineer to global vinyl plant consultant, this episode captures the spirit behind the event: passion, craftsmanship, and a deep respect for the analog experience.</p><p>Now in its eighth year, <i>Making Vinyl</i> isn’t just an event—it’s a global meeting point for everyone in the record production ecosystem: pressing plants, designers, engineers, record labels, and artists. It’s B2B, it’s hands-on, and it’s growing fast—just like the industry itself, which has gone from around 35 pressing plants in 2017 to nearly 200 today.</p><p>We also touch on something exciting: the emergence of new factories in regions that haven’t pressed records in decades—from India to Africa to the Balkans. As Kevin notes, this isn’t just about nostalgia. It’s about expanding music culture, supporting local creativity, and creating space for new voices.</p><p>This year’s event also dives into innovation—from sustainable materials to smart vinyl—and yes, even a brand-new session on cybersecurity for pressing plants (because even physical formats have digital vulnerabilities now).</p><p>Whether you’re a vinyl lover, a producer, or part of the production chain, this episode sets the tone for what promises to be another unforgettable <i>Making Vinyl</i> experience.</p><p>🗓️ <strong>Event Dates:</strong> June 2–4, 2025</p><p>📍 <strong>Location:</strong> Renasant Convention Center, Memphis, TN</p><p>🌐 <strong>More info:</strong> <a href="https://www.makingvinyl.com/">https://www.makingvinyl.com</a></p><p> </p><p>🎙️ Stay connected with us—subscribe to <i>On Location with Sean Martin and Marco Ciappelli</i> for more in-depth conversations from the world of cybersecurity, technology, and beyond!</p><p><strong>Guest:s </strong><br /><strong>Larry Jaffee</strong>: co-founder and conference director of Making Vinyl <br />On LinkedIn: <a href="https://www.linkedin.com/in/larry-jaffee-1379bb2/" target="_blank">https://www.linkedin.com/in/larry-jaffee-1379bb2/</a><br /><br /><strong>Kevin Da Costa</strong>: Vinyl Record Manufacturing Consultant & Technical Director @ evolution-music.co.uk<br /><br />On LinkedIn: <a href="https://www.linkedin.com/in/kevin-da-costa-349a5046/" target="_blank">https://www.linkedin.com/in/kevin-da-costa-349a5046/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br /><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">______________________________________________</a><br /><strong>Keywords:</strong> vinyl manufacturing, record pressing, music industry, analog revival, pressing plants, vinyl records, sustainability in music, record production, vinyl culture, Making Vinyl conference</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p><strong>Website: </strong><a href="https://makingvinyl.com" target="_blank">https://makingvinyl.com</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32210551" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9988a112-f9ea-473c-9b37-7c344940193d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9988a112-f9ea-473c-9b37-7c344940193d&amp;feed=2M86zCcc"/>
      <itunes:title>Vinyl Is Not Just Back—It Never Really Left | Making Vinyl Conference | Guest: Larry Jaffee &amp; Kevin Da Costa | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kevin Da Costa, Larry Jaffee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/860cce50-c54d-43f1-94c6-68d5d285165a/3000x3000/making-20vinyl-20memphis-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:33</itunes:duration>
      <itunes:summary>🎶✨ Vinyl Is Not Just Back—It Never Really Left
In this On Location pre-event conversation, Sean Martin and Marco Ciappelli sit down with Larry Jaffee—co-founder and conference director of Making Vinyl—and engineer and vinyl advocate Kevin Da Costa to talk about the past, present, and future of record pressing.</itunes:summary>
      <itunes:subtitle>🎶✨ Vinyl Is Not Just Back—It Never Really Left
In this On Location pre-event conversation, Sean Martin and Marco Ciappelli sit down with Larry Jaffee—co-founder and conference director of Making Vinyl—and engineer and vinyl advocate Kevin Da Costa to talk about the past, present, and future of record pressing.</itunes:subtitle>
      <itunes:keywords>making vinyl conference, technology, marco ciappelli, record production, vinyl, music, pressing plants, analog revival, sean martin, onlocationpodcast, music industry, conference, on location, innovation, sustainability in music, rock, event coverage, analog technology, record pressing, technologynews, ai, analog music, making vinyl, vinyl culture, vinyl records</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>192</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">38457502-82d4-45ba-8897-abe13b4b4b95</guid>
      <title>Discovering The Key to Secure and Seamless Healthcare Data Sharing | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</title>
      <description><![CDATA[<p>The HIMSS Global Conference brings together healthcare professionals, technology providers, and industry leaders to discuss the most pressing challenges in healthcare. One of the key conversations this year focused on security, risk management, and the role of HITRUST in ensuring trust across the healthcare ecosystem.</p><p><strong>HITRUST’s Expanding Role in Healthcare Security</strong></p><p>Ryan Patrick, VP of Adoption at HITRUST, joined the discussion to share insights from the conference floor. One of the most striking takeaways was the sheer scale of engagement—attendance at HIMSS was at an all-time high, reflecting a growing focus on healthcare security and compliance. Organizations across the industry are looking for solutions that support innovation while maintaining security, and HITRUST is at the center of those conversations.</p><p>A common misconception about HITRUST is that it only provides a single, rigorous cybersecurity assessment. Patrick clarified that HITRUST now offers a tiered approach, including the E1 (entry-level), I1 (intermediate), and R2 (comprehensive) assessments, allowing organizations to align their security and compliance efforts with their level of maturity. The E1 assessment, in particular, has gained rapid adoption as organizations look for a scalable way to demonstrate security and compliance without the complexity of a full certification process.</p><p><strong>The Role of HITRUST in Third-Party Risk Management</strong></p><p>With interoperability becoming a priority in healthcare, third-party risk management is a growing concern. Many healthcare organizations work with hundreds—if not thousands—of vendors, and ensuring security across this extended network is critical. Patrick emphasized that HITRUST is not just a cybersecurity framework but a tool for managing third-party risk at scale. HITRUST assessments provide structured, standardized data that can be integrated into risk management platforms, allowing organizations to evaluate their vendors with greater efficiency and confidence.</p><p>As discussions around security and compliance continue, Patrick encourages healthcare organizations to educate themselves on the full range of HITRUST offerings. Whether an organization is starting its security journey or looking to optimize third-party risk management, HITRUST provides a structured path to achieving trust and resilience.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 20 Mar 2025 10:53:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick)</author>
      <link>https://eventcoveragepodcast.com/episodes/discovering-the-key-to-secure-and-seamless-healthcare-data-sharing-a-brand-story-conversation-from-himss-2025-a-hitrust-brand-story-with-ryan-patrick-nXWVs6po</link>
      <content:encoded><![CDATA[<p>The HIMSS Global Conference brings together healthcare professionals, technology providers, and industry leaders to discuss the most pressing challenges in healthcare. One of the key conversations this year focused on security, risk management, and the role of HITRUST in ensuring trust across the healthcare ecosystem.</p><p><strong>HITRUST’s Expanding Role in Healthcare Security</strong></p><p>Ryan Patrick, VP of Adoption at HITRUST, joined the discussion to share insights from the conference floor. One of the most striking takeaways was the sheer scale of engagement—attendance at HIMSS was at an all-time high, reflecting a growing focus on healthcare security and compliance. Organizations across the industry are looking for solutions that support innovation while maintaining security, and HITRUST is at the center of those conversations.</p><p>A common misconception about HITRUST is that it only provides a single, rigorous cybersecurity assessment. Patrick clarified that HITRUST now offers a tiered approach, including the E1 (entry-level), I1 (intermediate), and R2 (comprehensive) assessments, allowing organizations to align their security and compliance efforts with their level of maturity. The E1 assessment, in particular, has gained rapid adoption as organizations look for a scalable way to demonstrate security and compliance without the complexity of a full certification process.</p><p><strong>The Role of HITRUST in Third-Party Risk Management</strong></p><p>With interoperability becoming a priority in healthcare, third-party risk management is a growing concern. Many healthcare organizations work with hundreds—if not thousands—of vendors, and ensuring security across this extended network is critical. Patrick emphasized that HITRUST is not just a cybersecurity framework but a tool for managing third-party risk at scale. HITRUST assessments provide structured, standardized data that can be integrated into risk management platforms, allowing organizations to evaluate their vendors with greater efficiency and confidence.</p><p>As discussions around security and compliance continue, Patrick encourages healthcare organizations to educate themselves on the full range of HITRUST offerings. Whether an organization is starting its security journey or looking to optimize third-party risk management, HITRUST provides a structured path to achieving trust and resilience.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14340321" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/30fde300-c943-4ad1-93a2-320363f1e127/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=30fde300-c943-4ad1-93a2-320363f1e127&amp;feed=2M86zCcc"/>
      <itunes:title>Discovering The Key to Secure and Seamless Healthcare Data Sharing | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:56</itunes:duration>
      <itunes:summary>Ryan Patrick, VP of Adoption at HITRUST, joins the conversation following HIMSS to share how HITRUST is helping healthcare organizations strengthen security, manage third-party risk, and support interoperability with a tiered approach to assessments. With record-breaking attendance at HIMSS, the discussion highlights why organizations are turning to HITRUST for scalable, efficient ways to navigate compliance and protect patient data.</itunes:summary>
      <itunes:subtitle>Ryan Patrick, VP of Adoption at HITRUST, joins the conversation following HIMSS to share how HITRUST is helping healthcare organizations strengthen security, manage third-party risk, and support interoperability with a tiered approach to assessments. With record-breaking attendance at HIMSS, the discussion highlights why organizations are turning to HITRUST for scalable, efficient ways to navigate compliance and protect patient data.</itunes:subtitle>
      <itunes:keywords>compliance, assurance, data, technology, marco ciappelli, sean martin, trust, framework, cybersecurity, conference, healthcare security, breach, patient safety, on location, risk management, innovation, event coverage, certification, ryan patrick, regulation, risk, healthcare, interoperability</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>191</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4c7e3021-d66e-471c-939e-88b9f7d118bc</guid>
      <title>Cybersecurity in Italy: ITASEC 2025 Recap &amp; Future Outlook with Professor Alessandro Armando | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Cybersecurity in Italy: ITASEC 2025 Recap & Future Outlook with</strong> <strong>Professor Alessandro Armando</strong></p><p>Cybersecurity is no longer a niche topic—it’s a fundamental pillar of modern society. And in Italy, ITASEC has become the go-to event for bringing together researchers, government officials, and industry leaders to tackle the biggest security challenges of our time.</p><p>Although we weren’t there in person this year, we’re diving into everything that happened at <strong>ITASEC 2025</strong> in this special <i>On Location</i> recap with <strong>Professor Alessandro Armando</strong>. As <strong>Deputy Director of the Cybersecurity National Laboratory at CINI</strong> and <strong>Chairman of the Scientific Committee of the SERICS Foundation</strong>, Alessandro has a front-row seat to the evolution of cybersecurity in Italy.</p><p>This year’s event, held in Bologna, showcased the <strong>growing maturity of Italy’s cybersecurity landscape</strong>, featuring keynotes, technical sessions, and even hands-on experiences for the next generation of security professionals. From government regulations like <strong>DORA</strong> (Digital Operational Resilience Act) to the challenges of <strong>AI security</strong>, ITASEC 2025 covered a vast range of topics shaping the future of digital defense.</p><p>One major theme? <strong>Cybersecurity as an investment, not just a cost.</strong> Italian companies are increasingly recognizing security as a competitive advantage—something that enhances trust and reputation rather than just a compliance checkbox.</p><p>We also discuss the critical role of education in cybersecurity, from university initiatives to national competitions that are training the next wave of security experts. With programs like <strong>Cyber Challenge.IT</strong>, Italy is making significant strides in developing a strong cybersecurity workforce, ensuring that organizations are prepared for the evolving threat landscape.</p><p>And of course, Alessandro shares a big reveal: <strong>ITASEC 2026 is heading to Sardinia!</strong> A stunning location for what promises to be another exciting edition of the conference.</p><p>Join us for this insightful discussion as we reflect on <strong>where cybersecurity in Italy is today, where it’s headed, and why events like ITASEC matter now more than ever</strong>.</p><p>🎙️ Stay connected with us—subscribe to <i>On Location with Sean Martin and Marco Ciappelli</i> for more in-depth conversations from the world of cybersecurity, technology, and beyond!</p><p><strong>Guest: </strong>Professor<strong> Alessandro Armando</strong>. University of Genoa | Deputy Director of the Cybersecurity National Laboratory at CINI and Chairman of the Scientific Committee of the SERICS Foundation | On LinkedIn: <a href="https://www.linkedin.com/in/alessandro-armando-67505913/" target="_blank">https://www.linkedin.com/in/alessandro-armando-67505913/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p><strong>Website: </strong><a href="https://itasec.it" target="_blank">https://itasec.it</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 18 Mar 2025 05:33:59 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Alessandro Armando)</author>
      <link>https://eventcoveragepodcast.com/episodes/cybersecurity-in-italy-itasec-2025-recap-future-outlook-with-professor-alessandro-armando-on-location-coverage-with-sean-martin-and-marco-ciappelli-iyq5LAc6</link>
      <content:encoded><![CDATA[<p><strong>Cybersecurity in Italy: ITASEC 2025 Recap & Future Outlook with</strong> <strong>Professor Alessandro Armando</strong></p><p>Cybersecurity is no longer a niche topic—it’s a fundamental pillar of modern society. And in Italy, ITASEC has become the go-to event for bringing together researchers, government officials, and industry leaders to tackle the biggest security challenges of our time.</p><p>Although we weren’t there in person this year, we’re diving into everything that happened at <strong>ITASEC 2025</strong> in this special <i>On Location</i> recap with <strong>Professor Alessandro Armando</strong>. As <strong>Deputy Director of the Cybersecurity National Laboratory at CINI</strong> and <strong>Chairman of the Scientific Committee of the SERICS Foundation</strong>, Alessandro has a front-row seat to the evolution of cybersecurity in Italy.</p><p>This year’s event, held in Bologna, showcased the <strong>growing maturity of Italy’s cybersecurity landscape</strong>, featuring keynotes, technical sessions, and even hands-on experiences for the next generation of security professionals. From government regulations like <strong>DORA</strong> (Digital Operational Resilience Act) to the challenges of <strong>AI security</strong>, ITASEC 2025 covered a vast range of topics shaping the future of digital defense.</p><p>One major theme? <strong>Cybersecurity as an investment, not just a cost.</strong> Italian companies are increasingly recognizing security as a competitive advantage—something that enhances trust and reputation rather than just a compliance checkbox.</p><p>We also discuss the critical role of education in cybersecurity, from university initiatives to national competitions that are training the next wave of security experts. With programs like <strong>Cyber Challenge.IT</strong>, Italy is making significant strides in developing a strong cybersecurity workforce, ensuring that organizations are prepared for the evolving threat landscape.</p><p>And of course, Alessandro shares a big reveal: <strong>ITASEC 2026 is heading to Sardinia!</strong> A stunning location for what promises to be another exciting edition of the conference.</p><p>Join us for this insightful discussion as we reflect on <strong>where cybersecurity in Italy is today, where it’s headed, and why events like ITASEC matter now more than ever</strong>.</p><p>🎙️ Stay connected with us—subscribe to <i>On Location with Sean Martin and Marco Ciappelli</i> for more in-depth conversations from the world of cybersecurity, technology, and beyond!</p><p><strong>Guest: </strong>Professor<strong> Alessandro Armando</strong>. University of Genoa | Deputy Director of the Cybersecurity National Laboratory at CINI and Chairman of the Scientific Committee of the SERICS Foundation | On LinkedIn: <a href="https://www.linkedin.com/in/alessandro-armando-67505913/" target="_blank">https://www.linkedin.com/in/alessandro-armando-67505913/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p><strong>Website: </strong><a href="https://itasec.it" target="_blank">https://itasec.it</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24564389" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d4819e76-464c-4da7-bf8c-1371cfa98d1b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d4819e76-464c-4da7-bf8c-1371cfa98d1b&amp;feed=2M86zCcc"/>
      <itunes:title>Cybersecurity in Italy: ITASEC 2025 Recap &amp; Future Outlook with Professor Alessandro Armando | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Alessandro Armando</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/84cef4a6-f6ee-4dce-b986-fc8c60187e6d/3000x3000/itasec-20bologna-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:35</itunes:duration>
      <itunes:summary>Cybersecurity is evolving, and so is ITASEC. In this episode of On Location, we recap ITASEC 2025 with Professor Alessandro Armando, exploring how this conference has grown into a key cybersecurity event in Italy.</itunes:summary>
      <itunes:subtitle>Cybersecurity is evolving, and so is ITASEC. In this episode of On Location, we recap ITASEC 2025 with Professor Alessandro Armando, exploring how this conference has grown into a key cybersecurity event in Italy.</itunes:subtitle>
      <itunes:keywords>itasec, data, technology, marco ciappelli, sean martin, cyberrisk, automation, onlocationpodcast, infosec, ethicalhacking, cybersecurity, pentesting, conference, cyberworkforce, on location, cyberlaw, ehr, innovation, aisecurity, policy, riskmanagement, dataprotection, cybereducation, event coverage, dora, sicurezza informatica, cyberresilience, cyberthreats, technologynews, security, italian cybersecurity, machine learning, regulation, digitalsecurity, ai, threatintel, privacy, itasec2025</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>190</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fe746e0e-638f-47de-ac27-0b3736aed28d</guid>
      <title>Interoperability, AI, and the Future of Trust in Healthcare | A HIMSS 2025 Conversation with Robert Havasy | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Artificial intelligence continues to shape the future of healthcare, and this year’s HIMSS Global Conference 2025 reflected both the momentum and the uncertainties surrounding its adoption. In a conversation with <strong>Robert Havasy, Senior Director, Connected Health at HIMSS</strong>, the discussion focused on how AI, interoperability, and regulatory policy are influencing healthcare delivery, patient engagement, and the broader industry landscape.</p><p><strong>AI in Healthcare: From Concept to Implementation</strong></p><p>Generative AI has moved beyond the hype stage, embedding itself into real-world applications. Oracle’s announcement of an AI-driven electronic health record (EHR) platform signals a shift in how hospitals and healthcare systems are rethinking data management. However, the conversation is no longer just about the technology itself—it’s about how governments, regulatory bodies, and healthcare institutions will set guardrails to ensure AI’s responsible and effective use.</p><p><strong>The Role of Policy in Shaping AI’s Future</strong></p><p>While AI adoption surges, regulatory uncertainty remains a key challenge. The Biden administration had proposed executive orders and regulations to guide AI’s role in healthcare, but with political shifts and differing global regulatory approaches, the direction remains unclear. HIMSS has observed that different regions—the U.S., Europe, and Asia—may take separate paths in AI governance, raising questions about whether a unified best-practice framework will emerge or if multiple regulatory approaches will lead to diverging standards.</p><p><strong>Interoperability and the Shift Back to Customization</strong></p><p>For years, healthcare institutions moved away from building their own systems in favor of purchasing standardized EHR solutions from dominant industry players. Now, there’s a return to in-house development, driven by the need for flexibility, adaptability, and deeper AI integration. At the same time, interoperability remains a hurdle, as institutions seek to make AI work across disparate systems while maintaining security and compliance.</p><p><strong>The Patient’s Role in AI-Driven Healthcare</strong></p><p>AI’s potential to close the information gap between patients and providers is one of the most promising developments. From personal health monitoring through wearables to AI-powered tools that help individuals interpret medical research and their own health data, the patient’s role in healthcare decision-making is evolving. The ability for AI to synthesize complex medical data and provide insights in real-time is reshaping how people engage with their health, making them more active participants in their care.</p><p><strong>What’s Next?</strong></p><p>As HIMSS 2025 highlighted, AI in healthcare is not a distant vision—it’s happening now. The question is no longer whether AI will be a part of healthcare, but rather how it will be implemented, regulated, and integrated into existing frameworks to maximize its benefits while mitigating risks. The conversation with Robert Havasy underscores the critical need for collaboration between healthcare providers, policymakers, and technologists to ensure AI delivers on its promise while keeping patients at the center of the equation.</p><p>Listen to the full episode for deeper insights into how AI, interoperability, and patient-centered care are shaping the future of healthcare.</p><p><strong>Guest: Robert Havasy</strong>, Senior Director, Connected Health at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/rhavasy/" target="_blank">https://www.linkedin.com/in/rhavasy/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 12 Mar 2025 04:31:15 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Havasy)</author>
      <link>https://eventcoveragepodcast.com/episodes/interoperability-ai-and-the-future-of-trust-in-healthcare-a-himss-2025-conversation-with-robert-havasy-on-location-coverage-with-sean-martin-and-marco-ciappelli-9He3UKS2</link>
      <content:encoded><![CDATA[<p>Artificial intelligence continues to shape the future of healthcare, and this year’s HIMSS Global Conference 2025 reflected both the momentum and the uncertainties surrounding its adoption. In a conversation with <strong>Robert Havasy, Senior Director, Connected Health at HIMSS</strong>, the discussion focused on how AI, interoperability, and regulatory policy are influencing healthcare delivery, patient engagement, and the broader industry landscape.</p><p><strong>AI in Healthcare: From Concept to Implementation</strong></p><p>Generative AI has moved beyond the hype stage, embedding itself into real-world applications. Oracle’s announcement of an AI-driven electronic health record (EHR) platform signals a shift in how hospitals and healthcare systems are rethinking data management. However, the conversation is no longer just about the technology itself—it’s about how governments, regulatory bodies, and healthcare institutions will set guardrails to ensure AI’s responsible and effective use.</p><p><strong>The Role of Policy in Shaping AI’s Future</strong></p><p>While AI adoption surges, regulatory uncertainty remains a key challenge. The Biden administration had proposed executive orders and regulations to guide AI’s role in healthcare, but with political shifts and differing global regulatory approaches, the direction remains unclear. HIMSS has observed that different regions—the U.S., Europe, and Asia—may take separate paths in AI governance, raising questions about whether a unified best-practice framework will emerge or if multiple regulatory approaches will lead to diverging standards.</p><p><strong>Interoperability and the Shift Back to Customization</strong></p><p>For years, healthcare institutions moved away from building their own systems in favor of purchasing standardized EHR solutions from dominant industry players. Now, there’s a return to in-house development, driven by the need for flexibility, adaptability, and deeper AI integration. At the same time, interoperability remains a hurdle, as institutions seek to make AI work across disparate systems while maintaining security and compliance.</p><p><strong>The Patient’s Role in AI-Driven Healthcare</strong></p><p>AI’s potential to close the information gap between patients and providers is one of the most promising developments. From personal health monitoring through wearables to AI-powered tools that help individuals interpret medical research and their own health data, the patient’s role in healthcare decision-making is evolving. The ability for AI to synthesize complex medical data and provide insights in real-time is reshaping how people engage with their health, making them more active participants in their care.</p><p><strong>What’s Next?</strong></p><p>As HIMSS 2025 highlighted, AI in healthcare is not a distant vision—it’s happening now. The question is no longer whether AI will be a part of healthcare, but rather how it will be implemented, regulated, and integrated into existing frameworks to maximize its benefits while mitigating risks. The conversation with Robert Havasy underscores the critical need for collaboration between healthcare providers, policymakers, and technologists to ensure AI delivers on its promise while keeping patients at the center of the equation.</p><p>Listen to the full episode for deeper insights into how AI, interoperability, and patient-centered care are shaping the future of healthcare.</p><p><strong>Guest: Robert Havasy</strong>, Senior Director, Connected Health at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/rhavasy/" target="_blank">https://www.linkedin.com/in/rhavasy/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21454356" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/cb4c5438-f5ac-4687-9e1a-9020b0521735/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=cb4c5438-f5ac-4687-9e1a-9020b0521735&amp;feed=2M86zCcc"/>
      <itunes:title>Interoperability, AI, and the Future of Trust in Healthcare | A HIMSS 2025 Conversation with Robert Havasy | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Havasy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/391fd208-16fb-44de-9adc-e48853c4654e/3000x3000/himss-20las-20vegas-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:20</itunes:duration>
      <itunes:summary>AI is transforming healthcare, but questions remain about how it will be implemented, regulated, and integrated into patient care. In this episode, Robert Havasy, Senior Director, Connected Health at HIMSS, shares insights on AI-driven EHRs, interoperability challenges, and the evolving role of policy in shaping the future of healthcare.</itunes:summary>
      <itunes:subtitle>AI is transforming healthcare, but questions remain about how it will be implemented, regulated, and integrated into patient care. In this episode, Robert Havasy, Senior Director, Connected Health at HIMSS, shares insights on AI-driven EHRs, interoperability challenges, and the evolving role of policy in shaping the future of healthcare.</itunes:subtitle>
      <itunes:keywords>patient care, data, technology, marco ciappelli, hospitals, sean martin, automation, trust, conference, himss, on location, ehr, innovation, policy, event coverage, security, robert havasy, machine learning, regulation, ai, privacy, healthcare, interoperability</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>189</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d0b3d51d-1681-4c62-8d28-43742d9632e1</guid>
      <title>AI, Cybersecurity, and the High-Stakes Risks in Healthcare | A HIMSS 2025 Conversation with Lee Kim | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The intersection of cybersecurity and healthcare is more critical than ever, as technology continues to shape the way patient care is delivered. At HIMSS 2025 in Las Vegas, we sat down with <strong>Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS</strong>, to discuss the pressing security challenges facing healthcare organizations, the role of artificial intelligence, and the balance between innovation and risk.</p><p><strong>AI in Healthcare: Promise and Peril</strong></p><p>Artificial intelligence is rapidly being adopted across the healthcare sector, yet many organizations still lack structured governance around its use. Kim highlights the “wild west” nature of AI adoption, where policies are either non-existent or underdeveloped, creating risks related to privacy, data security, and patient outcomes. While AI-powered diagnostic tools, like those used in radiology, have the potential to improve patient care by identifying critical conditions early, blind trust in AI-generated results presents serious risks. Without proper oversight, reliance on AI could lead to incorrect medical decisions, putting patient safety in jeopardy.</p><p><strong>Cybersecurity Gaps in Healthcare Organizations</strong></p><p>One of the biggest concerns in healthcare cybersecurity is the over-reliance on security tools without a clear strategy. Many organizations invest in the latest technology but neglect foundational security practices, such as governance, policy development, and staff training. Kim points out that less than half of cybersecurity budgets are allocated to governance, leading to disorganized security programs.</p><p>Another persistent challenge is the human factor. Social engineering and phishing attacks remain the top attack vectors, exploiting the inherent culture of healthcare professionals who are trained to help and trust others. Organizations must focus on proactive security measures, such as regular training and simulated attacks, to reduce human error and strengthen defenses.</p><p><strong>The Financial and Operational Reality</strong></p><p>Budget constraints continue to be a challenge, particularly for smaller hospitals and community healthcare providers. While larger organizations may have more resources, cybersecurity spending often focuses on acquiring new tools rather than optimizing existing defenses. Kim stresses the importance of a balanced approach—investing in both technology and governance to ensure long-term resilience.</p><p>Another concern is the increasing dependence on third-party services and cloud-based AI tools. If these services become too expensive or go offline, healthcare organizations may face operational disruptions. The lack of contingency planning, such as backup vendors or alternative systems, leaves many institutions vulnerable to supply chain risks.</p><p><strong>Building a More Resilient Healthcare Security Model</strong></p><p>As technology continues to drive innovation in healthcare, organizations must adopt a proactive cybersecurity stance. Business impact analyses, vendor risk assessments, and tabletop exercises should be standard practice to prepare for disruptions. Kim also raises the idea of <strong>cyber mutual aid</strong>—a model similar to emergency medical mutual aid, where healthcare organizations collaborate to support each other in times of crisis.</p><p>HIMSS 2025 provides a forum for these critical conversations, bringing together global healthcare leaders to share insights, challenges, and solutions. For those interested in diving deeper, the <strong>HIMSS Cybersecurity Survey</strong> is available online, offering a comprehensive look at the current state of healthcare security.</p><p>To hear the full discussion on these topics and more, listen to the episode featuring <strong>Lee Kim, Sean Martin, and Marco Ciappelli</strong> from HIMSS 2025 On Location.</p><p><strong>Guest: Lee Kim</strong>, Senior Principal of Cybersecurity and Privacy at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/leekim/" target="_blank">https://www.linkedin.com/in/leekim/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 3 Mar 2025 14:56:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Lee Kim)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-cybersecurity-and-the-high-stakes-risks-in-healthcare-a-himss-2025-conversation-with-lee-kim-on-location-coverage-with-sean-martin-and-marco-ciappelli-WW2IvGuX</link>
      <content:encoded><![CDATA[<p>The intersection of cybersecurity and healthcare is more critical than ever, as technology continues to shape the way patient care is delivered. At HIMSS 2025 in Las Vegas, we sat down with <strong>Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS</strong>, to discuss the pressing security challenges facing healthcare organizations, the role of artificial intelligence, and the balance between innovation and risk.</p><p><strong>AI in Healthcare: Promise and Peril</strong></p><p>Artificial intelligence is rapidly being adopted across the healthcare sector, yet many organizations still lack structured governance around its use. Kim highlights the “wild west” nature of AI adoption, where policies are either non-existent or underdeveloped, creating risks related to privacy, data security, and patient outcomes. While AI-powered diagnostic tools, like those used in radiology, have the potential to improve patient care by identifying critical conditions early, blind trust in AI-generated results presents serious risks. Without proper oversight, reliance on AI could lead to incorrect medical decisions, putting patient safety in jeopardy.</p><p><strong>Cybersecurity Gaps in Healthcare Organizations</strong></p><p>One of the biggest concerns in healthcare cybersecurity is the over-reliance on security tools without a clear strategy. Many organizations invest in the latest technology but neglect foundational security practices, such as governance, policy development, and staff training. Kim points out that less than half of cybersecurity budgets are allocated to governance, leading to disorganized security programs.</p><p>Another persistent challenge is the human factor. Social engineering and phishing attacks remain the top attack vectors, exploiting the inherent culture of healthcare professionals who are trained to help and trust others. Organizations must focus on proactive security measures, such as regular training and simulated attacks, to reduce human error and strengthen defenses.</p><p><strong>The Financial and Operational Reality</strong></p><p>Budget constraints continue to be a challenge, particularly for smaller hospitals and community healthcare providers. While larger organizations may have more resources, cybersecurity spending often focuses on acquiring new tools rather than optimizing existing defenses. Kim stresses the importance of a balanced approach—investing in both technology and governance to ensure long-term resilience.</p><p>Another concern is the increasing dependence on third-party services and cloud-based AI tools. If these services become too expensive or go offline, healthcare organizations may face operational disruptions. The lack of contingency planning, such as backup vendors or alternative systems, leaves many institutions vulnerable to supply chain risks.</p><p><strong>Building a More Resilient Healthcare Security Model</strong></p><p>As technology continues to drive innovation in healthcare, organizations must adopt a proactive cybersecurity stance. Business impact analyses, vendor risk assessments, and tabletop exercises should be standard practice to prepare for disruptions. Kim also raises the idea of <strong>cyber mutual aid</strong>—a model similar to emergency medical mutual aid, where healthcare organizations collaborate to support each other in times of crisis.</p><p>HIMSS 2025 provides a forum for these critical conversations, bringing together global healthcare leaders to share insights, challenges, and solutions. For those interested in diving deeper, the <strong>HIMSS Cybersecurity Survey</strong> is available online, offering a comprehensive look at the current state of healthcare security.</p><p>To hear the full discussion on these topics and more, listen to the episode featuring <strong>Lee Kim, Sean Martin, and Marco Ciappelli</strong> from HIMSS 2025 On Location.</p><p><strong>Guest: Lee Kim</strong>, Senior Principal of Cybersecurity and Privacy at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/leekim/" target="_blank">https://www.linkedin.com/in/leekim/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27177892" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/00671f9d-af18-4051-9a9b-3d9bad6bcb6e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=00671f9d-af18-4051-9a9b-3d9bad6bcb6e&amp;feed=2M86zCcc"/>
      <itunes:title>AI, Cybersecurity, and the High-Stakes Risks in Healthcare | A HIMSS 2025 Conversation with Lee Kim | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Lee Kim</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/391fd208-16fb-44de-9adc-e48853c4654e/3000x3000/himss-20las-20vegas-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:18</itunes:duration>
      <itunes:summary>AI is transforming healthcare, but without proper oversight, it introduces serious risks to patient safety, data security, and operational resilience. In this episode, Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS, joins Sean Martin and Marco Ciappelli to discuss the urgent need for governance, proactive security strategies, and a balanced approach to innovation in healthcare.</itunes:summary>
      <itunes:subtitle>AI is transforming healthcare, but without proper oversight, it introduces serious risks to patient safety, data security, and operational resilience. In this episode, Lee Kim, Senior Principal of Cybersecurity and Privacy at HIMSS, joins Sean Martin and Marco Ciappelli to discuss the urgent need for governance, proactive security strategies, and a balanced approach to innovation in healthcare.</itunes:subtitle>
      <itunes:keywords>compliance, marco ciappelli, digital health, medical technology, sean martin, automation, cybersecurity, conference, data security, patient safety, on location, risk management, innovation, resilience, threat intelligence, lee kim, event coverage, cloud security, ransomware, ai, privacy, zero trust, phishing, social engineering, healthcare, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>188</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dd6492b4-7c87-44e1-b8fa-310a6e84446c</guid>
      <title>Reimagining Nostalgia: Music’s Creative and Technological Evolution | A The NAMM Show 2025 Conversation with John Mlynczak | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The latest On Location with Sean Martin and Marco Ciappelli episode takes listeners behind the scenes of the NAMM 2025 show, featuring a vibrant discussion with John Mlynczak, NAMM President and CEO. The conversation is not just a recap of an incredible event but a celebration of music’s enduring power and the evolving role of technology in the music industry.</p><p><strong>A Legacy of Music and Community</strong></p><p>Founded in 1901, NAMM (National Association of Music Merchants) has become the world’s largest trade association representing the musical products industry. John Mlynczak shares how NAMM operates year-round to support manufacturers, retailers, and music educators through research, advocacy, and events. The annual NAMM show is the pinnacle of this work, gathering thousands of music makers, industry professionals, and artists to spark creativity and innovation.</p><p><strong>Technology Meets Tradition</strong></p><p>One of the episode’s key themes is the blend of modern technology with nostalgic sounds. The 2025 NAMM show showcased groundbreaking technologies, from AI-driven music tools to hardware-software collaborations. Mlynczak discusses how companies are innovating to create real-time processing tools, allowing musicians to produce music faster and more intuitively than ever before. He emphasizes that the goal is not to replace traditional methods but to enhance creativity and make music more accessible to all.</p><p><strong>The Power of Inspiration</strong></p><p>NAMM’s mission to create more music makers worldwide is a central focus. Mlynczak explains how the NAMM Foundation supports educational programs across all ages, from K-12 schools to community groups and adult learners. The foundation’s work aims to ensure everyone has the opportunity to explore music, whether through formal education or new digital tools that lower the barrier to entry.</p><p><strong>A Moment to Remember: Jon Batiste at NAMM</strong></p><p>A standout moment from the show was <a href="https://youtu.be/Lfq35enGq58" target="_blank">Mlynczak’s interview with Grammy-winning artist Jon Batiste</a> [<a href="https://youtu.be/Lfq35enGq58" target="_blank">https://youtu.be/Lfq35enGq58</a>]. Initially uncertain, the conversation transformed into a genuine exchange about music’s influence and the industry’s impact on artists. This interaction highlighted NAMM’s broader vision of not just serving as a trade show but as a cultural hub that fosters creativity and community.</p><p><strong>Looking Ahead to NAMM 2026</strong></p><p>The episode concludes with anticipation for NAMM 2026, scheduled for January 20-24 in Anaheim, California. As Sean, Marco, and John reflect on this year’s successes, they invite listeners to join them next year to explore the intersection of music, technology, and inspiration.</p><p>Tune in to <i>The Music Evolves Podcast</i> to dive deeper into these insights and discover how NAMM continues to shape the future of music. Be sure to stay tuned for more On Location with Sean Martin and Marco Ciappelli as they cover more technology and society events around the world.</p><p><strong>Guest: </strong><a href="https://www.linkedin.com/in/ACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA" target="_blank">John Mlynczak</a>, President and CEO of <a href="https://www.linkedin.com/company/namm/" target="_blank">NAMM</a> | <a href="https://www.johnmlynczak.com/">View Website</a> | <a href="https://www.namm.org/">Visit NAMM</a></p><p><strong>Host: </strong><a href="https://www.linkedin.com/in/imsmartin/">Sean Martin</a><strong>, </strong>Co-Founder at <a href="https://www.linkedin.com/company/itspmagazine/">ITSPmagazine Podcasts</a> and Host of <a href="https://redefiningcybersecuritypodcast.com/" target="_blank"><i>Redefining CyberSecurity Podcast</i></a> & <a href="https://musicevolvespodcast.com/" target="_blank"><i>Music Evolves Podcast</i></a> | On ITSPmagazine: <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Host:</strong> <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY" target="_blank">Marco Ciappelli</a>, Co-Founder at <a href="https://www.linkedin.com/company/itspmagazine/" target="_blank">ITSPmagazine Podcasts</a> and Host of <a href="https://redefiningsocietyandtechnologypodcast.com/"><i>Redefining Society and Technology Podcast</i></a> | On ITSPmagazine: <a href="https://www.itspmagazine.com/marco-ciappelli" target="_blank">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>To learn about event coverage sponsorship options, please visit <a href="https://itspm.ag/event-coverage-package" target="_blank">https://itspm.ag/event-coverage-package</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Catch more stories from NAMM Show 2025 coverage: <a href="https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california" target="_blank">https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california</a></p><p>NAMM Organization: <a href="https://www.namm.org/">https://www.namm.org/</a></p><p>The NAMM Show 2025: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | The 2025 NAMM Show: Honoring Tradition, Pioneering the Future: <a href="https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/">https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/</a></p><p>Music Evolves Episode | <a href="https://musicevolvespodcast.com/episodes/music-evolves-podcast-debut-exploring-musics-evolution-through-technology-creativity-and-innovation-a-conversation-with-marco-ciappelli-music-evolves-with-sean-martin">The debut episode of Music Evolves explores how technology is transforming music creation, performance, and production, with insights from the NAMM Show 2025</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage:<br /><a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Music Evolves stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/music-evolves-podcast" target="_blank">https://www.itspmagazine.com/music-evolves-podcast</a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 1 Mar 2025 14:00:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, John Mlynczak)</author>
      <link>https://eventcoveragepodcast.com/episodes/reimagining-nostalgia-musics-creative-and-technological-evolution-a-the-namm-show-2025-conversation-with-john-mlynczak-on-location-coverage-with-sean-martin-and-marco-ciappelli-oz9YO2K3</link>
      <content:encoded><![CDATA[<p>The latest On Location with Sean Martin and Marco Ciappelli episode takes listeners behind the scenes of the NAMM 2025 show, featuring a vibrant discussion with John Mlynczak, NAMM President and CEO. The conversation is not just a recap of an incredible event but a celebration of music’s enduring power and the evolving role of technology in the music industry.</p><p><strong>A Legacy of Music and Community</strong></p><p>Founded in 1901, NAMM (National Association of Music Merchants) has become the world’s largest trade association representing the musical products industry. John Mlynczak shares how NAMM operates year-round to support manufacturers, retailers, and music educators through research, advocacy, and events. The annual NAMM show is the pinnacle of this work, gathering thousands of music makers, industry professionals, and artists to spark creativity and innovation.</p><p><strong>Technology Meets Tradition</strong></p><p>One of the episode’s key themes is the blend of modern technology with nostalgic sounds. The 2025 NAMM show showcased groundbreaking technologies, from AI-driven music tools to hardware-software collaborations. Mlynczak discusses how companies are innovating to create real-time processing tools, allowing musicians to produce music faster and more intuitively than ever before. He emphasizes that the goal is not to replace traditional methods but to enhance creativity and make music more accessible to all.</p><p><strong>The Power of Inspiration</strong></p><p>NAMM’s mission to create more music makers worldwide is a central focus. Mlynczak explains how the NAMM Foundation supports educational programs across all ages, from K-12 schools to community groups and adult learners. The foundation’s work aims to ensure everyone has the opportunity to explore music, whether through formal education or new digital tools that lower the barrier to entry.</p><p><strong>A Moment to Remember: Jon Batiste at NAMM</strong></p><p>A standout moment from the show was <a href="https://youtu.be/Lfq35enGq58" target="_blank">Mlynczak’s interview with Grammy-winning artist Jon Batiste</a> [<a href="https://youtu.be/Lfq35enGq58" target="_blank">https://youtu.be/Lfq35enGq58</a>]. Initially uncertain, the conversation transformed into a genuine exchange about music’s influence and the industry’s impact on artists. This interaction highlighted NAMM’s broader vision of not just serving as a trade show but as a cultural hub that fosters creativity and community.</p><p><strong>Looking Ahead to NAMM 2026</strong></p><p>The episode concludes with anticipation for NAMM 2026, scheduled for January 20-24 in Anaheim, California. As Sean, Marco, and John reflect on this year’s successes, they invite listeners to join them next year to explore the intersection of music, technology, and inspiration.</p><p>Tune in to <i>The Music Evolves Podcast</i> to dive deeper into these insights and discover how NAMM continues to shape the future of music. Be sure to stay tuned for more On Location with Sean Martin and Marco Ciappelli as they cover more technology and society events around the world.</p><p><strong>Guest: </strong><a href="https://www.linkedin.com/in/ACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAA5ksRkBQVCKDwHDMfDmX5gyPMJMomZFHwA" target="_blank">John Mlynczak</a>, President and CEO of <a href="https://www.linkedin.com/company/namm/" target="_blank">NAMM</a> | <a href="https://www.johnmlynczak.com/">View Website</a> | <a href="https://www.namm.org/">Visit NAMM</a></p><p><strong>Host: </strong><a href="https://www.linkedin.com/in/imsmartin/">Sean Martin</a><strong>, </strong>Co-Founder at <a href="https://www.linkedin.com/company/itspmagazine/">ITSPmagazine Podcasts</a> and Host of <a href="https://redefiningcybersecuritypodcast.com/" target="_blank"><i>Redefining CyberSecurity Podcast</i></a> & <a href="https://musicevolvespodcast.com/" target="_blank"><i>Music Evolves Podcast</i></a> | On ITSPmagazine: <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Host:</strong> <a href="https://www.linkedin.com/in/marco-ciappelli?miniProfileUrn=urn%3Ali%3Afs_miniProfile%3AACoAAAD_QZMB_jUr1316NWqo3MgG_iFVSPTfDgY" target="_blank">Marco Ciappelli</a>, Co-Founder at <a href="https://www.linkedin.com/company/itspmagazine/" target="_blank">ITSPmagazine Podcasts</a> and Host of <a href="https://redefiningsocietyandtechnologypodcast.com/"><i>Redefining Society and Technology Podcast</i></a> | On ITSPmagazine: <a href="https://www.itspmagazine.com/marco-ciappelli" target="_blank">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>To learn about event coverage sponsorship options, please visit <a href="https://itspm.ag/event-coverage-package" target="_blank">https://itspm.ag/event-coverage-package</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Catch more stories from NAMM Show 2025 coverage: <a href="https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california" target="_blank">https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california</a></p><p>NAMM Organization: <a href="https://www.namm.org/">https://www.namm.org/</a></p><p>The NAMM Show 2025: <a href="https://www.namm.org/thenammshow/attend">https://www.namm.org/thenammshow/attend</a></p><p>Music Evolves: Sonic Frontiers Newsletter | The 2025 NAMM Show: Honoring Tradition, Pioneering the Future: <a href="https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/">https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/</a></p><p>Music Evolves Episode | <a href="https://musicevolvespodcast.com/episodes/music-evolves-podcast-debut-exploring-musics-evolution-through-technology-creativity-and-innovation-a-conversation-with-marco-ciappelli-music-evolves-with-sean-martin">The debut episode of Music Evolves explores how technology is transforming music creation, performance, and production, with insights from the NAMM Show 2025</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage:<br /><a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Music Evolves stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/music-evolves-podcast" target="_blank">https://www.itspmagazine.com/music-evolves-podcast</a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37559992" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ef720bbf-413c-42f9-b6e6-83fdbb9259ea/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ef720bbf-413c-42f9-b6e6-83fdbb9259ea&amp;feed=2M86zCcc"/>
      <itunes:title>Reimagining Nostalgia: Music’s Creative and Technological Evolution | A The NAMM Show 2025 Conversation with John Mlynczak | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, John Mlynczak</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/29370138-57df-4ded-835a-b65d3878bdda/3000x3000/the-20namm-20show-202025-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:07</itunes:duration>
      <itunes:summary>In this On Location with Sean Martin and Marco Ciappelli episode, NAMM President and CEO John Mlynczak shares how technology and tradition intertwine at NAMM 2025, showcasing innovations that empower musicians while honoring the timeless sounds that connect us all. Discover how NAMM’s mission to inspire new music makers and support education is shaping the future of music creation and community.</itunes:summary>
      <itunes:subtitle>In this On Location with Sean Martin and Marco Ciappelli episode, NAMM President and CEO John Mlynczak shares how technology and tradition intertwine at NAMM 2025, showcasing innovations that empower musicians while honoring the timeless sounds that connect us all. Discover how NAMM’s mission to inspire new music makers and support education is shaping the future of music creation and community.</itunes:subtitle>
      <itunes:keywords>production, collaboration, technology, marco ciappelli, music, jon batiste, sean martin, john mlynczak, education, music industry, sound, digital tools, music technology, conference, advocacy, on location, inspiration, innovation, music evolves podcast, event coverage, real-time processing, recording, artists, podcast, instruments, trade show, performance, creativity, ai, namm, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>187</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">22c31a5c-9aff-4b58-a182-c5f409bc2353</guid>
      <title>How Healthcare Organizations Can Achieve a Near-Zero Breach Rate | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</title>
      <description><![CDATA[<p>During the HIMSS Global Conference 2025 in Las Vegas, Sean Martin and Marco Ciappelli sat down with Ryan Patrick, Vice President of Adoption at HITRUST, for an insightful conversation about cybersecurity and risk management in healthcare. Rather than a traditional recap of the conference session, this discussion explores the critical role HITRUST plays in helping healthcare organizations navigate regulatory requirements, manage risk, and ensure patient safety through robust cybersecurity practices.</p><p><strong>Bridging Regulation and Real-World Application</strong></p><p>Ryan Patrick shared that HITRUST has spent over 17 years translating federal healthcare regulations into actionable frameworks for organizations. His role involves educating the market about HITRUST’s initiatives while continuously learning from industry feedback. This bi-directional exchange ensures that HITRUST’s frameworks and controls remain relevant and effective. Patrick emphasized the importance of HITRUST’s dynamic approach, highlighting that their framework is updated quarterly to address the latest cybersecurity threats. This frequency sets HITRUST apart from other frameworks like HIPAA, which, despite being nearly 30 years old, struggles to keep pace with modern challenges.</p><p><strong>Real Results: 2025 Trust Report Highlights</strong></p><p>One of the standout points of the conversation was the 2025 HITRUST Trust Report. The data is compelling—while roughly 45% of organizations reported breaches last year, less than 1% of HITRUST-certified environments experienced incidents. The 2025 report shows this number decreasing even further to 0.59%. According to Patrick, this success is driven by HITRUST’s focus on threat intelligence and its rigorous assurance mechanism, which goes beyond checkbox compliance to ensure controls are effective and actively reducing risk.</p><p><strong>Addressing AI and Emerging Technologies</strong></p><p>With AI being a hot topic at HIMSS, Patrick discussed HITRUST’s proactive approach to managing AI risks. In December 2024, HITRUST introduced an AI security certification designed to help organizations securely integrate AI technologies. This certification follows HITRUST’s established quality assurance model, offering the same level of scrutiny and validation as its other programs. Patrick likened the current AI landscape to the early days of cloud computing—initial uncertainty followed by widespread adoption, underscoring the need for secure practices as the technology matures.</p><p><strong>Listen to the Full Conversation</strong></p><p>This episode offers more than just surface-level insights. Ryan Patrick’s perspectives on risk management, the measurable success of HITRUST frameworks, and the thoughtful approach to AI in healthcare cybersecurity provide valuable takeaways for professionals looking to enhance their security posture. Tune in to the full episode for an in-depth look at how HITRUST is setting new standards in healthcare cybersecurity and what organizations can do to stay ahead of the curve.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 27 Feb 2025 20:32:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick)</author>
      <link>https://eventcoveragepodcast.com/episodes/how-healthcare-organizations-can-achieve-a-near-zero-breach-rate-a-brand-story-conversation-from-himss-2025-a-hitrust-brand-story-with-ryan-patrick-tsaExPA6</link>
      <content:encoded><![CDATA[<p>During the HIMSS Global Conference 2025 in Las Vegas, Sean Martin and Marco Ciappelli sat down with Ryan Patrick, Vice President of Adoption at HITRUST, for an insightful conversation about cybersecurity and risk management in healthcare. Rather than a traditional recap of the conference session, this discussion explores the critical role HITRUST plays in helping healthcare organizations navigate regulatory requirements, manage risk, and ensure patient safety through robust cybersecurity practices.</p><p><strong>Bridging Regulation and Real-World Application</strong></p><p>Ryan Patrick shared that HITRUST has spent over 17 years translating federal healthcare regulations into actionable frameworks for organizations. His role involves educating the market about HITRUST’s initiatives while continuously learning from industry feedback. This bi-directional exchange ensures that HITRUST’s frameworks and controls remain relevant and effective. Patrick emphasized the importance of HITRUST’s dynamic approach, highlighting that their framework is updated quarterly to address the latest cybersecurity threats. This frequency sets HITRUST apart from other frameworks like HIPAA, which, despite being nearly 30 years old, struggles to keep pace with modern challenges.</p><p><strong>Real Results: 2025 Trust Report Highlights</strong></p><p>One of the standout points of the conversation was the 2025 HITRUST Trust Report. The data is compelling—while roughly 45% of organizations reported breaches last year, less than 1% of HITRUST-certified environments experienced incidents. The 2025 report shows this number decreasing even further to 0.59%. According to Patrick, this success is driven by HITRUST’s focus on threat intelligence and its rigorous assurance mechanism, which goes beyond checkbox compliance to ensure controls are effective and actively reducing risk.</p><p><strong>Addressing AI and Emerging Technologies</strong></p><p>With AI being a hot topic at HIMSS, Patrick discussed HITRUST’s proactive approach to managing AI risks. In December 2024, HITRUST introduced an AI security certification designed to help organizations securely integrate AI technologies. This certification follows HITRUST’s established quality assurance model, offering the same level of scrutiny and validation as its other programs. Patrick likened the current AI landscape to the early days of cloud computing—initial uncertainty followed by widespread adoption, underscoring the need for secure practices as the technology matures.</p><p><strong>Listen to the Full Conversation</strong></p><p>This episode offers more than just surface-level insights. Ryan Patrick’s perspectives on risk management, the measurable success of HITRUST frameworks, and the thoughtful approach to AI in healthcare cybersecurity provide valuable takeaways for professionals looking to enhance their security posture. Tune in to the full episode for an in-depth look at how HITRUST is setting new standards in healthcare cybersecurity and what organizations can do to stay ahead of the curve.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23068938" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/582016f1-264f-40d5-9fa5-e0dbebab6d8a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=582016f1-264f-40d5-9fa5-e0dbebab6d8a&amp;feed=2M86zCcc"/>
      <itunes:title>How Healthcare Organizations Can Achieve a Near-Zero Breach Rate | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/994ad09e-766f-4ec2-9324-70b32bbc620c/3000x3000/brand-20stories-20on-20itspmagazine-20-20podcast-20cover-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:01</itunes:duration>
      <itunes:summary>In this Brand Story episode, Ryan Patrick, Vice President of Adoption at HITRUST, shares how HITRUST’s dynamic approach to cybersecurity and risk management is helping healthcare organizations achieve an industry-leading breach rate of less than 1%. With insights on AI security, threat intelligence, and the power of continuous improvement, this conversation is a must-listen for anyone serious about protecting healthcare data and enhancing risk management strategies.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode, Ryan Patrick, Vice President of Adoption at HITRUST, shares how HITRUST’s dynamic approach to cybersecurity and risk management is helping healthcare organizations achieve an industry-leading breach rate of less than 1%. With insights on AI security, threat intelligence, and the power of continuous improvement, this conversation is a must-listen for anyone serious about protecting healthcare data and enhancing risk management strategies.</itunes:subtitle>
      <itunes:keywords>compliance, assurance, data, technology, marco ciappelli, sean martin, trust, framework, cybersecurity, conference, healthcare security, breach, patient safety, on location, risk management, innovation, event coverage, certification, ryan patrick, regulation, risk, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>186</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb8c433e-6af2-4055-8ac6-1085f49aa8c4</guid>
      <title>Redefining Zero Trust: “Near Zero Trust” | A Real-World Success Story Through Proactive Security | A Zero Trust World Conversation with Avi Solomon | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The latest episode of the On Location series, recorded at ThreatLocker's <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, brings forward a deep and practical conversation about implementing Zero Trust principles in real-world environments. Hosted by Marco Ciappelli and Sean Martin, this episode features Avi Solomon, CIO of a law firm with nearly 30 years in IT and a strong focus on cybersecurity.</p><p><strong>The Journey to Proactive Security</strong></p><p>Avi Solomon shares his experience transitioning from traditional security models to a proactive, preventive approach with ThreatLocker. With a background in engineering, consulting, and security (CISSP certified), Solomon outlines his initial concerns with reactive endpoint detection and response (EDR) solutions. While EDR tools act as a secondary insurance policy, he emphasizes the need for a preventive layer to block threats before they manifest.</p><p>Solomon’s firm adopted ThreatLocker a year ago, replacing a legacy product to integrate its proactive security measures. He highlights the platform’s maturation, including network control, storage control, application whitelisting, and cloud integration. The shift was not only a technological change but also a cultural one, aligning with the broader philosophy of Zero Trust—approaching security with a mindset that nothing within or outside the network should be trusted by default.</p><p><strong>Implementing Zero Trust with Ease</strong></p><p>A standout moment in the episode is Solomon’s recount of his implementation process. His conservative approach included running ThreatLocker in observation mode for two months before transitioning fully to a secure mode. When the switch was finally flipped, the result was remarkable—zero disruptions, no pushback from users, and a smooth transition to a less risky security posture. Solomon attributes this success to ThreatLocker’s intuitive deployment and adaptive learning capabilities, which allowed the system to understand normal processes and minimize false positives.</p><p><strong>Redefining Zero Trust: “Near Zero Trust”</strong></p><p>Solomon introduces a pragmatic take on Zero Trust, coining the term “Near Zero Trust” (NZT). While achieving absolute Zero Trust is an ideal, Solomon argues that organizations should strive to get as close as possible by layering strategic solutions. He draws a clever analogy comparing Zero Trust to driving safely before relying on a seatbelt—proactive behavior backed by reactive safeguards.</p><p>Tune in to the full episode to explore more of Avi Solomon’s insights, hear stories from the conference floor, and learn practical approaches to embedding Zero Trust principles in your organization’s security strategy.</p><p><strong>Guest: Avi Solomon</strong>, Chief Information Officer at Rumberger | Kirk | On LinkedIn: <a href="https://www.linkedin.com/in/aviesolomon/" target="_blank">https://www.linkedin.com/in/aviesolomon/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 26 Feb 2025 16:55:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Avi Solomon)</author>
      <link>https://eventcoveragepodcast.com/episodes/redefining-zero-trust-near-zero-trust-a-real-world-success-story-through-proactive-security-a-zero-trust-world-conversation-with-avi-solomon-on-location-coverage-with-sean-martin-and-marco-ciappelli-Z6uxgl2I</link>
      <content:encoded><![CDATA[<p>The latest episode of the On Location series, recorded at ThreatLocker's <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, brings forward a deep and practical conversation about implementing Zero Trust principles in real-world environments. Hosted by Marco Ciappelli and Sean Martin, this episode features Avi Solomon, CIO of a law firm with nearly 30 years in IT and a strong focus on cybersecurity.</p><p><strong>The Journey to Proactive Security</strong></p><p>Avi Solomon shares his experience transitioning from traditional security models to a proactive, preventive approach with ThreatLocker. With a background in engineering, consulting, and security (CISSP certified), Solomon outlines his initial concerns with reactive endpoint detection and response (EDR) solutions. While EDR tools act as a secondary insurance policy, he emphasizes the need for a preventive layer to block threats before they manifest.</p><p>Solomon’s firm adopted ThreatLocker a year ago, replacing a legacy product to integrate its proactive security measures. He highlights the platform’s maturation, including network control, storage control, application whitelisting, and cloud integration. The shift was not only a technological change but also a cultural one, aligning with the broader philosophy of Zero Trust—approaching security with a mindset that nothing within or outside the network should be trusted by default.</p><p><strong>Implementing Zero Trust with Ease</strong></p><p>A standout moment in the episode is Solomon’s recount of his implementation process. His conservative approach included running ThreatLocker in observation mode for two months before transitioning fully to a secure mode. When the switch was finally flipped, the result was remarkable—zero disruptions, no pushback from users, and a smooth transition to a less risky security posture. Solomon attributes this success to ThreatLocker’s intuitive deployment and adaptive learning capabilities, which allowed the system to understand normal processes and minimize false positives.</p><p><strong>Redefining Zero Trust: “Near Zero Trust”</strong></p><p>Solomon introduces a pragmatic take on Zero Trust, coining the term “Near Zero Trust” (NZT). While achieving absolute Zero Trust is an ideal, Solomon argues that organizations should strive to get as close as possible by layering strategic solutions. He draws a clever analogy comparing Zero Trust to driving safely before relying on a seatbelt—proactive behavior backed by reactive safeguards.</p><p>Tune in to the full episode to explore more of Avi Solomon’s insights, hear stories from the conference floor, and learn practical approaches to embedding Zero Trust principles in your organization’s security strategy.</p><p><strong>Guest: Avi Solomon</strong>, Chief Information Officer at Rumberger | Kirk | On LinkedIn: <a href="https://www.linkedin.com/in/aviesolomon/" target="_blank">https://www.linkedin.com/in/aviesolomon/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14996483" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/20d06516-6684-4a46-ba69-83822471f9c9/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=20d06516-6684-4a46-ba69-83822471f9c9&amp;feed=2M86zCcc"/>
      <itunes:title>Redefining Zero Trust: “Near Zero Trust” | A Real-World Success Story Through Proactive Security | A Zero Trust World Conversation with Avi Solomon | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Avi Solomon</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:37</itunes:duration>
      <itunes:summary>In this episode, Avi Solomon, CIO of a law firm, shares his journey to implementing a proactive security approach with ThreatLocker, highlighting how a preventive Zero Trust model transformed his organization’s security posture without disruption. Listen in to discover practical insights on achieving “Near Zero Trust” and the real-world impact of strategic, forward-thinking cybersecurity.</itunes:summary>
      <itunes:subtitle>In this episode, Avi Solomon, CIO of a law firm, shares his journey to implementing a proactive security approach with ThreatLocker, highlighting how a preventive Zero Trust model transformed his organization’s security posture without disruption. Listen in to discover practical insights on achieving “Near Zero Trust” and the real-world impact of strategic, forward-thinking cybersecurity.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, security posture, zero trust world, proactive defense, sean martin, cybersecurity, enterprise security, application whitelisting, security implementation, conference, on location, endpoint security, ztw25, network control, event coverage, avi solomon, cloud security, risk reduction, preventive security, cio, threat prevention, it management, law firm, ztw, security strategy, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>185</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6d3daa31-3fa9-424e-b7fa-a389b24e525a</guid>
      <title>Hands-On Hacking: Lessons Learned from a Rubbery Ducky USB Attack Simulation | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At ThreatLocker's <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, Kieran Human, Special Projects Engineer at ThreatLocker, showcased the practical dangers of everyday cybersecurity threats through engaging, hands-on labs. Attendees, ranging from CISOs to IT technicians, were offered the chance to experience real-world hacking scenarios using devices like the infamous “rubber ducky.”</p><p><strong>The Rubber Ducky Experience</strong></p><p>The rubber ducky, which resembles a standard USB drive, acts as a keyboard when plugged into a computer, executing automated scripts. Human demonstrated how this device could disable Windows Defender, exfiltrate data, and execute scripts—highlighting how accessible hacking tools have become. Attendees left with both new knowledge and their own rubber ducky, reinforcing the event’s educational impact.</p><p><strong>From Learning to Defense</strong></p><p>The lab sessions underscored the importance of understanding threats to effectively defend against them. Human emphasized that cybersecurity isn’t just for seasoned professionals; even attendees with minimal experience learned how to execute data exfiltration and bypass security protocols within an hour. This revelation stressed the necessity of robust security measures, even for general IT professionals who may not specialize in cybersecurity.</p><p><strong>Mitigating Threats with ThreatLocker</strong></p><p>ThreatLocker’s solutions, including features like ring-fencing PowerShell and applying layered protections, were showcased as effective countermeasures. Human explained how ThreatLocker’s tools could prevent malicious scripts from accessing the internet or sensitive folders, offering a tangible defense against the types of attacks demonstrated in the labs.</p><p><strong>Looking Ahead</strong></p><p>Looking toward next year, Human hinted at more advanced demonstrations, potentially including ransomware scenarios. This forward-thinking approach aligns with ThreatLocker’s commitment to preparing IT and security professionals for the evolving challenges they face.</p><p><strong>Why This Matters</strong></p><p>The episode captures how ThreatLocker is not just educating but empowering IT and security professionals. By providing a controlled environment to experience cyberattacks firsthand, the event bridged the gap between theory and practice. Listen to the full episode for insights into how these experiences translate into actionable strategies for building stronger, more resilient cybersecurity defenses.</p><p><strong>Guest: Kieran Human</strong>, Special Projects Engineer at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 26 Feb 2025 16:05:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kieran Human)</author>
      <link>https://eventcoveragepodcast.com/episodes/hands-on-hacking-lessons-learned-from-a-rubbery-ducky-usb-attack-simulation-a-zero-trust-world-conversation-with-kieran-human-on-location-coverage-with-sean-martin-and-marco-ciappelli-WpxD3asS</link>
      <content:encoded><![CDATA[<p>At ThreatLocker's <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, Kieran Human, Special Projects Engineer at ThreatLocker, showcased the practical dangers of everyday cybersecurity threats through engaging, hands-on labs. Attendees, ranging from CISOs to IT technicians, were offered the chance to experience real-world hacking scenarios using devices like the infamous “rubber ducky.”</p><p><strong>The Rubber Ducky Experience</strong></p><p>The rubber ducky, which resembles a standard USB drive, acts as a keyboard when plugged into a computer, executing automated scripts. Human demonstrated how this device could disable Windows Defender, exfiltrate data, and execute scripts—highlighting how accessible hacking tools have become. Attendees left with both new knowledge and their own rubber ducky, reinforcing the event’s educational impact.</p><p><strong>From Learning to Defense</strong></p><p>The lab sessions underscored the importance of understanding threats to effectively defend against them. Human emphasized that cybersecurity isn’t just for seasoned professionals; even attendees with minimal experience learned how to execute data exfiltration and bypass security protocols within an hour. This revelation stressed the necessity of robust security measures, even for general IT professionals who may not specialize in cybersecurity.</p><p><strong>Mitigating Threats with ThreatLocker</strong></p><p>ThreatLocker’s solutions, including features like ring-fencing PowerShell and applying layered protections, were showcased as effective countermeasures. Human explained how ThreatLocker’s tools could prevent malicious scripts from accessing the internet or sensitive folders, offering a tangible defense against the types of attacks demonstrated in the labs.</p><p><strong>Looking Ahead</strong></p><p>Looking toward next year, Human hinted at more advanced demonstrations, potentially including ransomware scenarios. This forward-thinking approach aligns with ThreatLocker’s commitment to preparing IT and security professionals for the evolving challenges they face.</p><p><strong>Why This Matters</strong></p><p>The episode captures how ThreatLocker is not just educating but empowering IT and security professionals. By providing a controlled environment to experience cyberattacks firsthand, the event bridged the gap between theory and practice. Listen to the full episode for insights into how these experiences translate into actionable strategies for building stronger, more resilient cybersecurity defenses.</p><p><strong>Guest: Kieran Human</strong>, Special Projects Engineer at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7452741" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1c743495-7048-44c0-a00d-8fb54ce185d8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1c743495-7048-44c0-a00d-8fb54ce185d8&amp;feed=2M86zCcc"/>
      <itunes:title>Hands-On Hacking: Lessons Learned from a Rubbery Ducky USB Attack Simulation | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kieran Human</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:45</itunes:duration>
      <itunes:summary>In this episode, Kieran Human demonstrates how a simple USB device, the “rubber ducky,” can turn even a beginner into a capable hacker in just one hour. Listen in to discover why understanding the ease of cyberattacks is the first step in building stronger defenses for your organization.</itunes:summary>
      <itunes:subtitle>In this episode, Kieran Human demonstrates how a simple USB device, the “rubber ducky,” can turn even a beginner into a capable hacker in just one hour. Listen in to discover why understanding the ease of cyberattacks is the first step in building stronger defenses for your organization.</itunes:subtitle>
      <itunes:keywords>network defense, marco ciappelli, hacking, zero trust world, usb attacks, sean martin, ztw24, cybersecurity, conference, on location, windows defender, threat mitigation, endpoint security, data exfiltration, ring-fencing, event coverage, hands-on labs, powershell, ransomware, it professionals, ztw, rubber ducky, cisos, security training, kieran human, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>184</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a74110cc-e50c-453c-8776-6afbf89d581a</guid>
      <title>The Tools Hackers Use: From Manual Hacks to Automated Exploits | A Zero Trust World Conversation with Alex Benton | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Recorded during ThreatLocker <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, this episode of the On Location series features an engaging conversation with Alex Benton, Special Projects at ThreatLocker. Benton shares insights from his Metasploit lab, a beginner-friendly session that demonstrates the power of tools like Metasploit and Nmap in cybersecurity. The lab’s objective is clear: to illustrate how easily unpatched systems can be exploited and reinforce the critical need for consistent patch management.</p><p><strong>Understanding the Metasploit Lab</strong></p><p>Benton explains how participants in the lab learned to execute a hack manually before leveraging Metasploit’s streamlined capabilities. The manual process involves identifying vulnerable machines, gathering IP addresses, examining open ports, and assessing software vulnerabilities. With Metasploit, these steps become as simple as selecting an exploit and running it, underscoring the tool’s efficiency.</p><p>A key demonstration in the lab involved Eternal Blue, the exploit associated with the WannaCry virus in 2017. Benton emphasizes how Metasploit simplifies this complex attack, highlighting the importance of maintaining patched systems to prevent similar vulnerabilities.</p><p><strong>The Real-World Implications of Unpatched Systems</strong></p><p>The discussion dives into the risks posed by cybercriminals who use tools like Metasploit to automate attacks. Benton points out that malicious actors often analyze patch notes to identify potential vulnerabilities and create scripts to exploit unpatched systems quickly. The conversation touches on the dark web’s role in providing detailed information about exposed systems, making it even easier for attackers to target vulnerable machines.</p><p><strong>Lessons from WannaCry</strong></p><p>The episode revisits the WannaCry incident, where a vulnerability in Windows systems led to a global cybersecurity crisis. Benton recounts how outdated systems and the absence of a strong security culture created an environment ripe for exploitation. He also shares the story of cybersecurity researchers, including Marcus Hutchins, who played pivotal roles in mitigating the virus’s impact by identifying and activating its kill switch.</p><p><strong>Tune in to Learn More</strong></p><p>This episode offers valuable insights into cybersecurity practices, the dangers of unpatched environments, and the tools that both ethical hackers and cybercriminals use. Listen in to gain a deeper understanding of how to secure your systems and why proactive security measures are more crucial than ever.</p><p><strong>Guest: Alex Benton</strong>, Special Projects at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/alex-benton-b805065/" target="_blank">https://www.linkedin.com/in/alex-benton-b805065/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 26 Feb 2025 01:48:24 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Alex Benton)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-tools-hackers-use-from-manual-hacks-to-automated-exploits-a-zero-trust-world-conversation-with-alex-benton-on-location-coverage-with-sean-martin-and-marco-ciappelli-hIKU3EiJ</link>
      <content:encoded><![CDATA[<p>Recorded during ThreatLocker <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, this episode of the On Location series features an engaging conversation with Alex Benton, Special Projects at ThreatLocker. Benton shares insights from his Metasploit lab, a beginner-friendly session that demonstrates the power of tools like Metasploit and Nmap in cybersecurity. The lab’s objective is clear: to illustrate how easily unpatched systems can be exploited and reinforce the critical need for consistent patch management.</p><p><strong>Understanding the Metasploit Lab</strong></p><p>Benton explains how participants in the lab learned to execute a hack manually before leveraging Metasploit’s streamlined capabilities. The manual process involves identifying vulnerable machines, gathering IP addresses, examining open ports, and assessing software vulnerabilities. With Metasploit, these steps become as simple as selecting an exploit and running it, underscoring the tool’s efficiency.</p><p>A key demonstration in the lab involved Eternal Blue, the exploit associated with the WannaCry virus in 2017. Benton emphasizes how Metasploit simplifies this complex attack, highlighting the importance of maintaining patched systems to prevent similar vulnerabilities.</p><p><strong>The Real-World Implications of Unpatched Systems</strong></p><p>The discussion dives into the risks posed by cybercriminals who use tools like Metasploit to automate attacks. Benton points out that malicious actors often analyze patch notes to identify potential vulnerabilities and create scripts to exploit unpatched systems quickly. The conversation touches on the dark web’s role in providing detailed information about exposed systems, making it even easier for attackers to target vulnerable machines.</p><p><strong>Lessons from WannaCry</strong></p><p>The episode revisits the WannaCry incident, where a vulnerability in Windows systems led to a global cybersecurity crisis. Benton recounts how outdated systems and the absence of a strong security culture created an environment ripe for exploitation. He also shares the story of cybersecurity researchers, including Marcus Hutchins, who played pivotal roles in mitigating the virus’s impact by identifying and activating its kill switch.</p><p><strong>Tune in to Learn More</strong></p><p>This episode offers valuable insights into cybersecurity practices, the dangers of unpatched environments, and the tools that both ethical hackers and cybercriminals use. Listen in to gain a deeper understanding of how to secure your systems and why proactive security measures are more crucial than ever.</p><p><strong>Guest: Alex Benton</strong>, Special Projects at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/alex-benton-b805065/" target="_blank">https://www.linkedin.com/in/alex-benton-b805065/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="8033283" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1874f008-26a0-4cb5-b9d7-4bad120aad28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1874f008-26a0-4cb5-b9d7-4bad120aad28&amp;feed=2M86zCcc"/>
      <itunes:title>The Tools Hackers Use: From Manual Hacks to Automated Exploits | A Zero Trust World Conversation with Alex Benton | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Alex Benton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:08:22</itunes:duration>
      <itunes:summary>Discover how Alex Benton, Special Projects at ThreatLocker, demonstrates the ease of exploiting unpatched systems using Metasploit and highlights the real-world dangers of cybersecurity complacency. This episode offers a compelling look into the tools and tactics used by both ethical hackers and cybercriminals, emphasizing why proactive security measures are more critical than ever.</itunes:summary>
      <itunes:subtitle>Discover how Alex Benton, Special Projects at ThreatLocker, demonstrates the ease of exploiting unpatched systems using Metasploit and highlights the real-world dangers of cybersecurity complacency. This episode offers a compelling look into the tools and tactics used by both ethical hackers and cybercriminals, emphasizing why proactive security measures are more critical than ever.</itunes:subtitle>
      <itunes:keywords>cyber criminals, control alt pwn, network security, metasploit, hacking, zero trust world, sean martin, alex benton, exploit, ztw24, cybersecurity, patch management, conference, threatlocker, on location, vulnerability, software vulnerabilities, eternal blue, penetration testing, wannacry, malware, dark web, event coverage, ethical hacking, ztw, nmap</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>183</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a3cb881-f8f1-4d64-b9b1-260ed64bd372</guid>
      <title>Transforming Healthcare: How Innovation is Driving Better Patient Outcomes | A HIMSS 2025 Conversation with Albe Zakes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode of the <i>On Location</i> series recorded for HIMSS 2025 in Las Vegas, hosts Marco Ciappelli and Sean Martin sit down with Albe Zakes, Director of Strategic Communications at HIMSS, to discuss the transformative impact of technology on healthcare and the upcoming conference’s role in driving innovation. HIMSS, a global society of health and technology professionals, brings together leaders, clinicians, practitioners, and innovators to harness the power of information and technology for improved patient outcomes and expanded access to healthcare.</p><p><strong>A Focus on Collaboration Over Expertise</strong></p><p>Zakes emphasizes a significant shift in how the HIMSS conference operates. While traditional conferences often rely on a top-down approach with speakers sharing insights, HIMSS is increasingly prioritizing collaboration. The 2025 event will feature expanded networking opportunities and dedicated breaks to foster real-time partnerships and relationships that can extend beyond the conference. The approach underscores the organization’s belief in the “symbiotic triangle” of people, technology, and process—highlighting that technology alone is not enough without empowering the people who use it.</p><p><strong>Exploring Key Topics: AI, Cybersecurity, and Health Equity</strong></p><p>Artificial intelligence (AI) is set to take center stage at HIMSS 2025, reflecting its transition from a speculative technology to a practical tool reshaping healthcare. With dozens of educational sessions dedicated to AI, the conference will explore how clean data and strong governance are critical to unlocking AI’s potential in improving healthcare delivery.</p><p>Cybersecurity is another major focus, with a dedicated Healthcare Cybersecurity Forum and a Cybersecurity Command Center on the exhibit floor. Notably, former U.S. Cyber Command and NSA Director General Paul Nakasone will deliver a keynote on maintaining security in an AI-driven world. The emphasis on cybersecurity aligns with the critical need to protect patient data and maintain trust within the healthcare ecosystem.</p><p>Zakes also highlights the Health Equity Forum, which aligns with HIMSS’s mission to ensure that technology advancements translate into equitable healthcare access. The forum will gather leaders from governments and nonprofits worldwide to discuss strategies to improve health equity globally.</p><p><strong>Innovation and Emerging Technologies</strong></p><p>The conference aims to showcase not only established tech giants like Oracle and AWS but also emerging companies and startups. The “First-Time Exhibitors Pavilion” and the “Emerge Innovation Experience” will offer opportunities for attendees to engage with new technologies and ideas. The Emerge Innovation Experience will feature a pitch contest and networking events for entrepreneurs and investors, driving forward-thinking solutions in healthcare technology.</p><p><strong>The Power of People, Technology, and Process</strong></p><p>This episode offers a glimpse into the critical themes that will dominate HIMSS 2025, providing valuable insights into how technology, collaboration, and innovation are reshaping healthcare. With thought-provoking discussions on AI, cybersecurity, and health equity, listeners are invited to explore how these advancements impact not only healthcare systems but also society at large. Tune in to hear more about the initiatives and opportunities at HIMSS 2025, and how you can be part of the conversation shaping the future of healthcare.</p><p><strong>Guest: Albe Zakes</strong>, Director of Strategic Communications at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/albezakes/" target="_blank">https://www.linkedin.com/in/albezakes/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 26 Feb 2025 01:14:58 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Albe Zakes)</author>
      <link>https://eventcoveragepodcast.com/episodes/transforming-healthcare-how-innovation-is-driving-better-patient-outcomes-a-himss-2025-conversation-with-albe-zakes-on-location-coverage-with-sean-martin-and-marco-ciappelli-1LzYV1PN</link>
      <content:encoded><![CDATA[<p>In this episode of the <i>On Location</i> series recorded for HIMSS 2025 in Las Vegas, hosts Marco Ciappelli and Sean Martin sit down with Albe Zakes, Director of Strategic Communications at HIMSS, to discuss the transformative impact of technology on healthcare and the upcoming conference’s role in driving innovation. HIMSS, a global society of health and technology professionals, brings together leaders, clinicians, practitioners, and innovators to harness the power of information and technology for improved patient outcomes and expanded access to healthcare.</p><p><strong>A Focus on Collaboration Over Expertise</strong></p><p>Zakes emphasizes a significant shift in how the HIMSS conference operates. While traditional conferences often rely on a top-down approach with speakers sharing insights, HIMSS is increasingly prioritizing collaboration. The 2025 event will feature expanded networking opportunities and dedicated breaks to foster real-time partnerships and relationships that can extend beyond the conference. The approach underscores the organization’s belief in the “symbiotic triangle” of people, technology, and process—highlighting that technology alone is not enough without empowering the people who use it.</p><p><strong>Exploring Key Topics: AI, Cybersecurity, and Health Equity</strong></p><p>Artificial intelligence (AI) is set to take center stage at HIMSS 2025, reflecting its transition from a speculative technology to a practical tool reshaping healthcare. With dozens of educational sessions dedicated to AI, the conference will explore how clean data and strong governance are critical to unlocking AI’s potential in improving healthcare delivery.</p><p>Cybersecurity is another major focus, with a dedicated Healthcare Cybersecurity Forum and a Cybersecurity Command Center on the exhibit floor. Notably, former U.S. Cyber Command and NSA Director General Paul Nakasone will deliver a keynote on maintaining security in an AI-driven world. The emphasis on cybersecurity aligns with the critical need to protect patient data and maintain trust within the healthcare ecosystem.</p><p>Zakes also highlights the Health Equity Forum, which aligns with HIMSS’s mission to ensure that technology advancements translate into equitable healthcare access. The forum will gather leaders from governments and nonprofits worldwide to discuss strategies to improve health equity globally.</p><p><strong>Innovation and Emerging Technologies</strong></p><p>The conference aims to showcase not only established tech giants like Oracle and AWS but also emerging companies and startups. The “First-Time Exhibitors Pavilion” and the “Emerge Innovation Experience” will offer opportunities for attendees to engage with new technologies and ideas. The Emerge Innovation Experience will feature a pitch contest and networking events for entrepreneurs and investors, driving forward-thinking solutions in healthcare technology.</p><p><strong>The Power of People, Technology, and Process</strong></p><p>This episode offers a glimpse into the critical themes that will dominate HIMSS 2025, providing valuable insights into how technology, collaboration, and innovation are reshaping healthcare. With thought-provoking discussions on AI, cybersecurity, and health equity, listeners are invited to explore how these advancements impact not only healthcare systems but also society at large. Tune in to hear more about the initiatives and opportunities at HIMSS 2025, and how you can be part of the conversation shaping the future of healthcare.</p><p><strong>Guest: Albe Zakes</strong>, Director of Strategic Communications at HIMSS | On LinkedIn: <a href="https://www.linkedin.com/in/albezakes/" target="_blank">https://www.linkedin.com/in/albezakes/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HIMSS 2024 Cybersecurity Report: <a href="https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/" target="_blank">https://www.himss.org/resources/himss-healthcare-cybersecurity-survey/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19785044" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/75191d55-5275-40fb-b77e-9ac359ee48e8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=75191d55-5275-40fb-b77e-9ac359ee48e8&amp;feed=2M86zCcc"/>
      <itunes:title>Transforming Healthcare: How Innovation is Driving Better Patient Outcomes | A HIMSS 2025 Conversation with Albe Zakes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Albe Zakes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a48a6af8-6ba8-41ae-8e17-047550a8862c/3000x3000/himss-20las-20vegas-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:36</itunes:duration>
      <itunes:summary>In this episode of On Location for HIMSS 2025, hosts Marco Ciappelli and Sean Martin speak with Albe Zakes, Director of Strategic Communications at HIMSS, about how technology, collaboration, and innovation are transforming healthcare and driving equitable access to care. From the rise of AI to the critical role of cybersecurity and the push for health equity, this conversation offers fresh insights into the future of healthcare and the dynamic opportunities at this year’s conference.</itunes:summary>
      <itunes:subtitle>In this episode of On Location for HIMSS 2025, hosts Marco Ciappelli and Sean Martin speak with Albe Zakes, Director of Strategic Communications at HIMSS, about how technology, collaboration, and innovation are transforming healthcare and driving equitable access to care. From the rise of AI to the critical role of cybersecurity and the push for health equity, this conversation offers fresh insights into the future of healthcare and the dynamic opportunities at this year’s conference.</itunes:subtitle>
      <itunes:keywords>patient outcomes, collaboration, technology, marco ciappelli, artificial intelligence, digital health, healthcare access, networking, exhibitors, sean martin, cybersecurity, data governance, health equity, conference, himss, on location, innovation, healthcare it, event coverage, startups, ai, albe zakes, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>182</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">574ef767-e422-495f-a21a-3e1840b381ce</guid>
      <title>Zero Trust in Action: Revolutionizing Incident Response | A Zero Trust World Conversation with Art Ocain | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At ThreatLocker <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, Art Ocain, VP of Cybersecurity & Incident Response at Airiam, shared valuable insights into applying zero trust principles to incident response. The conversation, hosted by Marco Ciappelli and Sean Martin, highlighted the critical role of zero trust in preparing for and managing security incidents.</p><p><strong>The Zero Trust Mindset in Incident Response</strong> Ocain discussed how zero trust methodology—embracing the principles of "assume breach" and "always verify, never trust"—can significantly enhance incident response strategies. Instead of merely securing the perimeter or endpoints, his approach involves identifying and protecting core systems through micro-segmentation and robust identity management. By securing each component individually, organizations can minimize the impact of potential breaches.</p><p>For example, Ocain described a scenario where segmenting a SQL server from an application server could prevent data loss during an attack. Even if an application server is compromised, critical data remains secure, allowing quicker recovery and continuity of operations.</p><p><strong>Dynamic Containment Strategies</strong> Ocain emphasized the importance of dynamic containment when responding to incidents. Traditional methods, such as using Endpoint Detection and Response (EDR) tools, are effective for forensic analysis but may not stop active threats quickly. Instead, he advocated for an "allow list only" approach that restricts access to systems and data, effectively containing threats while maintaining critical business functions.</p><p>In practice, when Ocain is called into a crisis, he often implements a deny-by-default solution to isolate compromised systems. This strategy allows him to perform forensics and bring systems back online selectively, ensuring threat actors cannot access recovered systems.</p><p><strong>Balancing Security with Business Needs</strong> A significant challenge in adopting zero trust is gaining executive buy-in. Ocain noted that executive teams often push back against zero trust measures, either out of a desire for convenience or because of misconceptions about its impact on business culture. His approach involves demonstrating real-world scenarios where zero trust could mitigate damage during breaches. By focusing on critical systems and showing the potential consequences of compromised identities or systems, Ocain effectively bridges the gap between security and business priorities.</p><p><strong>A Cultural Shift Toward Security</strong> The discussion also touched on the cultural shift required to fully integrate zero trust into an organization. Zero trust is not just a technological framework but a mindset that influences how every employee views access and security. Through scenario-driven exercises and engaging executive teams early in the process, Ocain helps organizations transition from a "department of no" mentality to a collaborative, security-first culture.</p><p>Listen to the full episode to explore more strategies on implementing zero trust in incident response and how to align security initiatives with business goals.</p><p>Guest: <strong>Art Ocain</strong>, VP of Cybersecurity & Incident Response at Airiam | On LinkedIn: <a href="https://www.linkedin.com/in/artocain/" target="_blank">https://www.linkedin.com/in/artocain/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 25 Feb 2025 18:50:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Art Ocain)</author>
      <link>https://eventcoveragepodcast.com/episodes/zero-trust-in-action-revolutionizing-incident-response-a-zero-trust-world-conversation-with-art-ocain-on-location-coverage-with-sean-martin-and-marco-ciappelli-stXcB2bs</link>
      <content:encoded><![CDATA[<p>At ThreatLocker <a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> in Orlando, Art Ocain, VP of Cybersecurity & Incident Response at Airiam, shared valuable insights into applying zero trust principles to incident response. The conversation, hosted by Marco Ciappelli and Sean Martin, highlighted the critical role of zero trust in preparing for and managing security incidents.</p><p><strong>The Zero Trust Mindset in Incident Response</strong> Ocain discussed how zero trust methodology—embracing the principles of "assume breach" and "always verify, never trust"—can significantly enhance incident response strategies. Instead of merely securing the perimeter or endpoints, his approach involves identifying and protecting core systems through micro-segmentation and robust identity management. By securing each component individually, organizations can minimize the impact of potential breaches.</p><p>For example, Ocain described a scenario where segmenting a SQL server from an application server could prevent data loss during an attack. Even if an application server is compromised, critical data remains secure, allowing quicker recovery and continuity of operations.</p><p><strong>Dynamic Containment Strategies</strong> Ocain emphasized the importance of dynamic containment when responding to incidents. Traditional methods, such as using Endpoint Detection and Response (EDR) tools, are effective for forensic analysis but may not stop active threats quickly. Instead, he advocated for an "allow list only" approach that restricts access to systems and data, effectively containing threats while maintaining critical business functions.</p><p>In practice, when Ocain is called into a crisis, he often implements a deny-by-default solution to isolate compromised systems. This strategy allows him to perform forensics and bring systems back online selectively, ensuring threat actors cannot access recovered systems.</p><p><strong>Balancing Security with Business Needs</strong> A significant challenge in adopting zero trust is gaining executive buy-in. Ocain noted that executive teams often push back against zero trust measures, either out of a desire for convenience or because of misconceptions about its impact on business culture. His approach involves demonstrating real-world scenarios where zero trust could mitigate damage during breaches. By focusing on critical systems and showing the potential consequences of compromised identities or systems, Ocain effectively bridges the gap between security and business priorities.</p><p><strong>A Cultural Shift Toward Security</strong> The discussion also touched on the cultural shift required to fully integrate zero trust into an organization. Zero trust is not just a technological framework but a mindset that influences how every employee views access and security. Through scenario-driven exercises and engaging executive teams early in the process, Ocain helps organizations transition from a "department of no" mentality to a collaborative, security-first culture.</p><p>Listen to the full episode to explore more strategies on implementing zero trust in incident response and how to align security initiatives with business goals.</p><p>Guest: <strong>Art Ocain</strong>, VP of Cybersecurity & Incident Response at Airiam | On LinkedIn: <a href="https://www.linkedin.com/in/artocain/" target="_blank">https://www.linkedin.com/in/artocain/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="13519413" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b8a110c2-8ed4-4854-a4f1-810b1fdd958d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b8a110c2-8ed4-4854-a4f1-810b1fdd958d&amp;feed=2M86zCcc"/>
      <itunes:title>Zero Trust in Action: Revolutionizing Incident Response | A Zero Trust World Conversation with Art Ocain | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Art Ocain</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:04</itunes:duration>
      <itunes:summary>In this episode, Art Ocain, VP of Cybersecurity &amp; Incident Response at Airiam, shares practical strategies for applying zero trust principles to incident response, revealing how dynamic containment and micro-segmentation can safeguard critical systems during a breach. Listen in to learn how to align security initiatives with business goals while fostering a proactive, security-first culture.</itunes:summary>
      <itunes:subtitle>In this episode, Art Ocain, VP of Cybersecurity &amp; Incident Response at Airiam, shares practical strategies for applying zero trust principles to incident response, revealing how dynamic containment and micro-segmentation can safeguard critical systems during a breach. Listen in to learn how to align security initiatives with business goals while fostering a proactive, security-first culture.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, dynamic containment, zero trust world, sean martin, identity management, assume breach, cybersecurity, application security, conference, data security, threatlocker, on location, risk management, containment, ztw25, executive buy-in, cultural shift, network segmentation, event coverage, micro-segmentation, airiam, art ocain, incident response, ztw, business continuity, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>181</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8b82ca4b-8fe5-483c-a4a2-297f9aa38f7b</guid>
      <title>From Demo to Deployment: How A Hands-On Human Approach Transforms Security Implementation | A Conversation with Amanda Makowsky at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>This episode of the “On Location” series, recorded during <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a> <a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> in Orlando, features an insightful conversation with Amanda Makowsky, Solution Engineer at ThreatLocker. Amanda shares how ThreatLocker maintains a human touch in cybersecurity while delivering robust solutions for organizations of all sizes.</p><p><strong>The Human Element in Technology</strong></p><p>Amanda explains how ThreatLocker emphasizes human interaction from the first demo through implementation and beyond. When potential customers engage with ThreatLocker, they are assigned a dedicated Solution Engineer as their technical point of contact. Amanda highlights how this relationship extends beyond the sales process, ensuring partners have continuous support as they mature their security environments. Whether working with small businesses or large enterprises, the focus remains on personalized service and hands-on assistance.</p><p><strong>Support That Stands Out</strong></p><p>ThreatLocker’s commitment to human-centric support is evident through its 24/7 live helpdesk, staffed by real people in Orlando, Florida. Amanda notes the goal of responding to chat requests within a minute, providing immediate support without relying on bots or automated responses. This approach fosters trust and ensures that customers, regardless of their organization’s size, receive timely and effective help.</p><p><strong>Customization and Real-World Impact</strong></p><p>Amanda shares how every partner’s environment is unique, requiring tailored solutions to accommodate different software, hardware, and operational needs. She emphasizes the importance of building specific and intentional roles within ThreatLocker’s systems to match the diverse environments of their partners. The impact of this customization is profound, as partners express a sense of security that allows them to “sleep better at night.”</p><p>Listen to this episode to explore how ThreatLocker combines technology with human connection, offering a refreshing perspective in the cybersecurity industry.</p><h3><strong>Guest</strong></h3><p>🔹 <strong>Amanda Makowsky</strong>, Solutions Engineer at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/amandamakowsky/" target="_blank">https://www.linkedin.com/in/amandamakowsky/</a></p><h3><strong>Hosts</strong></h3><p>🔹 <strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹 <strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 25 Feb 2025 00:40:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Amanda Makowsky)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-demo-to-deployment-how-a-hands-on-human-approach-transforms-security-implementation-a-conversation-with-amanda-makowsky-at-zero-trust-world-2025-on-location-with-sean-martin-and-marco-ciappelli-LaUhPlhE</link>
      <content:encoded><![CDATA[<p>This episode of the “On Location” series, recorded during <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a> <a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> in Orlando, features an insightful conversation with Amanda Makowsky, Solution Engineer at ThreatLocker. Amanda shares how ThreatLocker maintains a human touch in cybersecurity while delivering robust solutions for organizations of all sizes.</p><p><strong>The Human Element in Technology</strong></p><p>Amanda explains how ThreatLocker emphasizes human interaction from the first demo through implementation and beyond. When potential customers engage with ThreatLocker, they are assigned a dedicated Solution Engineer as their technical point of contact. Amanda highlights how this relationship extends beyond the sales process, ensuring partners have continuous support as they mature their security environments. Whether working with small businesses or large enterprises, the focus remains on personalized service and hands-on assistance.</p><p><strong>Support That Stands Out</strong></p><p>ThreatLocker’s commitment to human-centric support is evident through its 24/7 live helpdesk, staffed by real people in Orlando, Florida. Amanda notes the goal of responding to chat requests within a minute, providing immediate support without relying on bots or automated responses. This approach fosters trust and ensures that customers, regardless of their organization’s size, receive timely and effective help.</p><p><strong>Customization and Real-World Impact</strong></p><p>Amanda shares how every partner’s environment is unique, requiring tailored solutions to accommodate different software, hardware, and operational needs. She emphasizes the importance of building specific and intentional roles within ThreatLocker’s systems to match the diverse environments of their partners. The impact of this customization is profound, as partners express a sense of security that allows them to “sleep better at night.”</p><p>Listen to this episode to explore how ThreatLocker combines technology with human connection, offering a refreshing perspective in the cybersecurity industry.</p><h3><strong>Guest</strong></h3><p>🔹 <strong>Amanda Makowsky</strong>, Solutions Engineer at ThreatLocker | On LinkedIn: <a href="https://www.linkedin.com/in/amandamakowsky/" target="_blank">https://www.linkedin.com/in/amandamakowsky/</a></p><h3><strong>Hosts</strong></h3><p>🔹 <strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹 <strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="4630690" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2bf24cdc-0506-4b2c-81c6-a15c09320e3d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2bf24cdc-0506-4b2c-81c6-a15c09320e3d&amp;feed=2M86zCcc"/>
      <itunes:title>From Demo to Deployment: How A Hands-On Human Approach Transforms Security Implementation | A Conversation with Amanda Makowsky at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Amanda Makowsky</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:04:49</itunes:duration>
      <itunes:summary>In this episode recorded at ThreatLocker Zero Trust World, Solution Engineer Amanda Makowsky shares how ThreatLocker’s human-centered approach ensures personalized support and tailored cybersecurity solutions for organizations of all sizes. Discover how real human connections and 24/7 live support set ThreatLocker apart in building trust and security.</itunes:summary>
      <itunes:subtitle>In this episode recorded at ThreatLocker Zero Trust World, Solution Engineer Amanda Makowsky shares how ThreatLocker’s human-centered approach ensures personalized support and tailored cybersecurity solutions for organizations of all sizes. Discover how real human connections and 24/7 live support set ThreatLocker apart in building trust and security.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, zero trust world, personalized support, sean martin, technical guidance, cybersecurity, enterprise security, small business security, conference, threatlocker, on location, ztw25, event coverage, security maturity, ztw, human connection, custom solutions, implementation, security solutions, trust building, amanda makowsky, zero trust, hands-on assistance, solution engineer, live support</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>180</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e8356f39-cf17-4113-a611-08768b98ca0d</guid>
      <title>Breaking the Spell: How to Avoid the Grand Delusion in Zero Trust | A Conversation with Dr. Chase Cunningham at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a> <a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled <i>The Grand Delusion</i>. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.</p><p><strong>Challenging the Status Quo</strong></p><p>Cunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn’t be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.</p><p><strong>Zero Trust as a Strategy, Not Just a Term</strong></p><p>The session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.</p><p><strong>Actionable Steps for Small Businesses</strong></p><p>Cunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.</p><p><strong>The Future of Zero Trust</strong></p><p>Looking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today’s digital world.</p><p>Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.</p><h3><strong>Guest</strong></h3><p>🔹 <strong>Dr. Chase Cunningham</strong>, VP Security Market Research at G2 | On LinkedIn: <a href="https://www.linkedin.com/in/dr-chase-cunningham/" target="_blank">https://www.linkedin.com/in/dr-chase-cunningham/</a></p><h3><strong>Hosts</strong></h3><p>🔹 <strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹<strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Book | vArIable: A Novel in the gAbrIel Series:</strong> <a href="https://amzn.to/41yHOUo" target="_blank">https://amzn.to/41yHOUo</a></p><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 25 Feb 2025 00:10:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Cunningham)</author>
      <link>https://eventcoveragepodcast.com/episodes/breaking-the-spell-how-to-avoid-the-grand-delusion-in-zero-trust-a-conversation-with-dr-chase-cunningham-at-zero-trust-world-2025-on-location-with-sean-martin-and-marco-ciappelli-oooU069w</link>
      <content:encoded><![CDATA[<p>At <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a> <a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> in Orlando, Chase Cunningham, often referred to as “Dr. Zero Trust,” delivered a thought-provoking session titled <i>The Grand Delusion</i>. The event, filled with IT professionals, managed service providers (MSPs), and small to midsize business (SMB) leaders, provided the perfect backdrop for a candid discussion about the state of cybersecurity and the real-world application of Zero Trust strategies.</p><p><strong>Challenging the Status Quo</strong></p><p>Cunningham emphasized the need for businesses to adopt realistic cybersecurity practices that align with their resources and needs. He pointed out the pitfalls of smaller organizations attempting to emulate enterprise-level security strategies without the necessary infrastructure. “Cyber shouldn’t be any different” than outsourcing taxes or other specialized tasks, he explained, advocating for MSPs and external services as practical solutions.</p><p><strong>Zero Trust as a Strategy, Not Just a Term</strong></p><p>The session underscored that Zero Trust is not merely a buzzword but a strategic approach to security. Cunningham stressed the importance of questioning the validity of industry claims and seeking concrete data to support cybersecurity initiatives. He encouraged attendees to avoid being “delusional” by blindly accepting security solutions without a critical evaluation of their impact and effectiveness.</p><p><strong>Actionable Steps for Small Businesses</strong></p><p>Cunningham shared practical advice for implementing Zero Trust principles within smaller organizations. He recommended focusing on foundational controls like identity and access management, micro-segmentation, and application allow and block lists. He noted that achieving security is a journey, requiring a structured, strategic approach and an acceptance that immediate results are unlikely.</p><p><strong>The Future of Zero Trust</strong></p><p>Looking ahead, Cunningham expressed optimism about the continued evolution of Zero Trust. He highlighted its growing global significance, with his upcoming engagements in Taiwan, Colombia, and Europe serving as evidence of its widespread adoption. Ultimately, he framed Zero Trust as not only a business imperative but a fundamental human right in today’s digital world.</p><p>Tune in to this episode to hear more insights from Chase Cunningham and explore what Zero Trust means for businesses of all sizes.</p><h3><strong>Guest</strong></h3><p>🔹 <strong>Dr. Chase Cunningham</strong>, VP Security Market Research at G2 | On LinkedIn: <a href="https://www.linkedin.com/in/dr-chase-cunningham/" target="_blank">https://www.linkedin.com/in/dr-chase-cunningham/</a></p><h3><strong>Hosts</strong></h3><p>🔹 <strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹<strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Book | vArIable: A Novel in the gAbrIel Series:</strong> <a href="https://amzn.to/41yHOUo" target="_blank">https://amzn.to/41yHOUo</a></p><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="9188109" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/cd7d0d45-92b3-4995-8ef8-886a80eab7bf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=cd7d0d45-92b3-4995-8ef8-886a80eab7bf&amp;feed=2M86zCcc"/>
      <itunes:title>Breaking the Spell: How to Avoid the Grand Delusion in Zero Trust | A Conversation with Dr. Chase Cunningham at Zero Trust World 2025 | On Location with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Cunningham</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:34</itunes:duration>
      <itunes:summary>In this episode, we challenge the “Grand Delusion” of cybersecurity and zero trust by exposing the gap between industry hype and real-world strategy. Listen in to discover practical, no-nonsense insights on how businesses—big and small—can build a robust security posture without falling for common misconceptions.</itunes:summary>
      <itunes:subtitle>In this episode, we challenge the “Grand Delusion” of cybersecurity and zero trust by exposing the gap between industry hype and real-world strategy. Listen in to discover practical, no-nonsense insights on how businesses—big and small—can build a robust security posture without falling for common misconceptions.</itunes:subtitle>
      <itunes:keywords>managed services, session insights, marco ciappelli, security posture, zero trust world, msp, digital safety, sean martin, practical security, identity management, application allow list, cybersecurity, enterprise security, conference, chase cunningham, threatlocker, on location, business security, ztw25, cyber defense, event coverage, micro-segmentation, small business, ztw, security strategy, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>179</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7a8957d2-2b7a-40fe-ac0c-6f7aa51b817a</guid>
      <title>Strengthening Cybersecurity Through Zero Trust | A Conversation with Adam Fuller at Zero Trust World 2025 | A Zero Trust World 2025 On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<h3><strong>Zero Trust World 2025: Strengthening Cybersecurity Through Zero Trust</strong></h3><p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a>, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of <strong>Zero Trust</strong>—not just as a concept but as an operational mindset.</p><p><strong>A Deep Dive into Windows Security and Zero Trust</strong></p><p>🔹<strong>Guest: Adam Fuller</strong>, Special Projects at ThreatLocker</p><p>In an era where cyber threats are more relentless than ever, organizations can no longer afford to rely on outdated security models. This urgency drove the conversations at <strong>Zero Trust World 2025</strong>, where experts shared insights on modern security strategies and the future of cyber defense.</p><p>As part of <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank"><strong>ITSPmagazine’s On Location coverage</strong></a>, host <strong>Sean Martin</strong> sat down with <strong>Adam Fuller</strong>, Special Projects at ThreatLocker, to discuss the critical role of Windows security, Zero Trust principles, and the evolving challenges of cyber risk management.</p><p>With Windows environments remaining a prime target for cyber threats, Fuller shared practical strategies for hardening systems using built-in tools and best practices.</p><blockquote><p><i>“It’s not just about blocking threats,”</i> Fuller explained. <i>“It’s about having visibility—knowing what’s changing in your system, locking down registry settings, and implementing effective event logging. These steps are crucial for proactive security.”</i></p></blockquote><p>A key takeaway from the discussion was the importance of collaboration between <strong>IT administrators and security teams</strong>to enforce strong security policies without disrupting productivity. Many organizations struggle with balancing security and usability, but Fuller emphasized that <strong>Zero Trust security</strong> can be implemented without compromising efficiency when approached with the right policies.</p><p><strong>Beyond Compliance: Cyber Insurance and Real-World Security</strong></p><p>Another emerging theme from <strong>Zero Trust World 2025</strong> was the increasing influence of <strong>cyber insurance</strong> in shaping security practices. While compliance standards often drive security implementations, Fuller pointed out that cyber insurance requirements are becoming just as important—if not more so.</p><blockquote><p><i>“Many companies don’t realize that a denied cyber insurance claim can be devastating,”</i> Fuller said. <i>“It’s not just about checking boxes for compliance; it’s about proving you’ve taken the right security steps to protect your organization.”</i></p></blockquote><p>The conversation also touched on <strong>phishing-resistant MFA, token protection policies, and real-time auditing</strong>. As cybercriminals continue evolving their tactics, organizations must stay ahead by adopting modern security controls that go beyond traditional MFA and perimeter defenses.</p><p><strong>Why These Conversations Matter</strong></p><p>This episode is a must-listen for IT administrators, security professionals, and <strong>MSPs</strong> looking to build a stronger <strong>Zero Trust strategy</strong>. As Sean and Adam break down the key takeaways from the event, one thing is clear—<strong>security is no longer just an IT issue; it’s a business imperative</strong>.</p><p>Stay tuned for more expert insights from <strong>Zero Trust World 2025</strong>, as <strong>ITSPmagazine’s On Location with Sean and Marco</strong> continues to explore the future of cybersecurity.</p><h3><strong>Hosts:</strong></h3><p>🔹 <strong>Sean Martin</strong> – Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of <i>Redefining CyberSecurity Podcast</i>[@RedefiningCyber]<br />🎙 <strong>ITSPmagazine Profile:</strong> <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹 <strong>Marco Ciappelli</strong> – Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of <i>Redefining Society Podcast</i> & <i>Audio Signals Podcast</i><br />🎙 <strong>ITSPmagazine Profile:</strong> <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 22 Feb 2025 21:41:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Adam Fuller, ThreatLocker)</author>
      <link>https://eventcoveragepodcast.com/episodes/strengthening-cybersecurity-through-zero-trust-a-conversation-with-adam-fuller-at-zero-trust-world-2025-a-zero-trust-world-2025-on-location-coverage-with-sean-martin-and-marco-ciappelli-jq3ALdv1</link>
      <content:encoded><![CDATA[<h3><strong>Zero Trust World 2025: Strengthening Cybersecurity Through Zero Trust</strong></h3><p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a> has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank"><strong>ThreatLocker</strong></a>, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of <strong>Zero Trust</strong>—not just as a concept but as an operational mindset.</p><p><strong>A Deep Dive into Windows Security and Zero Trust</strong></p><p>🔹<strong>Guest: Adam Fuller</strong>, Special Projects at ThreatLocker</p><p>In an era where cyber threats are more relentless than ever, organizations can no longer afford to rely on outdated security models. This urgency drove the conversations at <strong>Zero Trust World 2025</strong>, where experts shared insights on modern security strategies and the future of cyber defense.</p><p>As part of <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank"><strong>ITSPmagazine’s On Location coverage</strong></a>, host <strong>Sean Martin</strong> sat down with <strong>Adam Fuller</strong>, Special Projects at ThreatLocker, to discuss the critical role of Windows security, Zero Trust principles, and the evolving challenges of cyber risk management.</p><p>With Windows environments remaining a prime target for cyber threats, Fuller shared practical strategies for hardening systems using built-in tools and best practices.</p><blockquote><p><i>“It’s not just about blocking threats,”</i> Fuller explained. <i>“It’s about having visibility—knowing what’s changing in your system, locking down registry settings, and implementing effective event logging. These steps are crucial for proactive security.”</i></p></blockquote><p>A key takeaway from the discussion was the importance of collaboration between <strong>IT administrators and security teams</strong>to enforce strong security policies without disrupting productivity. Many organizations struggle with balancing security and usability, but Fuller emphasized that <strong>Zero Trust security</strong> can be implemented without compromising efficiency when approached with the right policies.</p><p><strong>Beyond Compliance: Cyber Insurance and Real-World Security</strong></p><p>Another emerging theme from <strong>Zero Trust World 2025</strong> was the increasing influence of <strong>cyber insurance</strong> in shaping security practices. While compliance standards often drive security implementations, Fuller pointed out that cyber insurance requirements are becoming just as important—if not more so.</p><blockquote><p><i>“Many companies don’t realize that a denied cyber insurance claim can be devastating,”</i> Fuller said. <i>“It’s not just about checking boxes for compliance; it’s about proving you’ve taken the right security steps to protect your organization.”</i></p></blockquote><p>The conversation also touched on <strong>phishing-resistant MFA, token protection policies, and real-time auditing</strong>. As cybercriminals continue evolving their tactics, organizations must stay ahead by adopting modern security controls that go beyond traditional MFA and perimeter defenses.</p><p><strong>Why These Conversations Matter</strong></p><p>This episode is a must-listen for IT administrators, security professionals, and <strong>MSPs</strong> looking to build a stronger <strong>Zero Trust strategy</strong>. As Sean and Adam break down the key takeaways from the event, one thing is clear—<strong>security is no longer just an IT issue; it’s a business imperative</strong>.</p><p>Stay tuned for more expert insights from <strong>Zero Trust World 2025</strong>, as <strong>ITSPmagazine’s On Location with Sean and Marco</strong> continues to explore the future of cybersecurity.</p><h3><strong>Hosts:</strong></h3><p>🔹 <strong>Sean Martin</strong> – Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of <i>Redefining CyberSecurity Podcast</i>[@RedefiningCyber]<br />🎙 <strong>ITSPmagazine Profile:</strong> <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p>🔹 <strong>Marco Ciappelli</strong> – Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of <i>Redefining Society Podcast</i> & <i>Audio Signals Podcast</i><br />🎙 <strong>ITSPmagazine Profile:</strong> <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><h3><strong>This Episode’s Sponsor</strong></h3><p>✅ <strong>ThreatLocker</strong>: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><h3><strong>Resources</strong></h3><p>🔗 <strong>Full ZTW 2025 Coverage:</strong> <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>🔗 <strong>ITSPmagazine’s Event Coverage Hub:</strong> <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>🎧 <strong>More </strong><i><strong>Redefining CyberSecurity</strong></i><strong> Content:</strong> <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">https://www.itspmagazine.com/redefining-cybersecurity-podcast</a></p><p>🎧 <strong>More </strong><i><strong>Redefining Society</strong></i><strong> Stories:</strong> <a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>📢 <strong>Want to share your Brand Story Briefing as part of our event coverage?</strong> Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>📢 <strong>Want Sean and Marco at your event?</strong> Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="10817662" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e82ef9c4-3a2b-437a-bf80-5d88d0db1178/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e82ef9c4-3a2b-437a-bf80-5d88d0db1178&amp;feed=2M86zCcc"/>
      <itunes:title>Strengthening Cybersecurity Through Zero Trust | A Conversation with Adam Fuller at Zero Trust World 2025 | A Zero Trust World 2025 On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Adam Fuller, ThreatLocker</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:16</itunes:duration>
      <itunes:summary>Zero Trust World 2025: Strengthening Cybersecurity Through Zero Trust

Zero Trust World 2025 has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by ThreatLocker, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.</itunes:summary>
      <itunes:subtitle>Zero Trust World 2025: Strengthening Cybersecurity Through Zero Trust

Zero Trust World 2025 has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by ThreatLocker, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.</itunes:subtitle>
      <itunes:keywords>compliance, security culture, technology, artificial intelligence, network security, leadership, cybersecurity podcast, threat detection, infosec, infosecurity, verification, cybersecurity, authentication, redefining cybersecurity, on location, zero trust world 2025, risk management, ztw25, mssps, event coverage, cto, cio, cybersecurity training, incident response, ai, access control, zero trust, redefining cybersecurity podcast, security operations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>178</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2d6d17a0-9a1b-4639-bc55-70be6152427b</guid>
      <title>Building a Community and a Culture of Security Education and Operations | A Zero Trust World Pre-Event Kick-Off | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> is officially underway, and the conversation centers around what it means to build a culture of security. Hosted by ThreatLocker, this event brings together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.</p><p><strong>Defining Zero Trust in Practice</strong></p><p>Sean Martin and Marco Ciappelli set the stage with a key takeaway: Zero Trust is not a one-size-fits-all solution. Each organization must define its own approach based on its unique environment, leadership structure, and operational needs. It is not about a single tool or quick fix but about establishing a continuous process of verification and risk management.</p><p><strong>A Focus on Security Operations</strong></p><p>Security operations and incident response are among the core themes of this year’s discussions. Speakers and panelists examine how organizations can implement Zero Trust principles effectively while maintaining business agility. Artificial intelligence, its intersection with cybersecurity, and its potential to both strengthen and challenge security frameworks are also on the agenda.</p><p><strong>Learning Through Engagement</strong></p><p>One of the standout aspects of Zero Trust World is its emphasis on education. From hands-on training and certification opportunities to interactive challenges—such as hacking a device to win it—attendees gain practical experience in real-world security scenarios. The event fosters a culture of learning, with participation from help desk professionals, CIOs, CTOs, and cybersecurity practitioners alike.</p><p><strong>The Power of Community</strong></p><p>Beyond the technical discussions, the event underscores the importance of community. Conferences like these are not just about discovering new technologies or solutions; they are about forging connections, sharing knowledge, and strengthening the collective approach to security.</p><p>Zero Trust World 2025 is just getting started, and there’s much more to come. Stay tuned as Sean and Marco continue to bring insights from the conference floor, capturing the voices that are shaping the future of cybersecurity.</p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 18 Feb 2025 22:50:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-a-community-and-a-culture-of-security-education-and-operations-a-zero-trust-world-pre-event-kick-off-on-location-coverage-with-sean-martin-and-marco-ciappelli-KPKS7Nv5</link>
      <content:encoded><![CDATA[<p><a href="https://itspm.ag/threat5mu1">Zero Trust World 2025</a> is officially underway, and the conversation centers around what it means to build a culture of security. Hosted by ThreatLocker, this event brings together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.</p><p><strong>Defining Zero Trust in Practice</strong></p><p>Sean Martin and Marco Ciappelli set the stage with a key takeaway: Zero Trust is not a one-size-fits-all solution. Each organization must define its own approach based on its unique environment, leadership structure, and operational needs. It is not about a single tool or quick fix but about establishing a continuous process of verification and risk management.</p><p><strong>A Focus on Security Operations</strong></p><p>Security operations and incident response are among the core themes of this year’s discussions. Speakers and panelists examine how organizations can implement Zero Trust principles effectively while maintaining business agility. Artificial intelligence, its intersection with cybersecurity, and its potential to both strengthen and challenge security frameworks are also on the agenda.</p><p><strong>Learning Through Engagement</strong></p><p>One of the standout aspects of Zero Trust World is its emphasis on education. From hands-on training and certification opportunities to interactive challenges—such as hacking a device to win it—attendees gain practical experience in real-world security scenarios. The event fosters a culture of learning, with participation from help desk professionals, CIOs, CTOs, and cybersecurity practitioners alike.</p><p><strong>The Power of Community</strong></p><p>Beyond the technical discussions, the event underscores the importance of community. Conferences like these are not just about discovering new technologies or solutions; they are about forging connections, sharing knowledge, and strengthening the collective approach to security.</p><p>Zero Trust World 2025 is just getting started, and there’s much more to come. Stay tuned as Sean and Marco continue to bring insights from the conference floor, capturing the voices that are shaping the future of cybersecurity.</p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5983195" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8e6e8ac8-c595-4f72-bfad-7371a0eca5fb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8e6e8ac8-c595-4f72-bfad-7371a0eca5fb&amp;feed=2M86zCcc"/>
      <itunes:title>Building a Community and a Culture of Security Education and Operations | A Zero Trust World Pre-Event Kick-Off | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:13</itunes:duration>
      <itunes:summary>Zero Trust World 2025 kicks off with a deep dive into what Zero Trust really means—beyond the buzzword—focusing on security operations, AI’s growing role, and the necessity of a continuous verification mindset. Hosts Sean Martin and Marco Ciappelli bring you inside the event, capturing insights from industry leaders, hands-on learning experiences, and the powerful sense of community driving the future of cybersecurity.</itunes:summary>
      <itunes:subtitle>Zero Trust World 2025 kicks off with a deep dive into what Zero Trust really means—beyond the buzzword—focusing on security operations, AI’s growing role, and the necessity of a continuous verification mindset. Hosts Sean Martin and Marco Ciappelli bring you inside the event, capturing insights from industry leaders, hands-on learning experiences, and the powerful sense of community driving the future of cybersecurity.</itunes:subtitle>
      <itunes:keywords>compliance, security culture, technology, artificial intelligence, network security, leadership, cybersecurity podcast, threat detection, verification, cybersecurity, authentication, redefining cybersecurity, on location, risk management, event coverage, cto, cio, cybersecurity training, incident response, ai, access control, zero trust, redefining cybersecurity podcast, security operations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>177</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d933ed8e-4518-4844-91da-6f7a87dd0bc2</guid>
      <title>Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a>, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.</p><p>In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, <i>The Dangers of Shadow IT</i>. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman’s session aims to shed light on this issue and equip attendees with strategies to address it effectively.</p><p><strong>Understanding Shadow IT and Its Risks</strong></p><p>Bowman explains that Shadow IT is more than just an inconvenience—it’s a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.</p><p>One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.</p><p>Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.</p><p><strong>Zero Trust as a Mindset</strong></p><p>A recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it’s a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.</p><p>This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.</p><p><strong>Practical Strategies to Combat Shadow IT</strong></p><p>Bowman’s session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:</p><p>• <strong>Identifying and monitoring unauthorized applications</strong> within their organization</p><p>• <strong>Implementing policies and security controls</strong> that balance security with user needs</p><p>• <strong>Enhancing employee engagement and education</strong> to prevent unauthorized technology use</p><p>• <strong>Leveraging solutions like ThreatLocker</strong> to enforce security policies while maintaining operational efficiency</p><p>Bowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.</p><p><strong>Why This Session Matters</strong></p><p>With organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman’s session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.</p><p>Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.</p><p>For those interested in staying ahead of security challenges, attending Bowman’s session on <strong>The Dangers of Shadow IT</strong> is a must.</p><p><strong>Guest: Ryan Bowman</strong>, VP of Solutions Engineering, ThreatLocker [<a href="https://x.com/ThreatLocker" target="_blank">@ThreatLocker</a> | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-bowman-3358a71b/" target="_blank">https://www.linkedin.com/in/ryan-bowman-3358a71b/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 7 Feb 2025 19:12:20 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Bowman)</author>
      <link>https://eventcoveragepodcast.com/episodes/shadow-it-securing-your-organization-in-a-world-of-unapproved-apps-a-zero-trust-world-conversation-with-ryan-bowman-on-location-coverage-with-sean-martin-and-marco-ciappelli-Q5Zn71Wr</link>
      <content:encoded><![CDATA[<p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a>, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.</p><p>In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, <i>The Dangers of Shadow IT</i>. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman’s session aims to shed light on this issue and equip attendees with strategies to address it effectively.</p><p><strong>Understanding Shadow IT and Its Risks</strong></p><p>Bowman explains that Shadow IT is more than just an inconvenience—it’s a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.</p><p>One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.</p><p>Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.</p><p><strong>Zero Trust as a Mindset</strong></p><p>A recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it’s a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.</p><p>This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.</p><p><strong>Practical Strategies to Combat Shadow IT</strong></p><p>Bowman’s session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:</p><p>• <strong>Identifying and monitoring unauthorized applications</strong> within their organization</p><p>• <strong>Implementing policies and security controls</strong> that balance security with user needs</p><p>• <strong>Enhancing employee engagement and education</strong> to prevent unauthorized technology use</p><p>• <strong>Leveraging solutions like ThreatLocker</strong> to enforce security policies while maintaining operational efficiency</p><p>Bowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.</p><p><strong>Why This Session Matters</strong></p><p>With organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman’s session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.</p><p>Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.</p><p>For those interested in staying ahead of security challenges, attending Bowman’s session on <strong>The Dangers of Shadow IT</strong> is a must.</p><p><strong>Guest: Ryan Bowman</strong>, VP of Solutions Engineering, ThreatLocker [<a href="https://x.com/ThreatLocker" target="_blank">@ThreatLocker</a> | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-bowman-3358a71b/" target="_blank">https://www.linkedin.com/in/ryan-bowman-3358a71b/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22629656" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8e16ecdc-065a-48a5-99b4-0bb21b7f128f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8e16ecdc-065a-48a5-99b4-0bb21b7f128f&amp;feed=2M86zCcc"/>
      <itunes:title>Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Bowman</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:34</itunes:duration>
      <itunes:summary>In this episode of On Location with Sean and Marco, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, breaks down the growing risks of Shadow IT—unauthorized applications and tools that create security gaps, operational inefficiencies, and compliance challenges. With real-world insights and practical strategies, Bowman explains how organizations can adopt a Zero Trust mindset to mitigate these risks while balancing security and productivity.</itunes:summary>
      <itunes:subtitle>In this episode of On Location with Sean and Marco, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, breaks down the growing risks of Shadow IT—unauthorized applications and tools that create security gaps, operational inefficiencies, and compliance challenges. With real-world insights and practical strategies, Bowman explains how organizations can adopt a Zero Trust mindset to mitigate these risks while balancing security and productivity.</itunes:subtitle>
      <itunes:keywords>compliance, security conference, marco ciappelli, network security, cybersecurity podcast, sean martin, endpoint protection, cybersecurity, redefining cybersecurity, data security, threatlocker, risk management, ryan bowman, information security, shadow it, access control, security strategy, security policies, zero trust, technology management, redefining cybersecurity podcast, cyber threats, security operations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>176</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cfaf1654-d21c-410d-98bd-4b9e63772ee3</guid>
      <title>The Ultimate 2025 Tech &amp; Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.</p><p><strong>Key Industry Events</strong></p><p>The year’s schedule includes cornerstone cybersecurity conferences such as <strong>RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas</strong>. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.</p><p><strong>Expanding Coverage Beyond Cybersecurity</strong></p><p>Beyond security-focused events, the team is covering <strong>NAMM 2025</strong>, a leading music and technology conference, and <strong>Legal Week in New York</strong>, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.</p><p>For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.</p><p>Learn about Event Briefings: <a href="https://www.itspmagazine.com/event-coverage-briefings" target="_blank">https://www.itspmagazine.com/event-coverage-briefings</a></p><p>Learn about the Event Coverage Sponsorship Bundle: <a href="https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings" target="_blank">https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>This Episode’s Sponsor: </strong>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>Resources</strong></p><p>The Business Newsletter: <a href="https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-" target="_blank">https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-</a></p><p>RSA Conference 2025: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Black Hat USA 2025: <a href="https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas" target="_blank">https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas</a></p><p>Infosecurity Europe 2025: <a href="https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage" target="_blank">https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage</a></p><p>All of our planned On Location event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Feb 2025 16:10:13 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-ultimate-2025-tech-cybersecurity-event-guide-where-to-be-on-location-coverage-with-sean-martin-and-marco-ciappelli-tR2rnoJl</link>
      <content:encoded><![CDATA[<p>ITSPmagazine is gearing up for another year of in-depth event coverage, bringing insights from industry leaders, innovators, and companies making an impact in cybersecurity, technology, and society. Sean Martin and Marco Ciappelli outline their plans for 2025, emphasizing a mix of established conferences and new opportunities to highlight emerging discussions.</p><p><strong>Key Industry Events</strong></p><p>The year’s schedule includes cornerstone cybersecurity conferences such as <strong>RSA Conference in San Francisco, Infosecurity Europe in London, and Black Hat in Las Vegas</strong>. These events serve as major platforms for discussing industry trends, launching new products, and showcasing research. Through editorial coverage, interviews, and discussions, ITSP Magazine provides perspectives from keynote speakers, panelists, and organizations shaping the field.</p><p><strong>Expanding Coverage Beyond Cybersecurity</strong></p><p>Beyond security-focused events, the team is covering <strong>NAMM 2025</strong>, a leading music and technology conference, and <strong>Legal Week in New York</strong>, where legal, policy, and AI discussions intersect. Other major tech gatherings include CES, VivaTech, and KIMS, broadening the conversation to industries influencing the digital landscape.</p><p>For companies looking to share their stories at these events, ITSP Magazine is offering sponsorship opportunities and editorial coverage. Stay tuned for updates, and catch ITSP Magazine on location throughout the year.</p><p>Learn about Event Briefings: <a href="https://www.itspmagazine.com/event-coverage-briefings" target="_blank">https://www.itspmagazine.com/event-coverage-briefings</a></p><p>Learn about the Event Coverage Sponsorship Bundle: <a href="https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings" target="_blank">https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>This Episode’s Sponsor: </strong>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>Resources</strong></p><p>The Business Newsletter: <a href="https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-" target="_blank">https://www.itspmagazine.com/campaigns/view-campaign/4GZV4Nk80T4jGaFCG6wZZXFhO1wa91_1AeZOznFKw-qJhYFt14gJ1lyUvtlfhpABey1BbwWbzLzj-wkwtsauLPtoWbDsmyr-</a></p><p>RSA Conference 2025: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Black Hat USA 2025: <a href="https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas" target="_blank">https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegas</a></p><p>Infosecurity Europe 2025: <a href="https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage" target="_blank">https://www.itspmagazine.com/infosecurity-europe-2025-infosec-london-cybersecurity-event-coverage</a></p><p>All of our planned On Location event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="11190950" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4d498219-a668-40af-a49c-7b8213caf5fa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4d498219-a668-40af-a49c-7b8213caf5fa&amp;feed=2M86zCcc"/>
      <itunes:title>The Ultimate 2025 Tech &amp; Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Sean Martin, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/99272eca-d443-4c17-81ba-4a6ff396ac90/3000x3000/on-20location-20-20podcast-20cover-20-203500x3500-3.jpg?aid=rss_feed"/>
      <itunes:duration>00:11:39</itunes:duration>
      <itunes:summary>ITSPmagazine’s Sean Martin and Marco Ciappelli outline their event coverage plans for 2025, highlighting major cybersecurity conferences like RSA, Black Hat, and Infosecurity Europe, along with tech, legal, and industry-specific events shaping innovation. From on-location interviews to exclusive insights, they share how companies and thought leaders can amplify their stories and stay ahead of the conversation.</itunes:summary>
      <itunes:subtitle>ITSPmagazine’s Sean Martin and Marco Ciappelli outline their event coverage plans for 2025, highlighting major cybersecurity conferences like RSA, Black Hat, and Infosecurity Europe, along with tech, legal, and industry-specific events shaping innovation. From on-location interviews to exclusive insights, they share how companies and thought leaders can amplify their stories and stay ahead of the conversation.</itunes:subtitle>
      <itunes:keywords>compliance, thought leadership, technology, marco ciappelli, infosecurity europe, tech trends, networking, cybersecurity podcast, black hat, sean martin, rsa, cybersecurity, music technology, redefining cybersecurity, risk management, redefining society podcast, innovation, music evolves podcast, data protection, policy, security conferences, event coverage, legal tech, industry insights, creativity, regulation, ai, privacy, redefining cybersecurity podcast, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>175</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64897b22-8e66-4f34-9e84-114d590dcc17</guid>
      <title>Cyber Threat Research, Hands-On Labs, and a Challenge You Can’t Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a>, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year’s event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.</p><h3>The Growth of Zero Trust World</h3><p>Now in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company’s own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.</p><h3>What to Expect: Hands-On Learning and Key Discussions</h3><p>One of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker’s perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.</p><p>For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there’s something to gain from these hands-on labs.</p><h3>High-Profile Speakers and Industry Insights</h3><p>Beyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.</p><p>One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.</p><h3>Networking, Certification, and More</h3><p>Zero Trust World isn’t just about education—it’s also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.</p><p>A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.</p><h3>A Unique Capture the Flag Challenge</h3><p>For those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event’s commitment to real-world application of cybersecurity techniques.</p><h3>Join the Conversation</h3><p>With so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.</p><p>Whether you’re looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you’re attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.</p><p><strong>Guest: Kieran Human</strong>, Special Projects Engineer, ThreatLocker [<a href="https://x.com/ThreatLocker" target="_blank">@ThreatLocker</a> | On LinkedIn: <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 3 Feb 2025 16:43:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kieran Human)</author>
      <link>https://eventcoveragepodcast.com/episodes/cyber-threat-research-hands-on-labs-and-a-challenge-you-cant-afford-to-miss-a-zero-trust-world-conversation-with-kieran-human-on-location-coverage-with-sean-martin-and-marco-ciappelli-NtufK7Za</link>
      <content:encoded><![CDATA[<p><a href="https://itspm.ag/threat5mu1" target="_blank">Zero Trust World 2025</a>, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year’s event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.</p><h3>The Growth of Zero Trust World</h3><p>Now in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company’s own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.</p><h3>What to Expect: Hands-On Learning and Key Discussions</h3><p>One of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker’s perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.</p><p>For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there’s something to gain from these hands-on labs.</p><h3>High-Profile Speakers and Industry Insights</h3><p>Beyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.</p><p>One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.</p><h3>Networking, Certification, and More</h3><p>Zero Trust World isn’t just about education—it’s also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.</p><p>A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.</p><h3>A Unique Capture the Flag Challenge</h3><p>For those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event’s commitment to real-world application of cybersecurity techniques.</p><h3>Join the Conversation</h3><p>With so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.</p><p>Whether you’re looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you’re attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.</p><p><strong>Guest: Kieran Human</strong>, Special Projects Engineer, ThreatLocker [<a href="https://x.com/ThreatLocker" target="_blank">@ThreatLocker</a> | On LinkedIn: <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ZTW 2025 coverage: <a href="https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Register for Zero Trust World 2025: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage" target="_blank">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us" target="_blank">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22618396" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2b811c6e-3bec-45b6-8918-6839dc16f65f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2b811c6e-3bec-45b6-8918-6839dc16f65f&amp;feed=2M86zCcc"/>
      <itunes:title>Cyber Threat Research, Hands-On Labs, and a Challenge You Can’t Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kieran Human</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/a3121908-c33b-488f-a647-3d519cfcc3c2/3000x3000/zero-20trust-202025-20orlando-20with-20threatlocker-20-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:33</itunes:duration>
      <itunes:summary>Zero Trust World 2025 is bringing IT professionals, business leaders, and security practitioners together for hands-on hacking labs, expert-led sessions, and high-profile keynotes on the future of cybersecurity. In this episode, Sean Martin and Marco Ciappelli preview the must-attend event with Kieran Human, exploring the interactive experiences, networking opportunities, and cutting-edge discussions that make this conference a standout.</itunes:summary>
      <itunes:subtitle>Zero Trust World 2025 is bringing IT professionals, business leaders, and security practitioners together for hands-on hacking labs, expert-led sessions, and high-profile keynotes on the future of cybersecurity. In this episode, Sean Martin and Marco Ciappelli preview the must-attend event with Kieran Human, exploring the interactive experiences, networking opportunities, and cutting-edge discussions that make this conference a standout.</itunes:subtitle>
      <itunes:keywords>security conference, marco ciappelli, network security, hacking, cybersecurity podcast, sean martin, cyber hero, cybersecurity, redefining cybersecurity, threatlocker, risk management, endpoint security, malware, data protection, on location podcast, ethical hacking, cyber resilience, shadow it, zero trust, security training, kieran human, redefining cybersecurity podcast, cyber threats, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>174</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71156f56-94fd-4ed0-a5d3-227d1dc814e1</guid>
      <title>Music Evolves Podcast Debut: Exploring Music’s Evolution Through Technology, Creativity, and Innovation | A Conversation with Marco Ciappelli | Music Evolves with Sean Martin</title>
      <description><![CDATA[<h2><strong>Guests and Host</strong></h2><p><strong>Guest: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><h2><strong>Show Notes</strong></h2><p>The first episode of <i>Music Evolves</i> with host Sean Martin sets the tone for an exciting exploration of the intersection of music and technology. Kicking things off with a discussion of the NAMM (National Association of Music Merchants) Show, this episode covers how musicians, producers, and innovators are shaping the future of sound.</p><p><strong>Music Meets Technology</strong></p><p>From the resurgence of classic analog instruments to the latest AI-assisted music creation tools, technology continues to redefine how music is made, performed, and shared. Sean shares his firsthand experience at NAMM, where major brands and independent creators showcased groundbreaking advancements, including digital amplifiers that recreate vintage sounds, AI-driven music production tools, and innovations designed to break creative barriers.</p><p>One standout topic is how technology is making music creation more accessible. Companies are introducing tools that allow artists to experiment with sounds in ways that were once impossible without expensive studio setups. Instruments with built-in effects, digital modeling amps that maintain rich analog tones at lower volumes, and silent drum heads that allow musicians to practice in small apartments—all of these are making professional-quality music creation more attainable.</p><p><strong>The Role of AI in Music</strong></p><p>A key discussion point in this episode is the growing influence of artificial intelligence. AI-generated music isn’t just an experiment—it’s already shaping songwriting, production, and even performance. Some musicians use AI to refine lyrics, generate melodies, or experiment with new sonic textures. But with this innovation comes debate. Can AI-generated music carry the same emotional depth as human-created work? And how does this impact authenticity in songwriting and performance?</p><p>NAMM also brought attention to ethical concerns surrounding AI, with Roland and Universal Music Group unveiling an initiative to address fair use, artist rights, and responsible AI implementation in music. As AI continues to evolve, these discussions will be critical in determining its role in the industry.</p><p><strong>Preserving the Classics While Pushing Boundaries</strong></p><p>Despite all the technological advancements, there remains a strong nostalgia for classic sounds. This balance between innovation and tradition was evident at NAMM, where artists and engineers worked to preserve vintage tones while enhancing their usability for modern musicians. Companies are now blending analog warmth with digital precision, allowing musicians to replicate legendary sounds without the constraints of older hardware.</p><p>Sean also touches on the impact of these advancements on performance. Portable gear with built-in looping and effects is allowing musicians to push creative limits, while innovations in live sound engineering are making it possible to replicate studio-quality mixes on stage.</p><p><strong>More to Come on Music Evolves</strong></p><p>This episode sets the stage for a series that will dive deep into how technology is changing the way music is created, performed, and consumed. Future episodes will explore everything from sound engineering and music education to AI composition and new performance technologies.</p><p>For those passionate about music and its ever-expanding possibilities, <i>Music Evolves</i> offers a fresh perspective on how creativity and technology intersect. Be sure to listen to the full episode to hear firsthand insights from NAMM and stay tuned for upcoming discussions with musicians, engineers, and industry leaders shaping the future of sound.</p><h2><strong>Sponsors</strong></h2><p>Are you interested in sponsoring this show or running ad placement in the podcast?</p><p><strong>Sponsorship</strong> 👉 <a href="https://itspm.ag/annual-sponsorship" target="_blank">https://itspm.ag/annual-sponsorship</a></p><p><strong>Ad Placement</strong> 👉 <a href="https://itspm.ag/podadplc">https://itspm.ag/podadplc</a></p><h2><strong>Resources</strong></h2><p>More The 2025 NAMM Show Coverage: <a href="https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california" target="_blank">https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california</a></p><p>Music Evolves: Sonic Frontiers Newsletter | The 2025 NAMM Show: Honoring Tradition, Pioneering the Future: <a href="https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/" target="_blank">https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 2 Feb 2025 04:30:29 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/music-evolves-podcast-debut-exploring-musics-evolution-through-technology-creativity-and-innovation-a-conversation-with-marco-ciappelli-music-evolves-with-sean-martin-y7_kZsCY</link>
      <content:encoded><![CDATA[<h2><strong>Guests and Host</strong></h2><p><strong>Guest: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><h2><strong>Show Notes</strong></h2><p>The first episode of <i>Music Evolves</i> with host Sean Martin sets the tone for an exciting exploration of the intersection of music and technology. Kicking things off with a discussion of the NAMM (National Association of Music Merchants) Show, this episode covers how musicians, producers, and innovators are shaping the future of sound.</p><p><strong>Music Meets Technology</strong></p><p>From the resurgence of classic analog instruments to the latest AI-assisted music creation tools, technology continues to redefine how music is made, performed, and shared. Sean shares his firsthand experience at NAMM, where major brands and independent creators showcased groundbreaking advancements, including digital amplifiers that recreate vintage sounds, AI-driven music production tools, and innovations designed to break creative barriers.</p><p>One standout topic is how technology is making music creation more accessible. Companies are introducing tools that allow artists to experiment with sounds in ways that were once impossible without expensive studio setups. Instruments with built-in effects, digital modeling amps that maintain rich analog tones at lower volumes, and silent drum heads that allow musicians to practice in small apartments—all of these are making professional-quality music creation more attainable.</p><p><strong>The Role of AI in Music</strong></p><p>A key discussion point in this episode is the growing influence of artificial intelligence. AI-generated music isn’t just an experiment—it’s already shaping songwriting, production, and even performance. Some musicians use AI to refine lyrics, generate melodies, or experiment with new sonic textures. But with this innovation comes debate. Can AI-generated music carry the same emotional depth as human-created work? And how does this impact authenticity in songwriting and performance?</p><p>NAMM also brought attention to ethical concerns surrounding AI, with Roland and Universal Music Group unveiling an initiative to address fair use, artist rights, and responsible AI implementation in music. As AI continues to evolve, these discussions will be critical in determining its role in the industry.</p><p><strong>Preserving the Classics While Pushing Boundaries</strong></p><p>Despite all the technological advancements, there remains a strong nostalgia for classic sounds. This balance between innovation and tradition was evident at NAMM, where artists and engineers worked to preserve vintage tones while enhancing their usability for modern musicians. Companies are now blending analog warmth with digital precision, allowing musicians to replicate legendary sounds without the constraints of older hardware.</p><p>Sean also touches on the impact of these advancements on performance. Portable gear with built-in looping and effects is allowing musicians to push creative limits, while innovations in live sound engineering are making it possible to replicate studio-quality mixes on stage.</p><p><strong>More to Come on Music Evolves</strong></p><p>This episode sets the stage for a series that will dive deep into how technology is changing the way music is created, performed, and consumed. Future episodes will explore everything from sound engineering and music education to AI composition and new performance technologies.</p><p>For those passionate about music and its ever-expanding possibilities, <i>Music Evolves</i> offers a fresh perspective on how creativity and technology intersect. Be sure to listen to the full episode to hear firsthand insights from NAMM and stay tuned for upcoming discussions with musicians, engineers, and industry leaders shaping the future of sound.</p><h2><strong>Sponsors</strong></h2><p>Are you interested in sponsoring this show or running ad placement in the podcast?</p><p><strong>Sponsorship</strong> 👉 <a href="https://itspm.ag/annual-sponsorship" target="_blank">https://itspm.ag/annual-sponsorship</a></p><p><strong>Ad Placement</strong> 👉 <a href="https://itspm.ag/podadplc">https://itspm.ag/podadplc</a></p><h2><strong>Resources</strong></h2><p>More The 2025 NAMM Show Coverage: <a href="https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california" target="_blank">https://itspmagazine.com/the-2025-namm-show-namm-music-conference-music-technology-event-coverage-anaheim-california</a></p><p>Music Evolves: Sonic Frontiers Newsletter | The 2025 NAMM Show: Honoring Tradition, Pioneering the Future: <a href="https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/" target="_blank">https://www.linkedin.com/pulse/2025-namm-show-honoring-tradition-pioneering-future-sean-martin-6jcge/</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41938555" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4021538e-e471-4fce-b9f8-a14b903775df/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4021538e-e471-4fce-b9f8-a14b903775df&amp;feed=2M86zCcc"/>
      <itunes:title>Music Evolves Podcast Debut: Exploring Music’s Evolution Through Technology, Creativity, and Innovation | A Conversation with Marco Ciappelli | Music Evolves with Sean Martin</itunes:title>
      <itunes:author>Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/4fdcd844-520d-4092-987a-d3d1fd653c07/3000x3000/the-20namm-20show-202025-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:43:41</itunes:duration>
      <itunes:summary>The debut episode of Music Evolves explores how technology is transforming music creation, performance, and production, with insights from the NAMM Show on innovations like AI-assisted songwriting, digital modeling amps, and silent drum heads. Host Sean Martin dives into the balance between preserving classic sounds and pushing creative boundaries, setting the stage for a series that uncovers the future of music.</itunes:summary>
      <itunes:subtitle>The debut episode of Music Evolves explores how technology is transforming music creation, performance, and production, with insights from the NAMM Show on innovations like AI-assisted songwriting, digital modeling amps, and silent drum heads. Host Sean Martin dives into the balance between preserving classic sounds and pushing creative boundaries, setting the stage for a series that uncovers the future of music.</itunes:subtitle>
      <itunes:keywords>production, technology, marco ciappelli, amplifiers, music, audio engineering, synthesizers, sound design, sean martin, music podcast, music industry, music technology, sound innovation, songwriting, innovation, music evolves podcast, audio tech, recording, electronic music, performance, digital music, drum machines, creativity, guitars, ai, namm, live music</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>173</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e889e190-380b-42fa-8bbd-32c36c6a63a9</guid>
      <title>CES 2025: Exploring Tech Innovation and Human-Centric Trends with Brian Comiskey, Senior Director of Innovation &amp; Trends | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Brian Comiskey</strong>, Senior Director of Innovation & Trends at CES</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brian-comiskey-futurist/" target="_blank">https://www.linkedin.com/in/brian-comiskey-futurist/</a></p><p><strong>Hosts: </strong></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br />On LinkedIn | <a href="https://www.linkedin.com/in/marco-ciappelli/" target="_blank">https://www.linkedin.com/in/marco-ciappelli/</a><br />WebSite | <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a><br />On LinkedIn | <a href="https://www.linkedin.com/in/imsmartin/" target="_blank">https://www.linkedin.com/in/imsmartin/</a><br />WebSite | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>CES 2025 is just around the corner, and what better way to dive into the upcoming event than with Brian Comiskey, Senior Director of Innovation and Trends and resident futurist at the Consumer Technology Association? In this special episode of <i>On Location</i>, I had the pleasure of speaking with Brian about what we can expect from this year’s CES, how it continues to shape the tech world, and what it means for all of us navigating a Hybrid Analog Digital Society.</p><p><strong>Setting the Tone for the Year in Tech</strong></p><p>As Brian pointed out, CES is not just an event—it’s the launchpad for the year’s tech trends. Taking place January 7-10 in Las Vegas, CES 2025 will be a massive showcase of innovation across countless industries, from artificial intelligence to mobility, digital health, energy solutions, and beyond.</p><p>This year’s theme, "Dive In," perfectly encapsulates the spirit of the event. It's not just about experiencing the surface level of emerging technologies but about going deeper—exploring how these advancements interact, converge, and shape our everyday lives. Whether you're an executive closing deals, a media professional discovering cutting-edge innovations, or a curious onlooker reading from afar, CES offers an opportunity to explore the tech-driven future.</p><p><strong>Human-Centric Innovation at Its Core</strong></p><p>CES has evolved from a purely consumer electronics show to something much broader. While enterprise solutions now account for nearly 40% of its exhibitors, the focus remains on human-centric innovation. As Brian aptly said, "Humans are not just consumers; they are patients, workers, collaborators, and creators." The technologies at CES aim to enhance our lives in all these roles.</p><p>Digital health is a prime example of this shift. This year, exhibitors in this category are moving to the Venetian campus alongside smart home, lifestyle tech, and accessibility solutions, highlighting how these technologies are converging to improve health, wellness, and longevity. From wearables that connect to your smart home to smart mirrors that monitor your mood, CES demonstrates how personalized, data-driven ecosystems can redefine daily living.</p><p><strong>The Evolution of Innovation</strong></p><p>Brian and I also discussed the nature of innovation, which he breaks down into two categories: evolutionary and revolutionary. CES showcases both. Evolutionary innovation involves incremental advances, like smarter AI chips in TVs that turn entertainment devices into command centers for your smart home or even tools for telehealth. Revolutionary innovation, on the other hand, includes breakthroughs like nuclear fusion and generative AI—transformations that redefine industries overnight.</p><p>This year, startups are expected to bring some of the most exciting stories. The Eureka Park pavilion will spotlight companies like Standard Energy, which is developing vanadium ion battery tiles for home energy storage, and Senergetics, which uses AI to predict and prevent corrosion in power plant pipes. Another standout is Glidance, an autonomous guide robot for individuals with low vision, showcasing how innovation can serve diverse needs and create new opportunities for accessibility.</p><p><strong>A Convergence of Ideas and Opportunities</strong></p><p>At its heart, CES is about connection—not just connecting devices but connecting people and ideas. It’s a place where startups meet industry giants, partnerships are forged, and new possibilities are imagined. As Brian highlighted, the show serves as both a showcase and a platform for collaboration, where the seeds of future innovations are planted.</p><p><strong>Wrapping It Up</strong></p><p>CES 2025 is more than a trade show—it’s a glimpse into the future of our coexistence with technology. As we prepare to dive into the event, one thing is clear: technology is no longer something we simply use. It’s a part of who we are and how we live.</p><p>I’ll leave you with this thought: CES isn’t just about what’s next; it’s about how we can work together to make what’s next even better.</p><p>Mark your calendars for January 7-10, and stay tuned for more conversations as Sean Martin and I bring you the latest stories <i>On Location</i>.</p><p>Subscribe, follow, and let’s explore the future together!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors </strong><br /><br />HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 24 Dec 2024 05:42:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Comiskey)</author>
      <link>https://eventcoveragepodcast.com/episodes/ces-2025-exploring-tech-innovation-and-human-centric-trends-with-brian-comiskey-senior-director-of-innovation-trends-on-location-coverage-with-sean-martin-and-marco-ciappelli-vJHoa_pj</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Brian Comiskey</strong>, Senior Director of Innovation & Trends at CES</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brian-comiskey-futurist/" target="_blank">https://www.linkedin.com/in/brian-comiskey-futurist/</a></p><p><strong>Hosts: </strong></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br />On LinkedIn | <a href="https://www.linkedin.com/in/marco-ciappelli/" target="_blank">https://www.linkedin.com/in/marco-ciappelli/</a><br />WebSite | <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a><br />On LinkedIn | <a href="https://www.linkedin.com/in/imsmartin/" target="_blank">https://www.linkedin.com/in/imsmartin/</a><br />WebSite | <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>CES 2025 is just around the corner, and what better way to dive into the upcoming event than with Brian Comiskey, Senior Director of Innovation and Trends and resident futurist at the Consumer Technology Association? In this special episode of <i>On Location</i>, I had the pleasure of speaking with Brian about what we can expect from this year’s CES, how it continues to shape the tech world, and what it means for all of us navigating a Hybrid Analog Digital Society.</p><p><strong>Setting the Tone for the Year in Tech</strong></p><p>As Brian pointed out, CES is not just an event—it’s the launchpad for the year’s tech trends. Taking place January 7-10 in Las Vegas, CES 2025 will be a massive showcase of innovation across countless industries, from artificial intelligence to mobility, digital health, energy solutions, and beyond.</p><p>This year’s theme, "Dive In," perfectly encapsulates the spirit of the event. It's not just about experiencing the surface level of emerging technologies but about going deeper—exploring how these advancements interact, converge, and shape our everyday lives. Whether you're an executive closing deals, a media professional discovering cutting-edge innovations, or a curious onlooker reading from afar, CES offers an opportunity to explore the tech-driven future.</p><p><strong>Human-Centric Innovation at Its Core</strong></p><p>CES has evolved from a purely consumer electronics show to something much broader. While enterprise solutions now account for nearly 40% of its exhibitors, the focus remains on human-centric innovation. As Brian aptly said, "Humans are not just consumers; they are patients, workers, collaborators, and creators." The technologies at CES aim to enhance our lives in all these roles.</p><p>Digital health is a prime example of this shift. This year, exhibitors in this category are moving to the Venetian campus alongside smart home, lifestyle tech, and accessibility solutions, highlighting how these technologies are converging to improve health, wellness, and longevity. From wearables that connect to your smart home to smart mirrors that monitor your mood, CES demonstrates how personalized, data-driven ecosystems can redefine daily living.</p><p><strong>The Evolution of Innovation</strong></p><p>Brian and I also discussed the nature of innovation, which he breaks down into two categories: evolutionary and revolutionary. CES showcases both. Evolutionary innovation involves incremental advances, like smarter AI chips in TVs that turn entertainment devices into command centers for your smart home or even tools for telehealth. Revolutionary innovation, on the other hand, includes breakthroughs like nuclear fusion and generative AI—transformations that redefine industries overnight.</p><p>This year, startups are expected to bring some of the most exciting stories. The Eureka Park pavilion will spotlight companies like Standard Energy, which is developing vanadium ion battery tiles for home energy storage, and Senergetics, which uses AI to predict and prevent corrosion in power plant pipes. Another standout is Glidance, an autonomous guide robot for individuals with low vision, showcasing how innovation can serve diverse needs and create new opportunities for accessibility.</p><p><strong>A Convergence of Ideas and Opportunities</strong></p><p>At its heart, CES is about connection—not just connecting devices but connecting people and ideas. It’s a place where startups meet industry giants, partnerships are forged, and new possibilities are imagined. As Brian highlighted, the show serves as both a showcase and a platform for collaboration, where the seeds of future innovations are planted.</p><p><strong>Wrapping It Up</strong></p><p>CES 2025 is more than a trade show—it’s a glimpse into the future of our coexistence with technology. As we prepare to dive into the event, one thing is clear: technology is no longer something we simply use. It’s a part of who we are and how we live.</p><p>I’ll leave you with this thought: CES isn’t just about what’s next; it’s about how we can work together to make what’s next even better.</p><p>Mark your calendars for January 7-10, and stay tuned for more conversations as Sean Martin and I bring you the latest stories <i>On Location</i>.</p><p>Subscribe, follow, and let’s explore the future together!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors </strong><br /><br />HITRUST: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30600566" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/0d35233a-19f2-485d-a147-3bfa64fd61b5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=0d35233a-19f2-485d-a147-3bfa64fd61b5&amp;feed=2M86zCcc"/>
      <itunes:title>CES 2025: Exploring Tech Innovation and Human-Centric Trends with Brian Comiskey, Senior Director of Innovation &amp; Trends | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Comiskey</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/af07731f-9829-4a19-b848-fd7da513cae2/3000x3000/ces-202025-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:52</itunes:duration>
      <itunes:summary>Brian Comiskey shares insights into CES 2025’s transformative technologies, human-centric innovation, and groundbreaking trends shaping our future.
</itunes:summary>
      <itunes:subtitle>Brian Comiskey shares insights into CES 2025’s transformative technologies, human-centric innovation, and groundbreaking trends shaping our future.
</itunes:subtitle>
      <itunes:keywords>human-centric technology, tech showcase, tech predictions 2025., wearable technology, smart devices, longevity solutions, ces 2025, digital health, futuristic trends, brian comiskey, energy solutions, ai advancements, tech convergence, accessibility innovation, innovation trends, ces keynote speakers, mobility tech, smart home, consumer technology association, eureka park startups</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>172</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4b6971f2-36aa-4cd6-89b2-04c41e5bea30</guid>
      <title>Rebalancing Cyber Security: Prioritizing Response and Recovery in Governance | An Australian Cyber Conference 2024 in Melbourne Conversation with Asaf Dori and Ashwin Pal | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Asaf Dori</strong>, Cyber Security Lead, Healthshare NSW</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adori/">https://www.linkedin.com/in/adori/</a></p><p><strong>Ashwin Pal</strong>, Partner – Cyber Security and Privacy Services, RSM Australia</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ashwin-pal-a1769a5/">https://www.linkedin.com/in/ashwin-pal-a1769a5/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At the AISA CyberCon 2024 in Melbourne, Sean Martin sat down with Asaf Dori and Ashwin Pal to explore the often-overlooked areas of the NIST Cybersecurity Framework: response and recovery. Both guests highlighted the critical gaps organizations face in these domains and shared practical insights on addressing them.</p><p>Asaf Dori, a cybersecurity professional in healthcare and a researcher at the University of Sydney, underscored the need for governance-driven awareness to improve response and recovery capabilities. His research revealed that while organizations invest heavily in prevention and detection, they frequently neglect robust recovery plans. He emphasized the importance of comprehensive disaster recovery exercises over isolated system-based approaches. By linking governance to practical outcomes, Dori argued that organizations could better align their strategies with business resilience.</p><p>Ashwin Pal, a partner at RSM with 26 years of experience in IT security, brought a field perspective, pointing out how recovery strategies often fail to meet business requirements. He discussed the disconnect between IT recovery metrics, such as RPOs and RTOs, and actual business needs. Pal noted that outdated assumptions about recovery timeframes and critical systems frequently result in misaligned priorities. He advocated for direct business engagement to establish recovery strategies that support operational continuity.</p><p>A key theme was the role of effective governance in fostering collaboration between IT and business stakeholders. Both speakers agreed that engaging business leaders through tabletop exercises is an essential starting point. Simulating ransomware scenarios, for instance, often exposes gaps in recovery plans, such as inaccessible continuity documents during a crisis. Such exercises, they suggested, empower CISOs to secure executive buy-in for strategic improvements.</p><p>The discussion also touched on the competitive advantages of robust cybersecurity practices. Dori noted that in some industries, such as energy, cybersecurity maturity is increasingly viewed as a differentiator in securing contracts. Pal echoed this, citing examples where certifications like ISO have become prerequisites in supply chain partnerships.</p><p>By reframing cybersecurity as a business enabler rather than a cost center, organizations can align their response and recovery strategies with broader operational goals. This shift requires CISOs and risk officers to lead conversations that translate technical requirements into business outcomes, emphasizing trust, resilience, and customer retention.</p><p>This dialogue provides actionable insights for leaders aiming to close the response and recovery gap and position cybersecurity as a strategic asset.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Dec 2024 02:14:57 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Asaf Dori, Ashwin Pal)</author>
      <link>https://eventcoveragepodcast.com/episodes/rebalancing-cyber-security-prioritizing-response-and-recovery-in-governance-an-australian-cyber-conference-2024-in-melbourne-conversation-with-asaf-dori-and-ashwin-pal-on-location-coverage-with-sean-martin-and-marco-ciappelli-e_pofrXY</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Asaf Dori</strong>, Cyber Security Lead, Healthshare NSW</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adori/">https://www.linkedin.com/in/adori/</a></p><p><strong>Ashwin Pal</strong>, Partner – Cyber Security and Privacy Services, RSM Australia</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ashwin-pal-a1769a5/">https://www.linkedin.com/in/ashwin-pal-a1769a5/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At the AISA CyberCon 2024 in Melbourne, Sean Martin sat down with Asaf Dori and Ashwin Pal to explore the often-overlooked areas of the NIST Cybersecurity Framework: response and recovery. Both guests highlighted the critical gaps organizations face in these domains and shared practical insights on addressing them.</p><p>Asaf Dori, a cybersecurity professional in healthcare and a researcher at the University of Sydney, underscored the need for governance-driven awareness to improve response and recovery capabilities. His research revealed that while organizations invest heavily in prevention and detection, they frequently neglect robust recovery plans. He emphasized the importance of comprehensive disaster recovery exercises over isolated system-based approaches. By linking governance to practical outcomes, Dori argued that organizations could better align their strategies with business resilience.</p><p>Ashwin Pal, a partner at RSM with 26 years of experience in IT security, brought a field perspective, pointing out how recovery strategies often fail to meet business requirements. He discussed the disconnect between IT recovery metrics, such as RPOs and RTOs, and actual business needs. Pal noted that outdated assumptions about recovery timeframes and critical systems frequently result in misaligned priorities. He advocated for direct business engagement to establish recovery strategies that support operational continuity.</p><p>A key theme was the role of effective governance in fostering collaboration between IT and business stakeholders. Both speakers agreed that engaging business leaders through tabletop exercises is an essential starting point. Simulating ransomware scenarios, for instance, often exposes gaps in recovery plans, such as inaccessible continuity documents during a crisis. Such exercises, they suggested, empower CISOs to secure executive buy-in for strategic improvements.</p><p>The discussion also touched on the competitive advantages of robust cybersecurity practices. Dori noted that in some industries, such as energy, cybersecurity maturity is increasingly viewed as a differentiator in securing contracts. Pal echoed this, citing examples where certifications like ISO have become prerequisites in supply chain partnerships.</p><p>By reframing cybersecurity as a business enabler rather than a cost center, organizations can align their response and recovery strategies with broader operational goals. This shift requires CISOs and risk officers to lead conversations that translate technical requirements into business outcomes, emphasizing trust, resilience, and customer retention.</p><p>This dialogue provides actionable insights for leaders aiming to close the response and recovery gap and position cybersecurity as a strategic asset.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27462129" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3f6d978e-6970-4914-a2d4-d3f1c8608813/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3f6d978e-6970-4914-a2d4-d3f1c8608813&amp;feed=2M86zCcc"/>
      <itunes:title>Rebalancing Cyber Security: Prioritizing Response and Recovery in Governance | An Australian Cyber Conference 2024 in Melbourne Conversation with Asaf Dori and Ashwin Pal | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Asaf Dori, Ashwin Pal</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:36</itunes:duration>
      <itunes:summary>Discover how Asaf Dori and Ashwin Pal unravel the often-overlooked gaps in cybersecurity response and recovery, sharing practical strategies to bridge the divide between IT and business needs. Learn how aligning recovery plans with operational goals can transform cybersecurity from a cost center into a competitive advantage.</itunes:summary>
      <itunes:subtitle>Discover how Asaf Dori and Ashwin Pal unravel the often-overlooked gaps in cybersecurity response and recovery, sharing practical strategies to bridge the divide between IT and business needs. Learn how aligning recovery plans with operational goals can transform cybersecurity from a cost center into a competitive advantage.</itunes:subtitle>
      <itunes:keywords>continuity, incident, melbourne cybersecurity event, marco ciappelli, tabletop, sean martin, response, aisa, australian cyber conference 2024, framework, cybersecurity, business, conference, nist, redefining cybersecurity, melbourne tech events, melbourne, resilience, asaf dori, ransomware, ashwin pal, podcast, strategy, melbourne cyber conference, risk, itspmagazine, australian cyber conference, recovery, cybercon, governance, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>171</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">024e9109-c048-45a4-bb0e-4c41c7c5ef6c</guid>
      <title>The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Ravi Nayyar</strong>, PhD Scholar, The University Of Sydney</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stillromancingwithlife/" target="_blank">https://www.linkedin.com/in/stillromancingwithlife/</a></p><p>At AISA AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3" target="_blank">https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.</p><p><strong>The Cyber Zoo: Ravi Nayyar’s Research Focus</strong></p><p>Ravi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.</p><p><strong>The Role of Humans in Cybersecurity</strong></p><p>At the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.</p><p><strong>The Case for Stronger Cyber Laws</strong></p><p>Ravi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.</p><p><strong>Global Cooperation and the Fight Against Regulatory Arbitrage</strong></p><p>The discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.</p><p><strong>Incentivizing Secure Practices</strong></p><p>Delving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.</p><p><strong>Closing Thoughts: Collaboration for a Safer Digital World</strong></p><p>Sean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The theory of saving the world: Intervention requests and critical infrastructure: <a href="https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNrifl">https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNrifl</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Dec 2024 01:35:13 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ravi Nayyar)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-theory-of-saving-the-world-intervention-requests-and-critical-infrastructure-an-australian-cyber-conference-2024-in-melbourne-conversation-with-ravi-nayyar-on-location-coverage-with-sean-martin-and-marco-ciappelli-zzj0tmKh</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ravi Nayyar</strong>, PhD Scholar, The University Of Sydney</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stillromancingwithlife/" target="_blank">https://www.linkedin.com/in/stillromancingwithlife/</a></p><p>At AISA AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3" target="_blank">https://melbourne2024.cyberconference.com.au/speakers/ravi-nayyar-uyhe3</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The discussion begins with a unique and lighthearted analogy: comparing cybersecurity professionals to superheroes. Marco draws parallels to characters like “The Avengers” and “Deadpool,” describing them as defenders of our digital world. Ravi builds on this playful yet thought-provoking metaphor, likening the fight against cybercriminals to epic battles against villains, highlighting the high stakes of cybersecurity in critical systems.</p><p><strong>The Cyber Zoo: Ravi Nayyar’s Research Focus</strong></p><p>Ravi introduces his research, focusing on the regulation of cyber resilience within critical infrastructure, particularly the software supply chain. Using the metaphor of a “zoo,” he paints a vivid picture of the cybersecurity ecosystem, where diverse stakeholders—government bodies, infrastructure operators, and software vendors—must coexist and collaborate. His work delves into how companies can be held accountable for their cyber practices, aiming to secure national and global systems.</p><p><strong>The Role of Humans in Cybersecurity</strong></p><p>At the heart of cybersecurity, Ravi emphasizes, is the human element. His research highlights the need for incentivizing all players—critical infrastructure operators, software developers, and even end users—to embed secure practices into their operations. It's not just about rules and frameworks but about fostering a culture of responsibility and collaboration in an interconnected world.</p><p><strong>The Case for Stronger Cyber Laws</strong></p><p>Ravi critiques the historically relaxed approach to regulating software security, particularly for critical systems, and advocates for stronger, standardized laws. He compares cybersecurity frameworks to those used for medical devices, which are rigorously regulated for public safety. By adopting similar models, critical software could be held to higher standards, reducing risks to national security.</p><p><strong>Global Cooperation and the Fight Against Regulatory Arbitrage</strong></p><p>The discussion shifts to the need for international collaboration in cybersecurity. Ravi underscores the risk of regulatory arbitrage, where companies exploit weaker laws in certain regions to save costs. He proposes global coalitions and standardization bodies as potential solutions to ensure consistent and robust security practices worldwide.</p><p><strong>Incentivizing Secure Practices</strong></p><p>Delving into the practical side of regulation, Ravi discusses ways to incentivize companies to adopt secure practices. From procurement policies favoring vendors with strong cybersecurity commitments to the potential for class action lawsuits, the conversation explores the multifaceted strategies needed to hold organizations accountable and foster a safer digital ecosystem.</p><p><strong>Closing Thoughts: Collaboration for a Safer Digital World</strong></p><p>Sean, Marco, and Ravi wrap up the episode by emphasizing the critical need for cross-sector collaboration—between academia, industry, media, and government—to tackle the evolving challenges of cybersecurity. By raising public awareness and encouraging proactive measures, they highlight the importance of a unified effort to secure our digital infrastructure.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The theory of saving the world: Intervention requests and critical infrastructure: <a href="https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNrifl">https://melbourne2024.cyberconference.com.au/sessions/session-eI6eYNrifl</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24998657" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bb893824-a27b-43f4-b961-83e3d1cc79ab/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bb893824-a27b-43f4-b961-83e3d1cc79ab&amp;feed=2M86zCcc"/>
      <itunes:title>The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ravi Nayyar</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:02</itunes:duration>
      <itunes:summary>In this live episode from the Australian Cyber Conference 2024 in Melbourne, Sean Martin and Marco Ciappelli sit down with Ravi Nayyar, a PhD scholar from the University of Sydney, to explore the critical challenges and solutions in cybersecurity for critical infrastructure. Together, they tackle topics ranging from metaphorical superheroes to the pressing need for global regulatory frameworks.</itunes:summary>
      <itunes:subtitle>In this live episode from the Australian Cyber Conference 2024 in Melbourne, Sean Martin and Marco Ciappelli sit down with Ravi Nayyar, a PhD scholar from the University of Sydney, to explore the critical challenges and solutions in cybersecurity for critical infrastructure. Together, they tackle topics ranging from metaphorical superheroes to the pressing need for global regulatory frameworks.</itunes:subtitle>
      <itunes:keywords>critical infrastructure, iso standards, melbourne cybersecurity event, superhero analogy in cybersecurity, marco ciappelli, melbourne 2024, global security, digital safety, sean martin, australian cyber conference 2024, cybersecurity, cybersecurity, conference, redefining cybersecurity, university of sydney, melbourne tech events, cyber policy, melbourne, cyber awareness, podcast, cyber resilience, melbourne cyber conference, software supply chain, cyber regulations, ravi nayyar, itspmagazine, itspmagazine, australian cyber conference, cyber threats, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>170</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ecb9b685-e61c-4052-8d0e-4927d1a15209</guid>
      <title>From Melbourne to the World: Recap, Highlights and the importance of Human Connections in a Digital Connected Society | An Australian Cyber Conference 2024 in Melbourne Conversation with Akash Mittal | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Akash Mittal</strong>, Chair, Australian Information Security Association (AISA)</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akashgmittal/">https://www.linkedin.com/in/akashgmittal/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Throughout the conference, one theme stood out above all: the power of community. Akash reflected on how CyberCon fosters a collective effort to strengthen Australia’s cyber resilience by uniting government, academia, and industry under one roof. From keynote presentations to impromptu hallway conversations, the conference showcased how innovation and human connection go hand in hand to address global cybersecurity challenges.</p><p><strong>The Block Party and Beyond</strong></p><p>One of the most talked-about moments was the renowned <strong>Block Party</strong>, a celebration that blurred the line between networking and friendship. Marco described it as a unique experience that left a lasting impression on attendees. Beyond the lively gatherings, the conference also stood out for its ability to create a space where meaningful connections and ideas flourished—whether on the exhibition floor, during panel discussions, or at informal meetups.</p><p><strong>Looking Ahead: The Future of CyberCon</strong></p><p>As the conference came to a close, Akash shared an exciting vision for what lies ahead. With an ethos of continuous improvement, the organizing team is committed to delivering even more impactful experiences in the years to come. Feedback from attendees will play a vital role in shaping future events, ensuring CyberCon remains at the forefront of the cybersecurity community.</p><p><strong>Highlights from the Exhibition Hall</strong></p><p>The buzzing exhibition hall served as the heart of CyberCon 2024, brimming with energy and engagement. Sean and Marco noted how sponsors and vendors played a pivotal role, sparking conversations about cutting-edge solutions and driving collaboration across sectors. The hall wasn’t just about showcasing products—it became a space for dialogue, exploration, and innovation.</p><p><strong>A Legacy of Success</strong></p><p>CyberCon 2024 was more than just a cybersecurity conference—it was a celebration of the community that makes progress possible. The dedication of volunteers and the meticulous planning behind the scenes ensured the event’s success. As Akash noted, the conference continues to evolve as a space where quality content and genuine connections take center stage.</p><p><strong>Closing Thoughts: A United Community</strong></p><p>As Sean, Marco, and Akash wrapped up their time at the Australian Cyber Conference 2024, they reflected on what made the event truly special: its people. The conversations, collaborations, and shared sense of purpose have set the stage for a brighter, more connected future in cybersecurity. Melbourne’s vibrant energy was the perfect backdrop for a conference that reminded us all that innovation is strongest when it’s rooted in community.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 6 Dec 2024 05:56:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Akash Mittal)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-melbourne-to-the-world-recap-highlights-and-the-importance-of-human-connections-in-a-digital-connected-society-an-australian-cyber-conference-2024-in-melbourne-conversation-with-akash-mittal-on-location-coverage-yk4oQapV</link>
      <content:encoded><![CDATA[<p><strong>Guest: Akash Mittal</strong>, Chair, Australian Information Security Association (AISA)</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akashgmittal/">https://www.linkedin.com/in/akashgmittal/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Throughout the conference, one theme stood out above all: the power of community. Akash reflected on how CyberCon fosters a collective effort to strengthen Australia’s cyber resilience by uniting government, academia, and industry under one roof. From keynote presentations to impromptu hallway conversations, the conference showcased how innovation and human connection go hand in hand to address global cybersecurity challenges.</p><p><strong>The Block Party and Beyond</strong></p><p>One of the most talked-about moments was the renowned <strong>Block Party</strong>, a celebration that blurred the line between networking and friendship. Marco described it as a unique experience that left a lasting impression on attendees. Beyond the lively gatherings, the conference also stood out for its ability to create a space where meaningful connections and ideas flourished—whether on the exhibition floor, during panel discussions, or at informal meetups.</p><p><strong>Looking Ahead: The Future of CyberCon</strong></p><p>As the conference came to a close, Akash shared an exciting vision for what lies ahead. With an ethos of continuous improvement, the organizing team is committed to delivering even more impactful experiences in the years to come. Feedback from attendees will play a vital role in shaping future events, ensuring CyberCon remains at the forefront of the cybersecurity community.</p><p><strong>Highlights from the Exhibition Hall</strong></p><p>The buzzing exhibition hall served as the heart of CyberCon 2024, brimming with energy and engagement. Sean and Marco noted how sponsors and vendors played a pivotal role, sparking conversations about cutting-edge solutions and driving collaboration across sectors. The hall wasn’t just about showcasing products—it became a space for dialogue, exploration, and innovation.</p><p><strong>A Legacy of Success</strong></p><p>CyberCon 2024 was more than just a cybersecurity conference—it was a celebration of the community that makes progress possible. The dedication of volunteers and the meticulous planning behind the scenes ensured the event’s success. As Akash noted, the conference continues to evolve as a space where quality content and genuine connections take center stage.</p><p><strong>Closing Thoughts: A United Community</strong></p><p>As Sean, Marco, and Akash wrapped up their time at the Australian Cyber Conference 2024, they reflected on what made the event truly special: its people. The conversations, collaborations, and shared sense of purpose have set the stage for a brighter, more connected future in cybersecurity. Melbourne’s vibrant energy was the perfect backdrop for a conference that reminded us all that innovation is strongest when it’s rooted in community.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="12338679" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c1b794c0-b39e-4d5c-9b41-2198bcfef776/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c1b794c0-b39e-4d5c-9b41-2198bcfef776&amp;feed=2M86zCcc"/>
      <itunes:title>From Melbourne to the World: Recap, Highlights and the importance of Human Connections in a Digital Connected Society | An Australian Cyber Conference 2024 in Melbourne Conversation with Akash Mittal | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Akash Mittal</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:12:51</itunes:duration>
      <itunes:summary>The Australian Cyber Conference 2024 in Melbourne wrapped up another successful year, bringing together experts, innovators, and leaders from across industries to address the most pressing challenges and opportunities in cybersecurity. Sean Martin and Marco Ciappelli teamed up with special guest Akash Mittal to capture the highlights, insights, and spirit of collaboration that defined this year’s event.</itunes:summary>
      <itunes:subtitle>The Australian Cyber Conference 2024 in Melbourne wrapped up another successful year, bringing together experts, innovators, and leaders from across industries to address the most pressing challenges and opportunities in cybersecurity. Sean Martin and Marco Ciappelli teamed up with special guest Akash Mittal to capture the highlights, insights, and spirit of collaboration that defined this year’s event.</itunes:subtitle>
      <itunes:keywords>melbourne cybersecurity event, akash mittal, marco ciappelli, academia, community in cybersecurity, sean martin, human connections in tech, future of cybersecurity, australian cyber conference 2024, cybersecurity, cybersecurity, cyber resilience australia, technology conferences australia, conference, redefining cybersecurity, melbourne tech events, cybersecurity networking, melbourne, melbourne cyber events, and industry collaboration, podcast, cybercon block party, cybercon 2024, melbourne cyber conference, government, itspmagazine, cybersecurity innovation, australian cyber conference, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>169</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bc6c8e40-a3de-4db1-a605-eebbf37b7ac5</guid>
      <title>Securing Digital Legacies: Ethical Challenges and Insights Based on a True Story | An Australian Cyber Conference 2024 in Melbourne Conversation with Peter Gigengack | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Peter Gigengack</strong>, Director Cyber Security, Capability, Department of Premier and Cabinet of WA</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/peter-gigengack/">https://www.linkedin.com/in/peter-gigengack/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The digital era has reshaped nearly every aspect of our lives, but it has also introduced new challenges to end-of-life planning. Peter Gigengack shares his insights on this pressing issue, recounting how he navigated the emotional and logistical hurdles of managing a loved one’s digital footprint after their passing.</p><p><strong>A Personal Story of Loss and Discovery</strong><br />Peter's journey into the realm of digital legacies began when his elderly relative, "John," passed away. The family was left not only with John’s physical belongings but also his vast and complicated online presence.</p><p>Without access to passwords or guidance from John, the family faced a daunting task. Drawing on his technical expertise, Peter took the lead, discovering firsthand the difficulties that come with managing digital identities without preparation.</p><p><strong>Ethical and Legal Considerations</strong><br />The discussion moves into the ethical and legal complexities of managing digital legacies. Peter admits that while his family’s choices were driven by love and respect, they highlighted a significant gray area between honoring someone’s memory and navigating privacy laws.</p><p>These questions are universal: What rights do families have to access a loved one’s digital accounts? How can individuals protect their online presence while providing their families with the tools they need to manage it?</p><p><strong>Preparing for the Inevitable</strong><br />Sean and Marco discuss proactive steps, such as assigning digital heirs, securing access to critical accounts, and incorporating digital assets into estate planning. They also challenge technology providers to offer clearer solutions for managing digital legacies responsibly and ethically.</p><p>The conversation emphasizes the need for individuals to take ownership of their digital afterlives while advocating for systemic changes that ease the burden on grieving families.</p><p><strong>The Future of Digital Immortality</strong><br />The episode explores the broader implications of digital immortality. In an age where online personas often outlast their creators, society must grapple with how we remember, honor, and even interact with the deceased.</p><p>Marco, Sean, and Peter discuss potential technologies, like AI-driven tools that could simulate conversations with late loved ones, and the ethical dilemmas they may bring. The trio reflects on the balance between preserving memories and respecting boundaries in a rapidly advancing digital world.</p><p><strong>Key Takeaways</strong><br />Peter encourages families to have honest conversations about their digital legacies, ensuring everyone is prepared for life’s uncertainties. Sean underscores the cybersecurity perspective, drawing parallels to how businesses prepare for digital risks.</p><p>The episode ends with a call to action: Start planning your digital legacy today, and advocate for policies that simplify the process for future generations.</p><p><strong>Conclusion</strong><br />This episode tackles a timely and often overlooked topic, urging listeners to consider the impact of their digital footprints after death. Whether you're looking for practical guidance or contemplating the philosophical questions of digital immortality, the conversation offers valuable perspectives for navigating this evolving landscape.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 6 Dec 2024 05:20:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Peter Gigengack)</author>
      <link>https://eventcoveragepodcast.com/episodes/securing-digital-legacies-ethical-challenges-and-insights-based-on-a-true-story-an-australian-cyber-conference-2024-in-melbourne-conversation-with-peter-gigengack-on-location-coverage-with-sean-martin-and-marco-ciappelli-ZdRx6Wzu</link>
      <content:encoded><![CDATA[<p><strong>Guest: Peter Gigengack</strong>, Director Cyber Security, Capability, Department of Premier and Cabinet of WA</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/peter-gigengack/">https://www.linkedin.com/in/peter-gigengack/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The digital era has reshaped nearly every aspect of our lives, but it has also introduced new challenges to end-of-life planning. Peter Gigengack shares his insights on this pressing issue, recounting how he navigated the emotional and logistical hurdles of managing a loved one’s digital footprint after their passing.</p><p><strong>A Personal Story of Loss and Discovery</strong><br />Peter's journey into the realm of digital legacies began when his elderly relative, "John," passed away. The family was left not only with John’s physical belongings but also his vast and complicated online presence.</p><p>Without access to passwords or guidance from John, the family faced a daunting task. Drawing on his technical expertise, Peter took the lead, discovering firsthand the difficulties that come with managing digital identities without preparation.</p><p><strong>Ethical and Legal Considerations</strong><br />The discussion moves into the ethical and legal complexities of managing digital legacies. Peter admits that while his family’s choices were driven by love and respect, they highlighted a significant gray area between honoring someone’s memory and navigating privacy laws.</p><p>These questions are universal: What rights do families have to access a loved one’s digital accounts? How can individuals protect their online presence while providing their families with the tools they need to manage it?</p><p><strong>Preparing for the Inevitable</strong><br />Sean and Marco discuss proactive steps, such as assigning digital heirs, securing access to critical accounts, and incorporating digital assets into estate planning. They also challenge technology providers to offer clearer solutions for managing digital legacies responsibly and ethically.</p><p>The conversation emphasizes the need for individuals to take ownership of their digital afterlives while advocating for systemic changes that ease the burden on grieving families.</p><p><strong>The Future of Digital Immortality</strong><br />The episode explores the broader implications of digital immortality. In an age where online personas often outlast their creators, society must grapple with how we remember, honor, and even interact with the deceased.</p><p>Marco, Sean, and Peter discuss potential technologies, like AI-driven tools that could simulate conversations with late loved ones, and the ethical dilemmas they may bring. The trio reflects on the balance between preserving memories and respecting boundaries in a rapidly advancing digital world.</p><p><strong>Key Takeaways</strong><br />Peter encourages families to have honest conversations about their digital legacies, ensuring everyone is prepared for life’s uncertainties. Sean underscores the cybersecurity perspective, drawing parallels to how businesses prepare for digital risks.</p><p>The episode ends with a call to action: Start planning your digital legacy today, and advocate for policies that simplify the process for future generations.</p><p><strong>Conclusion</strong><br />This episode tackles a timely and often overlooked topic, urging listeners to consider the impact of their digital footprints after death. Whether you're looking for practical guidance or contemplating the philosophical questions of digital immortality, the conversation offers valuable perspectives for navigating this evolving landscape.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34048316" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a9d23ec4-42bc-45eb-be8e-1e3eb7d81e95/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a9d23ec4-42bc-45eb-be8e-1e3eb7d81e95&amp;feed=2M86zCcc"/>
      <itunes:title>Securing Digital Legacies: Ethical Challenges and Insights Based on a True Story | An Australian Cyber Conference 2024 in Melbourne Conversation with Peter Gigengack | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Peter Gigengack</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:27</itunes:duration>
      <itunes:summary>In this episode of On Location with Sean Martin and Marco Ciappelli, recorded live at the Australian Cyber Conference 2024 in Melbourne, hosts Marco Ciappelli and Sean Martin sit down with Peter Gigengack, cybersecurity director at Western Australia&apos;s Office of Digital Government. Together, they examine the personal, ethical, and societal complexities of managing digital legacies—our online identities and assets—after death.</itunes:summary>
      <itunes:subtitle>In this episode of On Location with Sean Martin and Marco Ciappelli, recorded live at the Australian Cyber Conference 2024 in Melbourne, hosts Marco Ciappelli and Sean Martin sit down with Peter Gigengack, cybersecurity director at Western Australia&apos;s Office of Digital Government. Together, they examine the personal, ethical, and societal complexities of managing digital legacies—our online identities and assets—after death.</itunes:subtitle>
      <itunes:keywords>melbourne cybersecurity event, ethical technology, marco ciappelli, sean martin, sean martin, future of technology, digital footprint, memorializing accounts, australian cyber conference 2024, cybersecurity, cybersecurity, conference, redefining cybersecurity, digital legacy, melbourne tech events, melbourne, podcast episode, technology and society, legacy planning, peter gigengack, online privacy, family technology planning, podcast, digital afterlife, melbourne cyber conference, itspmagazine, digital identity management, digital preparedness, australian cyber conference, cyber risks, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>168</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dc67904b-fa59-46b6-a1bb-1e12772ca4d2</guid>
      <title>Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech [<a href="https://twitter.com/InformaTechHQ" target="_blank">@InformaTechHQ</a>] and General Manager at Black Hat [<a href="https://twitter.com/BlackHatEvents" target="_blank">@BlackHatEvents</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>London as the Backdrop for Innovation and Culture</strong></p><p>The conversation kicked off with reflections on London’s vibrant mix of history, culture, and modernity. Marco captured it perfectly, noting the city’s knack for staying on the cutting edge of fashion, music, and movement. Sean chimed in, describing the city as a destination where “cool kids” converge. It’s this ever-evolving energy that makes London the ideal host for forward-thinking gatherings like Black Hat.</p><p>Sean and Marco’s admiration for the city wasn’t just about its aesthetics but also its role in shaping global conversations. London is a place where the local meets the global, a theme that would resonate throughout their discussion.</p><p><strong>Black Hat’s Expanding Global Reach</strong></p><p>Sean and Marco highlighted the global nature of the cybersecurity community, emphasizing Black Hat’s international presence. Marco pointed out how the event has grown beyond its Las Vegas origins, with thriving editions in Europe, Asia, the Middle East, and beyond. This expansion reflects not only a growing need for cybersecurity collaboration but also the importance of tailoring conversations to regional contexts.</p><p>Sean observed how each edition of Black Hat carries a unique flavor, shaped by local cultures and challenges. He praised the effort to include regional experts on review boards, ensuring that the content resonates with specific audiences. From Riyadh to Toronto, this approach has made Black Hat a truly global force.</p><p><strong>Celebrating Local Voices in Global Conversations</strong></p><p>One of the key takeaways from the conversation was the importance of amplifying local voices in global discussions. Marco commended Black Hat’s dedication to fostering a sense of ownership among local cybersecurity communities. Sean agreed, noting how local insights enrich the broader, boundaryless research presented at these events.</p><p>The duo discussed the balance between global trends, like AI and supply chain security, and region-specific concerns, such as policy-driven discussions in Europe or industrial focus in Canada. This nuanced approach ensures that every Black Hat event feels relevant, impactful, and inclusive.</p><p><strong>Sean and Marco’s Chemistry: Informal Yet Insightful</strong></p><p>Beyond the topics, the conversation was marked by the easy rapport between Sean and Marco. They navigated seamlessly from cybersecurity strategy to the lighter moments, like teasing each other about wardrobe choices for London’s chilly December weather. Marco’s love for local cuisine even sparked a playful detour into Italian titles for hardware hacking sessions.</p><p>It’s this blend of professional insight and personal charm that makes their discussions so engaging. Whether they’re debating the merits of AI sessions or reminiscing about hallway chats at past events, Sean and Marco bring an authenticity that keeps listeners coming back.</p><p><strong>Looking Ahead</strong></p><p>As the conversation wrapped up, Sean and Marco hinted at their plans to keep “Chats on the Road” moving forward. While they may not make it to every event, their commitment to bringing the community’s stories to light remains steadfast. Whether you’re attending Black Hat in person or following along from afar, Sean and Marco ensure that the spirit of innovation and collaboration is accessible to all.</p><p>Stay tuned as they continue to explore the intersections of technology, culture, and community, one conversation at a time.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat Europe 2024: <a href="https://www.blackhat.com/eu-24/">https://www.blackhat.com/eu-24/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 5 Dec 2024 03:35:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie)</author>
      <link>https://eventcoveragepodcast.com/episodes/beyond-the-briefings-exploring-the-pulse-of-cybersecurity-communities-a-black-hat-europe-2024-conversation-with-steve-wylie-on-location-coverage-with-sean-martin-and-marco-ciappelli-idQL0_tV</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech [<a href="https://twitter.com/InformaTechHQ" target="_blank">@InformaTechHQ</a>] and General Manager at Black Hat [<a href="https://twitter.com/BlackHatEvents" target="_blank">@BlackHatEvents</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>London as the Backdrop for Innovation and Culture</strong></p><p>The conversation kicked off with reflections on London’s vibrant mix of history, culture, and modernity. Marco captured it perfectly, noting the city’s knack for staying on the cutting edge of fashion, music, and movement. Sean chimed in, describing the city as a destination where “cool kids” converge. It’s this ever-evolving energy that makes London the ideal host for forward-thinking gatherings like Black Hat.</p><p>Sean and Marco’s admiration for the city wasn’t just about its aesthetics but also its role in shaping global conversations. London is a place where the local meets the global, a theme that would resonate throughout their discussion.</p><p><strong>Black Hat’s Expanding Global Reach</strong></p><p>Sean and Marco highlighted the global nature of the cybersecurity community, emphasizing Black Hat’s international presence. Marco pointed out how the event has grown beyond its Las Vegas origins, with thriving editions in Europe, Asia, the Middle East, and beyond. This expansion reflects not only a growing need for cybersecurity collaboration but also the importance of tailoring conversations to regional contexts.</p><p>Sean observed how each edition of Black Hat carries a unique flavor, shaped by local cultures and challenges. He praised the effort to include regional experts on review boards, ensuring that the content resonates with specific audiences. From Riyadh to Toronto, this approach has made Black Hat a truly global force.</p><p><strong>Celebrating Local Voices in Global Conversations</strong></p><p>One of the key takeaways from the conversation was the importance of amplifying local voices in global discussions. Marco commended Black Hat’s dedication to fostering a sense of ownership among local cybersecurity communities. Sean agreed, noting how local insights enrich the broader, boundaryless research presented at these events.</p><p>The duo discussed the balance between global trends, like AI and supply chain security, and region-specific concerns, such as policy-driven discussions in Europe or industrial focus in Canada. This nuanced approach ensures that every Black Hat event feels relevant, impactful, and inclusive.</p><p><strong>Sean and Marco’s Chemistry: Informal Yet Insightful</strong></p><p>Beyond the topics, the conversation was marked by the easy rapport between Sean and Marco. They navigated seamlessly from cybersecurity strategy to the lighter moments, like teasing each other about wardrobe choices for London’s chilly December weather. Marco’s love for local cuisine even sparked a playful detour into Italian titles for hardware hacking sessions.</p><p>It’s this blend of professional insight and personal charm that makes their discussions so engaging. Whether they’re debating the merits of AI sessions or reminiscing about hallway chats at past events, Sean and Marco bring an authenticity that keeps listeners coming back.</p><p><strong>Looking Ahead</strong></p><p>As the conversation wrapped up, Sean and Marco hinted at their plans to keep “Chats on the Road” moving forward. While they may not make it to every event, their commitment to bringing the community’s stories to light remains steadfast. Whether you’re attending Black Hat in person or following along from afar, Sean and Marco ensure that the spirit of innovation and collaboration is accessible to all.</p><p>Stay tuned as they continue to explore the intersections of technology, culture, and community, one conversation at a time.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat Europe 2024: <a href="https://www.blackhat.com/eu-24/">https://www.blackhat.com/eu-24/</a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33632452" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/77e96b13-1e1b-4c7f-8efc-2319d38d8581/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=77e96b13-1e1b-4c7f-8efc-2319d38d8581&amp;feed=2M86zCcc"/>
      <itunes:title>Beyond the Briefings: Exploring the Pulse of Cybersecurity Communities | A Black Hat Europe 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/65237b36-608f-49c5-80d0-75aac511dce5/3000x3000/black-20hat-20europe-202024-20-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:02</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli in a lively conversation about the global impact of the Black Hat Platform and the unique flavors each regional event brings to the cybersecurity community. From London’s vibrant culture to the balance between global trends and local insights, this episode captures the heart of innovation, collaboration, and candid dialogue.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli in a lively conversation about the global impact of the Black Hat Platform and the unique flavors each regional event brings to the cybersecurity community. From London’s vibrant culture to the balance between global trends and local insights, this episode captures the heart of innovation, collaboration, and candid dialogue.</itunes:subtitle>
      <itunes:keywords>local trends, collaboration, technology, marco ciappelli, research, global community, sean martin, cybersecurity conferences, cybersecurity, black hat conference, conference, itsp magazine, innovation, blackhat, policy, conferences, culture, steve wylie, london, security, cyber security, insights, ai, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>167</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">30fb58eb-d776-427a-bbe1-6d128bb85470</guid>
      <title>From Bytes to Rights: The Intersection of Law and Cyber Security | An Australian Cyber Conference 2024 in Melbourne Conversation with EJ Wise | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: EJ Wise</strong>, Founder & Principal, WiseLaw</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wiselaw3/">https://www.linkedin.com/in/wiselaw3/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Against the energetic backdrop of Melbourne's CyberCon, hosted by ISA, the conversation dives into the global nature of technology's influence. The trio reflects on pressing topics such as privacy, cybersecurity, and the shifting landscape of cyber law, all while situated in one of Australia’s most tech-forward cities.</p><p><strong>EJ Wise’s Journey and Perspective</strong><br />EJ Wise shared her remarkable career path, starting as a member of the U.S. Air Force JAG Corps and later founding her boutique law firm in Australia in 2018. Her firsthand experience sheds light on Australia’s relatively recent introduction of comprehensive cyber laws and the ongoing need to bridge the gap between technological innovation and legislative action.</p><p><strong>Educating Consumers: A Shared Responsibility</strong><br />A key focus of the conversation was consumer awareness. EJ highlighted the critical need for industries to take responsibility for educating the public, much like banks have historically done with financial literacy. The discussion also touched on embedding technological literacy into early education, ensuring children grow up with a clear understanding of privacy and digital security.</p><p><strong>Technology and Ethics in Tension</strong><br />The group examined the ethical challenges posed by advancing technologies, especially regarding surveillance and data privacy. From facial recognition in retail spaces to the increasing capabilities of modern devices to monitor user behavior, the conversation drew thought-provoking parallels between these innovations and the history of advertising practices.</p><p>The ethical implications of such technologies go far beyond convenience, raising questions about transparency, consent, and societal norms in the digital age.</p><p><strong>Legal Frameworks and Industry Responsibility</strong><br />Marco and Sean explored the evolving role of legal frameworks in holding industry players accountable for consumer safety and privacy. EJ’s insights provided a grounded perspective on how regulatory environments are adapting—or struggling to adapt—to these challenges.</p><p>The discussion underscored a growing trend: companies must not only comply with existing laws but also anticipate and mitigate the societal impacts of their technologies.</p><p><strong>Encouraging Dialogue and Reflection</strong><br />Throughout the episode, the importance of open dialogue and introspection emerged as a recurring theme. By examining how technology shapes society and law, the discussion encouraged listeners to reflect on their digital habits and the privacy trade-offs they make in their daily lives.</p><p><strong>Conclusion</strong><br />While the conversation didn’t provide all the answers, it illuminated the complexities of the interplay between technology, law, and society. EJ, Marco, and Sean left listeners with an invitation to remain curious, question norms, and consider their role in shaping a more ethically aware digital future.</p><p>This episode captures the spirit of CyberCon 2024—sparking ideas, inspiring debate, and reinforcing the need for thoughtful engagement with the challenges of our hybrid analog-digital society.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 22:57:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, EJ Wise)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-bytes-to-rights-the-intersection-of-law-and-cyber-security-an-australian-cyber-conference-2024-in-melbourne-conversation-with-ej-wise-on-location-coverage-with-sean-martin-and-marco-ciappelli-L_i5cL72</link>
      <content:encoded><![CDATA[<p><strong>Guest: EJ Wise</strong>, Founder & Principal, WiseLaw</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wiselaw3/">https://www.linkedin.com/in/wiselaw3/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Against the energetic backdrop of Melbourne's CyberCon, hosted by ISA, the conversation dives into the global nature of technology's influence. The trio reflects on pressing topics such as privacy, cybersecurity, and the shifting landscape of cyber law, all while situated in one of Australia’s most tech-forward cities.</p><p><strong>EJ Wise’s Journey and Perspective</strong><br />EJ Wise shared her remarkable career path, starting as a member of the U.S. Air Force JAG Corps and later founding her boutique law firm in Australia in 2018. Her firsthand experience sheds light on Australia’s relatively recent introduction of comprehensive cyber laws and the ongoing need to bridge the gap between technological innovation and legislative action.</p><p><strong>Educating Consumers: A Shared Responsibility</strong><br />A key focus of the conversation was consumer awareness. EJ highlighted the critical need for industries to take responsibility for educating the public, much like banks have historically done with financial literacy. The discussion also touched on embedding technological literacy into early education, ensuring children grow up with a clear understanding of privacy and digital security.</p><p><strong>Technology and Ethics in Tension</strong><br />The group examined the ethical challenges posed by advancing technologies, especially regarding surveillance and data privacy. From facial recognition in retail spaces to the increasing capabilities of modern devices to monitor user behavior, the conversation drew thought-provoking parallels between these innovations and the history of advertising practices.</p><p>The ethical implications of such technologies go far beyond convenience, raising questions about transparency, consent, and societal norms in the digital age.</p><p><strong>Legal Frameworks and Industry Responsibility</strong><br />Marco and Sean explored the evolving role of legal frameworks in holding industry players accountable for consumer safety and privacy. EJ’s insights provided a grounded perspective on how regulatory environments are adapting—or struggling to adapt—to these challenges.</p><p>The discussion underscored a growing trend: companies must not only comply with existing laws but also anticipate and mitigate the societal impacts of their technologies.</p><p><strong>Encouraging Dialogue and Reflection</strong><br />Throughout the episode, the importance of open dialogue and introspection emerged as a recurring theme. By examining how technology shapes society and law, the discussion encouraged listeners to reflect on their digital habits and the privacy trade-offs they make in their daily lives.</p><p><strong>Conclusion</strong><br />While the conversation didn’t provide all the answers, it illuminated the complexities of the interplay between technology, law, and society. EJ, Marco, and Sean left listeners with an invitation to remain curious, question norms, and consider their role in shaping a more ethically aware digital future.</p><p>This episode captures the spirit of CyberCon 2024—sparking ideas, inspiring debate, and reinforcing the need for thoughtful engagement with the challenges of our hybrid analog-digital society.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26402145" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a6922bd9-396a-4305-aa1b-6c1af07f9300/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a6922bd9-396a-4305-aa1b-6c1af07f9300&amp;feed=2M86zCcc"/>
      <itunes:title>From Bytes to Rights: The Intersection of Law and Cyber Security | An Australian Cyber Conference 2024 in Melbourne Conversation with EJ Wise | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, EJ Wise</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:30</itunes:duration>
      <itunes:summary>In this episode of On Location with Sean Martin and Marco Ciappelli, recorded during the Australian Cyber Conference 2024 in Melbourne, hosts Marco Ciappelli and Sean Martin welcome EJ Wise, an expert in cyber law and ethics. Together, they explore the critical and complex intersections of technology, law, and societal impact, highlighting the challenges and opportunities in this rapidly evolving space.</itunes:summary>
      <itunes:subtitle>In this episode of On Location with Sean Martin and Marco Ciappelli, recorded during the Australian Cyber Conference 2024 in Melbourne, hosts Marco Ciappelli and Sean Martin welcome EJ Wise, an expert in cyber law and ethics. Together, they explore the critical and complex intersections of technology, law, and societal impact, highlighting the challenges and opportunities in this rapidly evolving space.</itunes:subtitle>
      <itunes:keywords>isa conference, melbourne cybersecurity event, ethical technology, marco ciappelli, marco ciappelli, legal adaptation to technology, societal impact of tech, sean martin, consumer education, australian cyber conference 2024, cybersecurity, conference, digital responsibility, redefining cybersecurity, cyber law, melbourne tech events, cyber policy, melbourne, facial recognition ethics, industry accountability, technology and society, data privacy, ej wise, podcast, regulatory challenges, cybersecurity awareness, melbourne cyber conference, itspmagazine, australian cyber conference, privacy, tech literacy for kids, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>166</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">255fb0d9-8a94-44b2-8c3e-9e9697867bf5</guid>
      <title>Stranger Danger, Phishing, Instinct, and Technology: How AI and Awareness Are Shaping Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Benji Zorella and Rebecca Caldwell | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Benji Zorella</strong>, eLearning Instructional Designer, CyberCX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/benjiz/">https://www.linkedin.com/in/benjiz/</a></p><p><strong>Rebecca Caldwell</strong>, Phishing Content Specialist, Phriendly Phishing</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/bec-j-caldwell/">https://www.linkedin.com/in/bec-j-caldwell/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Kicking off the episode, Sean Martin and Marco Ciappelli highlight the uniquely local flavor of the conference. With Benji and Bec calling Melbourne home, the guests reflect on the value of attending such a prominent event in their backyard while drawing on their experiences as hosts of their own cybersecurity podcast.</p><p><strong>Unmasking Phishing in the Digital Age</strong></p><p>Phishing takes center stage as Benji and Bec share stories and insights about the dangers lurking behind cleverly crafted scams. Sean Martin draws a clever comparison between traditional fishing methods and the digital phishing tactics cybercriminals use today—hooking victims by exploiting their trust and curiosity.</p><p>Benji drives the conversation deeper, explaining how a person's digital footprint—especially in an age of AI-driven tools like deepfakes—can be weaponized for deception. The guests underscore the importance of remaining vigilant and minimizing the personal information we leave online, turning our digital habits into our best line of defense.</p><p><strong>Cybersecurity Education: The First Line of Defense</strong></p><p>Shifting gears, the group emphasizes the need to move beyond relying solely on tech-driven safeguards and focus on building a culture of cybersecurity awareness within organizations. Bec Caldwell shares actionable strategies, likening cybersecurity education to learning how to drive—starting small and gradually building confidence in spotting risks. Empowering employees to question suspicious contexts fosters not just better security, but a collaborative culture of accountability.</p><p><strong>AI: Friend or Foe?</strong></p><p>The role of AI emerges as a hot topic, sparking a discussion about its dual impact on cybersecurity. While AI enables sophisticated phishing attacks, it also holds the potential to strengthen defenses. The panel imagines AI tools evolving to provide real-time security nudges, similar to how cars alert drivers to potential hazards. It’s a balancing act, as AI must be wielded thoughtfully to enhance—not replace—human vigilance.</p><p><strong>The Human Factor in Cybersecurity</strong></p><p>Throughout the conversation, one message resonates: the enduring power of human intuition. Benji recounts a gripping story of a CEO who thwarted a highly advanced phishing attempt with a simple, old-school phone verification. This moment reinforces the idea that while tech can improve security measures, the human touch remains irreplaceable.</p><p><strong>Future-Proofing Cybersecurity</strong></p><p>As the episode winds down, the group reflects on thought-provoking audience questions from the conference. From AI’s impact on CISO responsibilities to how generational shifts in digital communication shape cybersecurity strategies, the guests underscore the need for adaptability as both technology and society evolve.</p><p><strong>A Final Call to Action</strong></p><p>Marco Ciappelli and Sean Martin wrap up with a clear takeaway for their listeners: stay curious, ask questions, and embrace skepticism online. The key to navigating today’s cyber landscape is a mix of awareness, education, and the occasional gut check—because even in a tech-driven world, the human element is our greatest asset.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Bytes with Bec and Benji podcast: <a href="https://www.phriendlyphishing.com/resources/podcasts">https://www.phriendlyphishing.com/resources/podcasts</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 22:26:27 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Benji Zorella, Rebecca Caldwell)</author>
      <link>https://eventcoveragepodcast.com/episodes/stranger-danger-phishing-instinct-and-technology-how-ai-and-awareness-are-shaping-cybersecurity-an-australian-cyber-conference-2024-in-melbourne-conversation-with-benji-zorella-and-rebecca-caldwell-on-location-coverage-ffMv1nUq</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Benji Zorella</strong>, eLearning Instructional Designer, CyberCX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/benjiz/">https://www.linkedin.com/in/benjiz/</a></p><p><strong>Rebecca Caldwell</strong>, Phishing Content Specialist, Phriendly Phishing</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/bec-j-caldwell/">https://www.linkedin.com/in/bec-j-caldwell/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Kicking off the episode, Sean Martin and Marco Ciappelli highlight the uniquely local flavor of the conference. With Benji and Bec calling Melbourne home, the guests reflect on the value of attending such a prominent event in their backyard while drawing on their experiences as hosts of their own cybersecurity podcast.</p><p><strong>Unmasking Phishing in the Digital Age</strong></p><p>Phishing takes center stage as Benji and Bec share stories and insights about the dangers lurking behind cleverly crafted scams. Sean Martin draws a clever comparison between traditional fishing methods and the digital phishing tactics cybercriminals use today—hooking victims by exploiting their trust and curiosity.</p><p>Benji drives the conversation deeper, explaining how a person's digital footprint—especially in an age of AI-driven tools like deepfakes—can be weaponized for deception. The guests underscore the importance of remaining vigilant and minimizing the personal information we leave online, turning our digital habits into our best line of defense.</p><p><strong>Cybersecurity Education: The First Line of Defense</strong></p><p>Shifting gears, the group emphasizes the need to move beyond relying solely on tech-driven safeguards and focus on building a culture of cybersecurity awareness within organizations. Bec Caldwell shares actionable strategies, likening cybersecurity education to learning how to drive—starting small and gradually building confidence in spotting risks. Empowering employees to question suspicious contexts fosters not just better security, but a collaborative culture of accountability.</p><p><strong>AI: Friend or Foe?</strong></p><p>The role of AI emerges as a hot topic, sparking a discussion about its dual impact on cybersecurity. While AI enables sophisticated phishing attacks, it also holds the potential to strengthen defenses. The panel imagines AI tools evolving to provide real-time security nudges, similar to how cars alert drivers to potential hazards. It’s a balancing act, as AI must be wielded thoughtfully to enhance—not replace—human vigilance.</p><p><strong>The Human Factor in Cybersecurity</strong></p><p>Throughout the conversation, one message resonates: the enduring power of human intuition. Benji recounts a gripping story of a CEO who thwarted a highly advanced phishing attempt with a simple, old-school phone verification. This moment reinforces the idea that while tech can improve security measures, the human touch remains irreplaceable.</p><p><strong>Future-Proofing Cybersecurity</strong></p><p>As the episode winds down, the group reflects on thought-provoking audience questions from the conference. From AI’s impact on CISO responsibilities to how generational shifts in digital communication shape cybersecurity strategies, the guests underscore the need for adaptability as both technology and society evolve.</p><p><strong>A Final Call to Action</strong></p><p>Marco Ciappelli and Sean Martin wrap up with a clear takeaway for their listeners: stay curious, ask questions, and embrace skepticism online. The key to navigating today’s cyber landscape is a mix of awareness, education, and the occasional gut check—because even in a tech-driven world, the human element is our greatest asset.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Bytes with Bec and Benji podcast: <a href="https://www.phriendlyphishing.com/resources/podcasts">https://www.phriendlyphishing.com/resources/podcasts</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28930821" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7722c024-2318-4e54-a859-2b91d1902bea/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7722c024-2318-4e54-a859-2b91d1902bea&amp;feed=2M86zCcc"/>
      <itunes:title>Stranger Danger, Phishing, Instinct, and Technology: How AI and Awareness Are Shaping Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Benji Zorella and Rebecca Caldwell | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Benji Zorella, Rebecca Caldwell</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:08</itunes:duration>
      <itunes:summary>In this latest episode of On Location with Sean Martin and Marco Ciappelli, the hosts sit down with Benji Zorella and Bec Caldwell, co-hosts of the Bytes with Bec and Benji podcast, during the bustling Australian Cyber Conference in Melbourne 2024. Together, they explore the evolving threats of phishing, the role of AI in both perpetuating and combating scams, and the critical need for human intuition in the cybersecurity landscape.</itunes:summary>
      <itunes:subtitle>In this latest episode of On Location with Sean Martin and Marco Ciappelli, the hosts sit down with Benji Zorella and Bec Caldwell, co-hosts of the Bytes with Bec and Benji podcast, during the bustling Australian Cyber Conference in Melbourne 2024. Together, they explore the evolving threats of phishing, the role of AI in both perpetuating and combating scams, and the critical need for human intuition in the cybersecurity landscape.</itunes:subtitle>
      <itunes:keywords>bec caldwell, melbourne cybersecurity event, marco ciappelli, conference highlights, melbourne 2024, digital safety, sean martin, digital footprint, australian cyber conference 2024, cybersecurity, benji zorella, conference, redefining cybersecurity, melbourne tech events, melbourne, cyber awareness, ai and cybersecurity, on location podcast, bites with beck and benji podcast, podcast, scam prevention, melbourne cyber conference, phishing education, cybersecurity culture, human intuition, itspmagazine, australian cyber conference, ai threats, phishing, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>165</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56de6e74-404d-4241-aa8b-74fc27c1468e</guid>
      <title>Building Cyber Resilience Through Global Innovation, Local Community Feedback, and Regional Partnerships | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</title>
      <description><![CDATA[<p>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 19:31:05 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-cyber-resilience-through-global-innovation-local-community-feedback-and-regional-partnerships-a-brand-story-conversation-from-aisa-cyber-con-2024-in-melbourne-a-threatlocker-story-with-jade-wilkie-MLa_8mn_</link>
      <content:encoded><![CDATA[<p>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17008447" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/19beab2d-5bf2-411a-af73-19103c2d0dca/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=19beab2d-5bf2-411a-af73-19103c2d0dca&amp;feed=2M86zCcc"/>
      <itunes:title>Building Cyber Resilience Through Global Innovation, Local Community Feedback, and Regional Partnerships | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:42</itunes:duration>
      <itunes:summary>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</itunes:summary>
      <itunes:subtitle>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</itunes:subtitle>
      <itunes:keywords>jade wilkie, compliance, essential eight, marco ciappelli, industries, marco, sean martin, maturity, trust, aisa, cybersecurity, eight, threatlocker, essential 8, innovation, sean, resilience, zero, jade, essential, frameworks, wilkie, government, australia, cyber conference, cyber con, brand story, 2024, cybercon</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>164</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">31ca4c26-bbc5-4a3b-91b8-d96e27f8ce3d</guid>
      <title>Inside the MIND of a Hacker - Insights and Lessons From a Ransomware Attack | An Australian Cyber Conference 2024 in Melbourne Conversation with Joseph Carson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Joseph Carson</strong>, Chief Security Scientist (CSS) & Advisory CISO, Delinea</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/josephcarson/">https://www.linkedin.com/in/josephcarson/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At AISA Cyber Con 2024, amidst the bustling energy of Melbourne, the conversation between Sean Martin, Marco Ciappelli, and Joseph Carson provided a unique perspective on cybersecurity challenges and insights. The setting wasn’t just a backdrop—it was a canvas where shared experiences and professional journeys painted a vivid picture of evolving cyber threats and collaborative defense strategies.</p><p>The Dynamics of Engagement</p><p>The dialogue kicked off with a casual and candid exchange, where the speakers reflected on the nuances of attending conferences—long walks between sessions, weather swings, and the unexpected yet pleasant surprise of encountering familiar faces. Marco and Sean seamlessly blended humor and camaraderie into their conversation, making the technical discussion both engaging and relatable.</p><p>Insights on Ransomware Realities</p><p>Joseph Carson shared a deeply technical yet accessible walkthrough of ransomware attacks. He explained his approach to recreating real-world scenarios to educate organizations on vulnerabilities and lessons learned. He highlighted that while AI garners much attention, attackers often rely on basic techniques that remain effective. His revelation that many victims still struggle with simple misconfigurations and weak credential management served as a stark reminder of cybersecurity’s foundational importance.</p><p>The audience's reaction underscored the relevance of these insights. Many attendees, identifying parallels with their organizational experiences, approached Carson afterward to share stories or seek advice. This interactive exchange emphasized the importance of open dialogue and proactive learning in addressing cyber threats.</p><p>Ethical and Strategic Considerations in Cybersecurity</p><p>The discussion also touched on the ethical dilemmas surrounding ransomware payments. Carson recounted incidents where organizations faced the difficult decision to pay ransoms to save critical operations. His narrative of assisting a cancer research organization emphasized that these decisions are fundamentally business-driven, balancing continuity against principles.</p><p>Sean and Marco expanded on the implications of regulatory frameworks. They debated the effectiveness of Australia’s laws permitting ransomware payments under strict disclosure conditions, exploring whether such measures could foster collaboration between government agencies and the private sector or inadvertently sustain the criminals’ business model.</p><p>Global Trends and Local Challenges</p><p>The conversation delved into how sanctions and geopolitics influence cybercrime. Carson explained how ransomware operators adapt their strategies, targeting regions with fewer regulatory constraints or financial barriers. He emphasized the need for global cooperation to create a resilient cybersecurity ecosystem, advocating for shared intelligence and collaborative defense measures.</p><p>Marco’s observations on the societal aspect of cybersecurity resonated strongly. He noted that resilient countries could inadvertently shift the burden of ransomware to less developed regions, highlighting the ethical responsibility to extend cybersecurity efforts globally.</p><p>Final Thoughts: Building a Safer Digital World</p><p>The discussion wrapped up with a call for cooperation and proactive measures. Whether through fostering societal awareness or tightening organizational controls, the speakers agreed that tackling cybercrime requires a unified effort. Carson emphasized that sharing knowledge—be it through podcasts, conferences, or direct collaboration—creates a ripple effect of security.</p><p>This conversation at AISA Cyber Con wasn’t just an exchange of ideas but a demonstration of the power of collaboration in combating the ever-evolving challenges of cybersecurity. Through humor, storytelling, and expertise, Sean, Marco, and Carson left their audience not only informed but inspired to act.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 17:22:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Joseph Carson)</author>
      <link>https://eventcoveragepodcast.com/episodes/inside-the-mind-of-a-hacker-insights-and-lessons-from-a-ransomware-attack-an-australian-cyber-conference-2024-in-melbourne-conversation-with-joseph-carson-on-location-coverage-with-sean-martin-and-marco-ciappelli-YsTJAMIy</link>
      <content:encoded><![CDATA[<p><strong>Guest: Joseph Carson</strong>, Chief Security Scientist (CSS) & Advisory CISO, Delinea</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/josephcarson/">https://www.linkedin.com/in/josephcarson/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At AISA Cyber Con 2024, amidst the bustling energy of Melbourne, the conversation between Sean Martin, Marco Ciappelli, and Joseph Carson provided a unique perspective on cybersecurity challenges and insights. The setting wasn’t just a backdrop—it was a canvas where shared experiences and professional journeys painted a vivid picture of evolving cyber threats and collaborative defense strategies.</p><p>The Dynamics of Engagement</p><p>The dialogue kicked off with a casual and candid exchange, where the speakers reflected on the nuances of attending conferences—long walks between sessions, weather swings, and the unexpected yet pleasant surprise of encountering familiar faces. Marco and Sean seamlessly blended humor and camaraderie into their conversation, making the technical discussion both engaging and relatable.</p><p>Insights on Ransomware Realities</p><p>Joseph Carson shared a deeply technical yet accessible walkthrough of ransomware attacks. He explained his approach to recreating real-world scenarios to educate organizations on vulnerabilities and lessons learned. He highlighted that while AI garners much attention, attackers often rely on basic techniques that remain effective. His revelation that many victims still struggle with simple misconfigurations and weak credential management served as a stark reminder of cybersecurity’s foundational importance.</p><p>The audience's reaction underscored the relevance of these insights. Many attendees, identifying parallels with their organizational experiences, approached Carson afterward to share stories or seek advice. This interactive exchange emphasized the importance of open dialogue and proactive learning in addressing cyber threats.</p><p>Ethical and Strategic Considerations in Cybersecurity</p><p>The discussion also touched on the ethical dilemmas surrounding ransomware payments. Carson recounted incidents where organizations faced the difficult decision to pay ransoms to save critical operations. His narrative of assisting a cancer research organization emphasized that these decisions are fundamentally business-driven, balancing continuity against principles.</p><p>Sean and Marco expanded on the implications of regulatory frameworks. They debated the effectiveness of Australia’s laws permitting ransomware payments under strict disclosure conditions, exploring whether such measures could foster collaboration between government agencies and the private sector or inadvertently sustain the criminals’ business model.</p><p>Global Trends and Local Challenges</p><p>The conversation delved into how sanctions and geopolitics influence cybercrime. Carson explained how ransomware operators adapt their strategies, targeting regions with fewer regulatory constraints or financial barriers. He emphasized the need for global cooperation to create a resilient cybersecurity ecosystem, advocating for shared intelligence and collaborative defense measures.</p><p>Marco’s observations on the societal aspect of cybersecurity resonated strongly. He noted that resilient countries could inadvertently shift the burden of ransomware to less developed regions, highlighting the ethical responsibility to extend cybersecurity efforts globally.</p><p>Final Thoughts: Building a Safer Digital World</p><p>The discussion wrapped up with a call for cooperation and proactive measures. Whether through fostering societal awareness or tightening organizational controls, the speakers agreed that tackling cybercrime requires a unified effort. Carson emphasized that sharing knowledge—be it through podcasts, conferences, or direct collaboration—creates a ripple effect of security.</p><p>This conversation at AISA Cyber Con wasn’t just an exchange of ideas but a demonstration of the power of collaboration in combating the ever-evolving challenges of cybersecurity. Through humor, storytelling, and expertise, Sean, Marco, and Carson left their audience not only informed but inspired to act.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25746388" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/86b69333-4d67-437d-abf6-5c0671a434a5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=86b69333-4d67-437d-abf6-5c0671a434a5&amp;feed=2M86zCcc"/>
      <itunes:title>Inside the MIND of a Hacker - Insights and Lessons From a Ransomware Attack | An Australian Cyber Conference 2024 in Melbourne Conversation with Joseph Carson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Joseph Carson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:49</itunes:duration>
      <itunes:summary>In this engaging episode recorded at AISA Cyber Con 2024, Sean Martin, Marco Ciappelli, and Joseph Carson explore the real-world dynamics of ransomware attacks, ethical dilemmas around paying ransoms, and the global shifts in cybercrime tactics. Packed with insights, humor, and actionable advice, this conversation will leave you inspired to rethink cybersecurity resilience and collaboration.</itunes:summary>
      <itunes:subtitle>In this engaging episode recorded at AISA Cyber Con 2024, Sean Martin, Marco Ciappelli, and Joseph Carson explore the real-world dynamics of ransomware attacks, ethical dilemmas around paying ransoms, and the global shifts in cybercrime tactics. Packed with insights, humor, and actionable advice, this conversation will leave you inspired to rethink cybersecurity resilience and collaboration.</itunes:subtitle>
      <itunes:keywords>intelligence, collaboration, melbourne cybersecurity event, marco ciappelli, joseph carson, backups, attackers, sean martin, credentials, australian cyber conference 2024, cybersecurity, conference, redefining cybersecurity, regulations, melbourne tech events, melbourne, resilience, disclosure, cybercrime, conferences, ransomware, podcast, melbourne cyber conference, ai, itspmagazine, australian cyber conference, sanctions, phishing, social engineering, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ad571dcd-1ca7-4828-b2ff-7dc98d7f9441</guid>
      <title>The Imperative of Transitioning from Traditional Access Control to Modern Access Control | An Australian Cyber Conference 2024 in Melbourne Conversation with Ahmad Salehi Shahraki | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Ahmad Salehi Shahraki</strong>, Lecturer (Assistant Professor) in Cybersecurity, La Trobe University</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ahmad-salehi-shahraki-83494152/">https://www.linkedin.com/in/ahmad-salehi-shahraki-83494152/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During this "On Location" podcast episode at AISA CyberCon 2024, host Sean Martin welcomed guest Ahmad Salehi Shahraki to discuss cutting-edge developments in access control, identity management, and cybersecurity infrastructure.</p><p>Ahmad, a lecturer at La Trobe University specializing in authentication, authorization, applied cryptography, and blockchain, shared insights into transitioning from traditional access control models like Role-Based Access Control (RBAC) to more advanced Attribute-Based Access Control (ABAC). Ahmad emphasized that while RBAC has served as the backbone of organizational security for decades, its centralized nature and limitations in cross-domain applications necessitate the shift to ABAC. He also highlighted a critical aspect of his research: leveraging cryptographic primitives like attribute-based group signatures to enhance security and privacy while enabling decentralization without relying on blockchain.</p><p>Sean and Ahmad explored the technical and operational implications of ABAC. Ahmad described how this model uses user attributes—such as location, role, and organizational details—to determine access permissions dynamically. This contrasts with RBAC's reliance on predefined roles, which can lead to rule exploitation and administrative inefficiencies.</p><p>Ahmad also discussed practical applications, including secure digital health systems, enterprise environments, and even e-voting platforms. One innovative feature of his approach is "attribute anonymity," which ensures sensitive information remains private, even in peer-to-peer or decentralized setups. For example, he described how his system could validate an individual’s age for accessing a service without revealing personal data—a critical step toward minimizing data exposure.</p><p>The conversation expanded into challenges organizations face in adopting ABAC, particularly the cost and complexity of transitioning from entrenched RBAC systems. Ahmad stressed the importance of education and collaboration with governments and industry players to operationalize ABAC and other decentralized models.</p><p>The episode closed with Ahmad reflecting on the robust feedback and collaboration opportunities he encountered at the conference, underscoring the growing interest in decentralized and privacy-preserving solutions within the cybersecurity industry. Ahmad’s research has attracted attention globally, with plans to further develop and implement these models in Australia and beyond.</p><p>Listeners are encouraged to follow Ahmad’s work and connect via LinkedIn to stay informed about these transformative approaches to cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 16:42:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ahmad Salehi Shahraki)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-imperative-of-transitioning-from-traditional-access-control-to-modern-access-control-an-australian-cyber-conference-2024-in-melbourne-conversation-with-ahmad-salehi-shahraki-on-location-coverage-with-sean-martin-and-marco-ciappelli-YE72VAZ_</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ahmad Salehi Shahraki</strong>, Lecturer (Assistant Professor) in Cybersecurity, La Trobe University</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ahmad-salehi-shahraki-83494152/">https://www.linkedin.com/in/ahmad-salehi-shahraki-83494152/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During this "On Location" podcast episode at AISA CyberCon 2024, host Sean Martin welcomed guest Ahmad Salehi Shahraki to discuss cutting-edge developments in access control, identity management, and cybersecurity infrastructure.</p><p>Ahmad, a lecturer at La Trobe University specializing in authentication, authorization, applied cryptography, and blockchain, shared insights into transitioning from traditional access control models like Role-Based Access Control (RBAC) to more advanced Attribute-Based Access Control (ABAC). Ahmad emphasized that while RBAC has served as the backbone of organizational security for decades, its centralized nature and limitations in cross-domain applications necessitate the shift to ABAC. He also highlighted a critical aspect of his research: leveraging cryptographic primitives like attribute-based group signatures to enhance security and privacy while enabling decentralization without relying on blockchain.</p><p>Sean and Ahmad explored the technical and operational implications of ABAC. Ahmad described how this model uses user attributes—such as location, role, and organizational details—to determine access permissions dynamically. This contrasts with RBAC's reliance on predefined roles, which can lead to rule exploitation and administrative inefficiencies.</p><p>Ahmad also discussed practical applications, including secure digital health systems, enterprise environments, and even e-voting platforms. One innovative feature of his approach is "attribute anonymity," which ensures sensitive information remains private, even in peer-to-peer or decentralized setups. For example, he described how his system could validate an individual’s age for accessing a service without revealing personal data—a critical step toward minimizing data exposure.</p><p>The conversation expanded into challenges organizations face in adopting ABAC, particularly the cost and complexity of transitioning from entrenched RBAC systems. Ahmad stressed the importance of education and collaboration with governments and industry players to operationalize ABAC and other decentralized models.</p><p>The episode closed with Ahmad reflecting on the robust feedback and collaboration opportunities he encountered at the conference, underscoring the growing interest in decentralized and privacy-preserving solutions within the cybersecurity industry. Ahmad’s research has attracted attention globally, with plans to further develop and implement these models in Australia and beyond.</p><p>Listeners are encouraged to follow Ahmad’s work and connect via LinkedIn to stay informed about these transformative approaches to cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26036451" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7dcec797-fe37-4ba0-9137-541a4a0391ae/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7dcec797-fe37-4ba0-9137-541a4a0391ae&amp;feed=2M86zCcc"/>
      <itunes:title>The Imperative of Transitioning from Traditional Access Control to Modern Access Control | An Australian Cyber Conference 2024 in Melbourne Conversation with Ahmad Salehi Shahraki | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ahmad Salehi Shahraki</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:07</itunes:duration>
      <itunes:summary>Explore groundbreaking advancements in access control as Ahmad Salehi Shahraki discusses transitioning from traditional RBAC systems to decentralized, privacy-preserving ABAC models, reshaping identity management and cybersecurity infrastructure. Learn how cryptographic innovations can secure everything from healthcare systems to e-voting while maintaining user anonymity and minimizing data exposure.</itunes:summary>
      <itunes:subtitle>Explore groundbreaking advancements in access control as Ahmad Salehi Shahraki discusses transitioning from traditional RBAC systems to decentralized, privacy-preserving ABAC models, reshaping identity management and cybersecurity infrastructure. Learn how cryptographic innovations can secure everything from healthcare systems to e-voting while maintaining user anonymity and minimizing data exposure.</itunes:subtitle>
      <itunes:keywords>melbourne cybersecurity event, rbac, australia cybercon, marco ciappelli, blockchain, sean martin, identity management, australian cyber conference 2024, cybersecurity, conference, nist, e-voting, redefining cybersecurity, data security, melbourne tech events, attribute anonymity, abac, melbourne, peer-to-peer, cryptography, podcast, digital identity, ahmad salehi shahraki, melbourne cyber conference, itspmagazine, decentralization, access control, australian cyber conference, privacy, healthcare, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>162</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1a7b50d-7950-4cac-9165-27c5536978b7</guid>
      <title>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Brand Story with Robert Booker, Blake Sutherland, Sidney Prasse, Josh Ladeau</title>
      <description><![CDATA[<p>The HITRUST CyberInsurance Webinar unveiled an innovative approach to acquiring cyber insurance, highlighting a streamlined process designed to benefit organizations of all sizes and sectors. Gathering insights from industry leaders including Sean Martin, Josh Ladeau, Sidney Prasse, Robert Booker, and Blake Sutherland, the discussion centered around the HITRUST Shared Risk Facility and its value proposition for organizations seeking robust cyber insurance coverage.</p><p>Josh Ladeau, CEO of Trium, emphasized the importance of reducing volatility in the insurance market. He pointed out the challenges organizations face with traditional insurance processes, including cumbersome questionnaires and inconsistent underwriting requirements. By leveraging HITRUST certifications, the Shared Risk Facility offers a consistent, transparent, and efficient pathway for obtaining coverage, ensuring organizations can focus more on their core operations rather than administrative burdens.</p><p>Sidney Prasse, a cyber specialist at McGill and Partners, highlighted the comprehensive nature of HITRUST certifications, which provide a high level of assurance and a robust framework for organizations. Prasse elaborated on the return on investment (ROI) that organizations gain from this streamlined approach, not only in terms of competitive premiums but also through time and resource efficiencies.</p><p>Robert Booker, Chief Strategy Officer at HITRUST, elaborated on the rigorous processes involved in HITRUST certifications. He explained that these certifications require organizations to demonstrate their security maturity comprehensively, which in turn provides insurers with verified, reliable data. This reliability and transparency in security posture are critical, as they enhance the trust between insurers and insureds, making the underwriting process smoother and more accurate.</p><p>Blake Sutherland, EVP of Market Engagement at HITRUST, emphasized the importance of proactive engagement between IT security teams and finance or risk management teams within organizations. He noted that the HITRUST approach helps bridge gaps between these departments, ensuring a unified and effective strategy towards obtaining and maintaining cyber insurance coverage.</p><p>The webinar underscored that the HITRUST Shared Risk Facility is not just about easier and more efficient insurance processes; it also represents a strategic advantage in the market. Organizations that are HITRUST certified can differentiate themselves, demonstrating a high level of security and compliance that can be pivotal in securing business contracts. This differentiation is particularly crucial as businesses increasingly rely on third-party attestation to verify their security measures.</p><p>Ultimately, the HITRUST CyberInsurance Webinar showcased how strategic partnerships and innovative approaches can transform the traditional cyber insurance landscape, providing organizations with the tools they need to effectively manage risk and achieve better overall security.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Sidney Prasse</strong>, Partner, McGill & Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sidney-prasse-297894aa/">https://www.linkedin.com/in/sidney-prasse-297894aa/</a></p><p><strong>Josh Ladeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships (Session): </p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 16:15:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sidney Prasse, Blake Sutherland, Robert Booker, Josh Ladeau)</author>
      <link>https://eventcoveragepodcast.com/episodes/enhancing-cyber-insurance-with-hitrust-streamlining-coverage-through-strategic-partnerships-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-brand-story-with-robert-booker-blake-sutherland-sidney-prasse-josh-ladeau-jhatv_ZH</link>
      <content:encoded><![CDATA[<p>The HITRUST CyberInsurance Webinar unveiled an innovative approach to acquiring cyber insurance, highlighting a streamlined process designed to benefit organizations of all sizes and sectors. Gathering insights from industry leaders including Sean Martin, Josh Ladeau, Sidney Prasse, Robert Booker, and Blake Sutherland, the discussion centered around the HITRUST Shared Risk Facility and its value proposition for organizations seeking robust cyber insurance coverage.</p><p>Josh Ladeau, CEO of Trium, emphasized the importance of reducing volatility in the insurance market. He pointed out the challenges organizations face with traditional insurance processes, including cumbersome questionnaires and inconsistent underwriting requirements. By leveraging HITRUST certifications, the Shared Risk Facility offers a consistent, transparent, and efficient pathway for obtaining coverage, ensuring organizations can focus more on their core operations rather than administrative burdens.</p><p>Sidney Prasse, a cyber specialist at McGill and Partners, highlighted the comprehensive nature of HITRUST certifications, which provide a high level of assurance and a robust framework for organizations. Prasse elaborated on the return on investment (ROI) that organizations gain from this streamlined approach, not only in terms of competitive premiums but also through time and resource efficiencies.</p><p>Robert Booker, Chief Strategy Officer at HITRUST, elaborated on the rigorous processes involved in HITRUST certifications. He explained that these certifications require organizations to demonstrate their security maturity comprehensively, which in turn provides insurers with verified, reliable data. This reliability and transparency in security posture are critical, as they enhance the trust between insurers and insureds, making the underwriting process smoother and more accurate.</p><p>Blake Sutherland, EVP of Market Engagement at HITRUST, emphasized the importance of proactive engagement between IT security teams and finance or risk management teams within organizations. He noted that the HITRUST approach helps bridge gaps between these departments, ensuring a unified and effective strategy towards obtaining and maintaining cyber insurance coverage.</p><p>The webinar underscored that the HITRUST Shared Risk Facility is not just about easier and more efficient insurance processes; it also represents a strategic advantage in the market. Organizations that are HITRUST certified can differentiate themselves, demonstrating a high level of security and compliance that can be pivotal in securing business contracts. This differentiation is particularly crucial as businesses increasingly rely on third-party attestation to verify their security measures.</p><p>Ultimately, the HITRUST CyberInsurance Webinar showcased how strategic partnerships and innovative approaches can transform the traditional cyber insurance landscape, providing organizations with the tools they need to effectively manage risk and achieve better overall security.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Sidney Prasse</strong>, Partner, McGill & Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sidney-prasse-297894aa/">https://www.linkedin.com/in/sidney-prasse-297894aa/</a></p><p><strong>Josh Ladeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships (Session): </p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="57699370" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1c5bc3fd-b3aa-4726-9e0f-d034169f04f6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1c5bc3fd-b3aa-4726-9e0f-d034169f04f6&amp;feed=2M86zCcc"/>
      <itunes:title>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Brand Story with Robert Booker, Blake Sutherland, Sidney Prasse, Josh Ladeau</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sidney Prasse, Blake Sutherland, Robert Booker, Josh Ladeau</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>01:00:06</itunes:duration>
      <itunes:summary>If you’re seeking a stronger, simpler way to secure cyber insurance, don’t miss this opportunity to learn from the experts. Join us for this conversation to learn how the HITRUST Shared Risk Facility empowers organizations with: streamlined coverage application, shorter underwriting timelines, and consistent renewals and competitive premiums.</itunes:summary>
      <itunes:subtitle>If you’re seeking a stronger, simpler way to secure cyber insurance, don’t miss this opportunity to learn from the experts. Join us for this conversation to learn how the HITRUST Shared Risk Facility empowers organizations with: streamlined coverage application, shorter underwriting timelines, and consistent renewals and competitive premiums.</itunes:subtitle>
      <itunes:keywords>roi, compliance, transparency, trium, marco ciappelli, mcgill and partners, security posture, efficiency, sidney prasse, sean martin, josh ladeau, hitrust, cybersecurity, robert booker, risk management, underwriting, certification, hitrust collaborate 2024, insurance coverage, blake sutherland, brand story, cyberinsurance, webinar</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>161</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4bbe7bf-740a-4db4-9e6b-5ddaa79d567d</guid>
      <title>Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A McGill and Partners Short Brand Innovation Story with Ryan Griffin</title>
      <description><![CDATA[<p>During the latest Brand Story episode recorded as part of the On Location series at HITRUST Collaborate 2024, host Sean Martin speaks with Ryan Griffin from McGill Partners about the intricacies of cyber insurance.</p><p>Ryan Griffin, who plays a key role at the cyber insurance brokerage firm McGill Partners, shares insights into the importance of cyber insurance for large and complex organizations. Griffin outlines how the company helps clients understand and quantify their cyber risks before negotiating with over 100 cyber insurers to secure coverage. This rigorous approach is crucial given the volatile nature of cyber risks.</p><p>One of the significant challenges in the field, Griffin notes, is the counterparty risk involved in contractual relationships between large organizations. He emphasizes the necessity for businesses to carry adequate insurance coverage, akin to traditional liability insurance. Griffin reflects on the market evolution where organizations now see the value in cyber insurance, which should ideally cover rare but high-impact events.</p><p>The episode also highlights the pivotal role of data in understanding and pricing cyber risks. Sean Martin brings attention to the collaboration between McGill Partners and HITRUST. HITRUST's extensive data on cybersecurity and privacy maturity provides Griffins' team with a strong foundation for tailored cyber insurance solutions. Griffin praises HITRUST’s reliable framework that has been in place since 2007-2008, saying it’s a key differentiator in the cyber insurance space.</p><p>Sean Martin also notes the ongoing evolution in how organizations approach cyber insurance. Historically, the market's response to cybersecurity certifications has been lukewarm, but there is a shift towards utilizing credible, respected frameworks in insurance solutions. HITRUST certifications, such as the R2 certification, now play a crucial role in demonstrating an organization's efforts to mitigate risk and are instrumental in securing favorable insurance terms.</p><p>Griffin further discusses the multifaceted stakeholders involved in procuring cyber insurance within organizations. He talks about the need for simplifying cyber risk management for different organizational roles, particularly the non-technical insurance buyers. Griffin emphasizes making the insurance process less intimidating by leveraging compliance and cybersecurity measures already in place.</p><p>Ryan Griffin underscores McGill Partners' mission to create a mature and sustainable risk pool, making cyber insurance predictable and reliable for their clients. The collaboration with HITRUST showcases a tangible effort towards improving trust and efficiency in the cyber insurance market. With accurate, trustworthy data, McGill Partners is dedicated to reducing insurance barriers and ensuring organizations are well-prepared to meet their cyber risk management needs.</p><p>Learn more about McGill and Partners: <a href="https://itspm.ag/mcgill-and-partners-o89w">https://itspm.ag/mcgill-and-partners-o89w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Griffin</strong>, Partner, McGill and Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryanpgriffin/">https://www.linkedin.com/in/ryanpgriffin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from McGill and Partners: <a href="https://www.itspmagazine.com/directory/mcgill-and-partners">https://www.itspmagazine.com/directory/mcgill-and-partners</a></p><p>Video Podcast: Introduction to HITRUST’s Cyber Insurance Facility: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 3 Dec 2024 16:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Griffin)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-a-sustainable-predictable-cyber-insurance-market-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-mcgill-and-partners-short-brand-innovation-story-with-ryan-griffin-feliOpsF</link>
      <content:encoded><![CDATA[<p>During the latest Brand Story episode recorded as part of the On Location series at HITRUST Collaborate 2024, host Sean Martin speaks with Ryan Griffin from McGill Partners about the intricacies of cyber insurance.</p><p>Ryan Griffin, who plays a key role at the cyber insurance brokerage firm McGill Partners, shares insights into the importance of cyber insurance for large and complex organizations. Griffin outlines how the company helps clients understand and quantify their cyber risks before negotiating with over 100 cyber insurers to secure coverage. This rigorous approach is crucial given the volatile nature of cyber risks.</p><p>One of the significant challenges in the field, Griffin notes, is the counterparty risk involved in contractual relationships between large organizations. He emphasizes the necessity for businesses to carry adequate insurance coverage, akin to traditional liability insurance. Griffin reflects on the market evolution where organizations now see the value in cyber insurance, which should ideally cover rare but high-impact events.</p><p>The episode also highlights the pivotal role of data in understanding and pricing cyber risks. Sean Martin brings attention to the collaboration between McGill Partners and HITRUST. HITRUST's extensive data on cybersecurity and privacy maturity provides Griffins' team with a strong foundation for tailored cyber insurance solutions. Griffin praises HITRUST’s reliable framework that has been in place since 2007-2008, saying it’s a key differentiator in the cyber insurance space.</p><p>Sean Martin also notes the ongoing evolution in how organizations approach cyber insurance. Historically, the market's response to cybersecurity certifications has been lukewarm, but there is a shift towards utilizing credible, respected frameworks in insurance solutions. HITRUST certifications, such as the R2 certification, now play a crucial role in demonstrating an organization's efforts to mitigate risk and are instrumental in securing favorable insurance terms.</p><p>Griffin further discusses the multifaceted stakeholders involved in procuring cyber insurance within organizations. He talks about the need for simplifying cyber risk management for different organizational roles, particularly the non-technical insurance buyers. Griffin emphasizes making the insurance process less intimidating by leveraging compliance and cybersecurity measures already in place.</p><p>Ryan Griffin underscores McGill Partners' mission to create a mature and sustainable risk pool, making cyber insurance predictable and reliable for their clients. The collaboration with HITRUST showcases a tangible effort towards improving trust and efficiency in the cyber insurance market. With accurate, trustworthy data, McGill Partners is dedicated to reducing insurance barriers and ensuring organizations are well-prepared to meet their cyber risk management needs.</p><p>Learn more about McGill and Partners: <a href="https://itspm.ag/mcgill-and-partners-o89w">https://itspm.ag/mcgill-and-partners-o89w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Griffin</strong>, Partner, McGill and Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryanpgriffin/">https://www.linkedin.com/in/ryanpgriffin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from McGill and Partners: <a href="https://www.itspmagazine.com/directory/mcgill-and-partners">https://www.itspmagazine.com/directory/mcgill-and-partners</a></p><p>Video Podcast: Introduction to HITRUST’s Cyber Insurance Facility: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6848799" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/34c35b51-d0f2-4f72-946c-2f408152b6d6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=34c35b51-d0f2-4f72-946c-2f408152b6d6&amp;feed=2M86zCcc"/>
      <itunes:title>Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A McGill and Partners Short Brand Innovation Story with Ryan Griffin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Griffin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:08</itunes:duration>
      <itunes:summary>Join Sean Martin and Ryan Griffin from McGill Partners as they delve into the complexities of cyber insurance, discussing how reliable data from HITRUST is transforming risk management for large organizations. Discover the evolving role of cyber insurance in safeguarding businesses against high-impact cyber threats and the strategies for making the process less intimidating.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Ryan Griffin from McGill Partners as they delve into the complexities of cyber insurance, discussing how reliable data from HITRUST is transforming risk management for large organizations. Discover the evolving role of cyber insurance in safeguarding businesses against high-impact cyber threats and the strategies for making the process less intimidating.</itunes:subtitle>
      <itunes:keywords>compliance, data, marco ciappelli, insurance, sean martin, hitrust, cybersecurity, mcgill partners, cyber, itsp, conference, organization, coverage, seven minutes podcast, collaborate, management, cyber insurance, ryan griffin, certifications, hitrust collaborate, risk, privacy, vendor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>160</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">66490b10-52bf-40e6-980e-db66426dba2c</guid>
      <title>The Irreversible Impact of Technology: The Ethical Dilemmas We Face When We Can’t Uninvent Our Creations | An Australian Cyber Conference 2024 in Melbourne Conversation with Mikko Hypponen | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Mikko Hypponen</strong>, Chief Research Officer (CRO) at WithSecure [<a href="https://twitter.com/WithSecure" target="_blank">@WithSecure</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/hypponen/" target="_blank">https://www.linkedin.com/in/hypponen/</a></p><p>On Twitter | <a href="https://twitter.com/mikko" target="_blank">https://twitter.com/mikko</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the AISA CyberCon 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Mikko Hypponen to discuss the irreversible nature of technology, the challenges it presents, and its impact on society. The discussion focused not on the event itself but on broader issues and ideas that shape our relationship with technological innovation.</p><h3>The Irreversible Nature of Innovation</h3><p>Mikko emphasized that once a technology is invented, it cannot be uninvented. Strong encryption was one of his key examples: it secures communication for individuals and organizations, yet it is also used by criminals to evade detection. This duality underscores the reality that every innovation carries benefits and drawbacks. Mikko noted, “Even if we wanted to get rid of strong encryption, it’s not possible. Criminals would still use it.”</p><p>The conversation also touched on artificial intelligence. Mikko highlighted how innovations build on past advancements. Decades of progress in digitizing information, developing the internet, and creating cloud infrastructure have made today’s AI capabilities possible. He reflected on how large technological revolutions often take longer than anticipated to develop but eventually surpass expectations in scope.</p><h3>Technology as a Double-Edged Sword</h3><p>The group explored societal challenges posed by technology, such as the impact of social media on youth and ethical questions around ransomware. Mikko pointed to the breach of the Vastamo psychotherapy center in Finland, where hackers stole sensitive patient records and demanded ransoms from both the clinic and its patients. He argued that, in some cases, paying the ransom might result in less harm, even though it contradicts the principle of not funding criminal activity.</p><p>Marco raised the issue of preparing young people for social media, comparing it to teaching a child to drive before handing over car keys. The discussion emphasized the importance of gradually introducing tools and systems while fostering understanding of their risks and responsibilities.</p><h3>Building on the Past</h3><p>Marco noted how foundational technologies, like the internet, enable further innovations. Mikko agreed, citing how AI’s rapid rise was made possible by decades of previous work. He stressed that each technological leap requires the groundwork laid by earlier developments, creating platforms for new ideas to flourish.</p><p>The group also discussed the limitations of regulation. For example, cryptocurrencies, built on mathematical principles, cannot be fundamentally altered by laws. Instead, regulation can only address interactions between real-world currencies and blockchain systems. Mikko observed, “Math doesn’t care about your laws and regulations.”</p><h3>Closing Thoughts</h3><p>The conversation underscored that innovation is inherently a trade-off. Every advancement brings both opportunities and challenges, and society must navigate these complexities thoughtfully. Mikko highlighted that while the benefits of technologies like encryption, AI, and the internet are significant, they also create new risks.</p><p>Sean, Marco, and Mikko’s discussion emphasized the importance of understanding and adapting to technological change. While we can’t control the pace of innovation, we can shape how it integrates into our lives and institutions. This ongoing dialogue remains essential as society continues to grapple with the implications of progress.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 30 Nov 2024 01:01:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mikko Hypponen)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-irreversible-impact-of-technology-the-ethical-dilemmas-we-face-when-we-cant-uninvent-our-creations-an-australian-cyber-conference-2024-in-melbourne-conversation-with-mikko-hypponen-on-location-coverage-with-sean-martin-and-marco-ciappelli-mAPnc3Rr</link>
      <content:encoded><![CDATA[<p><strong>Guest: Mikko Hypponen</strong>, Chief Research Officer (CRO) at WithSecure [<a href="https://twitter.com/WithSecure" target="_blank">@WithSecure</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/hypponen/" target="_blank">https://www.linkedin.com/in/hypponen/</a></p><p>On Twitter | <a href="https://twitter.com/mikko" target="_blank">https://twitter.com/mikko</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the AISA CyberCon 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Mikko Hypponen to discuss the irreversible nature of technology, the challenges it presents, and its impact on society. The discussion focused not on the event itself but on broader issues and ideas that shape our relationship with technological innovation.</p><h3>The Irreversible Nature of Innovation</h3><p>Mikko emphasized that once a technology is invented, it cannot be uninvented. Strong encryption was one of his key examples: it secures communication for individuals and organizations, yet it is also used by criminals to evade detection. This duality underscores the reality that every innovation carries benefits and drawbacks. Mikko noted, “Even if we wanted to get rid of strong encryption, it’s not possible. Criminals would still use it.”</p><p>The conversation also touched on artificial intelligence. Mikko highlighted how innovations build on past advancements. Decades of progress in digitizing information, developing the internet, and creating cloud infrastructure have made today’s AI capabilities possible. He reflected on how large technological revolutions often take longer than anticipated to develop but eventually surpass expectations in scope.</p><h3>Technology as a Double-Edged Sword</h3><p>The group explored societal challenges posed by technology, such as the impact of social media on youth and ethical questions around ransomware. Mikko pointed to the breach of the Vastamo psychotherapy center in Finland, where hackers stole sensitive patient records and demanded ransoms from both the clinic and its patients. He argued that, in some cases, paying the ransom might result in less harm, even though it contradicts the principle of not funding criminal activity.</p><p>Marco raised the issue of preparing young people for social media, comparing it to teaching a child to drive before handing over car keys. The discussion emphasized the importance of gradually introducing tools and systems while fostering understanding of their risks and responsibilities.</p><h3>Building on the Past</h3><p>Marco noted how foundational technologies, like the internet, enable further innovations. Mikko agreed, citing how AI’s rapid rise was made possible by decades of previous work. He stressed that each technological leap requires the groundwork laid by earlier developments, creating platforms for new ideas to flourish.</p><p>The group also discussed the limitations of regulation. For example, cryptocurrencies, built on mathematical principles, cannot be fundamentally altered by laws. Instead, regulation can only address interactions between real-world currencies and blockchain systems. Mikko observed, “Math doesn’t care about your laws and regulations.”</p><h3>Closing Thoughts</h3><p>The conversation underscored that innovation is inherently a trade-off. Every advancement brings both opportunities and challenges, and society must navigate these complexities thoughtfully. Mikko highlighted that while the benefits of technologies like encryption, AI, and the internet are significant, they also create new risks.</p><p>Sean, Marco, and Mikko’s discussion emphasized the importance of understanding and adapting to technological change. While we can’t control the pace of innovation, we can shape how it integrates into our lives and institutions. This ongoing dialogue remains essential as society continues to grapple with the implications of progress.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23038848" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/08ced294-3cdb-490c-b462-9bab15face4a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=08ced294-3cdb-490c-b462-9bab15face4a&amp;feed=2M86zCcc"/>
      <itunes:title>The Irreversible Impact of Technology: The Ethical Dilemmas We Face When We Can’t Uninvent Our Creations | An Australian Cyber Conference 2024 in Melbourne Conversation with Mikko Hypponen | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mikko Hypponen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:59</itunes:duration>
      <itunes:summary>Explore the irreversible impact of technological innovation with Mikko Hypponen as he joins Sean Martin and Marco Ciappelli to discuss the duality of progress—from the ethical dilemmas of ransomware to the transformative rise of AI. This episode challenges you to rethink how we navigate the trade-offs of innovation in a world where the future is already here.</itunes:summary>
      <itunes:subtitle>Explore the irreversible impact of technological innovation with Mikko Hypponen as he joins Sean Martin and Marco Ciappelli to discuss the duality of progress—from the ethical dilemmas of ransomware to the transformative rise of AI. This episode challenges you to rethink how we navigate the trade-offs of innovation in a world where the future is already here.</itunes:subtitle>
      <itunes:keywords>melbourne cybersecurity event, technology, marco ciappelli, social media, artificial intelligence, risks, blockchain, sean martin, progress, australian cyber conference 2024, cybersecurity, conference, redefining cybersecurity, melbourne tech events, innovation, melbourne, trade-offs, future, cryptocurrencies, ransomware, podcast, encryption, ethics, regulation, melbourne cyber conference, ai, itspmagazine, digital transformation, australian cyber conference, mikko hypponen, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>159</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">221dec4a-45ee-4415-a53f-b236b57dd2ba</guid>
      <title>Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Australian Cyber Conference 2024 in Melbourne Conversation with Leanne Ngo | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Leanne Ngo</strong>, Associate Professor, La Trobe University</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/leanne-ngo-86979042/">https://www.linkedin.com/in/leanne-ngo-86979042/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During AISA Cyber Con 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Dr. Leanne Ngo to discuss cyber resilience, community impact, and the role of culture in cybersecurity. Their conversation explored the intersection of technology, education, and human connection in the pursuit of a safer and more secure society.</p><p>Dr. Ngo shared her perspective on resilience, highlighting its evolving definition. While digital tools increase opportunities for connection, she emphasized that face-to-face interaction remains vital, especially for vulnerable communities. Her work in promoting cybersecurity awareness involves building trust and understanding among diverse groups, tailoring approaches to their unique needs and cultural contexts.</p><p>The discussion turned to the importance of culture in cybersecurity, with Dr. Ngo describing it as a gradual process of change driven by action and integration into everyday life. She stressed that cyber awareness—often focused on knowledge—must evolve into behavioral transformation, where secure practices become second nature both at work and in personal lives. This requires understanding the subcultures within organizations and communities and adapting strategies to resonate with their specific dynamics.</p><p>Sean also brought up the concept of belief as a cornerstone for driving cultural change. Dr. Ngo agreed, emphasizing that confidence and a growth mindset are essential in fostering resilience. Drawing on her experience as a mentor and educator, she described how instilling belief in individuals’ capacity to contribute to a secure society empowers them to take ownership of their role in cybersecurity.</p><p>The conversation explored practical ways to bridge the gap between technical solutions and human-centered approaches. Dr. Ngo highlighted her work with the Australian government’s "Stay Safe, Act Now" campaign, which focuses on localizing cybersecurity education. By adapting materials to the values and practices of various communities—such as the South Sudanese and Cambodian populations—her initiatives create relatable and impactful messaging that goes beyond surface-level translations.</p><p>Education and workforce development also emerged as key themes. Dr. Ngo underscored the importance of short, targeted training programs, like micro-credentials, in addressing the growing skills gap in cybersecurity. Such programs offer accessible pathways for individuals from all backgrounds to contribute meaningfully to the industry, supporting Australia's ambition to be the most cyber-resilient country by 2030.</p><p>Closing the discussion, Dr. Ngo reinforced that cybersecurity is fundamentally about people. By fostering empathy, understanding, and a collaborative spirit, society can build resilience not just through technology but through the collective effort of individuals who care deeply about protecting one another. This belief in human potential left an enduring impression, inspiring attendees to think beyond traditional approaches and embrace the human element at the core of cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 29 Nov 2024 17:25:29 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Leanne Ngo)</author>
      <link>https://eventcoveragepodcast.com/episodes/human-factors-in-cyber-security-cultivating-cybersecurity-culture-and-cyber-skills-gap-an-australian-cyber-conference-2024-in-melbourne-conversation-with-leanne-ngo-on-location-coverage-with-sean-martin-and-marco-ciappelli-83oSn2o3</link>
      <content:encoded><![CDATA[<p><strong>Guest: Leanne Ngo</strong>, Associate Professor, La Trobe University</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/leanne-ngo-86979042/">https://www.linkedin.com/in/leanne-ngo-86979042/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During AISA Cyber Con 2024 in Melbourne, Sean Martin and Marco Ciappelli sat down with Dr. Leanne Ngo to discuss cyber resilience, community impact, and the role of culture in cybersecurity. Their conversation explored the intersection of technology, education, and human connection in the pursuit of a safer and more secure society.</p><p>Dr. Ngo shared her perspective on resilience, highlighting its evolving definition. While digital tools increase opportunities for connection, she emphasized that face-to-face interaction remains vital, especially for vulnerable communities. Her work in promoting cybersecurity awareness involves building trust and understanding among diverse groups, tailoring approaches to their unique needs and cultural contexts.</p><p>The discussion turned to the importance of culture in cybersecurity, with Dr. Ngo describing it as a gradual process of change driven by action and integration into everyday life. She stressed that cyber awareness—often focused on knowledge—must evolve into behavioral transformation, where secure practices become second nature both at work and in personal lives. This requires understanding the subcultures within organizations and communities and adapting strategies to resonate with their specific dynamics.</p><p>Sean also brought up the concept of belief as a cornerstone for driving cultural change. Dr. Ngo agreed, emphasizing that confidence and a growth mindset are essential in fostering resilience. Drawing on her experience as a mentor and educator, she described how instilling belief in individuals’ capacity to contribute to a secure society empowers them to take ownership of their role in cybersecurity.</p><p>The conversation explored practical ways to bridge the gap between technical solutions and human-centered approaches. Dr. Ngo highlighted her work with the Australian government’s "Stay Safe, Act Now" campaign, which focuses on localizing cybersecurity education. By adapting materials to the values and practices of various communities—such as the South Sudanese and Cambodian populations—her initiatives create relatable and impactful messaging that goes beyond surface-level translations.</p><p>Education and workforce development also emerged as key themes. Dr. Ngo underscored the importance of short, targeted training programs, like micro-credentials, in addressing the growing skills gap in cybersecurity. Such programs offer accessible pathways for individuals from all backgrounds to contribute meaningfully to the industry, supporting Australia's ambition to be the most cyber-resilient country by 2030.</p><p>Closing the discussion, Dr. Ngo reinforced that cybersecurity is fundamentally about people. By fostering empathy, understanding, and a collaborative spirit, society can build resilience not just through technology but through the collective effort of individuals who care deeply about protecting one another. This belief in human potential left an enduring impression, inspiring attendees to think beyond traditional approaches and embrace the human element at the core of cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24942653" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1fdccb78-7986-408b-8daf-8140771a7527/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1fdccb78-7986-408b-8daf-8140771a7527&amp;feed=2M86zCcc"/>
      <itunes:title>Human Factors in Cyber Security: Cultivating Cybersecurity Culture and Cyber Skills Gap | An Australian Cyber Conference 2024 in Melbourne Conversation with Leanne Ngo | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Leanne Ngo</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:58</itunes:duration>
      <itunes:summary>Explore how resilience, culture, and community connection drive cybersecurity in a compelling conversation with Dr. Leanne Ngo at AISA Cyber Con 2024. Discover actionable insights on empowering diverse communities, fostering belief in human potential, and building a secure society through collaboration and education.</itunes:summary>
      <itunes:subtitle>Explore how resilience, culture, and community connection drive cybersecurity in a compelling conversation with Dr. Leanne Ngo at AISA Cyber Con 2024. Discover actionable insights on empowering diverse communities, fostering belief in human potential, and building a secure society through collaboration and education.</itunes:subtitle>
      <itunes:keywords>collaboration, melbourne cybersecurity event, technology, marco ciappelli, empowerment, digital safety, sean martin, education, cultural change, australian cyber conference 2024, vulnerable communities, cybersecurity, human factors, conference, community engagement, redefining cybersecurity, melbourne tech events, melbourne, cybersecurity education, cyber awareness, micro-credentials, leanne ngo, podcast, cyber resilience, melbourne cyber conference, cybersecurity culture, australia, itspmagazine, australian cyber conference, belief, training, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">34d2c7f9-a692-481b-ae55-5289f1755943</guid>
      <title>Data Sovereignty and Security Challenges in the APAC Region: Simplifying Security with Zero Trust and AI-Driven Solutions | An Australian Cyber Conference 2024 in Melbourne Conversation with Abbas Kudrati | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Abbas Kudrati</strong>, Asia’s SMC Regional Chief Security, Risk, Compliance Advisor, Microsoft [<a href="https://x.com/microsoft" target="_blank">@Microsoft</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akudrati/" target="_blank">https://www.linkedin.com/in/akudrati/</a></p><p>On Twitter | <a href="https://twitter.com/askudrati" target="_blank">https://twitter.com/askudrati</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the On Location series at AISA Cyber Con 2024 in Melbourne, a significant conversation unfolded between Sean Martin, Marco Ciappelli, and Abbas Kudrati about key cybersecurity themes and strategies relevant to the Asia-Pacific region.</p><p>Abbas Kudrati, a seasoned cybersecurity professional and cloud advocate, shared insights into the state of cybersecurity in the region. He highlighted that ransomware remains one of the top threats, particularly in Asia and Australia. This persistent issue underscores the importance of robust data governance and access control. Abbas emphasized that organizations must establish strong security foundations, including data classification and access management, to prepare for the complexities introduced by AI. Without these measures, companies risk exposing sensitive information when leveraging generative AI solutions.</p><p>The discussion also touched on data sovereignty, a critical topic for governments and defense organizations in Australia. Abbas noted the growing number of localized data centers built by major cloud providers to meet sovereignty requirements. While private sector organizations tend to be less stringent about data location, government entities require data to remain onshore. Frameworks like IRAP and Essential Eight are instrumental in ensuring compliance and guiding organizations in implementing consistent security practices.</p><p>Zero Trust emerged as a transformative concept post-pandemic. According to Abbas, it simplified cybersecurity by enabling secure remote work and encouraging organizations to embrace cloud solutions. He contrasted this with the rise of generative AI, which has introduced both opportunities and challenges. AI's potential to streamline processes, such as analyzing security alerts and automating vulnerability management, is undeniable. However, its unbounded nature demands new strategies, including employee education on prompt engineering and responsible AI use.</p><p>Sean Martin and Marco Ciappelli explored how AI can revolutionize operations. Abbas pointed out that AI tools like security copilots are making cybersecurity more accessible, allowing analysts to query systems in natural language and accelerating incident response. He stressed the importance of using AI defensively to match the speed and sophistication of modern attackers, noting that attackers are increasingly leveraging AI for malicious activities.</p><p>The conversation concluded with a forward-looking perspective on AI’s role in shaping cybersecurity and the importance of maintaining agility and preparedness in the face of evolving threats. This dynamic exchange provided a comprehensive view of the challenges and advancements influencing cybersecurity in the Asia-Pacific region today.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 29 Nov 2024 01:25:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Abbas Kudrati)</author>
      <link>https://eventcoveragepodcast.com/episodes/data-sovereignty-and-security-challenges-in-the-apac-region-simplifying-security-with-zero-trust-and-ai-driven-solutions-an-australian-cyber-conference-2024-in-melbourne-conversation-with-abbas-kudrati-on-location-coverage-FmmkY00I</link>
      <content:encoded><![CDATA[<p><strong>Guest: Abbas Kudrati</strong>, Asia’s SMC Regional Chief Security, Risk, Compliance Advisor, Microsoft [<a href="https://x.com/microsoft" target="_blank">@Microsoft</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akudrati/" target="_blank">https://www.linkedin.com/in/akudrati/</a></p><p>On Twitter | <a href="https://twitter.com/askudrati" target="_blank">https://twitter.com/askudrati</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the On Location series at AISA Cyber Con 2024 in Melbourne, a significant conversation unfolded between Sean Martin, Marco Ciappelli, and Abbas Kudrati about key cybersecurity themes and strategies relevant to the Asia-Pacific region.</p><p>Abbas Kudrati, a seasoned cybersecurity professional and cloud advocate, shared insights into the state of cybersecurity in the region. He highlighted that ransomware remains one of the top threats, particularly in Asia and Australia. This persistent issue underscores the importance of robust data governance and access control. Abbas emphasized that organizations must establish strong security foundations, including data classification and access management, to prepare for the complexities introduced by AI. Without these measures, companies risk exposing sensitive information when leveraging generative AI solutions.</p><p>The discussion also touched on data sovereignty, a critical topic for governments and defense organizations in Australia. Abbas noted the growing number of localized data centers built by major cloud providers to meet sovereignty requirements. While private sector organizations tend to be less stringent about data location, government entities require data to remain onshore. Frameworks like IRAP and Essential Eight are instrumental in ensuring compliance and guiding organizations in implementing consistent security practices.</p><p>Zero Trust emerged as a transformative concept post-pandemic. According to Abbas, it simplified cybersecurity by enabling secure remote work and encouraging organizations to embrace cloud solutions. He contrasted this with the rise of generative AI, which has introduced both opportunities and challenges. AI's potential to streamline processes, such as analyzing security alerts and automating vulnerability management, is undeniable. However, its unbounded nature demands new strategies, including employee education on prompt engineering and responsible AI use.</p><p>Sean Martin and Marco Ciappelli explored how AI can revolutionize operations. Abbas pointed out that AI tools like security copilots are making cybersecurity more accessible, allowing analysts to query systems in natural language and accelerating incident response. He stressed the importance of using AI defensively to match the speed and sophistication of modern attackers, noting that attackers are increasingly leveraging AI for malicious activities.</p><p>The conversation concluded with a forward-looking perspective on AI’s role in shaping cybersecurity and the importance of maintaining agility and preparedness in the face of evolving threats. This dynamic exchange provided a comprehensive view of the challenges and advancements influencing cybersecurity in the Asia-Pacific region today.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23476453" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/10579cfb-2152-447e-a21f-81aff03329f0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=10579cfb-2152-447e-a21f-81aff03329f0&amp;feed=2M86zCcc"/>
      <itunes:title>Data Sovereignty and Security Challenges in the APAC Region: Simplifying Security with Zero Trust and AI-Driven Solutions | An Australian Cyber Conference 2024 in Melbourne Conversation with Abbas Kudrati | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Abbas Kudrati</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:27</itunes:duration>
      <itunes:summary>Hear how Abbas Kudrati shares actionable insights on tackling ransomware, navigating AI challenges, and embracing Zero Trust strategies to strengthen cybersecurity foundations in the Asia-Pacific region. This engaging conversation also highlights the evolving role of AI in streamlining operations and staying ahead of attackers, offering practical guidance for today’s security leaders.</itunes:summary>
      <itunes:subtitle>Hear how Abbas Kudrati shares actionable insights on tackling ransomware, navigating AI challenges, and embracing Zero Trust strategies to strengthen cybersecurity foundations in the Asia-Pacific region. This engaging conversation also highlights the evolving role of AI in streamlining operations and staying ahead of attackers, offering practical guidance for today’s security leaders.</itunes:subtitle>
      <itunes:keywords>compliance, essential eight, melbourne cybersecurity event, marco ciappelli, abbas kudrati, sean martin, australian cyber conference 2024, cybersecurity, threat actors, conference, redefining cybersecurity, melbourne tech events, generative ai, data protection, apac, cloud, ransomware, podcast, data sovereignty, incident response, melbourne cyber conference, ai, user awareness, itspmagazine, access control, australian cyber conference, zero trust, security operations, governance, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>157</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">addd4ba0-49db-44b8-aa83-d0301059af61</guid>
      <title>Australia&apos;s Global Opportunity and Responsibility: Shaping a More Secure Region and a Safer Digital World | An Australian Cyber Conference 2024 in Melbourne Conversation with Ambassador Brendan Dowling | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Ambassador Brendan Dowling</strong>, Ambassador for Cyber Affairs and Critical Technology, DFAT</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brendan-dowling-7812b4261/" target="_blank">https://www.linkedin.com/in/brendan-dowling-7812b4261/</a></p><p>AT AU Cyber Con | <a href="https://canberra2024.cyberconference.com.au/speakers/brendan-dowling" target="_blank">https://canberra2024.cyberconference.com.au/speakers/brendan-dowling</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This conversation with Brendan Dowling gave us a glimpse into the strategies, challenges, and collaborations shaping Australia’s digital future—and reminded us all that the cyber frontier is not just a technical battlefield but a deeply human one.</p><p><strong>The Role of a Cyber Ambassador</strong><br />Dowling began by discussing the unique responsibilities of a Cyber Ambassador, a role that integrates cybersecurity into foreign policy at the highest levels. He emphasized how this position, once viewed as an innovative experiment, has become a strategic necessity for national security. As cyber threats grow increasingly complex and borderless, cyber diplomacy has emerged as a critical tool for fostering stability and trust on the global stage.</p><p><strong>Strengthening Global Collaboration</strong><br />During the discussion, Dowling highlighted the collaborative nature of Australia’s cybersecurity efforts. He explained how cooperation within government agencies and partnerships with international allies are key to staying ahead of emerging threats. These relationships enable critical information-sharing, strategic alignment, and unified responses to incidents, underscoring the interconnectedness of today’s digital ecosystem.</p><p><strong>Navigating AI and Ethical Challenges</strong><br />The conversation turned to artificial intelligence and its growing role in society. Dowling addressed the ethical considerations of AI development and deployment, stressing the importance of balancing innovation with responsibility. He described Australia’s approach to advocating for ethical design and policy frameworks that protect privacy and human rights while maximizing AI’s benefits.</p><p><strong>Building Resilience in Critical Infrastructure</strong><br />Critical infrastructure was another focal point of the discussion. Dowling acknowledged the increasing complexity of protecting vital systems, from industrial control processes to supply chains. He emphasized resilience—not only in preventing attacks but in responding swiftly and effectively when incidents occur. This approach ensures that essential services, such as energy and manufacturing, can continue to operate even under pressure.</p><p><strong>Cultural Contexts in Cybersecurity</strong><br />Dowling also reflected on the role of cultural differences in shaping cybersecurity strategies. He shared experiences from his international work, where addressing issues like online safety and disinformation often requires sensitivity to local norms and values. Tailoring cybersecurity approaches to diverse cultural contexts, he noted, is vital for fostering trust and collaboration across regions.</p><p><strong>Conclusion:</strong><br />As the conversation concluded, Dowling reaffirmed the need for continued cooperation, innovation, and cultural understanding in tackling global cyber challenges. Sean Martin and Marco Ciappelli expressed their gratitude, leaving listeners with a clear message: cybersecurity is not just a technical issue—it’s a global, ethical, and deeply human challenge that requires collective effort.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Australia's global opportunity and responsibility: shaping a more secure region and a safer digital world (Session): <a href="https://canberra2024.cyberconference.com.au/sessions/australias-global-opportunity-and-responsibility-shaping-a-more-secure-region-and-a-safer-digital-world">https://canberra2024.cyberconference.com.au/sessions/australias-global-opportunity-and-responsibility-shaping-a-more-secure-region-and-a-safer-digital-world</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 29 Nov 2024 00:52:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ambassador Brendan Dowling)</author>
      <link>https://eventcoveragepodcast.com/episodes/australias-global-opportunity-and-responsibility-shaping-a-more-secure-region-and-a-safer-digital-world-an-australian-cyber-conference-2024-in-melbourne-conversation-with-ambassador-brendan-dowling-on-location-coverage-zv5Y0n7e</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ambassador Brendan Dowling</strong>, Ambassador for Cyber Affairs and Critical Technology, DFAT</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brendan-dowling-7812b4261/" target="_blank">https://www.linkedin.com/in/brendan-dowling-7812b4261/</a></p><p>AT AU Cyber Con | <a href="https://canberra2024.cyberconference.com.au/speakers/brendan-dowling" target="_blank">https://canberra2024.cyberconference.com.au/speakers/brendan-dowling</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This conversation with Brendan Dowling gave us a glimpse into the strategies, challenges, and collaborations shaping Australia’s digital future—and reminded us all that the cyber frontier is not just a technical battlefield but a deeply human one.</p><p><strong>The Role of a Cyber Ambassador</strong><br />Dowling began by discussing the unique responsibilities of a Cyber Ambassador, a role that integrates cybersecurity into foreign policy at the highest levels. He emphasized how this position, once viewed as an innovative experiment, has become a strategic necessity for national security. As cyber threats grow increasingly complex and borderless, cyber diplomacy has emerged as a critical tool for fostering stability and trust on the global stage.</p><p><strong>Strengthening Global Collaboration</strong><br />During the discussion, Dowling highlighted the collaborative nature of Australia’s cybersecurity efforts. He explained how cooperation within government agencies and partnerships with international allies are key to staying ahead of emerging threats. These relationships enable critical information-sharing, strategic alignment, and unified responses to incidents, underscoring the interconnectedness of today’s digital ecosystem.</p><p><strong>Navigating AI and Ethical Challenges</strong><br />The conversation turned to artificial intelligence and its growing role in society. Dowling addressed the ethical considerations of AI development and deployment, stressing the importance of balancing innovation with responsibility. He described Australia’s approach to advocating for ethical design and policy frameworks that protect privacy and human rights while maximizing AI’s benefits.</p><p><strong>Building Resilience in Critical Infrastructure</strong><br />Critical infrastructure was another focal point of the discussion. Dowling acknowledged the increasing complexity of protecting vital systems, from industrial control processes to supply chains. He emphasized resilience—not only in preventing attacks but in responding swiftly and effectively when incidents occur. This approach ensures that essential services, such as energy and manufacturing, can continue to operate even under pressure.</p><p><strong>Cultural Contexts in Cybersecurity</strong><br />Dowling also reflected on the role of cultural differences in shaping cybersecurity strategies. He shared experiences from his international work, where addressing issues like online safety and disinformation often requires sensitivity to local norms and values. Tailoring cybersecurity approaches to diverse cultural contexts, he noted, is vital for fostering trust and collaboration across regions.</p><p><strong>Conclusion:</strong><br />As the conversation concluded, Dowling reaffirmed the need for continued cooperation, innovation, and cultural understanding in tackling global cyber challenges. Sean Martin and Marco Ciappelli expressed their gratitude, leaving listeners with a clear message: cybersecurity is not just a technical issue—it’s a global, ethical, and deeply human challenge that requires collective effort.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Australia's global opportunity and responsibility: shaping a more secure region and a safer digital world (Session): <a href="https://canberra2024.cyberconference.com.au/sessions/australias-global-opportunity-and-responsibility-shaping-a-more-secure-region-and-a-safer-digital-world">https://canberra2024.cyberconference.com.au/sessions/australias-global-opportunity-and-responsibility-shaping-a-more-secure-region-and-a-safer-digital-world</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="15729158" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/be169fb0-8ae7-4daa-9dfc-4913d279b8d1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=be169fb0-8ae7-4daa-9dfc-4913d279b8d1&amp;feed=2M86zCcc"/>
      <itunes:title>Australia&apos;s Global Opportunity and Responsibility: Shaping a More Secure Region and a Safer Digital World | An Australian Cyber Conference 2024 in Melbourne Conversation with Ambassador Brendan Dowling | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ambassador Brendan Dowling</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:23</itunes:duration>
      <itunes:summary>At the Australian Cyber Conference Melbourne 2024, On Location with Sean Martin and Marco Ciappelli welcomed Brendan Dowling, Australia’s Ambassador for Cyber Affairs and Critical Technology. In this thought-provoking conversation, Dowling shared his insights on the evolving role of cyber diplomacy, the ethical implications of AI, and the importance of international collaboration in securing the digital world.</itunes:summary>
      <itunes:subtitle>At the Australian Cyber Conference Melbourne 2024, On Location with Sean Martin and Marco Ciappelli welcomed Brendan Dowling, Australia’s Ambassador for Cyber Affairs and Critical Technology. In this thought-provoking conversation, Dowling shared his insights on the evolving role of cyber diplomacy, the ethical implications of AI, and the importance of international collaboration in securing the digital world.</itunes:subtitle>
      <itunes:keywords>brendan dowling, cultural sensitivity, critical infrastructure, melbourne cybersecurity event, marco ciappelli, sean martin, australian cyber conference 2024, cybersecurity, global collaboration, cyberdiplomacy, conference, redefining cybersecurity, melbourne tech events, melbourne, podcast, cyber resilience, ethics, melbourne cyber conference, ai, itspmagazine, australian cyber conference, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>156</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">755671f6-3271-4a79-80c4-6aa394904255</guid>
      <title>How Do We Make Decisions in Cyber Security? Operational, Tactical, and Strategic Decision-Making in the Age of AI | An Australian Cyber Conference 2024 in Melbourne Conversation with Ivano Bongiovanni | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Ivano Bongiovanni</strong>, General Manager / Sr Lecturer, AusCERT / UQ</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ivano-bongiovanni-cybersecurity-management/" target="_blank">https://www.linkedin.com/in/ivano-bongiovanni-cybersecurity-management/</a></p><p>At AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/ivano-bongiovanni-ibtpp" target="_blank">https://melbourne2024.cyberconference.com.au/speakers/ivano-bongiovanni-ibtpp</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This AISA Cyber Con 2024 On Location podcast episode recorded in Melbourne spotlights critical discussions led by Ivano Bongiovanni, General Manager for AUSCERT and Senior Lecturer in Cybersecurity at the University of Queensland. The dialogue centers on pivotal issues shaping organizational approaches to cybersecurity, from decision-making factors to data governance and regulatory influences.</p><p>Bongiovanni discusses his research on decision-making in cybersecurity, conducted across six large organizations. By interviewing professionals at operational, tactical, and strategic levels, the study examines the multifaceted factors driving decisions, such as configuring security systems or choosing cyber insurance. The research identifies four primary influence levels: industry, organizational, team, and individual. Key drivers include regulations at the industry level, organizational culture, and access to collaborative professional forums. These insights aim to provide decision-makers with a reflective framework to ensure comprehensive and informed choices.</p><p>Another prominent focus is data governance. Bongiovanni emphasizes its role as both a foundation for robust cybersecurity and a potential avenue for organizational value creation. He highlights the challenges organizations face in mapping, managing, and securing their data. While traditionally viewed through a lens of loss prevention, he argues that effective data governance can unlock operational efficiencies and new business opportunities. This aligns with a broader industry shift to link cybersecurity investments to strategic value creation, rather than purely protective measures.</p><p>The episode also touches on evolving regulatory landscapes. Bongiovanni outlines the increasing scrutiny on board members and CISOs (Chief Information Security Officers) regarding cybersecurity accountability. While Australia is still catching up with global trends, parallels are drawn to the U.S., where regulations like the SEC’s proposed cyber disclosures link leadership liability to organizational cybersecurity practices. In Australia, existing duties of care under the Corporations Act are becoming focal points for regulatory expectations.</p><p>Information-sharing frameworks, such as ISACs (Information Sharing and Analysis Centers), also feature in the discussion. Bongiovanni underscores their importance in fostering collaboration, particularly in sectors like higher education and healthcare. He notes the ongoing cultural shift encouraging organizations to share threat intelligence securely, which is essential for collective resilience.</p><p>Through Bongiovanni’s contributions, this episode highlights both the challenges and opportunities in cybersecurity decision-making, emphasizing a nuanced understanding of regulatory, cultural, and technical dynamics.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Future is now: Cautious reflections and bold predictions on cyber security in the years to come (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-FsEVnuge9u">https://melbourne2024.cyberconference.com.au/sessions/session-FsEVnuge9u</a></p><p>How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-BdOGZjahUe">https://melbourne2024.cyberconference.com.au/sessions/session-BdOGZjahUe</a></p><p>The executive playbook: Elevate your cyber security through data governance (Workshop): <a href="https://melbourne2024.cyberconference.com.au/workshops/workshop-rxAAQPTLUJ">https://melbourne2024.cyberconference.com.au/workshops/workshop-rxAAQPTLUJ</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 28 Nov 2024 02:09:25 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ivano Bongiovanni)</author>
      <link>https://eventcoveragepodcast.com/episodes/how-do-we-make-decisions-in-cyber-security-operational-tactical-and-strategic-decision-making-in-the-age-of-ai-an-australian-cyber-conference-2024-in-melbourne-conversation-with-ivano-bongiovanni-on-location-coverage-VGtfeBCu</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ivano Bongiovanni</strong>, General Manager / Sr Lecturer, AusCERT / UQ</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ivano-bongiovanni-cybersecurity-management/" target="_blank">https://www.linkedin.com/in/ivano-bongiovanni-cybersecurity-management/</a></p><p>At AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/ivano-bongiovanni-ibtpp" target="_blank">https://melbourne2024.cyberconference.com.au/speakers/ivano-bongiovanni-ibtpp</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This AISA Cyber Con 2024 On Location podcast episode recorded in Melbourne spotlights critical discussions led by Ivano Bongiovanni, General Manager for AUSCERT and Senior Lecturer in Cybersecurity at the University of Queensland. The dialogue centers on pivotal issues shaping organizational approaches to cybersecurity, from decision-making factors to data governance and regulatory influences.</p><p>Bongiovanni discusses his research on decision-making in cybersecurity, conducted across six large organizations. By interviewing professionals at operational, tactical, and strategic levels, the study examines the multifaceted factors driving decisions, such as configuring security systems or choosing cyber insurance. The research identifies four primary influence levels: industry, organizational, team, and individual. Key drivers include regulations at the industry level, organizational culture, and access to collaborative professional forums. These insights aim to provide decision-makers with a reflective framework to ensure comprehensive and informed choices.</p><p>Another prominent focus is data governance. Bongiovanni emphasizes its role as both a foundation for robust cybersecurity and a potential avenue for organizational value creation. He highlights the challenges organizations face in mapping, managing, and securing their data. While traditionally viewed through a lens of loss prevention, he argues that effective data governance can unlock operational efficiencies and new business opportunities. This aligns with a broader industry shift to link cybersecurity investments to strategic value creation, rather than purely protective measures.</p><p>The episode also touches on evolving regulatory landscapes. Bongiovanni outlines the increasing scrutiny on board members and CISOs (Chief Information Security Officers) regarding cybersecurity accountability. While Australia is still catching up with global trends, parallels are drawn to the U.S., where regulations like the SEC’s proposed cyber disclosures link leadership liability to organizational cybersecurity practices. In Australia, existing duties of care under the Corporations Act are becoming focal points for regulatory expectations.</p><p>Information-sharing frameworks, such as ISACs (Information Sharing and Analysis Centers), also feature in the discussion. Bongiovanni underscores their importance in fostering collaboration, particularly in sectors like higher education and healthcare. He notes the ongoing cultural shift encouraging organizations to share threat intelligence securely, which is essential for collective resilience.</p><p>Through Bongiovanni’s contributions, this episode highlights both the challenges and opportunities in cybersecurity decision-making, emphasizing a nuanced understanding of regulatory, cultural, and technical dynamics.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Future is now: Cautious reflections and bold predictions on cyber security in the years to come (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-FsEVnuge9u">https://melbourne2024.cyberconference.com.au/sessions/session-FsEVnuge9u</a></p><p>How do we make decisions in cybersecurity? Operational, tactical, and strategic decision-making in the age of AI (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-BdOGZjahUe">https://melbourne2024.cyberconference.com.au/sessions/session-BdOGZjahUe</a></p><p>The executive playbook: Elevate your cyber security through data governance (Workshop): <a href="https://melbourne2024.cyberconference.com.au/workshops/workshop-rxAAQPTLUJ">https://melbourne2024.cyberconference.com.au/workshops/workshop-rxAAQPTLUJ</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23968797" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9fb51c67-2d08-4949-8a8a-930b222dba0a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9fb51c67-2d08-4949-8a8a-930b222dba0a&amp;feed=2M86zCcc"/>
      <itunes:title>How Do We Make Decisions in Cyber Security? Operational, Tactical, and Strategic Decision-Making in the Age of AI | An Australian Cyber Conference 2024 in Melbourne Conversation with Ivano Bongiovanni | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ivano Bongiovanni</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:58</itunes:duration>
      <itunes:summary>Discover how Ivano Bongiovanni, General Manager for AUSCERT and Senior Lecturer at the University of Queensland, unpacks the complexities of cybersecurity decision-making, data governance, and regulatory accountability. This episode offers actionable insights into navigating organizational challenges while leveraging cybersecurity for strategic value creation.</itunes:summary>
      <itunes:subtitle>Discover how Ivano Bongiovanni, General Manager for AUSCERT and Senior Lecturer at the University of Queensland, unpacks the complexities of cybersecurity decision-making, data governance, and regulatory accountability. This episode offers actionable insights into navigating organizational challenges while leveraging cybersecurity for strategic value creation.</itunes:subtitle>
      <itunes:keywords>compliance, collaboration, melbourne cybersecurity event, marco ciappelli, research, organizational culture, sean martin, australian cyber conference 2024, cybersecurity, data governance, conference, redefining cybersecurity, regulations, risk management, melbourne tech events, ivano bongiovanni, cyber insurance, melbourne, higher education, podcast, incident response, melbourne cyber conference, australia, itspmagazine, data sharing, australian cyber conference, cisos, board accountability, decision making, au cyber con 2024, isacs</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10d78441-9ddb-4699-8423-d6a8442bcf7e</guid>
      <title>The Top 10 Skills Your Security Awareness and Culture Person Must Have (With No IT or Cyber Skills in Sight) | An Australian Cyber Conference 2024 in Melbourne Conversation with Daisy Wong | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Daisy Wong</strong>, Head of Security Awareness, Medibank</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/daisywong127/">https://www.linkedin.com/in/daisywong127/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Kicking off the conversation, Marco noted the absence of his co-host Sean, whose focus often leans technical. This opened the door for a deeper exploration into the human and operational side of cybersecurity, an area Daisy Wong is uniquely equipped to discuss.</p><p>Daisy’s career journey, from earning a marketing degree to becoming Medibank’s Head of Security Awareness, is rooted in understanding human behavior. Her hands-on experience with phishing emails and time spent in a pen-testing team revealed how critical culture and communication are to effective cybersecurity.</p><p><strong>The Power of Communication and Culture in Cybersecurity</strong><br />Daisy highlighted how her ability to simplify complex technical language became the cornerstone of her work in cybersecurity awareness. She emphasized that soft skills, like communication, are just as essential as technical know-how in navigating today’s cyber challenges.</p><p>Drawing cultural parallels, Daisy shared analogies from her cultural heritage, like the tradition of removing shoes before entering a home, and compared them to cybersecurity practices. Marco added an Italian twist, pointing to customs like cheek-kissing as a metaphor for ingrained behaviors. Together, they underscored how fostering a security-first mindset mirrors cultural conditioning—it requires intentionality, consistency, and collective effort.</p><p><strong>Breaking Barriers and Building Bridges</strong><br />One of the key takeaways from the discussion was the need to break down the misconception that cybersecurity is solely a technical field. Daisy argued for creating environments where employees feel safe reporting security concerns, regardless of their technical background.</p><p>She shared strategies for fostering collaboration, like simple yet impactful initiatives during Cyber Awareness Month. These efforts, such as wearing branded T-shirts, can make security a shared responsibility and encourage open communication across teams.</p><p><strong>Staying Ahead in an Evolving Threat Landscape</strong><br />Daisy also spoke about how cyber threats are evolving, particularly with the rise of generative AI. Traditional warning signs, like spelling mistakes in phishing emails, are being replaced with far more sophisticated tactics. She emphasized the need for organizations to stay adaptable and for individuals to remain vigilant.</p><p>While AI offers tools to identify risks, Daisy and Marco agreed that personal accountability and fundamental awareness remain irreplaceable in ensuring robust security practices.</p><p>In this lively episode of <i>On Location with Marco Ciappelli</i>, Daisy Wong spotlighted the indispensable role of human behavior, culture, and communication in cybersecurity. Her insights remind us that while technology evolves, the human element remains at the heart of effective cyber defense.</p><p>Cybersecurity isn’t just about systems and software—it’s about people. And as threats become more sophisticated, so must our strategies, blending technical tools with cultural awareness to create a resilient and adaptable defense</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 28 Nov 2024 01:50:16 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Daisy Wong)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-top-10-skills-your-security-awareness-and-culture-person-must-have-with-no-it-or-cyber-skills-in-sight-an-australian-cyber-conference-2024-in-melbourne-conversation-with-daisy-wong-on-location-coverage-with-sean-martin-and-marco-ciappelli-QfrViFlx</link>
      <content:encoded><![CDATA[<p><strong>Guest: Daisy Wong</strong>, Head of Security Awareness, Medibank</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/daisywong127/">https://www.linkedin.com/in/daisywong127/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Kicking off the conversation, Marco noted the absence of his co-host Sean, whose focus often leans technical. This opened the door for a deeper exploration into the human and operational side of cybersecurity, an area Daisy Wong is uniquely equipped to discuss.</p><p>Daisy’s career journey, from earning a marketing degree to becoming Medibank’s Head of Security Awareness, is rooted in understanding human behavior. Her hands-on experience with phishing emails and time spent in a pen-testing team revealed how critical culture and communication are to effective cybersecurity.</p><p><strong>The Power of Communication and Culture in Cybersecurity</strong><br />Daisy highlighted how her ability to simplify complex technical language became the cornerstone of her work in cybersecurity awareness. She emphasized that soft skills, like communication, are just as essential as technical know-how in navigating today’s cyber challenges.</p><p>Drawing cultural parallels, Daisy shared analogies from her cultural heritage, like the tradition of removing shoes before entering a home, and compared them to cybersecurity practices. Marco added an Italian twist, pointing to customs like cheek-kissing as a metaphor for ingrained behaviors. Together, they underscored how fostering a security-first mindset mirrors cultural conditioning—it requires intentionality, consistency, and collective effort.</p><p><strong>Breaking Barriers and Building Bridges</strong><br />One of the key takeaways from the discussion was the need to break down the misconception that cybersecurity is solely a technical field. Daisy argued for creating environments where employees feel safe reporting security concerns, regardless of their technical background.</p><p>She shared strategies for fostering collaboration, like simple yet impactful initiatives during Cyber Awareness Month. These efforts, such as wearing branded T-shirts, can make security a shared responsibility and encourage open communication across teams.</p><p><strong>Staying Ahead in an Evolving Threat Landscape</strong><br />Daisy also spoke about how cyber threats are evolving, particularly with the rise of generative AI. Traditional warning signs, like spelling mistakes in phishing emails, are being replaced with far more sophisticated tactics. She emphasized the need for organizations to stay adaptable and for individuals to remain vigilant.</p><p>While AI offers tools to identify risks, Daisy and Marco agreed that personal accountability and fundamental awareness remain irreplaceable in ensuring robust security practices.</p><p>In this lively episode of <i>On Location with Marco Ciappelli</i>, Daisy Wong spotlighted the indispensable role of human behavior, culture, and communication in cybersecurity. Her insights remind us that while technology evolves, the human element remains at the heart of effective cyber defense.</p><p>Cybersecurity isn’t just about systems and software—it’s about people. And as threats become more sophisticated, so must our strategies, blending technical tools with cultural awareness to create a resilient and adaptable defense</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26099975" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8d3f4cf3-d286-428e-96b9-1e55a8114118/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8d3f4cf3-d286-428e-96b9-1e55a8114118&amp;feed=2M86zCcc"/>
      <itunes:title>The Top 10 Skills Your Security Awareness and Culture Person Must Have (With No IT or Cyber Skills in Sight) | An Australian Cyber Conference 2024 in Melbourne Conversation with Daisy Wong | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Daisy Wong</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:11</itunes:duration>
      <itunes:summary>At the Australian Cyber Conference 2024 in Melbourne, Marco Ciappelli hosted an insightful conversation with Daisy Wong, diving into a topic often overshadowed in cybersecurity discussions—the human factor.</itunes:summary>
      <itunes:subtitle>At the Australian Cyber Conference 2024 in Melbourne, Marco Ciappelli hosted an insightful conversation with Daisy Wong, diving into a topic often overshadowed in cybersecurity discussions—the human factor.</itunes:subtitle>
      <itunes:keywords>non-technical skills, communication in security, melbourne cybersecurity event, marco ciappelli, stakeholder management, human element in cybersecurity, ciso, sean martin, australian cyber conference 2024, australian cyber conference 2024, cybersecurity, generative ai in cybersecurity, conference, redefining cybersecurity, penetration testing, melbourne tech events, melbourne, cybersecurity education, cyber awareness, cybersecurity skills development, cyber defense, security awareness, podcast, learning and development in cyber, daisy wong, melbourne cyber conference, cybersecurity culture, itspmagazine, australian cyber conference, cyber threats, melbourne cyber event, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>154</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">503e3e8f-6d89-433b-9906-de609f67e270</guid>
      <title>Building Resilience in a Disruptive Digital Landscape while Being Green by Design: Addressing the Carbon Footprint in Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Sian John | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Sian John</strong>, Chief Technology Officer, NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/" target="_blank">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the recent AISA Cyber Conference 2024 in Melbourne, notable figures Sean Martin and Sian John engaged in a compelling conversation about emerging trends and significant topics within the cyber industry. The discussion covered a range of subjects from the importance of availability in operational technology (OT) security to the environmental implications of artificial intelligence (AI) and analytics. Sean Martin noted the communal focus of the conference, highlighting how initiatives driven by members of the industry, like those led by the AISA Perth chapter (as noted by Sian John), contribute significantly to the cybersecurity community.</p><p>Sian John MBE provided an in-depth perspective on the global regulatory landscape, pointing out how digital disruption is driving an increase in regulations. She emphasized that privacy regulations now affect more people worldwide than ever before. John observes that while some regions might roll back regulations, the overall trend is increasing around regulatory scrutiny.</p><p>Another key topic was the carbon impact of AI and analytics. Sian John pointed out the substantial environmental cost associated with training large language models, referencing research by PwC and Microsoft showcasing the significant carbon footprint involved. She argued for the need to integrate sustainability into technological advancements, coining it 'green by design.'</p><p>The conversation also touched on the vital importance of OT security in the context of achieving net-zero carbon emissions and advancing renewable technology. John pointed out that while OT security has been a topic of discussion for some time, the urgency is now heightened as regulatory focus intensifies and renewable energy projects increase. When it comes to triggers that drive action, finance could win out over regulation in this case.</p><p>The dialogue also explored the broader implications of security, extending beyond the traditional realms to incorporate business resilience. Martin stressed the necessity for organizations to adopt a risk-aware approach that encompasses both cyber and business risks. He posits that mature organizations, which effectively integrate resilience into their operations, are more adept at navigating regulatory changes and emerging threats.</p><p>Finally, the cost of security and operational efficiency was discussed. Both speakers agreed that in a world with rising power costs, the drive towards efficient, sustainable practices is also economically motivated. This underscores the intersection of cost, regulation, and sustainability in today's business strategies. As the conversation drew to a close, the future-oriented outlook shared by both speakers reflected a pragmatic approach to the complexities of modern cybersecurity, emphasizing efficiency, regulatory compliance, and sustainability.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Nov 2024 22:54:20 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sian John)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-resilience-in-a-disruptive-digital-landscape-while-being-green-by-design-addressing-the-carbon-footprint-in-cybersecurity-an-australian-cyber-conference-2024-in-melbourne-conversation-with-sian-john-on-location-coverage-T_9Coaww</link>
      <content:encoded><![CDATA[<p><strong>Guest: Sian John</strong>, Chief Technology Officer, NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/" target="_blank">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the recent AISA Cyber Conference 2024 in Melbourne, notable figures Sean Martin and Sian John engaged in a compelling conversation about emerging trends and significant topics within the cyber industry. The discussion covered a range of subjects from the importance of availability in operational technology (OT) security to the environmental implications of artificial intelligence (AI) and analytics. Sean Martin noted the communal focus of the conference, highlighting how initiatives driven by members of the industry, like those led by the AISA Perth chapter (as noted by Sian John), contribute significantly to the cybersecurity community.</p><p>Sian John MBE provided an in-depth perspective on the global regulatory landscape, pointing out how digital disruption is driving an increase in regulations. She emphasized that privacy regulations now affect more people worldwide than ever before. John observes that while some regions might roll back regulations, the overall trend is increasing around regulatory scrutiny.</p><p>Another key topic was the carbon impact of AI and analytics. Sian John pointed out the substantial environmental cost associated with training large language models, referencing research by PwC and Microsoft showcasing the significant carbon footprint involved. She argued for the need to integrate sustainability into technological advancements, coining it 'green by design.'</p><p>The conversation also touched on the vital importance of OT security in the context of achieving net-zero carbon emissions and advancing renewable technology. John pointed out that while OT security has been a topic of discussion for some time, the urgency is now heightened as regulatory focus intensifies and renewable energy projects increase. When it comes to triggers that drive action, finance could win out over regulation in this case.</p><p>The dialogue also explored the broader implications of security, extending beyond the traditional realms to incorporate business resilience. Martin stressed the necessity for organizations to adopt a risk-aware approach that encompasses both cyber and business risks. He posits that mature organizations, which effectively integrate resilience into their operations, are more adept at navigating regulatory changes and emerging threats.</p><p>Finally, the cost of security and operational efficiency was discussed. Both speakers agreed that in a world with rising power costs, the drive towards efficient, sustainable practices is also economically motivated. This underscores the intersection of cost, regulation, and sustainability in today's business strategies. As the conversation drew to a close, the future-oriented outlook shared by both speakers reflected a pragmatic approach to the complexities of modern cybersecurity, emphasizing efficiency, regulatory compliance, and sustainability.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="15780996" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ddd9442c-480c-4acb-b156-3e0b6dc90d7d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ddd9442c-480c-4acb-b156-3e0b6dc90d7d&amp;feed=2M86zCcc"/>
      <itunes:title>Building Resilience in a Disruptive Digital Landscape while Being Green by Design: Addressing the Carbon Footprint in Cybersecurity | An Australian Cyber Conference 2024 in Melbourne Conversation with Sian John | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sian John</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:26</itunes:duration>
      <itunes:summary>In this engaging On Location episode from AISA Cyber Conference 2024, Sean Martin and Sian John MBE explore crucial topics such as the carbon impact of AI, the importance of OT security, and the intersection of cost, regulation, and sustainability in today’s business strategies. Their insightful discussion offers a forward-thinking perspective on how organizations can navigate emerging trends and regulatory landscapes effectively.</itunes:summary>
      <itunes:subtitle>In this engaging On Location episode from AISA Cyber Conference 2024, Sean Martin and Sian John MBE explore crucial topics such as the carbon impact of AI, the importance of OT security, and the intersection of cost, regulation, and sustainability in today’s business strategies. Their insightful discussion offers a forward-thinking perspective on how organizations can navigate emerging trends and regulatory landscapes effectively.</itunes:subtitle>
      <itunes:keywords>compliance, melbourne cybersecurity event, technology, marco ciappelli, efficiency, digital disruption, renewable energy, sean martin, aisa, australian cyber conference 2024, cybersecurity, cyber, conference, redefining cybersecurity, business resilience, melbourne tech events, ot security, melbourne, analytics, sian john mbe, sustainability, carbon footprint, podcast, regulation, melbourne cyber conference, ai, risk, itspmagazine, australian cyber conference, privacy, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>153</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">808d4fe3-b561-4e2d-8961-f3095eb1aff2</guid>
      <title>The Present and Future of Human-Centered Cybersecurity: Managing Risks and Fostering Digital Safety | An Australian Cyber Conference 2024 in Melbourne Conversation with Jinan Budge | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jinan Budge</strong>, Vice President, Principal Analyst serving Security & Risk professionals, Forrester</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jinan-budge-2898132/">https://www.linkedin.com/in/jinan-budge-2898132/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The <strong>Australian Cyber Conference Melbourne 2024</strong> is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry’s most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a  conversation with <strong>Jinan Budge</strong>, Vice President at Forrester Research, focusing on the vital role of human-centered security in today’s evolving landscape.</p><p><strong>Building a Human-Centered Cybersecurity Culture</strong></p><p>One of the central themes of the discussion was the shift from traditional security awareness programs to <strong>human risk management</strong>. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward <strong>human-centered cybersecurity</strong> is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.</p><p><strong>Collaboration Between Enterprises and Vendors</strong></p><p>The podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace <strong>adaptive security solutions</strong> tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.</p><p><strong>Understanding the Human Element in Data Breaches</strong></p><p>Budge introduced a framework she calls the <strong>“wheel of human element breaches,”</strong> which categorizes risks such as <strong>social engineering</strong>, <strong>human error</strong>, and <strong>insider threats</strong>. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.</p><p><strong>Education and Continuous Learning</strong></p><p>Marco Ciappelli and Jinan Budge underscored the importance of integrating <strong>cybersecurity education</strong> into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.</p><p><strong>Conclusion</strong></p><p>The discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry’s growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Nov 2024 03:09:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jinan Budge)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-present-and-future-of-human-centered-cybersecurity-managing-risks-and-fostering-digital-safety-an-australian-cyber-conference-2024-in-melbourne-conversation-with-jinan-budge-on-location-coverage-with-sean-martin-and-marco-ciappelli-vJPoouzL</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jinan Budge</strong>, Vice President, Principal Analyst serving Security & Risk professionals, Forrester</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jinan-budge-2898132/">https://www.linkedin.com/in/jinan-budge-2898132/</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The <strong>Australian Cyber Conference Melbourne 2024</strong> is a dynamic hub of innovation, bringing together top cybersecurity professionals and thought leaders to tackle the industry’s most pressing challenges. On this On Location Recording Sean Martin and Marco Ciappelli have a  conversation with <strong>Jinan Budge</strong>, Vice President at Forrester Research, focusing on the vital role of human-centered security in today’s evolving landscape.</p><p><strong>Building a Human-Centered Cybersecurity Culture</strong></p><p>One of the central themes of the discussion was the shift from traditional security awareness programs to <strong>human risk management</strong>. Jinan Budge emphasized the need to move beyond treating people as liabilities and instead design security practices that align with individual behaviors and motivations. This evolution toward <strong>human-centered cybersecurity</strong> is essential to addressing the unique risks posed by human behavior while fostering a culture of adaptability and trust.</p><p><strong>Collaboration Between Enterprises and Vendors</strong></p><p>The podcast highlighted the shared responsibility between enterprises and vendors to advance security practices. Enterprises must embrace <strong>adaptive security solutions</strong> tailored to their workforce, while vendors have a pivotal role in driving innovation and educating the market. This partnership is key to creating flexible, effective solutions that meet the needs of diverse organizations, from startups to global enterprises.</p><p><strong>Understanding the Human Element in Data Breaches</strong></p><p>Budge introduced a framework she calls the <strong>“wheel of human element breaches,”</strong> which categorizes risks such as <strong>social engineering</strong>, <strong>human error</strong>, and <strong>insider threats</strong>. This comprehensive approach pushes the conversation beyond the common narrative of phishing attacks, encouraging organizations to adopt holistic strategies that address the root causes of human-driven vulnerabilities.</p><p><strong>Education and Continuous Learning</strong></p><p>Marco Ciappelli and Jinan Budge underscored the importance of integrating <strong>cybersecurity education</strong> into early learning environments. Instilling digital safety habits at a young age helps build an instinctive understanding of cybersecurity, preparing future generations for the increasingly digital workplace. This foundation ensures smoother transitions into organizational cultures where cybersecurity is second nature.</p><p><strong>Conclusion</strong></p><p>The discussions at the Australian Cyber Conference Melbourne 2024 illuminated the industry’s growing focus on human-centered strategies and collaboration between enterprises and vendors. These efforts underscore the importance of proactively addressing human risks and integrating cybersecurity education into every level of society. Events like this continue to shape the future, offering invaluable insights and inspiration for those dedicated to advancing the field.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38160187" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/28d7d90b-8999-4a4d-95df-eb59abbd5fdc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=28d7d90b-8999-4a4d-95df-eb59abbd5fdc&amp;feed=2M86zCcc"/>
      <itunes:title>The Present and Future of Human-Centered Cybersecurity: Managing Risks and Fostering Digital Safety | An Australian Cyber Conference 2024 in Melbourne Conversation with Jinan Budge | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jinan Budge</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:44</itunes:duration>
      <itunes:summary>Marco Ciappelli and Sean Martin bring you highlights from the Australian Cyber Conference Melbourne 2024, where industry thought leaders, including Jinan Budge from Forrester Research, explore emerging trends, challenges, and the human side of cybersecurity.</itunes:summary>
      <itunes:subtitle>Marco Ciappelli and Sean Martin bring you highlights from the Australian Cyber Conference Melbourne 2024, where industry thought leaders, including Jinan Budge from Forrester Research, explore emerging trends, challenges, and the human side of cybersecurity.</itunes:subtitle>
      <itunes:keywords>social engineering risks, insider threats, human-centered cybersecurity, melbourne cybersecurity event, forrester research, marco ciappelli, sean martin, sean martin podcast, australian cyber conference 2024, cybersecurity, conference, redefining cybersecurity, melbourne tech events, digital safety education, marco ciappelli podcast, melbourne, jinan budge, adaptive security solutions, enterprise security strategies, data breach insights, vendor innovation, podcast, emerging trends, cybersecurity and society, cyber risk management, melbourne cyber conference, cybersecurity culture, itspmagazine, australian cyber conference, australian cyber conference, cyber hygiene education, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>152</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">72819d9b-5251-4896-a6aa-feebb4ffd0ea</guid>
      <title>Transforming Cybersecurity with Essential Eight by Building Robust Security Structures with a Default Deny Approach | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</title>
      <description><![CDATA[<p>During AISA Cyber Con 2024 in Melbourne, Sean Martin connected with Jade Wilkie from ThreatLocker. Wilkie, who is currently an account executive and soon to assume a leadership role with the APAC sales team, discusses the significance of ThreatLocker’s presence at the event and their growth in the Australian market. With ThreatLocker’s APAC team attending for the first time, Wilkie emphasizes the importance of support on the ground as Australia has quickly become ThreatLocker’s second-largest market.</p><p>ThreatLocker’s approach, centered on a default deny methodology and zero trust framework, aligns well with Australia’s Essential Eight cybersecurity framework. Wilkie highlights that this strategy not only prevents unauthorized access but also reduces noise during detection and response processes. This makes the Essential 8 a solid foundation for cybersecurity, offering a straightforward and effective structure that companies can implement.</p><p>At their booth, ThreatLocker aims to raise awareness about their comprehensive offerings beyond application control, including EDR and MDR, and network control modules. Wilkie invites attendees to engage with the team to understand how ThreatLocker’s solutions can fortify their security structures.</p><p>The episode teases an upcoming conversation at Zero Trust World in Orlando, where Sean Martin and Jade Wilkie will further explore the event’s takeaways and discuss emerging themes and trends in the cybersecurity space. Don’t miss out on this insightful discussion that promises to deliver valuable information for strengthening cybersecurity efforts.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Nov 2024 01:52:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie)</author>
      <link>https://eventcoveragepodcast.com/episodes/transforming-cybersecurity-with-essential-eight-by-building-robust-security-structures-with-a-default-deny-approach-a-brand-story-conversation-from-aisa-cyber-con-2024-in-melbourne-a-threatlocker-story-with-jade-wilkie-fKK_YMma</link>
      <content:encoded><![CDATA[<p>During AISA Cyber Con 2024 in Melbourne, Sean Martin connected with Jade Wilkie from ThreatLocker. Wilkie, who is currently an account executive and soon to assume a leadership role with the APAC sales team, discusses the significance of ThreatLocker’s presence at the event and their growth in the Australian market. With ThreatLocker’s APAC team attending for the first time, Wilkie emphasizes the importance of support on the ground as Australia has quickly become ThreatLocker’s second-largest market.</p><p>ThreatLocker’s approach, centered on a default deny methodology and zero trust framework, aligns well with Australia’s Essential Eight cybersecurity framework. Wilkie highlights that this strategy not only prevents unauthorized access but also reduces noise during detection and response processes. This makes the Essential 8 a solid foundation for cybersecurity, offering a straightforward and effective structure that companies can implement.</p><p>At their booth, ThreatLocker aims to raise awareness about their comprehensive offerings beyond application control, including EDR and MDR, and network control modules. Wilkie invites attendees to engage with the team to understand how ThreatLocker’s solutions can fortify their security structures.</p><p>The episode teases an upcoming conversation at Zero Trust World in Orlando, where Sean Martin and Jade Wilkie will further explore the event’s takeaways and discuss emerging themes and trends in the cybersecurity space. Don’t miss out on this insightful discussion that promises to deliver valuable information for strengthening cybersecurity efforts.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5681847" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/93619e82-1fee-491c-b20c-b064d0fe35fa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=93619e82-1fee-491c-b20c-b064d0fe35fa&amp;feed=2M86zCcc"/>
      <itunes:title>Transforming Cybersecurity with Essential Eight by Building Robust Security Structures with a Default Deny Approach | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:55</itunes:duration>
      <itunes:summary>At AISA Cyber Con 2024, Sean Martin connects with Jade Wilkie from ThreatLocker to reveal the company&apos;s growth in the Australian market and their alignment with the Essential Eight cybersecurity framework. Discover how ThreatLocker&apos;s innovative approach and comprehensive offerings can enhance your organization&apos;s security structure by tuning into this insightful episode.</itunes:summary>
      <itunes:subtitle>At AISA Cyber Con 2024, Sean Martin connects with Jade Wilkie from ThreatLocker to reveal the company&apos;s growth in the Australian market and their alignment with the Essential Eight cybersecurity framework. Discover how ThreatLocker&apos;s innovative approach and comprehensive offerings can enhance your organization&apos;s security structure by tuning into this insightful episode.</itunes:subtitle>
      <itunes:keywords>jade wilkie, essential eight, marco ciappelli, leadership, security structure, sean martin, aisa, cybersecurity, threatlocker, essential 8, network control, apac, account executive, application control, default deny, sales team, australia, cyber conference, emea, zero trust, cyber con, brand story, 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>151</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">435604c1-17da-4f1e-b369-a726b3d873a5</guid>
      <title>Balancing Technology and Human Awareness in Cyber Defense: Strategies for Families and Organizations | An Australian Cyber Conference 2024 in Melbourne Conversation with Jacqueline Jayne | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jacqueline Jayne</strong>, The Independent Cybersecurity Expert</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jacquelinejayne/" target="_blank">https://www.linkedin.com/in/jacquelinejayne/</a></p><p>At AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/jacqueline-jayne-smict">https://melbourne2024.cyberconference.com.au/speakers/jacqueline-jayne-smict</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the On Location series at AISA Cyber Con 2024 in Melbourne, the conversation about cybersecurity turns engaging as Jacqueline Jayne, Security Awareness Advocate, shares her experience on human risk management and cybersecurity education. Her insights bring forward crucial points on bridging the gap between human behavior and technological security measures.</p><p>One pivotal topic discussed is the persistent challenge of human error in cybersecurity. Jacqueline highlights that human error now accounts for over 90% of security breaches. The approach to mitigating these risks isn't merely technological but educational. She emphasizes the need for comprehensive security awareness training and shifting organizational culture towards proactive risk management.</p><p>Jacqueline shares, “Organizations should redefine IT departments from the ‘Department of No’ to the ‘Department of K-N-O-W.’” She believes that instead of restricting users, organizations should focus on empowering them with knowledge, emphasizing the importance of comprehensive training that connects with employees on a personal level.</p><p>Throughout the conversation, the importance of contextual and relatable education stands out. Jacqueline advocates for simulated phishing campaigns to provide real-world scenarios for employees. By understanding and experiencing what a phishing attempt looks like in a controlled environment, employees can better recognize and react to actual threats.</p><p>Another compelling point is teaching digital citizenship from a young age. Jacqueline compares cybersecurity education to road safety education. Just as children learn road safety progressively, digital safety should be ingrained from an early age. Appropriate and guided exposure to technology can ensure they grow up as responsible digital citizens.</p><p>The discussion also touches on parental and organizational roles. Jacqueline discusses the proposal of banning social media for children under 16, acknowledging its complexity. She suggests that though banning might seem straightforward, it's more about educating and guiding children and teenagers on safe digital practices. Organizations and parents alike should collaborate to create a safer and more informed digital environment for the younger generation.</p><p>Towards the end, the dialogue shifts to the potential role of AI in enhancing cybersecurity awareness. There’s a consensus on using AI not as a replacement but as an augmentative tool to alert and educate users about potential threats in real-time, potentially mitigating the risk of human error. In conclusion, the conversation highlights the indispensable role of education in cybersecurity. JJ's perspective fosters a comprehensive approach that includes organizational culture change, continuous engagement, and early digital citizenship education. It’s not just about implementing technology but evolving our collective behavior and mindset to ensure a secure digital future.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-OZ4j4mTr1O">https://melbourne2024.cyberconference.com.au/sessions/session-OZ4j4mTr1O</a></p><p>Keeping our kids safe online: The essential information for parents and caregivers (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-oBf7Gjn2xG">https://melbourne2024.cyberconference.com.au/sessions/session-oBf7Gjn2xG</a></p><p>Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture: <a href="https://melbourne2024.cyberconference.com.au/sessions/session-drDWsOKBsL">https://melbourne2024.cyberconference.com.au/sessions/session-drDWsOKBsL</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Nov 2024 00:38:09 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jacqueline Jayne)</author>
      <link>https://eventcoveragepodcast.com/episodes/balancing-technology-and-human-awareness-in-cyber-defense-strategies-for-families-and-organizations-an-australian-cyber-conference-2024-in-melbourne-conversation-with-jacqueline-jayne-on-location-coverage-with-sean-martin-and-marco-ciappelli-QQg3h_l9</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jacqueline Jayne</strong>, The Independent Cybersecurity Expert</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jacquelinejayne/" target="_blank">https://www.linkedin.com/in/jacquelinejayne/</a></p><p>At AU Cyber Con | <a href="https://melbourne2024.cyberconference.com.au/speakers/jacqueline-jayne-smict">https://melbourne2024.cyberconference.com.au/speakers/jacqueline-jayne-smict</a></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>During the On Location series at AISA Cyber Con 2024 in Melbourne, the conversation about cybersecurity turns engaging as Jacqueline Jayne, Security Awareness Advocate, shares her experience on human risk management and cybersecurity education. Her insights bring forward crucial points on bridging the gap between human behavior and technological security measures.</p><p>One pivotal topic discussed is the persistent challenge of human error in cybersecurity. Jacqueline highlights that human error now accounts for over 90% of security breaches. The approach to mitigating these risks isn't merely technological but educational. She emphasizes the need for comprehensive security awareness training and shifting organizational culture towards proactive risk management.</p><p>Jacqueline shares, “Organizations should redefine IT departments from the ‘Department of No’ to the ‘Department of K-N-O-W.’” She believes that instead of restricting users, organizations should focus on empowering them with knowledge, emphasizing the importance of comprehensive training that connects with employees on a personal level.</p><p>Throughout the conversation, the importance of contextual and relatable education stands out. Jacqueline advocates for simulated phishing campaigns to provide real-world scenarios for employees. By understanding and experiencing what a phishing attempt looks like in a controlled environment, employees can better recognize and react to actual threats.</p><p>Another compelling point is teaching digital citizenship from a young age. Jacqueline compares cybersecurity education to road safety education. Just as children learn road safety progressively, digital safety should be ingrained from an early age. Appropriate and guided exposure to technology can ensure they grow up as responsible digital citizens.</p><p>The discussion also touches on parental and organizational roles. Jacqueline discusses the proposal of banning social media for children under 16, acknowledging its complexity. She suggests that though banning might seem straightforward, it's more about educating and guiding children and teenagers on safe digital practices. Organizations and parents alike should collaborate to create a safer and more informed digital environment for the younger generation.</p><p>Towards the end, the dialogue shifts to the potential role of AI in enhancing cybersecurity awareness. There’s a consensus on using AI not as a replacement but as an augmentative tool to alert and educate users about potential threats in real-time, potentially mitigating the risk of human error. In conclusion, the conversation highlights the indispensable role of education in cybersecurity. JJ's perspective fosters a comprehensive approach that includes organizational culture change, continuous engagement, and early digital citizenship education. It’s not just about implementing technology but evolving our collective behavior and mindset to ensure a secure digital future.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The top 10 skills your security awareness and culture person must have with no IT or cyber skills in sight (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-OZ4j4mTr1O">https://melbourne2024.cyberconference.com.au/sessions/session-OZ4j4mTr1O</a></p><p>Keeping our kids safe online: The essential information for parents and caregivers (Session): <a href="https://melbourne2024.cyberconference.com.au/sessions/session-oBf7Gjn2xG">https://melbourne2024.cyberconference.com.au/sessions/session-oBf7Gjn2xG</a></p><p>Security awareness 2.0: The paradigm shift from training and simulations to engagement and culture: <a href="https://melbourne2024.cyberconference.com.au/sessions/session-drDWsOKBsL">https://melbourne2024.cyberconference.com.au/sessions/session-drDWsOKBsL</a></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27766804" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4379899b-9142-47a9-bbdd-2b5c6ee23324/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4379899b-9142-47a9-bbdd-2b5c6ee23324&amp;feed=2M86zCcc"/>
      <itunes:title>Balancing Technology and Human Awareness in Cyber Defense: Strategies for Families and Organizations | An Australian Cyber Conference 2024 in Melbourne Conversation with Jacqueline Jayne | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jacqueline Jayne</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:55</itunes:duration>
      <itunes:summary>Join us for an insightful talk with Jacqueline Jayne about the vital role of human behavior in cybersecurity, where she shares strategies on reducing human error and educating digital citizens from an early age. Learn how AI can assist in real-time threat detection while addressing the global challenge of maintaining online safety.</itunes:summary>
      <itunes:subtitle>Join us for an insightful talk with Jacqueline Jayne about the vital role of human behavior in cybersecurity, where she shares strategies on reducing human error and educating digital citizens from an early age. Learn how AI can assist in real-time threat detection while addressing the global challenge of maintaining online safety.</itunes:subtitle>
      <itunes:keywords>culture change, melbourne cybersecurity event, marco ciappelli, sean martin, kids safety, aisa, australian cyber conference 2024, online safety, cybersecurity, jacqueline jayne, conference, redefining cybersecurity, human risk, melbourne tech events, melbourne, security awareness, human error, podcast, digital citizenship, melbourne cyber conference, ai, itspmagazine, cyber hygiene, australian cyber conference, awareness training, phishing, cybercon, au cyber con 2024, deepfake</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>150</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9f9b0e66-722a-459a-957f-1626a0454650</guid>
      <title>From Healthcare to Cybersecurity: Leveraging Past Professions to Enhance Cybersecurity Programs | A Conversation with Gina D’Addamio | Redefining CyberSecurity with Sean Martin</title>
      <description><![CDATA[<p><strong>Guest: Gina D’Addamio</strong>, Threat Analyst, Canadian Cyber Threat Exchange [<a href="https://x.com/cctxcanada">@CCTXCanada</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/gina-daddamio" target="_blank">https://www.linkedin.com/in/gina-daddamio</a></p><p>On Twitter | <a href="https://www.linkedin.com/in/gina-daddamio" target="_blank">https://www.linkedin.com/in/gina-daddamio</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In the latest episode of Redefining CyberSecurity on ITSPmagazine, host Sean Martin engages with Gina D’Addamio, a threat analyst at the Canadian Cyber Threat Exchange (CCTX), to discuss the pathways and challenges for transitioning into the field of cybersecurity from different professional backgrounds.</p><p>Gina D’Addamio: From Nursing to Cybersecurity — Gina shares her compelling journey from the world of nursing to becoming a threat analyst at CCTX. Starting her career in nursing, Gina specialized in delivering babies and providing postpartum care. However, due to the increasing pressures and emotional toll of a deteriorating healthcare system, she decided to make a career change. She reflects on the emotional challenges and the impact on her family life that led her to step away from nursing.</p><p>Transitioning through the Rogers Cybersecure Catalyst Program — Gina was introduced to cybersecurity through a fellow school mom and an opportunity with the Rogers Cybersecure Catalyst program. The program provided an accelerated learning path, offering her three SANS certifications within seven months. Gina emphasizes the importance of such programs in bridging the gap for those who have no prior experience in cybersecurity, showcasing her success as a significant transition case.</p><p>Relatability between Nursing and Cybersecurity — Throughout the discussion, Gina and Sean draw parallels between nursing and cybersecurity. Gina points out how her experience in managing life-and-death situations in nursing is akin to dealing with critical incidents in cybersecurity. Her ability to remain composed under pressure and her proficiency in translating complex medical information into understandable terms has been vital in her role at CCTX.</p><p>The Role at CCTX — At CCTX, Gina's work involves threat analysis and translating complex cybersecurity threats into actionable advice for a diverse range of members, from large corporations to small businesses. The nonprofit organization plays a crucial role in threat intelligence sharing across sectors in Canada, similar to ISACs and ISAOs in the U.S.</p><p>Mentorship and Continuous Learning — Gina discusses the ongoing learning environment within CCTX, facilitated by member-led webinars and hands-on experiences such as Wireshark workshops. She highlights the constant need for education in cybersecurity due to the ever-changing threat landscape. She also mentors others transitioning into cybersecurity, stressing the value of soft skills and effective communication in securing roles within the industry.</p><p>Advice to Employers in Cybersecurity — Gina urges employers to recognize the potential in candidates from diverse professional backgrounds, emphasizing that the ability to learn and adapt is often more important than years of industry-specific experience. She advocates for a hiring approach that looks beyond certifications to the person’s overall ability to fit within the team and contribute to the organization’s goals.</p><p>This episode underscores the potential for successful career transitions into cybersecurity from seemingly unrelated fields. Gina D’Addamio’s story is a testament to how diverse experiences can enrich the cybersecurity field, bringing fresh perspectives and skills that enhance threat analysis and response.</p><p>___________________________</p><p><strong>Sponsors</strong></p><p>Imperva:<strong> </strong><a href="https://itspm.ag/imperva277117988">https://itspm.ag/imperva277117988</a></p><p>LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a> and <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty: <a href="https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty" target="_blank">https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 26 Nov 2024 13:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Gina D’Addamio)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-healthcare-to-cybersecurity-leveraging-past-professions-to-enhance-cybersecurity-programs-a-conversation-with-gina-daddamio-redefining-cybersecurity-with-sean-martin-SiYeRxyh</link>
      <content:encoded><![CDATA[<p><strong>Guest: Gina D’Addamio</strong>, Threat Analyst, Canadian Cyber Threat Exchange [<a href="https://x.com/cctxcanada">@CCTXCanada</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/gina-daddamio" target="_blank">https://www.linkedin.com/in/gina-daddamio</a></p><p>On Twitter | <a href="https://www.linkedin.com/in/gina-daddamio" target="_blank">https://www.linkedin.com/in/gina-daddamio</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In the latest episode of Redefining CyberSecurity on ITSPmagazine, host Sean Martin engages with Gina D’Addamio, a threat analyst at the Canadian Cyber Threat Exchange (CCTX), to discuss the pathways and challenges for transitioning into the field of cybersecurity from different professional backgrounds.</p><p>Gina D’Addamio: From Nursing to Cybersecurity — Gina shares her compelling journey from the world of nursing to becoming a threat analyst at CCTX. Starting her career in nursing, Gina specialized in delivering babies and providing postpartum care. However, due to the increasing pressures and emotional toll of a deteriorating healthcare system, she decided to make a career change. She reflects on the emotional challenges and the impact on her family life that led her to step away from nursing.</p><p>Transitioning through the Rogers Cybersecure Catalyst Program — Gina was introduced to cybersecurity through a fellow school mom and an opportunity with the Rogers Cybersecure Catalyst program. The program provided an accelerated learning path, offering her three SANS certifications within seven months. Gina emphasizes the importance of such programs in bridging the gap for those who have no prior experience in cybersecurity, showcasing her success as a significant transition case.</p><p>Relatability between Nursing and Cybersecurity — Throughout the discussion, Gina and Sean draw parallels between nursing and cybersecurity. Gina points out how her experience in managing life-and-death situations in nursing is akin to dealing with critical incidents in cybersecurity. Her ability to remain composed under pressure and her proficiency in translating complex medical information into understandable terms has been vital in her role at CCTX.</p><p>The Role at CCTX — At CCTX, Gina's work involves threat analysis and translating complex cybersecurity threats into actionable advice for a diverse range of members, from large corporations to small businesses. The nonprofit organization plays a crucial role in threat intelligence sharing across sectors in Canada, similar to ISACs and ISAOs in the U.S.</p><p>Mentorship and Continuous Learning — Gina discusses the ongoing learning environment within CCTX, facilitated by member-led webinars and hands-on experiences such as Wireshark workshops. She highlights the constant need for education in cybersecurity due to the ever-changing threat landscape. She also mentors others transitioning into cybersecurity, stressing the value of soft skills and effective communication in securing roles within the industry.</p><p>Advice to Employers in Cybersecurity — Gina urges employers to recognize the potential in candidates from diverse professional backgrounds, emphasizing that the ability to learn and adapt is often more important than years of industry-specific experience. She advocates for a hiring approach that looks beyond certifications to the person’s overall ability to fit within the team and contribute to the organization’s goals.</p><p>This episode underscores the potential for successful career transitions into cybersecurity from seemingly unrelated fields. Gina D’Addamio’s story is a testament to how diverse experiences can enrich the cybersecurity field, bringing fresh perspectives and skills that enhance threat analysis and response.</p><p>___________________________</p><p><strong>Sponsors</strong></p><p>Imperva:<strong> </strong><a href="https://itspm.ag/imperva277117988">https://itspm.ag/imperva277117988</a></p><p>LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p>ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a> and <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty: <a href="https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty" target="_blank">https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="43026899" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/52f2a1c7-7840-46bd-9628-8bbd105a4d89/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=52f2a1c7-7840-46bd-9628-8bbd105a4d89&amp;feed=2M86zCcc"/>
      <itunes:title>From Healthcare to Cybersecurity: Leveraging Past Professions to Enhance Cybersecurity Programs | A Conversation with Gina D’Addamio | Redefining CyberSecurity with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Gina D’Addamio</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/64b2465e-cabd-4111-be48-294760e6b6b5/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:44:49</itunes:duration>
      <itunes:summary>Join host Sean Martin as he talks with Gina D’Addamio, a former nurse turned threat analyst at the Canadian Cyber Threat Exchange, about her transformative journey into cybersecurity and the vital skills she brings from her healthcare background. Discover how diverse experiences can enrich cybersecurity programs and why employers should look beyond traditional qualifications in this inspiring episode of the Redefining CyberSecurity Podcast.</itunes:summary>
      <itunes:subtitle>Join host Sean Martin as he talks with Gina D’Addamio, a former nurse turned threat analyst at the Canadian Cyber Threat Exchange, about her transformative journey into cybersecurity and the vital skills she brings from her healthcare background. Discover how diverse experiences can enrich cybersecurity programs and why employers should look beyond traditional qualifications in this inspiring episode of the Redefining CyberSecurity Podcast.</itunes:subtitle>
      <itunes:keywords>threat analyst, technology, sans certifications, continuous learning, cctx, nursing, sean martin, team fit, cybersecurity, itsp magazine, redefining cybersecurity, mentorship, healthcare to cyber, soft skills, threat intelligence, career transition, podcast, security, certifications, incident response, diverse backgrounds, rogers cybersecure catalyst, gina d’addamio</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f9196557-c9b6-4b4f-b07a-95ff0cb508c3</guid>
      <title>Pre-Event Coverage | Different Hats, Shared Goals: Insights and Anticipations for Conversations and Stories from Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.</p><p>Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.</p><p>Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.</p><p>The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.</p><p>Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.</p><p>As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.</p><p>Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 24 Nov 2024 08:21:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/pre-event-coverage-different-hats-shared-goals-insights-and-anticipations-for-conversations-and-stories-from-australian-cyber-conference-2024-in-melbourne-on-location-coverage-with-sean-martin-and-marco-ciappelli-qVywThtZ</link>
      <content:encoded><![CDATA[<p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this pre-event Chats on the Road episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli meet up in person and on location to discuss their excitement and expectations for the upcoming Australia Cybersecurity Conference 2024 in Melbourne. They express their enthusiasm about reuniting with the cybersecurity community and emphasize the significance of the event, which is organized by AISA and supported by notable individuals like Akash Mattel, Megan, and Abbas Kudrati.</p><p>Sean and Marco share a light-hearted opening conversation about boats and travels, setting a casual tone before diving into what they look forward to at the conference. The hosts appreciate the opportunity to connect with industry leaders and attendees, emphasizing the importance of stories in operationalizing cybersecurity in business and society.</p><p>Sean highlights the need to align technology with business processes while adhering to policies and laws on a global scale. On the other hand, Marco provides a broader perspective on the interaction between individuals, society, and technology, stressing the role of cybersecurity in protecting personal privacy and fostering human interaction — it turns out it's all about the intersection of technology and culture.</p><p>The hosts reflect on their past experiences in the cybersecurity field, with Sean sharing an anecdote about a vintage AV hat that represents his journey at Symantec rooted in the Australia. culture. This reflection underscores the value of learning from past and present experiences to shape a better future in cybersecurity.</p><p>Sean and Marco discuss the diverse sessions and interactions planned for the event, mentioning notable speakers like Joe Sullivan and Mikko Hypponen. They are particularly excited about the wide range of topics to be covered, from policy and privacy to operational strategies and the human element in cybersecurity.</p><p>As they anticipate the week ahead, Sean and Marco invite listeners to engage with them during the conference. They are eager to forge new relationships and gather stories that resonate on a global scale, underscoring the event's potential for fostering meaningful connections and enhancing cybersecurity practices worldwide.</p><p>Tune in to hear Sean and Marco's thoughts on what promises to be an exciting and informative week at the Australia Cybersecurity Conference 2024. Whether you're attending the event or staying tuned from afar, this episode sets the stage for the compelling conversations and insights to come.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="9163439" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/248023fe-769f-4216-861a-5fa0e565a9a4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=248023fe-769f-4216-861a-5fa0e565a9a4&amp;feed=2M86zCcc"/>
      <itunes:title>Pre-Event Coverage | Different Hats, Shared Goals: Insights and Anticipations for Conversations and Stories from Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/22f309fa-2bd5-432b-a4a9-cb8d5f859f95/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:32</itunes:duration>
      <itunes:summary>Join Sean and Marco as they gear up for the Australia Cybersecurity Conference 2024 in Melbourne, sharing their excitement and insights on the diverse topics and notable conversations anticipated at the event. Discover why this gathering is a must-attend for those passionate about cybersecurity, technology, and global collaboration.</itunes:summary>
      <itunes:subtitle>Join Sean and Marco as they gear up for the Australia Cybersecurity Conference 2024 in Melbourne, sharing their excitement and insights on the diverse topics and notable conversations anticipated at the event. Discover why this gathering is a must-attend for those passionate about cybersecurity, technology, and global collaboration.</itunes:subtitle>
      <itunes:keywords>cybersecurity leadership, melbourne cybersecurity event, technology, marco ciappelli, abbas kudrati, cybercrime and technology, sean martin, cybersecurity regulation, stories, future of cybersecurity, aisa, australian cyber conference 2024, cybersecurity, business, conference, redefining cybersecurity, melbourne tech events, cybersecurity policy, melbourne, policy, future, culture, international cybersecurity community, global security challenges, podcast, security, global, symantec, cyber risk management, melbourne cyber conference, australia, itspmagazine, humanitarian tech initiatives, australian cyber conference, privacy, sessions, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8783638f-6f6a-4698-9f44-866c38e637e4</guid>
      <title>Bridging Cybersecurity and Finance for Better Insurance Outcomes | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Google Short Brand Innovation Story with Monica Shokrai</title>
      <description><![CDATA[<p>In this Brand Story episode, recorded live at the HITRUST Collaborate Conference 2024, host Sean Martin sits down with Monica Shokrai, Head of Risk and Insurance for Google Cloud. The topic of conversation centers around cyber insurance, a crucial area impacting organizations across sectors.</p><p>Monica Shokrai leads the charge in managing risk and procuring insurance for Google Cloud, a role that integrates closely with both the finance and security teams. She highlights the unique dual approach of her team, which not only secures coverage for Google but also strategizes on how to leverage insurance to assist Google Cloud customers in mitigating risks.</p><p>A key point discussed is the interdisciplinary nature of cyber insurance. Traditionally managed by the finance or legal departments, Shokrai emphasizes its growing collaboration with cybersecurity teams. She notes that the standard organizational structure often sees a communication divide between finance and security departments. However, the evolving cyber insurance market is pushing these groups closer together, fostering a more integrated risk management strategy.</p><p>Shokrai also shares insights on how Google approaches risk exposure and posture. By modeling risk in-house and leveraging an actuarial team, Google can quantify risks accurately and work closely with security teams. This model not only helps in securing better insurance terms but also aids in understanding and integrating security measures within the organization.</p><p>Another significant point is Google’s innovative approach to automating the cyber insurance process. Through their Risk Protection Program, Google allows security metrics to be shared with insurance partners like Allianz in Munich. This method simplifies the underwriting process and promotes a data-driven approach to evaluating cybersecurity risks, aligning insurers and security teams toward a common goal.</p><p>Overall, the discussion underscores the importance of a cohesive strategy that bridges finance and cybersecurity through innovative risk management and insurance practices. With leaders like Monica Shokrai at the helm, Google Cloud is at the forefront of integrating these critical functions, ultimately benefiting both the company and its customers.</p><p>Learn more about Google Cloud: <a href="https://itspm.ag/google-pkap">https://itspm.ag/google-pkap</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monica Shokrai</strong>, Head of Risk and Insurance, Google Cloud [<a href="https://x.com/lifeatgoogle">@lifeatgoogle</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/monicashokrai/">https://www.linkedin.com/in/monicashokrai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Google: <a href="https://www.itspmagazine.com/directory/google">https://www.itspmagazine.com/directory/google</a></p><p>Simplified Cyber Insurance for Organizations with a HITRUST Certification: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 22 Nov 2024 00:38:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Monica Shokrai)</author>
      <link>https://eventcoveragepodcast.com/episodes/bridging-cybersecurity-and-finance-for-better-insurance-outcomes-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-hitrust-short-brand-innovation-story-with-monica-shokrai-EExcz5Zf</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, recorded live at the HITRUST Collaborate Conference 2024, host Sean Martin sits down with Monica Shokrai, Head of Risk and Insurance for Google Cloud. The topic of conversation centers around cyber insurance, a crucial area impacting organizations across sectors.</p><p>Monica Shokrai leads the charge in managing risk and procuring insurance for Google Cloud, a role that integrates closely with both the finance and security teams. She highlights the unique dual approach of her team, which not only secures coverage for Google but also strategizes on how to leverage insurance to assist Google Cloud customers in mitigating risks.</p><p>A key point discussed is the interdisciplinary nature of cyber insurance. Traditionally managed by the finance or legal departments, Shokrai emphasizes its growing collaboration with cybersecurity teams. She notes that the standard organizational structure often sees a communication divide between finance and security departments. However, the evolving cyber insurance market is pushing these groups closer together, fostering a more integrated risk management strategy.</p><p>Shokrai also shares insights on how Google approaches risk exposure and posture. By modeling risk in-house and leveraging an actuarial team, Google can quantify risks accurately and work closely with security teams. This model not only helps in securing better insurance terms but also aids in understanding and integrating security measures within the organization.</p><p>Another significant point is Google’s innovative approach to automating the cyber insurance process. Through their Risk Protection Program, Google allows security metrics to be shared with insurance partners like Allianz in Munich. This method simplifies the underwriting process and promotes a data-driven approach to evaluating cybersecurity risks, aligning insurers and security teams toward a common goal.</p><p>Overall, the discussion underscores the importance of a cohesive strategy that bridges finance and cybersecurity through innovative risk management and insurance practices. With leaders like Monica Shokrai at the helm, Google Cloud is at the forefront of integrating these critical functions, ultimately benefiting both the company and its customers.</p><p>Learn more about Google Cloud: <a href="https://itspm.ag/google-pkap">https://itspm.ag/google-pkap</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monica Shokrai</strong>, Head of Risk and Insurance, Google Cloud [<a href="https://x.com/lifeatgoogle">@lifeatgoogle</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/monicashokrai/">https://www.linkedin.com/in/monicashokrai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Google: <a href="https://www.itspmagazine.com/directory/google">https://www.itspmagazine.com/directory/google</a></p><p>Simplified Cyber Insurance for Organizations with a HITRUST Certification: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6792376" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/02f5e564-8338-43e1-9005-9912d58f6523/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=02f5e564-8338-43e1-9005-9912d58f6523&amp;feed=2M86zCcc"/>
      <itunes:title>Bridging Cybersecurity and Finance for Better Insurance Outcomes | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Google Short Brand Innovation Story with Monica Shokrai</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Monica Shokrai</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>Join Sean Martin and Monica Shokrai, Head of Risk and Insurance for Google Cloud, as they explore the innovative strategies behind Google&apos;s approach to cyber insurance and risk management. Discover how interdisciplinary collaboration and automation are shaping the future of cyber insurance and helping organizations mitigate risks effectively.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Monica Shokrai, Head of Risk and Insurance for Google Cloud, as they explore the innovative strategies behind Google&apos;s approach to cyber insurance and risk management. Discover how interdisciplinary collaboration and automation are shaping the future of cyber insurance and helping organizations mitigate risks effectively.</itunes:subtitle>
      <itunes:keywords>collaboration, monica shokrai, marco ciappelli, risk protection, google cloud, insurance, sean martin, automation, hitrust, cybersecurity, finance security, cyber, conference, risk management, coverage, metrics, seven minutes podcast, cyber insurance, underwriting, actuary, finance team, strategy, risk, security teams, 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>148</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02a07e4b-1270-4952-adbd-feabf2227335</guid>
      <title>Pre Event Coverage | Unveiling Cybersecurity&apos;s Future: Joe Sullivan&apos;s Keynote Journey to Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Joe Sulllivan</strong>, CEO at Ukraine Friends [<a href="https://twitter.com/ukrainefriends_?lang=en">@UkraineFriends_</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/joesu11ivan/" target="_blank">https://www.linkedin.com/in/joesu11ivan/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference’s stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.</p><p>Sullivan’s career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.</p><p><strong>Joe Sullivan's Career Journey</strong><br />Reflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.</p><p><strong>The Role of Regulation in Cybersecurity</strong><br />Sullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.</p><p><strong>Connecting with Security Professionals Globally</strong><br />Through his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today’s interconnected world.</p><p><strong>Humanitarian Efforts Beyond Cybersecurity</strong><br />Beyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children’s education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.</p><p><strong>Conclusion</strong><br />As the Australian Cyber Conference 2024 approaches, Joe Sullivan’s insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>UkraineFriends: <a href="https://itspm.ag/ukrainwwmj">https://itspm.ag/ukrainwwmj</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 20 Nov 2024 19:02:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Joe Sullivan)</author>
      <link>https://eventcoveragepodcast.com/episodes/pre-event-coverage-unveiling-cybersecuritys-future-joe-sullivans-keynote-journey-to-australian-cyber-conference-2024-in-melbourne-on-location-coverage-with-sean-martin-and-marco-ciappelli-RBlF_ijE</link>
      <content:encoded><![CDATA[<p><strong>Guest: Joe Sulllivan</strong>, CEO at Ukraine Friends [<a href="https://twitter.com/ukrainefriends_?lang=en">@UkraineFriends_</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/joesu11ivan/" target="_blank">https://www.linkedin.com/in/joesu11ivan/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The discussion begins with Sean and Marco humorously chatting about sunsets in California versus those on the other side of the world, as they prepare for their trip. With excitement in the air, they highlight the conference’s stellar lineup, especially keynote speaker Joe Sullivan, joining the conversation from Sydney. Already immersed in the Australian vibe, Sullivan shares his anticipation for the event and comments on the sunny weather awaiting them.</p><p>Sullivan’s career is a fascinating intersection of technology, law, and leadership. From his days as a cybercrime prosecutor to leading security efforts at Facebook and Uber, he offers a unique perspective on the evolution of cybersecurity as both a profession and a global necessity.</p><p><strong>Joe Sullivan's Career Journey</strong><br />Reflecting on his career path, Sullivan describes his journey as a "Jenga pile" built on diverse and dynamic experiences. He recalls his transition from government service to the tech industry during the dot-com boom, driven by curiosity and a hunger for new challenges. His work at companies like eBay, PayPal, and Facebook involved pioneering projects such as building security teams from scratch and shaping policies like responsible disclosure programs.</p><p><strong>The Role of Regulation in Cybersecurity</strong><br />Sullivan and the hosts delve into the crucial topic of regulation in cybersecurity. Drawing on his experiences, Sullivan underscores the disparity in resources between regulated and unregulated sectors, pointing to financial services and healthcare as examples. He advocates for smart, balanced regulations to ensure cybersecurity initiatives are well-funded and effective, emphasizing that structure is key to protecting industries and consumers alike.</p><p><strong>Connecting with Security Professionals Globally</strong><br />Through his global speaking engagements and commitment to attending conferences in full, Sullivan has gained valuable insights into the shared challenges facing security professionals worldwide. He highlights the universal nature of these challenges and the importance of collaboration across borders. His passion for fostering connections within the cybersecurity community resonates strongly in today’s interconnected world.</p><p><strong>Humanitarian Efforts Beyond Cybersecurity</strong><br />Beyond his professional endeavors, Sullivan shares his inspiring humanitarian work, particularly his efforts to support Ukraine through laptop donations. These initiatives, born from his professional network, illustrate the profound impact the cybersecurity community can have on broader global issues. By using technology to aid children’s education in conflict zones, Sullivan underscores the power of tech to bring hope and stability to those in need.</p><p><strong>Conclusion</strong><br />As the Australian Cyber Conference 2024 approaches, Joe Sullivan’s insights set a compelling tone for discussions about the future of cybersecurity. His message of resilience, adaptability, and global cooperation will undoubtedly inspire attendees. For those ready to engage and learn, Sean Martin and Marco Ciappelli warmly invite you to join them in Melbourne for this transformative event — and of course, follow them subscribing to their podcast if you cannot be there.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>UkraineFriends: <a href="https://itspm.ag/ukrainwwmj">https://itspm.ag/ukrainwwmj</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27315409" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c85da46d-a574-4339-85e0-7da735dc2339/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c85da46d-a574-4339-85e0-7da735dc2339&amp;feed=2M86zCcc"/>
      <itunes:title>Pre Event Coverage | Unveiling Cybersecurity&apos;s Future: Joe Sullivan&apos;s Keynote Journey to Australian Cyber Conference 2024 in Melbourne | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Joe Sullivan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/a70f304a-eeb6-43f2-a668-a99e1f70426f/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:27</itunes:duration>
      <itunes:summary>In the lead-up to the highly anticipated Australian Cyber Conference 2024 in Melbourne, hosts Sean Martin and Marco Ciappelli engage in an insightful pre-event conversation with keynote speaker Joe Sullivan. Together, they explore the evolving landscape of cybersecurity and the critical role of security leaders in navigating today’s challenges.</itunes:summary>
      <itunes:subtitle>In the lead-up to the highly anticipated Australian Cyber Conference 2024 in Melbourne, hosts Sean Martin and Marco Ciappelli engage in an insightful pre-event conversation with keynote speaker Joe Sullivan. Together, they explore the evolving landscape of cybersecurity and the critical role of security leaders in navigating today’s challenges.</itunes:subtitle>
      <itunes:keywords>cybersecurity leadership, melbourne cybersecurity event, marco ciappelli, marco ciappelli, cybercrime and technology, sean martin, sean martin, cybersecurity regulation, future of cybersecurity, australian cyber conference 2024, cybersecurity, conference, redefining cybersecurity, melbourne tech events, cybersecurity policy, keynote speaker insights, joe sullivan, international cybersecurity community, global security challenges, podcast, security, technology for good, cyber risk management, melbourne cyber conference, building security teams, itspmagazine, humanitarian tech initiatives, australian cyber conference, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>147</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3cc47262-ce36-43b4-a2ec-2c2befeea7f4</guid>
      <title>Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.</p><p>Briefings highlights include:</p><p>● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications</p><p>● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon</p><p>● WorstFit: Unveiling Hidden Transformers in Windows ANSI!</p><p>Trainings highlights include:</p><p>● Assessing and Exploiting Control Systems and IIoT [4105]</p><p>● Fundamentals of Cyber Investigations and Human Intelligence [2111]</p><p>● Attacking DevOps Pipelines [2108]</p><p>● Offensive Mobile Reversing and Exploitation [4108]</p><p>● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]</p><p>Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:</p><p>● Campus as a Living Lab: An Open-World Hacking Environment</p><p>● Pandora: Exploit Password Management Software To Obtain Credential From Memory</p><p>● Morion - A Tool for Experimenting with Symbolic Execution on Real-World Binaries</p><p>For registration and additional information on Black Hat Europe 2024, please visit <a href="http://www.blackhat.com/eu-24" target="_blank">www.blackhat.com/eu-24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.blackhat.com/html/press/2024-11-06.html" target="_blank">https://www.blackhat.com/html/press/2024-11-06.html</a></p><p>Catch all of our On Location Stories: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 20 Nov 2024 03:51:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/sector-2024-announces-record-breaking-attendance-following-successful-close-of-toronto-event-2-minutes-on-itspmagazine-wuhhcyfj-2lo9B3CR</link>
      <content:encoded><![CDATA[<p>Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.</p><p>Briefings highlights include:</p><p>● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications</p><p>● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon</p><p>● WorstFit: Unveiling Hidden Transformers in Windows ANSI!</p><p>Trainings highlights include:</p><p>● Assessing and Exploiting Control Systems and IIoT [4105]</p><p>● Fundamentals of Cyber Investigations and Human Intelligence [2111]</p><p>● Attacking DevOps Pipelines [2108]</p><p>● Offensive Mobile Reversing and Exploitation [4108]</p><p>● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]</p><p>Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:</p><p>● Campus as a Living Lab: An Open-World Hacking Environment</p><p>● Pandora: Exploit Password Management Software To Obtain Credential From Memory</p><p>● Morion - A Tool for Experimenting with Symbolic Execution on Real-World Binaries</p><p>For registration and additional information on Black Hat Europe 2024, please visit <a href="http://www.blackhat.com/eu-24" target="_blank">www.blackhat.com/eu-24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.blackhat.com/html/press/2024-11-06.html" target="_blank">https://www.blackhat.com/html/press/2024-11-06.html</a></p><p>Catch all of our On Location Stories: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1816075" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/87a45fb9-1940-4abb-8c1b-ca02a5f8da61/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=87a45fb9-1940-4abb-8c1b-ca02a5f8da61&amp;feed=2M86zCcc"/>
      <itunes:title>Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/9812a125-fd6f-4587-b266-18add284bf39/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:01:53</itunes:duration>
      <itunes:summary>Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends.</itunes:summary>
      <itunes:subtitle>Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, networking, sean martin, cybersecurity, cybersecurity conference, security, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>146</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">00b0617c-020b-4264-87f3-37a119a1f7ab</guid>
      <title>SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.</p><p>Show highlights for 2024 included:</p><p>● Keynotes: This year’s event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.</p><p>● Business Hall: This year’s Business Hall showcased the latest products and technologies from more than 140 of the industry’s leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.</p><p>● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.</p><p>● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event" target="_blank">https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 18 Nov 2024 18:14:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/sector-2024-announces-record-breaking-attendance-following-successful-close-of-toronto-event-2-minutes-on-itspmagazine-NOe8_DXo</link>
      <content:encoded><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.</p><p>Show highlights for 2024 included:</p><p>● Keynotes: This year’s event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.</p><p>● Business Hall: This year’s Business Hall showcased the latest products and technologies from more than 140 of the industry’s leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.</p><p>● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.</p><p>● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event" target="_blank">https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1956092" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/aa51e7c8-6536-41e3-9ab8-f2c8ec41b988/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=aa51e7c8-6536-41e3-9ab8-f2c8ec41b988&amp;feed=2M86zCcc"/>
      <itunes:title>SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/9812a125-fd6f-4587-b266-18add284bf39/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:02</itunes:duration>
      <itunes:summary>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:summary>
      <itunes:subtitle>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:subtitle>
      <itunes:keywords>leaders, technology, ai summit, marco ciappelli, networking, summits, sean martin, cybersecurity, business, conference, metro toronto, sector, information security, expo, cloud, security, global, executives, october, ai, cybersecurity event series, keynote, convention</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>145</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5a73be41-f143-4639-b756-75f55652bf75</guid>
      <title>Leveraging Data for Cyber Insurance to Bring Consistency and Clarity in Underwriting | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Trium Cyber Short Brand Innovation Story with Josh LaDeau</title>
      <description><![CDATA[<p>In this episode of Short Brand Story recorded during the HITRUST Collaborate 2024 conference, Sean Martin sits down with Josh LaDeau, a prominent figure in the world of cyber insurance. Josh, who represents Trium Cyber, illuminates the crucial aspects of cyber insurance, from data integrity to market challenges. Trium Cyber is known for its specialty in providing cyber property, E&O, and miscellaneous coverages.</p><p>Josh emphasizes the importance of data in the insurance industry, explaining how accurate, structured data provided by HITRUST aids in underwriting processes. The partnership with HITRUST brings a unique advantage by ensuring data consistency and structure. This elevates the underwriting process by reducing ambiguities in policy applications and promoting data security. Josh highlights that this collaboration allows clients to present their data in a more uniform manner, making it easier for insurers to assess and underwrite policies accurately.</p><p>Moreover, the HITRUST R2 framework is particularly beneficial for clients, offering a higher quality of data that leads to better coverage options and advantageous premium pricing. Josh points out that a third-party attestation by HITRUST not only assures data integrity but also qualifies clients for a dedicated credit, further enhancing their position in the market.</p><p>The episode underscores the value Trium Cyber brings to its clients, focusing on technological acumen and a keen understanding of the cyber insurance landscape. This partnership is poised to make a significant impact in making cyber insurance more accessible and reliable for businesses.</p><p>Learn more about Trium Cyber: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Josh LaDeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Trium Cyber: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 16 Nov 2024 00:09:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Josh LaDeau)</author>
      <link>https://eventcoveragepodcast.com/episodes/leveraging-data-for-cyber-insurance-to-bring-consistency-and-clarity-in-underwriting-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-trium-cybershort-brand-innovation-story-with-josh-ladeau-vG3i8JdB</link>
      <content:encoded><![CDATA[<p>In this episode of Short Brand Story recorded during the HITRUST Collaborate 2024 conference, Sean Martin sits down with Josh LaDeau, a prominent figure in the world of cyber insurance. Josh, who represents Trium Cyber, illuminates the crucial aspects of cyber insurance, from data integrity to market challenges. Trium Cyber is known for its specialty in providing cyber property, E&O, and miscellaneous coverages.</p><p>Josh emphasizes the importance of data in the insurance industry, explaining how accurate, structured data provided by HITRUST aids in underwriting processes. The partnership with HITRUST brings a unique advantage by ensuring data consistency and structure. This elevates the underwriting process by reducing ambiguities in policy applications and promoting data security. Josh highlights that this collaboration allows clients to present their data in a more uniform manner, making it easier for insurers to assess and underwrite policies accurately.</p><p>Moreover, the HITRUST R2 framework is particularly beneficial for clients, offering a higher quality of data that leads to better coverage options and advantageous premium pricing. Josh points out that a third-party attestation by HITRUST not only assures data integrity but also qualifies clients for a dedicated credit, further enhancing their position in the market.</p><p>The episode underscores the value Trium Cyber brings to its clients, focusing on technological acumen and a keen understanding of the cyber insurance landscape. This partnership is poised to make a significant impact in making cyber insurance more accessible and reliable for businesses.</p><p>Learn more about Trium Cyber: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Josh LaDeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Trium Cyber: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6843364" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/edfc90c0-c3e6-4e44-bfe7-d651a2b8c5c6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=edfc90c0-c3e6-4e44-bfe7-d651a2b8c5c6&amp;feed=2M86zCcc"/>
      <itunes:title>Leveraging Data for Cyber Insurance to Bring Consistency and Clarity in Underwriting | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Trium Cyber Short Brand Innovation Story with Josh LaDeau</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Josh LaDeau</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:07</itunes:duration>
      <itunes:summary>Discover how Trium Cyber, in collaboration with HITRUST, is revolutionizing cyber insurance through data integrity and structured frameworks. Join Sean Martin and Josh LaDeau as they explore the challenges and innovative solutions transforming the industry.</itunes:summary>
      <itunes:subtitle>Discover how Trium Cyber, in collaboration with HITRUST, is revolutionizing cyber insurance through data integrity and structured frameworks. Join Sean Martin and Josh LaDeau as they explore the challenges and innovative solutions transforming the industry.</itunes:subtitle>
      <itunes:keywords>data, trium, marco ciappelli, insurance, sean martin, josh ladeau, hitrust, framework, cybersecurity, cyber, application, coverage, seven minutes podcast, premium, underwriting, policy, attestation, client, security, market, control, risk, cpe, vendor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>144</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">23b324da-80e8-4c7a-8937-194ce4aa82e5</guid>
      <title>A New People-Centric Approach to Determining an Organization&apos;s Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Christine Dewhurst and Dr. Thomas Lee | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Christine Dewhurst</strong>, Partner, NSC Tech</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christine-dewhurst-262867a9/">https://www.linkedin.com/in/christine-dewhurst-262867a9/</a></p><p>At Sector | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706</a></p><p><strong>Dr. Thomas Lee</strong>, CEO, Vivo Security</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/thomas-lee-phd-b7766b10/">https://www.linkedin.com/in/thomas-lee-phd-b7766b10/</a></p><p>At Sector | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.</p><p>Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.</p><p>Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.</p><p>The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>A New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach (Session): <a href="https://www.blackhat.com/sector/2024/briefings/schedule/index.html#a-new-people-centric-approach-to-determining-an-organizations-exposure-to-a-third-party-data-breach-41396">https://www.blackhat.com/sector/2024/briefings/schedule/index.html#a-new-people-centric-approach-to-determining-an-organizations-exposure-to-a-third-party-data-breach-41396</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 9 Nov 2024 04:40:48 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christine Dewhurst, Dr. Thomas Lee)</author>
      <link>https://eventcoveragepodcast.com/episodes/a-new-people-centric-approach-to-determining-an-organizations-exposure-to-a-third-party-data-breach-a-sector-cybersecurity-conference-toronto-2024-conversation-with-christine-dewhurst-and-dr-thomas-lee-on-location-coverage-SBPTpJoS</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Christine Dewhurst</strong>, Partner, NSC Tech</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christine-dewhurst-262867a9/">https://www.linkedin.com/in/christine-dewhurst-262867a9/</a></p><p>At Sector | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706</a></p><p><strong>Dr. Thomas Lee</strong>, CEO, Vivo Security</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/thomas-lee-phd-b7766b10/">https://www.linkedin.com/in/thomas-lee-phd-b7766b10/</a></p><p>At Sector | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.</p><p>Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.</p><p>Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.</p><p>The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>A New People-Centric Approach to Determining an Organization's Exposure to a Third-Party Data Breach (Session): <a href="https://www.blackhat.com/sector/2024/briefings/schedule/index.html#a-new-people-centric-approach-to-determining-an-organizations-exposure-to-a-third-party-data-breach-41396">https://www.blackhat.com/sector/2024/briefings/schedule/index.html#a-new-people-centric-approach-to-determining-an-organizations-exposure-to-a-third-party-data-breach-41396</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25853866" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/aeaf2623-65f4-43a6-9822-5140caf3cd2a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=aeaf2623-65f4-43a6-9822-5140caf3cd2a&amp;feed=2M86zCcc"/>
      <itunes:title>A New People-Centric Approach to Determining an Organization&apos;s Exposure to a Third-Party Data Breach | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Christine Dewhurst and Dr. Thomas Lee | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christine Dewhurst, Dr. Thomas Lee</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/bcaeb5f7-ba0f-4188-a338-32824c67dfdd/3000x3000/sector-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:55</itunes:duration>
      <itunes:summary>In this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Christine Dewhurst and Dr. Thomas Lee introduce a groundbreaking model that predicts an organization&apos;s exposure to third-party data breaches based on staffing levels and certifications. Their innovative approach shifts the focus from traditional technical controls to the critical role of human resources in cybersecurity, providing fresh insights for both security professionals and business managers.</itunes:summary>
      <itunes:subtitle>In this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Christine Dewhurst and Dr. Thomas Lee introduce a groundbreaking model that predicts an organization&apos;s exposure to third-party data breaches based on staffing levels and certifications. Their innovative approach shifts the focus from traditional technical controls to the critical role of human resources in cybersecurity, providing fresh insights for both security professionals and business managers.</itunes:subtitle>
      <itunes:keywords>staffing, security conference, cissp, empirical regression, technology, marco ciappelli, sector conference, predictive model, sector 2024, black hat, sean martin, cisa, cybersecurity, conference, sector, risk management, information security, christine dewhurst, human resources, data breach, cybersecurity conference, podcast, security, certifications, cybersecurityconference, dr thomas lee, toronto, 2024, third party</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>143</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e68a704f-b2bd-438d-849c-a8d6017a7cd3</guid>
      <title>First of its Kind Cyber Insurance Product Exclusively Available to HITRUST-Certified Customers | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Blake Sutherland and Robert Booker</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin brings together the team from HITRUST, Robert Booker and Blake Sutherland, to discuss the topic of cyber insurance and its current state in the industry. Both guests bring a wealth of experience and insight, with Robert Booker overseeing strategy, research, and innovation at HITRUST, and Blake Sutherland serving as the EVP of Market Engagement.</p><p>A significant portion of the discussion centers around the role of cyber insurance in today's business environment. Cyber insurance is not just a safety net but a critical aspect of a complete risk management strategy. As Robert Booker points out, it’s an essential service, historically used to cover residual risk after companies have applied their own security measures. However, the market has changed considerably, with new capabilities and approaches evolving over the past several years, making it a dynamic area.</p><p>Blake Sutherland further elaborates on the issues that organizations face in acquiring cyber insurance today. The process is often cumbersome, involving extensive questionnaires and varied requirements from different underwriters. This can be particularly challenging for mid-market companies that may lack the internal resources to manage these complexities.</p><p>The episode highlights that HITRUST is addressing these challenges with their R2 certification, which provides an objective, quantifiable measure of an organization’s cybersecurity posture. This certification helps companies not only in fortifying their own security but also in streamlining the insurance acquisition process by offering a standardized measure that underwriters can rely on. According to Robert Booker, this quantified approach can make a significant difference, offering confidence to both the insured and the insurer.</p><p>Another important aspect discussed is the role of brokerage in this process. Brokers traditionally guide companies through the insurance process, and an R2 certification from HITRUST can greatly assist them in securing better terms and conditions, as it is recognized as a testament to a company's robust security posture. This can also translate into potentially lower premiums and more reliable coverage, addressing one of the largest pain points in securing cyber insurance.</p><p>The HITRUST Shared Risk Facility is made available exclusively through licensed brokers and can be accessed by any company holding an R2 certification, with plans to extend to I1 and E1 levels in the future. This facility aims to simplify the process, reduce the administrative burden on companies, and provide greater reliability in the insurance coverage.</p><p>The episode wraps up with an invitation for organizations, brokers, and underwriters to engage with HITRUST to explore these innovative solutions. It’s a call to improve the overall confidence in the insurance landscape through verified, independent measures of cybersecurity maturity, ultimately benefiting all parties involved in the cyber insurance ecosystem.</p><p>Explore how HITRUST’s R2 certification can enhance your organization's cybersecurity posture and streamline your cyber insurance process.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Resources</strong></p><p>HITRUST 2024 Trust Report: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 8 Nov 2024 17:37:26 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Booker, Blake Sutherland)</author>
      <link>https://eventcoveragepodcast.com/episodes/first-of-its-kind-cyber-insurance-product-exclusively-available-to-hitrust-certified-customers-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-story-with-blake-sutherland-and-robert-booker-lZrdkBtW</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin brings together the team from HITRUST, Robert Booker and Blake Sutherland, to discuss the topic of cyber insurance and its current state in the industry. Both guests bring a wealth of experience and insight, with Robert Booker overseeing strategy, research, and innovation at HITRUST, and Blake Sutherland serving as the EVP of Market Engagement.</p><p>A significant portion of the discussion centers around the role of cyber insurance in today's business environment. Cyber insurance is not just a safety net but a critical aspect of a complete risk management strategy. As Robert Booker points out, it’s an essential service, historically used to cover residual risk after companies have applied their own security measures. However, the market has changed considerably, with new capabilities and approaches evolving over the past several years, making it a dynamic area.</p><p>Blake Sutherland further elaborates on the issues that organizations face in acquiring cyber insurance today. The process is often cumbersome, involving extensive questionnaires and varied requirements from different underwriters. This can be particularly challenging for mid-market companies that may lack the internal resources to manage these complexities.</p><p>The episode highlights that HITRUST is addressing these challenges with their R2 certification, which provides an objective, quantifiable measure of an organization’s cybersecurity posture. This certification helps companies not only in fortifying their own security but also in streamlining the insurance acquisition process by offering a standardized measure that underwriters can rely on. According to Robert Booker, this quantified approach can make a significant difference, offering confidence to both the insured and the insurer.</p><p>Another important aspect discussed is the role of brokerage in this process. Brokers traditionally guide companies through the insurance process, and an R2 certification from HITRUST can greatly assist them in securing better terms and conditions, as it is recognized as a testament to a company's robust security posture. This can also translate into potentially lower premiums and more reliable coverage, addressing one of the largest pain points in securing cyber insurance.</p><p>The HITRUST Shared Risk Facility is made available exclusively through licensed brokers and can be accessed by any company holding an R2 certification, with plans to extend to I1 and E1 levels in the future. This facility aims to simplify the process, reduce the administrative burden on companies, and provide greater reliability in the insurance coverage.</p><p>The episode wraps up with an invitation for organizations, brokers, and underwriters to engage with HITRUST to explore these innovative solutions. It’s a call to improve the overall confidence in the insurance landscape through verified, independent measures of cybersecurity maturity, ultimately benefiting all parties involved in the cyber insurance ecosystem.</p><p>Explore how HITRUST’s R2 certification can enhance your organization's cybersecurity posture and streamline your cyber insurance process.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Resources</strong></p><p>HITRUST 2024 Trust Report: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30074001" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a62854b7-b3eb-4564-becd-10b379e30a57/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a62854b7-b3eb-4564-becd-10b379e30a57&amp;feed=2M86zCcc"/>
      <itunes:title>First of its Kind Cyber Insurance Product Exclusively Available to HITRUST-Certified Customers | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Blake Sutherland and Robert Booker</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Booker, Blake Sutherland</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:19</itunes:duration>
      <itunes:summary>Discover how HITRUST&apos;s R2 certification is revolutionizing cyber insurance by providing a quantifiable measure of cybersecurity maturity, easing the insurance acquisition process, and potentially lowering premiums. Join Sean Martin as he speaks with Robert Booker and Blake Sutherland to explore this groundbreaking approach and its benefits for organizations and underwriters alike.</itunes:summary>
      <itunes:subtitle>Discover how HITRUST&apos;s R2 certification is revolutionizing cyber insurance by providing a quantifiable measure of cybersecurity maturity, easing the insurance acquisition process, and potentially lowering premiums. Join Sean Martin as he speaks with Robert Booker and Blake Sutherland to explore this groundbreaking approach and its benefits for organizations and underwriters alike.</itunes:subtitle>
      <itunes:keywords>maturity assessment, hitrust shared risk facility, marco ciappelli, security posture, sean martin, hitrust, regulatory compliance, cybersecurity, risk assessment, robert booker, risk management, r2 certification, cyber insurance, underwriting, data validation, certification, insurance brokers, mid-market companies, hitrust collaborate 2024, insurance acquisition, blake sutherland, brand story, insurance premiums</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>142</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aff16168-a747-416f-a5b3-b45c6db28776</guid>
      <title>Bringing a Consistent, Personable and Hands-On Approach to Compliance | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A IS Partners Short Brand Innovation Story with Ian Terry and Robert Godard</title>
      <description><![CDATA[<p>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Ian Terry and Robert Godard from IS Partners to discuss the importance of compliance in modern corporations. Ian and Robert share their insights from the HITRUST Collaborate event, shedding light on their company's unique approach to cybersecurity and auditing.</p><p>Robert Godard explains that IS Partners was founded with a startup mentality, emphasizing collaboration and a fun work environment. This culture aims to make compliance efforts less daunting for both their team and their clients. Ian Terry adds that fostering an enjoyable work atmosphere is crucial for engaging and committed outcomes, especially in the dynamic world of information security.</p><p>One significant point discussed is the balance between fun and professionalism. Ian highlights that while the job can be stressful during cybersecurity incidents, the focus on industry changes and continuous learning keeps the work interesting and rewarding. The duo also touches on how IS Partners assists clients in navigating complex compliance frameworks. Their tailored approach ensures clients not only meet regulatory requirements but also achieve their business goals.</p><p>The episode concludes with a note on the importance of events like HITRUST Collaborate for networking and professional growth.</p><p>Learn more about IS Partners: <a href="https://itspm.ag/isparto2jk">https://itspm.ag/isparto2jk</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Ian Terry</strong>, Principal, Cybersecurity Services, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-terry/" target="_blank">https://www.linkedin.com/in/ian-terry/</a></p><p><strong>Robert Godard</strong>, Partner, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/" target="_blank">https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from IS Partners: <a href="https://www.itspmagazine.com/directory/is-partners">https://www.itspmagazine.com/directory/is-partners</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 7 Nov 2024 04:24:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ian Terry, Robert Godard)</author>
      <link>https://eventcoveragepodcast.com/episodes/bringing-a-consistent-personable-and-hands-on-approach-to-compliance-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-is-partnersshort-brand-innovation-story-with-ian-terry-and-robert-godard-ylTvwRxT</link>
      <content:encoded><![CDATA[<p>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Ian Terry and Robert Godard from IS Partners to discuss the importance of compliance in modern corporations. Ian and Robert share their insights from the HITRUST Collaborate event, shedding light on their company's unique approach to cybersecurity and auditing.</p><p>Robert Godard explains that IS Partners was founded with a startup mentality, emphasizing collaboration and a fun work environment. This culture aims to make compliance efforts less daunting for both their team and their clients. Ian Terry adds that fostering an enjoyable work atmosphere is crucial for engaging and committed outcomes, especially in the dynamic world of information security.</p><p>One significant point discussed is the balance between fun and professionalism. Ian highlights that while the job can be stressful during cybersecurity incidents, the focus on industry changes and continuous learning keeps the work interesting and rewarding. The duo also touches on how IS Partners assists clients in navigating complex compliance frameworks. Their tailored approach ensures clients not only meet regulatory requirements but also achieve their business goals.</p><p>The episode concludes with a note on the importance of events like HITRUST Collaborate for networking and professional growth.</p><p>Learn more about IS Partners: <a href="https://itspm.ag/isparto2jk">https://itspm.ag/isparto2jk</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Ian Terry</strong>, Principal, Cybersecurity Services, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-terry/" target="_blank">https://www.linkedin.com/in/ian-terry/</a></p><p><strong>Robert Godard</strong>, Partner, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/" target="_blank">https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from IS Partners: <a href="https://www.itspmagazine.com/directory/is-partners">https://www.itspmagazine.com/directory/is-partners</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7108367" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e9f8e71d-0192-4cba-951d-a171184b84ec/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e9f8e71d-0192-4cba-951d-a171184b84ec&amp;feed=2M86zCcc"/>
      <itunes:title>Bringing a Consistent, Personable and Hands-On Approach to Compliance | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A IS Partners Short Brand Innovation Story with Ian Terry and Robert Godard</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ian Terry, Robert Godard</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:24</itunes:duration>
      <itunes:summary>Join Sean Martin as he chats with Ian Terry and Robert Godard from IS Partners about making compliance fun and approachable for businesses, all while sharing insights from the HITRUST Collaborate event. Discover how IS Partners uses a collaborative and engaging work culture to navigate complex cybersecurity and compliance frameworks successfully.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he chats with Ian Terry and Robert Godard from IS Partners about making compliance fun and approachable for businesses, all while sharing insights from the HITRUST Collaborate event. Discover how IS Partners uses a collaborative and engaging work culture to navigate complex cybersecurity and compliance frameworks successfully.</itunes:subtitle>
      <itunes:keywords>compliance, collaboration, soc 2, marco ciappelli, rsa conference, networking, startup, sean martin, industry standards, hitrust, robert godard, cybersecurity, nist, penetration testing, is partners, ssa 16, seven minutes podcast, cybersecurity compliance, soc 1, it audit, iso, security, cyber incidents, pci dss, cpe, audit, ian terry, engagement</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>141</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5da1d5e8-9d91-4a92-a72c-7ae005fe6853</guid>
      <title>The Future of Cybersecurity at the Australian Cyber Conference 2024, in Melbourne | A Pre-Event Conversation with Akash Mittal | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Akash Mittal</strong>, CISO, Group Security, Sumitomo Forestry Australia</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akashgmittal/">https://www.linkedin.com/in/akashgmittal/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Welcome to Melbourne for AU Cyber Con 2024</strong><br />From November 26th to 28th, Melbourne will transform into the epicenter of cybersecurity as it hosts AU Cyber Con 2024. Organized by the Australian Information Security Association (AISA), the conference brings a diverse lineup of global thought leaders and innovators to the stage, all focused on shaping the next wave of cybersecurity.</p><p><strong>Conference Highlights and Theme</strong><br />The theme, <i>"The Future is Now,"</i> reflects the urgent need for organizations and individuals alike to adapt to our rapidly changing digital landscape. Over three days, the event will feature 440+ speakers and 350 sessions, offering a deep dive into the intersection of cybersecurity, society, and technology.</p><p><strong>Engage with Industry Leaders</strong><br />This year’s lineup includes top voices in cybersecurity and beyond, like former Facebook CSO Joe Sullivan, astronaut Jose Hernandez, and security icon Mikko Hypponen. With appearances from cultural figures such as actor Kal Penn, the event will highlight the broader societal impact of cybersecurity, demonstrating how it affects everything from the arts to government policy.</p><p><strong>Interactive Villages and Hands-On Workshops</strong><br />AU Cyber Con goes beyond the stage with interactive villages like the Careers Village, Lockpicking Village, and AI Village. Here, attendees can gain hands-on experience with everything from physical security tools to AI applications and prompt injections. For those interested in personal brand-building, industry insights, or getting into the nuts and bolts of cybersecurity, these workshops offer something for everyone.</p><p><strong>Spotlight on Sponsors and Exhibitors</strong><br />With support from over 150 exhibitors, the event provides a unique opportunity for attendees to connect with leading companies and uncover the latest in cybersecurity tech. For exhibitors, it’s a valuable chance to meet professionals tackling real-world cybersecurity challenges head-on.</p><p><strong>Fostering Global Collaboration</strong><br />AU Cyber Con 2024 emphasizes the need for global teamwork to advance cybersecurity. Government representatives and international delegates will discuss strategic initiatives and regulatory advancements to strengthen cyber resilience. This gathering is the perfect platform to build connections, share ideas, and work toward a unified digital security future.</p><p><strong>Looking Ahead: Coverage from ITSPmagazine</strong><br />Sean Martin and Marco Ciappelli will be covering AU Cyber Con in real time. Join us for pre-event discussions, live updates, and post-event insights—all crafted to keep you connected to the latest innovations and collaborations shaping the future of cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/asia24">https://itspm.ag/asia24</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 7 Nov 2024 03:41:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Akash Mittal, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-future-of-cybersecurity-at-the-australian-cyber-conference-2024-in-melbourne-a-pre-event-conversation-with-akash-mittal-on-location-coverage-with-sean-martin-and-marco-ciappelli-tj7yzN1P</link>
      <content:encoded><![CDATA[<p><strong>Guest: Akash Mittal</strong>, CISO, Group Security, Sumitomo Forestry Australia</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/akashgmittal/">https://www.linkedin.com/in/akashgmittal/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Welcome to Melbourne for AU Cyber Con 2024</strong><br />From November 26th to 28th, Melbourne will transform into the epicenter of cybersecurity as it hosts AU Cyber Con 2024. Organized by the Australian Information Security Association (AISA), the conference brings a diverse lineup of global thought leaders and innovators to the stage, all focused on shaping the next wave of cybersecurity.</p><p><strong>Conference Highlights and Theme</strong><br />The theme, <i>"The Future is Now,"</i> reflects the urgent need for organizations and individuals alike to adapt to our rapidly changing digital landscape. Over three days, the event will feature 440+ speakers and 350 sessions, offering a deep dive into the intersection of cybersecurity, society, and technology.</p><p><strong>Engage with Industry Leaders</strong><br />This year’s lineup includes top voices in cybersecurity and beyond, like former Facebook CSO Joe Sullivan, astronaut Jose Hernandez, and security icon Mikko Hypponen. With appearances from cultural figures such as actor Kal Penn, the event will highlight the broader societal impact of cybersecurity, demonstrating how it affects everything from the arts to government policy.</p><p><strong>Interactive Villages and Hands-On Workshops</strong><br />AU Cyber Con goes beyond the stage with interactive villages like the Careers Village, Lockpicking Village, and AI Village. Here, attendees can gain hands-on experience with everything from physical security tools to AI applications and prompt injections. For those interested in personal brand-building, industry insights, or getting into the nuts and bolts of cybersecurity, these workshops offer something for everyone.</p><p><strong>Spotlight on Sponsors and Exhibitors</strong><br />With support from over 150 exhibitors, the event provides a unique opportunity for attendees to connect with leading companies and uncover the latest in cybersecurity tech. For exhibitors, it’s a valuable chance to meet professionals tackling real-world cybersecurity challenges head-on.</p><p><strong>Fostering Global Collaboration</strong><br />AU Cyber Con 2024 emphasizes the need for global teamwork to advance cybersecurity. Government representatives and international delegates will discuss strategic initiatives and regulatory advancements to strengthen cyber resilience. This gathering is the perfect platform to build connections, share ideas, and work toward a unified digital security future.</p><p><strong>Looking Ahead: Coverage from ITSPmagazine</strong><br />Sean Martin and Marco Ciappelli will be covering AU Cyber Con in real time. Join us for pre-event discussions, live updates, and post-event insights—all crafted to keep you connected to the latest innovations and collaborations shaping the future of cybersecurity.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Threatlocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><strong>____________________________</strong></p><p>Learn more and catch more stories from Australian Cyber Conference 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/asia24">https://itspm.ag/asia24</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33351172" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1e40176e-f601-425b-aa48-16068694d293/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1e40176e-f601-425b-aa48-16068694d293&amp;feed=2M86zCcc"/>
      <itunes:title>The Future of Cybersecurity at the Australian Cyber Conference 2024, in Melbourne | A Pre-Event Conversation with Akash Mittal | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Akash Mittal, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/fe0d192a-3ae6-4528-ada1-e1def48d4392/3000x3000/au-20cyber-20conference-202024-203500-20x-203500.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:44</itunes:duration>
      <itunes:summary>Join us as we explore the cutting edge of cybersecurity at the Australian Cyber Conference 2024 in Melbourne. This premier event brings together industry leaders, visionaries, and global experts to discuss the latest advancements and the future of digital security.</itunes:summary>
      <itunes:subtitle>Join us as we explore the cutting edge of cybersecurity at the Australian Cyber Conference 2024 in Melbourne. This premier event brings together industry leaders, visionaries, and global experts to discuss the latest advancements and the future of digital security.</itunes:subtitle>
      <itunes:keywords>interactive villages, melbourne cybersecurity event, marco ciappelli, sean martin, future of cybersecurity, global cybersecurity, aisa, cybersecurity, conference, cybersecurity workshops, redefining cybersecurity, melbourne tech events, jose hernandez, cybersecurity networking, information security, podcast, security, cyber resilience, kal penn cybersecurity, ai in cybersecurity, itspmagazine, cybersecurity innovation, australian cyber conference, digital security, au cyber con 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>140</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cc6aab01-487c-4af9-84e9-3954e0cbded8</guid>
      <title>Transforming Compliance and Revolutionizing Cybersecurity | A HITRUST Collaborate 2024 Conversation with Ryan T. Patrick | On Location Coverage with Sean Martin</title>
      <description><![CDATA[<p><strong>Guests: Ryan T. Patrick</strong>, Vice President of Adoption, HITRUST</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In On Location Podcast episode, Sean Martin had a recap conversation with Ryan T. Patrick, engaging about the pivotal topics surrounding HITRUST and its Collaborate Conference. Ryan Patrick, Director of Corporate Audit and Compliance Operations at HITRUST, provided insightful commentary on HITRUST's mission and its recent initiatives to strengthen cybersecurity and compliance across various sectors. Throughout the episode, Ryan emphasized the significance of HITRUST's annual event, Collaborate. The conference serves as a central hub for customers, assessors, partners, auditors, security, and privacy professionals to share insights and build relationships.</p><p>One key discussion topic was the evolving concept of continuous assurance. Ryan highlighted how HITRUST is striving to transform annual assessments into a continuous process, enabling organizations to better manage and understand their security posture throughout the year. This shift aims to make security and compliance efforts more proactive and less burdensome.</p><p>Sean and Ryan also touched on the important role of HITRUST's Results Distribution System (RDS). This innovative system allows organizations to receive structured assessment results, which can be integrated seamlessly into GRC platforms like ServiceNow. By utilizing RDS, companies can more effectively compare vendor assessments and manage risk in a streamlined manner.</p><p>Another significant highlight from the conference was the announcement of HITRUST's first AI security certification. Set to launch in December, this certification will provide a comprehensive framework for securing AI technologies. Ryan explained that this initiative addresses the rising concerns around AI security by focusing on the controls needed to safeguard AI deployments. In addition, the certification will ensure that the underlying infrastructure supporting AI meets high-security standards.</p><p>Cyber insurance was another critical topic discussed. HITRUST's partnership with leading insurers has led to the creation of a cyber insurance product tailored for HITRUST-certified organizations. This product offers a 25% premium reduction for those who achieve HITRUST certification, potentially leading to lower premiums and higher coverage limits. Ryan noted that the product is designed to reward organizations that have demonstrated robust cybersecurity practices through their HITRUST certification.</p><p>The conversation wrapped up with a mention of HITRUST's impressive Trust Report statistics. According to Ryan, less than 1% of HITRUST-certified organizations experienced a security breach in the past two years, compared to over 50% of non-certified entities. This stark difference underscores the effectiveness of HITRUST's rigorous assessment and certification process in enhancing organizational security. Ryan’s insights during this episode illuminate the critical role HITRUST plays in advancing cybersecurity and compliance.</p><p>The initiatives discussed not only demonstrate HITRUST's commitment to innovation but also highlight practical steps organizations can take to fortify their security posture and achieve greater assurance in an increasingly interconnected world. This collaborative spirit and dedication to continuous improvement continue to set HITRUST apart as a leader in the field.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 31 Oct 2024 15:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ryan T. Patrick)</author>
      <link>https://eventcoveragepodcast.com/episodes/transforming-compliance-and-revolutionizing-cybersecurity-a-hitrust-collaborate-2024-conversation-with-ryan-t-patrick-on-location-coverage-with-sean-martin-6H9icW8u</link>
      <content:encoded><![CDATA[<p><strong>Guests: Ryan T. Patrick</strong>, Vice President of Adoption, HITRUST</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In On Location Podcast episode, Sean Martin had a recap conversation with Ryan T. Patrick, engaging about the pivotal topics surrounding HITRUST and its Collaborate Conference. Ryan Patrick, Director of Corporate Audit and Compliance Operations at HITRUST, provided insightful commentary on HITRUST's mission and its recent initiatives to strengthen cybersecurity and compliance across various sectors. Throughout the episode, Ryan emphasized the significance of HITRUST's annual event, Collaborate. The conference serves as a central hub for customers, assessors, partners, auditors, security, and privacy professionals to share insights and build relationships.</p><p>One key discussion topic was the evolving concept of continuous assurance. Ryan highlighted how HITRUST is striving to transform annual assessments into a continuous process, enabling organizations to better manage and understand their security posture throughout the year. This shift aims to make security and compliance efforts more proactive and less burdensome.</p><p>Sean and Ryan also touched on the important role of HITRUST's Results Distribution System (RDS). This innovative system allows organizations to receive structured assessment results, which can be integrated seamlessly into GRC platforms like ServiceNow. By utilizing RDS, companies can more effectively compare vendor assessments and manage risk in a streamlined manner.</p><p>Another significant highlight from the conference was the announcement of HITRUST's first AI security certification. Set to launch in December, this certification will provide a comprehensive framework for securing AI technologies. Ryan explained that this initiative addresses the rising concerns around AI security by focusing on the controls needed to safeguard AI deployments. In addition, the certification will ensure that the underlying infrastructure supporting AI meets high-security standards.</p><p>Cyber insurance was another critical topic discussed. HITRUST's partnership with leading insurers has led to the creation of a cyber insurance product tailored for HITRUST-certified organizations. This product offers a 25% premium reduction for those who achieve HITRUST certification, potentially leading to lower premiums and higher coverage limits. Ryan noted that the product is designed to reward organizations that have demonstrated robust cybersecurity practices through their HITRUST certification.</p><p>The conversation wrapped up with a mention of HITRUST's impressive Trust Report statistics. According to Ryan, less than 1% of HITRUST-certified organizations experienced a security breach in the past two years, compared to over 50% of non-certified entities. This stark difference underscores the effectiveness of HITRUST's rigorous assessment and certification process in enhancing organizational security. Ryan’s insights during this episode illuminate the critical role HITRUST plays in advancing cybersecurity and compliance.</p><p>The initiatives discussed not only demonstrate HITRUST's commitment to innovation but also highlight practical steps organizations can take to fortify their security posture and achieve greater assurance in an increasingly interconnected world. This collaborative spirit and dedication to continuous improvement continue to set HITRUST apart as a leader in the field.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34946099" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/138c3fec-62bc-437d-a924-6d0ddccc9ccd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=138c3fec-62bc-437d-a924-6d0ddccc9ccd&amp;feed=2M86zCcc"/>
      <itunes:title>Transforming Compliance and Revolutionizing Cybersecurity | A HITRUST Collaborate 2024 Conversation with Ryan T. Patrick | On Location Coverage with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ryan T. Patrick</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/24e457c6-baea-4a63-9156-47d5ac929d00/3000x3000/hitrust-collaborate-october-1-3-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:36:24</itunes:duration>
      <itunes:summary>Join Sean Martin and Ryan T. Patrick as they discuss groundbreaking HITRUST initiatives like the continuous assurance model, AI security certification, and a new cyber insurance product that rewards robust cybersecurity practices. Discover how HITRUST&apos;s innovative approaches are helping organizations enhance security and manage compliance more effectively.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Ryan T. Patrick as they discuss groundbreaking HITRUST initiatives like the continuous assurance model, AI security certification, and a new cyber insurance product that rewards robust cybersecurity practices. Discover how HITRUST&apos;s innovative approaches are helping organizations enhance security and manage compliance more effectively.</itunes:subtitle>
      <itunes:keywords>compliance, security posture, results distribution, grc, sean martin, ai certification, hitrust, cybersecurity, conference, healthcare security, redefining cybersecurity, collaborate 2024, risk management, audits, collaborate, innovation, cyber insurance, technology conference, continuous assurance, ryan t patrick, podcast, security, data integration, privacy, cybersecurityconference, third party</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>139</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40bc2040-7f76-4f81-a0eb-4bb618559105</guid>
      <title>Guiding Organizations on the Next Steps in Their Compliance Journey | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | An A-LIGN Short Brand Innovation Story with Shreesh Bhattarai</title>
      <description><![CDATA[<p>The focus is on HITRUST assessments, specifically the e1 certification, which provides an entry-level approach to cybersecurity compliance. The session emphasizes that compliance is an ongoing process and highlights the HITRUST e1 framework's adaptability to evolving threats. It also discusses the value proposition of the e1 certification, its affordability, and its suitability for low-risk organizations, as well as its synergies with existing SOC2 and ISO certifications.</p><p>A-LIGN was founded in 2009 by CEO Scott Price to help companies like yours navigate the complexities of cybersecurity and compliance by offering customized solutions that align specifically with each organization’s unique goals and objectives. We believe your business can reach its fullest potential by aligning compliance objectives with strategic objectives. Working with small businesses to global enterprises, A‑LIGN’s experts coupled with our proprietary compliance management platform, A‑SCEND, are transforming the compliance experience.</p><p>A-LIGN is the leading provider of high-quality, efficient cybersecurity compliance programs. Combining experienced auditors and audit management technology, A-LIGN provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI. A-LIGN is the number one issuer of SOC 2 and HITRUST and a top three FedRAMP assessor.</p><p>Learn more about A-LIGN: <a href="https://itspm.ag/a-lign-uz1w" target="_blank">https://itspm.ag/a-lign-uz1w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Shreesh Bhattarai</strong>, Director of HITRUST, A-LIGN [<a href="https://x.com/AlignCompliance">@aligncompliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/" target="_blank">https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from A-LIGN: <a href="https://www.itspmagazine.com/directory/a-lign">https://www.itspmagazine.com/directory/a-lign</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 31 Oct 2024 02:33:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Shreesh Bhattarai)</author>
      <link>https://eventcoveragepodcast.com/episodes/guiding-organizations-on-the-next-steps-in-their-compliance-journey-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-an-a-lignshort-brand-innovation-story-with-shreesh-bhattarai-CUxBOrDZ</link>
      <content:encoded><![CDATA[<p>The focus is on HITRUST assessments, specifically the e1 certification, which provides an entry-level approach to cybersecurity compliance. The session emphasizes that compliance is an ongoing process and highlights the HITRUST e1 framework's adaptability to evolving threats. It also discusses the value proposition of the e1 certification, its affordability, and its suitability for low-risk organizations, as well as its synergies with existing SOC2 and ISO certifications.</p><p>A-LIGN was founded in 2009 by CEO Scott Price to help companies like yours navigate the complexities of cybersecurity and compliance by offering customized solutions that align specifically with each organization’s unique goals and objectives. We believe your business can reach its fullest potential by aligning compliance objectives with strategic objectives. Working with small businesses to global enterprises, A‑LIGN’s experts coupled with our proprietary compliance management platform, A‑SCEND, are transforming the compliance experience.</p><p>A-LIGN is the leading provider of high-quality, efficient cybersecurity compliance programs. Combining experienced auditors and audit management technology, A-LIGN provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI. A-LIGN is the number one issuer of SOC 2 and HITRUST and a top three FedRAMP assessor.</p><p>Learn more about A-LIGN: <a href="https://itspm.ag/a-lign-uz1w" target="_blank">https://itspm.ag/a-lign-uz1w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Shreesh Bhattarai</strong>, Director of HITRUST, A-LIGN [<a href="https://x.com/AlignCompliance">@aligncompliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/" target="_blank">https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from A-LIGN: <a href="https://www.itspmagazine.com/directory/a-lign">https://www.itspmagazine.com/directory/a-lign</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6942845" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/200376d3-22ae-4e10-badb-c2dff650af02/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=200376d3-22ae-4e10-badb-c2dff650af02&amp;feed=2M86zCcc"/>
      <itunes:title>Guiding Organizations on the Next Steps in Their Compliance Journey | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | An A-LIGN Short Brand Innovation Story with Shreesh Bhattarai</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Shreesh Bhattarai</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:13</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Shreesh Bhattarai to share his insights on how A-LIGN has become the leading provider of high-quality, efficient cybersecurity compliance programs and provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Shreesh Bhattarai to share his insights on how A-LIGN has become the leading provider of high-quality, efficient cybersecurity compliance programs and provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI.</itunes:subtitle>
      <itunes:keywords>roi, compliance, vc, shreesh bhattarai, marco ciappelli, rsa conference, ciso, sean martin, assessment, hitrust, framework, cybersecurity, seven minutes podcast, pci, a-lign, soc, attestation, iso, security, certification, private equity, threat</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>138</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fdec751e-0f74-4749-9d8c-e26a39420b2b</guid>
      <title>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty</title>
      <description><![CDATA[<p>The latest episode of 7 Minutes on ITSPmagazine, recorded during the Black Hat Sector 2024 event in Toronto, Canada, brings insights from the dynamic world of cybersecurity training and education. Hosted by Sean Martin, the discussion features Rushmi Hasham, Director of Strategic Partnerships, and Vasu Daggupaty, Manager of Strategic Partnerships and Investments, both from Rogers Cybersecure Catalyst.</p><p>Rogers Cybersecure Catalyst, a non-profit organization operated by Toronto Metropolitan University, serves as the university’s national hub for cyber education. The organization’s focus spans three primary areas: training individuals to become cybersecurity professionals, helping organizations to bolster their cyber safety measures, and assisting cybersecurity founders in bringing their innovative solutions to the market.</p><p>Vasu Daggupaty explains that the Catalyst’s training programs certify individuals with the necessary credentials to be employable in the cybersecurity field. Moreover, organizations receive guidance on enhancing their incident response strategies and other critical safety practices. An essential part of their mission is also supporting innovators in launching new cybersecurity products and services.</p><p>The episode highlights a compelling story of Gina, a former nurse transitioning into a cybersecurity analyst role. This transformation exemplifies the success of the Catalyst’s Accelerated Rapid Training Program. Rushmi Hasham elaborates on the program’s design, which caters to mid-life career changers, providing a seven-month intensive course in collaboration with the SANS Institute. The program equips participants with hands-on skills, transitioning knowledge, and career development, ensuring they are job-ready upon completion.</p><p>Additionally, the Catalyst’s corporate training services include non-technical tabletop exercises to prepare executives for real-life cyber threats. They also offer a cyber range where clients can safely engage with live malware to elevate their technical response capabilities. This comprehensive approach is instrumental in addressing Canada’s cybersecurity skills shortage and enhancing the nation’s defensive posture. The episode concludes with an invitation to explore the Catalyst's investment initiatives aimed at fortifying cybersecurity innovations and talent development across Canada.</p><p>Learn more about Rogers Cybersecure Catalyst: <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Rushmi Hasham</strong>, Director of Strategic Partnerships, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rushmi-hasham-9523554/">https://www.linkedin.com/in/rushmi-hasham-9523554/</a></p><p><strong>Vasu Daggupaty</strong>, Manager, Partnerships & Investment, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vdaggupaty/">https://www.linkedin.com/in/vdaggupaty/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 24 Oct 2024 01:31:29 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rushmi Hasham, Vasu Daggupaty)</author>
      <link>https://eventcoveragepodcast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty-4MTBfix0</link>
      <content:encoded><![CDATA[<p>The latest episode of 7 Minutes on ITSPmagazine, recorded during the Black Hat Sector 2024 event in Toronto, Canada, brings insights from the dynamic world of cybersecurity training and education. Hosted by Sean Martin, the discussion features Rushmi Hasham, Director of Strategic Partnerships, and Vasu Daggupaty, Manager of Strategic Partnerships and Investments, both from Rogers Cybersecure Catalyst.</p><p>Rogers Cybersecure Catalyst, a non-profit organization operated by Toronto Metropolitan University, serves as the university’s national hub for cyber education. The organization’s focus spans three primary areas: training individuals to become cybersecurity professionals, helping organizations to bolster their cyber safety measures, and assisting cybersecurity founders in bringing their innovative solutions to the market.</p><p>Vasu Daggupaty explains that the Catalyst’s training programs certify individuals with the necessary credentials to be employable in the cybersecurity field. Moreover, organizations receive guidance on enhancing their incident response strategies and other critical safety practices. An essential part of their mission is also supporting innovators in launching new cybersecurity products and services.</p><p>The episode highlights a compelling story of Gina, a former nurse transitioning into a cybersecurity analyst role. This transformation exemplifies the success of the Catalyst’s Accelerated Rapid Training Program. Rushmi Hasham elaborates on the program’s design, which caters to mid-life career changers, providing a seven-month intensive course in collaboration with the SANS Institute. The program equips participants with hands-on skills, transitioning knowledge, and career development, ensuring they are job-ready upon completion.</p><p>Additionally, the Catalyst’s corporate training services include non-technical tabletop exercises to prepare executives for real-life cyber threats. They also offer a cyber range where clients can safely engage with live malware to elevate their technical response capabilities. This comprehensive approach is instrumental in addressing Canada’s cybersecurity skills shortage and enhancing the nation’s defensive posture. The episode concludes with an invitation to explore the Catalyst's investment initiatives aimed at fortifying cybersecurity innovations and talent development across Canada.</p><p>Learn more about Rogers Cybersecure Catalyst: <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Rushmi Hasham</strong>, Director of Strategic Partnerships, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rushmi-hasham-9523554/">https://www.linkedin.com/in/rushmi-hasham-9523554/</a></p><p><strong>Vasu Daggupaty</strong>, Manager, Partnerships & Investment, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vdaggupaty/">https://www.linkedin.com/in/vdaggupaty/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6983774" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f12e294d-8e57-45e7-8bdf-de8c4518f45b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f12e294d-8e57-45e7-8bdf-de8c4518f45b&amp;feed=2M86zCcc"/>
      <itunes:title>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rushmi Hasham, Vasu Daggupaty</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:16</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine, Sean Martin speaks with Rushmi Hasham and Vasu Daggupaty from Rogers Cybersecure Catalyst about their impactful training programs that transform career-changers into cybersecurity professionals and bolster organizational security measures. Discover how their innovative education and corporate training initiatives are bridging the talent gap and driving cybersecurity advancements in Canada.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine, Sean Martin speaks with Rushmi Hasham and Vasu Daggupaty from Rogers Cybersecure Catalyst about their impactful training programs that transform career-changers into cybersecurity professionals and bolster organizational security measures. Discover how their innovative education and corporate training initiatives are bridging the talent gap and driving cybersecurity advancements in Canada.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sector 2024, black hat, sean martin, education, job readiness, cybersecure, credentials, cybersecurity, career change, reskilling, upskilling, seven minutes podcast, innovation, vasu daggupaty, rushmi hashim, incident response, itspmagazine, cyber threats, training, catalyst, toronto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>137</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a631b918-edd0-4499-b9ab-9c704748ea3c</guid>
      <title>Effectively Managing a Growing Compliance Program While Minimizing Audit Fatigue | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Schellman Short Brand Innovation Story with Michael Parisi and Ryan Meehan</title>
      <description><![CDATA[<p>Schellman, founded in 2002 as SAS 70 Solutions, was originally focused on just one audit standard; the SAS 70 (subsequently replaced by SOC 2). As the client base grew so did the request to perform other audits outside of the SAS 70. Schellman grew its offerings over the past 20+ years by identifying client needs and then determining if we have the skillset and expertise to deliver high quality work. We have always stayed true to our core strengths and expertise, which is why Schellman is the only Top 100 CPA firm that specializes in IT Audit and Cybersecurity.</p><p>Schellman provides full-spectrum cybersecurity third-party audits, assessments, and certifications. In a marketplace with growing cybersecurity compliance needs, organizations are struggling to incorporate additional framework and regulations in an efficient and effective way. At Schellman we harnesses our expertise and deep knowledge across the compliance standards to roadmap audits throughout the year that promotes the highest return on evidence collection and subject matter expert time.</p><p>By performing specific assessments in a staggered or parallel fashion, Schellman is able to collect once and test many; both in terms of information from subject matters experts and evidence from business stakeholders. The broad range of our compliance offerings, along with our combined audit approach and depth of expertise sets Schellman apart. Schellman's approach was built to provide expertise and quality work while valuing and respecting the time and stress assessments/audits place on an organization.</p><p>Learn more about Schellman: <a href="https://itspm.ag/schellman9a6v">https://itspm.ag/schellman9a6v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Michael Parisi</strong>, Head of Client Acquisition, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a></p><p><strong>Ryan Meehan</strong>, Director, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939" target="_blank">https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Schellman: <a href="https://www.itspmagazine.com/directory/schellman">https://www.itspmagazine.com/directory/schellman</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Oct 2024 16:12:15 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Meehan, Michael Parisi)</author>
      <link>https://eventcoveragepodcast.com/episodes/effectively-managing-a-growing-compliance-program-while-minimizing-audit-fatigue-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-schellmanshort-brand-innovation-story-with-michael-parisi-and-ryan-meehan-0bg2IU8B</link>
      <content:encoded><![CDATA[<p>Schellman, founded in 2002 as SAS 70 Solutions, was originally focused on just one audit standard; the SAS 70 (subsequently replaced by SOC 2). As the client base grew so did the request to perform other audits outside of the SAS 70. Schellman grew its offerings over the past 20+ years by identifying client needs and then determining if we have the skillset and expertise to deliver high quality work. We have always stayed true to our core strengths and expertise, which is why Schellman is the only Top 100 CPA firm that specializes in IT Audit and Cybersecurity.</p><p>Schellman provides full-spectrum cybersecurity third-party audits, assessments, and certifications. In a marketplace with growing cybersecurity compliance needs, organizations are struggling to incorporate additional framework and regulations in an efficient and effective way. At Schellman we harnesses our expertise and deep knowledge across the compliance standards to roadmap audits throughout the year that promotes the highest return on evidence collection and subject matter expert time.</p><p>By performing specific assessments in a staggered or parallel fashion, Schellman is able to collect once and test many; both in terms of information from subject matters experts and evidence from business stakeholders. The broad range of our compliance offerings, along with our combined audit approach and depth of expertise sets Schellman apart. Schellman's approach was built to provide expertise and quality work while valuing and respecting the time and stress assessments/audits place on an organization.</p><p>Learn more about Schellman: <a href="https://itspm.ag/schellman9a6v">https://itspm.ag/schellman9a6v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Michael Parisi</strong>, Head of Client Acquisition, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a></p><p><strong>Ryan Meehan</strong>, Director, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939" target="_blank">https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Schellman: <a href="https://www.itspmagazine.com/directory/schellman">https://www.itspmagazine.com/directory/schellman</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6883507" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ce44b261-7929-47a4-b38d-9cc2f71f2474/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ce44b261-7929-47a4-b38d-9cc2f71f2474&amp;feed=2M86zCcc"/>
      <itunes:title>Effectively Managing a Growing Compliance Program While Minimizing Audit Fatigue | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Schellman Short Brand Innovation Story with Michael Parisi and Ryan Meehan</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Meehan, Michael Parisi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:10</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Michael Parisi and Ryan Meehan from Schellman to discuss the intricacies of streamlining IT audits and compliance for major companies. Discover how Schellman enhances cybersecurity and compliance efficiency while helping organizations navigate audit fatigue and board-level transparency.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Michael Parisi and Ryan Meehan from Schellman to discuss the intricacies of streamlining IT audits and compliance for major companies. Discover how Schellman enhances cybersecurity and compliance efficiency while helping organizations navigate audit fatigue and board-level transparency.</itunes:subtitle>
      <itunes:keywords>compliance, transparency, attestations, soc 2, marco ciappelli, michael parisi, sean martin, trust, hitrust, cybersecurity, seven minutes podcast, audits, clients, it, schellman, ryan meehan, risk, roadmap, board, iso 27001</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>136</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">00ee1b11-cd7e-4995-8f67-6807515c43c5</guid>
      <title>Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk</title>
      <description><![CDATA[<p>In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.</p><p>Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.</p><p>Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today’s fast-paced world. In closing, the emphasis on understanding one’s maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Mychalczuk</strong>, Director of Product Management at OpenText [<a href="https://x.com/opentext" target="_blank">@opentext</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michaelmychalczuk/" target="_blank">https://www.linkedin.com/in/michaelmychalczuk/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OpenText: <a href="https://www.itspmagazine.com/directory/opentext" target="_blank">https://www.itspmagazine.com/directory/opentext</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 22 Oct 2024 19:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Michael Mychalczuk)</author>
      <link>https://eventcoveragepodcast.com/episodes/mastering-multi-cloud-management-7-minutes-on-itspmagazine-from-black-hat-sector-2024-an-opentext-short-brand-innovation-story-with-michael-mychalczuk-Qnm1Jv3k</link>
      <content:encoded><![CDATA[<p>In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.</p><p>Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.</p><p>Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today’s fast-paced world. In closing, the emphasis on understanding one’s maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Mychalczuk</strong>, Director of Product Management at OpenText [<a href="https://x.com/opentext" target="_blank">@opentext</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michaelmychalczuk/" target="_blank">https://www.linkedin.com/in/michaelmychalczuk/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OpenText: <a href="https://www.itspmagazine.com/directory/opentext" target="_blank">https://www.itspmagazine.com/directory/opentext</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6857969" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/db21e214-a519-4c94-a22d-5a757f4e7106/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=db21e214-a519-4c94-a22d-5a757f4e7106&amp;feed=2M86zCcc"/>
      <itunes:title>Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Michael Mychalczuk</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0613bba0-7aa8-4e73-be18-9438420f5574/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:08</itunes:duration>
      <itunes:summary>Join Sean Martin and Michael Mychalczuk during Black Hat SecTor 2024 for a new 7 Minutes on ITSPmagazine Short Brand Story as they unpack the complexities of managing multi-cloud environments and the essential strategies to ensure security. Discover expert insights on how businesses can navigate these challenges and thrive securely in today’s multi-cloud world.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Michael Mychalczuk during Black Hat SecTor 2024 for a new 7 Minutes on ITSPmagazine Short Brand Story as they unpack the complexities of managing multi-cloud environments and the essential strategies to ensure security. Discover expert insights on how businesses can navigate these challenges and thrive securely in today’s multi-cloud world.</itunes:subtitle>
      <itunes:keywords>michael mychalczuk, kubernetes, business enablement, black hat sector, marco ciappelli, multi-cloud challenges, sean martin, containers, automation, identity management, cloud deployment, itsp magazine, seven minutes podcast, opentext, multicloud, arcsight, cloud security, podcast, cyber security, cloud management, it operations, toronto, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>135</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9418604e-6c56-45fb-9d6a-872521ec9fd6</guid>
      <title>Leveraging AI for Effective Healthcare Solutions | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Walter Haydock and Steve Dufour</title>
      <description><![CDATA[<p><strong>The Emergence of Innovative Partnerships:</strong> As AI becomes increasingly integral across industries, healthcare is at the forefront of adopting these technologies to improve patient outcomes and streamline services. Sean Martin emphasizes the collaboration between StackAware and Embold Health, setting the stage for a discussion on how they leverage HITRUST to enhance healthcare solutions.</p><p><strong>A Look into StackAware and Embold Health:</strong> Walter Haydock, founder and CEO of StackAware, shares the company's mission to support AI-driven enterprises in measuring and managing cybersecurity compliance and privacy risks. Meanwhile, Steve Dufour, Chief Security and Privacy Officer of Embold Health, describes their initiative to assess physician performance, guiding patients toward top-performing providers.</p><p><strong>Integrating AI Responsibly:</strong> A key theme throughout the conversation is the responsible integration of generative AI into healthcare. Steve Dufour details how Embold Health developed a virtual assistant using Azure OpenAI, ensuring users receive informed healthcare recommendations without long-term storage of sensitive data.</p><p><strong>Assessment Through Rigorous Standards:</strong> Haydock and Dufour also highlight the importance of ensuring data privacy and compliance with security standards, from conducting penetration tests to implementing HITRUST assessments. Their approach underscores the need to prioritize security throughout product development, rather than as an afterthought.</p><p><strong>Navigating Risk and Compliance:</strong> The conversation touches on risk management and compliance, with both speakers emphasizing the importance of aligning AI initiatives with business objectives and risk tolerance. A strong risk assessment framework is essential for maintaining trust and security in AI-enabled applications.</p><p><strong>Conclusion:</strong> This in-depth discussion not only outlines a responsible approach to incorporating AI into healthcare but also showcases the power of collaboration in driving innovation. Sean Martin concludes with a call to embrace secure, impactful technologies that enhance healthcare services and improve outcomes.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Walter Haydock</strong>, Founder and CEO, StackAware</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/walter-haydock/">https://www.linkedin.com/in/walter-haydock/</a></p><p><strong>Steve Dufour</strong>, Chief Security & Privacy Officer, Embold Health</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swdufour/">https://www.linkedin.com/in/swdufour/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 17 Oct 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Walter Haydock, Steve Dufour)</author>
      <link>https://eventcoveragepodcast.com/episodes/leveraging-ai-for-effective-healthcare-solutions-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-story-with-walter-haydock-and-steve-dufour-YkdCxMsn</link>
      <content:encoded><![CDATA[<p><strong>The Emergence of Innovative Partnerships:</strong> As AI becomes increasingly integral across industries, healthcare is at the forefront of adopting these technologies to improve patient outcomes and streamline services. Sean Martin emphasizes the collaboration between StackAware and Embold Health, setting the stage for a discussion on how they leverage HITRUST to enhance healthcare solutions.</p><p><strong>A Look into StackAware and Embold Health:</strong> Walter Haydock, founder and CEO of StackAware, shares the company's mission to support AI-driven enterprises in measuring and managing cybersecurity compliance and privacy risks. Meanwhile, Steve Dufour, Chief Security and Privacy Officer of Embold Health, describes their initiative to assess physician performance, guiding patients toward top-performing providers.</p><p><strong>Integrating AI Responsibly:</strong> A key theme throughout the conversation is the responsible integration of generative AI into healthcare. Steve Dufour details how Embold Health developed a virtual assistant using Azure OpenAI, ensuring users receive informed healthcare recommendations without long-term storage of sensitive data.</p><p><strong>Assessment Through Rigorous Standards:</strong> Haydock and Dufour also highlight the importance of ensuring data privacy and compliance with security standards, from conducting penetration tests to implementing HITRUST assessments. Their approach underscores the need to prioritize security throughout product development, rather than as an afterthought.</p><p><strong>Navigating Risk and Compliance:</strong> The conversation touches on risk management and compliance, with both speakers emphasizing the importance of aligning AI initiatives with business objectives and risk tolerance. A strong risk assessment framework is essential for maintaining trust and security in AI-enabled applications.</p><p><strong>Conclusion:</strong> This in-depth discussion not only outlines a responsible approach to incorporating AI into healthcare but also showcases the power of collaboration in driving innovation. Sean Martin concludes with a call to embrace secure, impactful technologies that enhance healthcare services and improve outcomes.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Walter Haydock</strong>, Founder and CEO, StackAware</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/walter-haydock/">https://www.linkedin.com/in/walter-haydock/</a></p><p><strong>Steve Dufour</strong>, Chief Security & Privacy Officer, Embold Health</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swdufour/">https://www.linkedin.com/in/swdufour/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24669343" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3ef90e79-96f0-4466-878a-5ea0394b5023/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3ef90e79-96f0-4466-878a-5ea0394b5023&amp;feed=2M86zCcc"/>
      <itunes:title>Leveraging AI for Effective Healthcare Solutions | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Walter Haydock and Steve Dufour</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Walter Haydock, Steve Dufour</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:41</itunes:duration>
      <itunes:summary>In this new HITRUST Brand Story we explore advancements in healthcare through AI technology. Broadcasting live from HITRUST Collaborate 2024, Sean Martin leads a conversation with Walter Haydock of StackAware and Steve Dufour of Embold Health.</itunes:summary>
      <itunes:subtitle>In this new HITRUST Brand Story we explore advancements in healthcare through AI technology. Broadcasting live from HITRUST Collaborate 2024, Sean Martin leads a conversation with Walter Haydock of StackAware and Steve Dufour of Embold Health.</itunes:subtitle>
      <itunes:keywords>patient outcomes, marco ciappelli, partnership innovation, healthcare compliance, embold health, sean martin, healthcare partnerships, cybersecurity, physician performance, virtual assistant, risk management, stackaware, ai risk assessment, generative ai, cybersecurity compliance, healthcare technology, azure openai, data privacy, ai in healthcare, hitrust collaborate 2024, brand story, health outcomes</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ec900e32-729d-437a-a8a7-4c6e19014e4f</guid>
      <title>Unveiling AI&apos;s Impact and Challenges at SECTOR 2024 | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Helen Oakley and Larry Pesce | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Helen Oakley</strong>, Director of Secure Software Supply Chains and Secure Development, SAP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/helen-oakley" target="_blank">https://www.linkedin.com/in/helen-oakley</a></p><p>On Twitter | <a href="https://x.com/e2hln" target="_blank">https://x.com/e2hln</a></p><p>On Instagram |<a href="https://instagram.com/e2hln" target="_blank">https://instagram.com/e2hln</a></p><p><strong>Larry Pesce</strong>, Product Security Research and Analysis Director, Finite State [<a href="https://x.com/FiniteStateInc">@FiniteStateInc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/larrypesce/" target="_blank">https://www.linkedin.com/in/larrypesce/</a></p><p>On Twitter | <a href="https://x.com/haxorthematrix" target="_blank">https://x.com/haxorthematrix</a></p><p>On Mastodon | <a href="https://infosec.exchange/@haxorthematrix" target="_blank">https://infosec.exchange/@haxorthematrix</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Sean Martin and Marco Ciappelli kicked off their discussion by pondering the intricacies and potential pitfalls of the AI supply chain. Martin humorously questioned when Ciappelli last checked the entire supply chain of an AI session, provoking insightful thoughts about how people approach AI today.</p><p>The conversation then shifted as Oakley and Pesce were introduced, with Oakley explaining her role in leading cybersecurity for the software supply chain at SAP and co-founding the AI Integrity and Safe Use Foundation. Pesce shared his expertise in product security research and pen testing, emphasizing the importance of securing AI integrations.</p><p><strong>Preventing the AI Apocalypse</strong></p><p>One of the session's highlights was the discussion titled "AI Apocalypse Prevention 101." Oakley and Pesce shared insights into the potential risks of AI overtaking human roles and discussed ways to prevent a hypothetical AI apocalypse. Oakley humorously noted her experimentation with deep fakes and emphasized the importance of addressing the root causes to avert catastrophic outcomes.</p><p>Pesce contributed by highlighting the need for a comprehensive Bill of Materials (BOM) for AI, pointing out how it differs from traditional software due to its unique reliance on multiple layers, including hardware and software components.</p><p><strong>AI BOM: A Tool for Understanding and Compliance</strong></p><p>The conversation evolved into a discussion about the AI BOM's significance. Oakley explained that the AI BOM serves as an ingredient list, akin to what you would find on packaged goods. It includes details about datasets, models, and energy consumption—critical for preventing decay or malicious behavior over time.</p><p>Pesce noted the AI BOM's potential in guiding pen testing and compliance. He emphasized the challenges that companies face in keeping up with rapidly evolving AI technology, suggesting that AI BOM could potentially streamline compliance efforts.</p><p><strong>Engagement at the CISO Executive Summit</strong></p><p>The speakers touched on SECTOR 2024's CISO Executive Summit, inviting senior leaders to join the conversation. Oakley highlighted the summit's role in providing a platform for addressing AI challenges and regulations. Martin and Ciappelli emphasized the value of attending such events for exchanging knowledge and ideas in a secure, collaborative environment.</p><p><strong>Conclusion: A Call to Be Prepared</strong></p><p>As the episode wrapped up, Sean Martin extended an invitation to all interested in preventing an AI apocalypse to join the broader discussions at SECTOR 2024. Helen Oakley and Larry Pesce left listeners with a pressing reminder of the importance of understanding AI's potential impact.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 10 Oct 2024 15:49:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Larry Pesce, Helen Oakley)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-ais-impact-and-challenges-at-sector-2024-a-sector-cybersecurity-conference-toronto-2024-conversation-with-helen-oakley-and-larry-pesce-on-location-coverage-with-sean-martin-and-marco-ciappelli-pvtc4FME</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Helen Oakley</strong>, Director of Secure Software Supply Chains and Secure Development, SAP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/helen-oakley" target="_blank">https://www.linkedin.com/in/helen-oakley</a></p><p>On Twitter | <a href="https://x.com/e2hln" target="_blank">https://x.com/e2hln</a></p><p>On Instagram |<a href="https://instagram.com/e2hln" target="_blank">https://instagram.com/e2hln</a></p><p><strong>Larry Pesce</strong>, Product Security Research and Analysis Director, Finite State [<a href="https://x.com/FiniteStateInc">@FiniteStateInc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/larrypesce/" target="_blank">https://www.linkedin.com/in/larrypesce/</a></p><p>On Twitter | <a href="https://x.com/haxorthematrix" target="_blank">https://x.com/haxorthematrix</a></p><p>On Mastodon | <a href="https://infosec.exchange/@haxorthematrix" target="_blank">https://infosec.exchange/@haxorthematrix</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Sean Martin and Marco Ciappelli kicked off their discussion by pondering the intricacies and potential pitfalls of the AI supply chain. Martin humorously questioned when Ciappelli last checked the entire supply chain of an AI session, provoking insightful thoughts about how people approach AI today.</p><p>The conversation then shifted as Oakley and Pesce were introduced, with Oakley explaining her role in leading cybersecurity for the software supply chain at SAP and co-founding the AI Integrity and Safe Use Foundation. Pesce shared his expertise in product security research and pen testing, emphasizing the importance of securing AI integrations.</p><p><strong>Preventing the AI Apocalypse</strong></p><p>One of the session's highlights was the discussion titled "AI Apocalypse Prevention 101." Oakley and Pesce shared insights into the potential risks of AI overtaking human roles and discussed ways to prevent a hypothetical AI apocalypse. Oakley humorously noted her experimentation with deep fakes and emphasized the importance of addressing the root causes to avert catastrophic outcomes.</p><p>Pesce contributed by highlighting the need for a comprehensive Bill of Materials (BOM) for AI, pointing out how it differs from traditional software due to its unique reliance on multiple layers, including hardware and software components.</p><p><strong>AI BOM: A Tool for Understanding and Compliance</strong></p><p>The conversation evolved into a discussion about the AI BOM's significance. Oakley explained that the AI BOM serves as an ingredient list, akin to what you would find on packaged goods. It includes details about datasets, models, and energy consumption—critical for preventing decay or malicious behavior over time.</p><p>Pesce noted the AI BOM's potential in guiding pen testing and compliance. He emphasized the challenges that companies face in keeping up with rapidly evolving AI technology, suggesting that AI BOM could potentially streamline compliance efforts.</p><p><strong>Engagement at the CISO Executive Summit</strong></p><p>The speakers touched on SECTOR 2024's CISO Executive Summit, inviting senior leaders to join the conversation. Oakley highlighted the summit's role in providing a platform for addressing AI challenges and regulations. Martin and Ciappelli emphasized the value of attending such events for exchanging knowledge and ideas in a secure, collaborative environment.</p><p><strong>Conclusion: A Call to Be Prepared</strong></p><p>As the episode wrapped up, Sean Martin extended an invitation to all interested in preventing an AI apocalypse to join the broader discussions at SECTOR 2024. Helen Oakley and Larry Pesce left listeners with a pressing reminder of the importance of understanding AI's potential impact.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21833891" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/eaec6189-2076-4cd3-921f-4dac436b631a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=eaec6189-2076-4cd3-921f-4dac436b631a&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling AI&apos;s Impact and Challenges at SECTOR 2024 | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Helen Oakley and Larry Pesce | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Larry Pesce, Helen Oakley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/bcaeb5f7-ba0f-4188-a338-32824c67dfdd/3000x3000/sector-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:44</itunes:duration>
      <itunes:summary>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; the duo delves into the intricacies of AI integration in today&apos;s technology landscape, joined by experts Helen Oakley and Larry Pesce at SECTOR 2024 in Toronto, Canada.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; the duo delves into the intricacies of AI integration in today&apos;s technology landscape, joined by experts Helen Oakley and Larry Pesce at SECTOR 2024 in Toronto, Canada.</itunes:subtitle>
      <itunes:keywords>compliance, ai integration, technology, marco ciappelli, sector conference, artificial intelligence, ai integrity, sector 2024, black hat, sean martin, supply chain security, ai challenges, cybersecurity, conference, ai bom, sector, larry pesce, sap security, cybersecurity conference, technology summit, helen oakley, deep fakes, podcast, security, sap, ai apocalypse, cybersecurityconference, toronto, 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>133</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4fe5516a-fa5e-4cae-a68d-7ca05a413333</guid>
      <title>SecTor 2024 Announces Summit Schedule | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the release of its full schedule of Summits for SecTor 2024. The live, in-person event will take place from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto. Summits will take place on Tuesday, October 22 and include:</p><ul><li>SecTor Executive Summit – This Summit will offer CISOs and other cybersecurity executives an opportunity to hear from industry experts helping to shape the next generation of information security strategy. Sponsors include: Armis, Sysdig, Cyera, and Trend Micro. To apply, please visit <a href="https://www.blackhat.com/sector/2024/executive-summit.html" target="_blank">blackhat.com/sector/2024/executive-summit.html</a>.</li><li>Inaugural AI Summit at SecTor – This Summit will take place as part of The AI Summit Series, a global conference and expo series focusing on practical applications of AI technologies. This Summit will underscore the importance of artificial intelligence (AI) as an organization’s newest and greatest weapon within the ever-evolving cybersecurity landscape. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/ai-summit.html" target="_blank">blackhat.com/sector/2024/ai-summit.html</a>.</li><li>Cloud Security Summit at SecTor – This Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions, and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security. Sponsors include: CrowdStrike, Cyera, Kyndryl, Okta, OpenText, StrongDM, Sysdig, and Lookout. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/cloud-summit.html" target="_blank">blackhat.com/sector/2024/cloud-summit.html</a>.</li></ul><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 10 Oct 2024 15:21:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/sector-2024-announces-summit-schedule-brand-story-2-minutes-on-itspmagazine-FznGlBOJ</link>
      <content:encoded><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the release of its full schedule of Summits for SecTor 2024. The live, in-person event will take place from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto. Summits will take place on Tuesday, October 22 and include:</p><ul><li>SecTor Executive Summit – This Summit will offer CISOs and other cybersecurity executives an opportunity to hear from industry experts helping to shape the next generation of information security strategy. Sponsors include: Armis, Sysdig, Cyera, and Trend Micro. To apply, please visit <a href="https://www.blackhat.com/sector/2024/executive-summit.html" target="_blank">blackhat.com/sector/2024/executive-summit.html</a>.</li><li>Inaugural AI Summit at SecTor – This Summit will take place as part of The AI Summit Series, a global conference and expo series focusing on practical applications of AI technologies. This Summit will underscore the importance of artificial intelligence (AI) as an organization’s newest and greatest weapon within the ever-evolving cybersecurity landscape. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/ai-summit.html" target="_blank">blackhat.com/sector/2024/ai-summit.html</a>.</li><li>Cloud Security Summit at SecTor – This Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions, and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security. Sponsors include: CrowdStrike, Cyera, Kyndryl, Okta, OpenText, StrongDM, Sysdig, and Lookout. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/cloud-summit.html" target="_blank">blackhat.com/sector/2024/cloud-summit.html</a>.</li></ul><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2111209" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/740702a6-6e66-4749-8a05-bc8183d24923/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=740702a6-6e66-4749-8a05-bc8183d24923&amp;feed=2M86zCcc"/>
      <itunes:title>SecTor 2024 Announces Summit Schedule | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/9812a125-fd6f-4587-b266-18add284bf39/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:11</itunes:duration>
      <itunes:summary>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:summary>
      <itunes:subtitle>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:subtitle>
      <itunes:keywords>leaders, technology, ai summit, marco ciappelli, networking, summits, sean martin, cybersecurity, business, conference, metro toronto, sector, information security, expo, cloud, security, global, executives, october, ai, keynote, convention</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>132</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">be2db1db-0f73-41cc-9131-65708927f11b</guid>
      <title>A Sneak Peek into SecTor 2024: AI, Open-Source, and Cybersecurity Trends | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Portfolio</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The Black Hat SecTor Conference, scheduled for October 22-24, 2024, in Toronto, promises an array of discussions and insights into the cybersecurity domain. Steve Wylie, General Manager of Black Hat, joins ITSP Magazine's Sean Martin and Marco Ciappelli to preview the upcoming event. Wylie highlights the acquisition of SecTor by Black Hat in 2019, underscoring its unique focus on the Canadian cybersecurity community while maintaining global research standards.</p><p>This year's event features three main components: summits, briefings, and a business hall. The summits, including a new AI summit, address various specialized topics, while the briefings provide in-depth research presentations. Keynote speakers like New York University’s Omkhar Arasaratnam, who will discuss security in open-source platforms, further enrich the event. Arasaratnam's focus on the XZ Utils backdoor incident emphasizes the critical nature of open-source security, highlighting both risks and mitigation strategies.</p><p>The agenda also includes a diverse range of sessions on AI, reflecting its significant role in current cybersecurity practices. Talks range from AI vulnerabilities to the protection and utilization of AI in enterprise security. Sessions such as "15 Ways to Break Your Co-Pilot" and discussions on deepfake image detection systems present real-world challenges and solutions in this area.</p><p>Wylie also discusses the importance of community engagement, noting the sector's provisions for networking and collaboration. The founders of the original event continue to contribute actively, ensuring the event remains closely tied to its original mission of serving Canada's cybersecurity professionals. Martin expresses enthusiasm for meeting regional participants and learning about their unique challenges and solutions, emphasizing the value of shared knowledge and strategies. The event is positioned as a vital convergence point for both local and international cybersecurity insights and advancements.</p><p>In summary, SecTor 2024 aims to foster a robust exchange of ideas and solutions, drawing from a wide array of expertise within the cybersecurity field. Attendees can look forward to engaging with high-profile speakers, participating in focused discussions, and exploring the latest industry innovations.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 9 Oct 2024 17:24:25 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie)</author>
      <link>https://eventcoveragepodcast.com/episodes/a-sneak-peek-into-sector-2024-ai-open-source-and-cybersecurity-trends-a-sector-cybersecurity-conference-toronto-2024-conversation-with-steve-wylie-on-location-coverage-with-sean-martin-and-marco-ciappelli-Bbau2Np_</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Portfolio</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The Black Hat SecTor Conference, scheduled for October 22-24, 2024, in Toronto, promises an array of discussions and insights into the cybersecurity domain. Steve Wylie, General Manager of Black Hat, joins ITSP Magazine's Sean Martin and Marco Ciappelli to preview the upcoming event. Wylie highlights the acquisition of SecTor by Black Hat in 2019, underscoring its unique focus on the Canadian cybersecurity community while maintaining global research standards.</p><p>This year's event features three main components: summits, briefings, and a business hall. The summits, including a new AI summit, address various specialized topics, while the briefings provide in-depth research presentations. Keynote speakers like New York University’s Omkhar Arasaratnam, who will discuss security in open-source platforms, further enrich the event. Arasaratnam's focus on the XZ Utils backdoor incident emphasizes the critical nature of open-source security, highlighting both risks and mitigation strategies.</p><p>The agenda also includes a diverse range of sessions on AI, reflecting its significant role in current cybersecurity practices. Talks range from AI vulnerabilities to the protection and utilization of AI in enterprise security. Sessions such as "15 Ways to Break Your Co-Pilot" and discussions on deepfake image detection systems present real-world challenges and solutions in this area.</p><p>Wylie also discusses the importance of community engagement, noting the sector's provisions for networking and collaboration. The founders of the original event continue to contribute actively, ensuring the event remains closely tied to its original mission of serving Canada's cybersecurity professionals. Martin expresses enthusiasm for meeting regional participants and learning about their unique challenges and solutions, emphasizing the value of shared knowledge and strategies. The event is positioned as a vital convergence point for both local and international cybersecurity insights and advancements.</p><p>In summary, SecTor 2024 aims to foster a robust exchange of ideas and solutions, drawing from a wide array of expertise within the cybersecurity field. Attendees can look forward to engaging with high-profile speakers, participating in focused discussions, and exploring the latest industry innovations.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22960738" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/506cbce3-af80-483e-9337-42789cb07836/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=506cbce3-af80-483e-9337-42789cb07836&amp;feed=2M86zCcc"/>
      <itunes:title>A Sneak Peek into SecTor 2024: AI, Open-Source, and Cybersecurity Trends | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/bcaeb5f7-ba0f-4188-a338-32824c67dfdd/3000x3000/sector-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:55</itunes:duration>
      <itunes:summary>Discover the highlights of the upcoming Black Hat SecTor Conference in Toronto, featuring insightful discussions on AI, open-source security, and more. Join Steve Wylie, Sean Martin, and Marco Ciappelli as they preview keynotes, summits, and unique aspects of this premier cybersecurity event.</itunes:summary>
      <itunes:subtitle>Discover the highlights of the upcoming Black Hat SecTor Conference in Toronto, featuring insightful discussions on AI, open-source security, and more. Join Steve Wylie, Sean Martin, and Marco Ciappelli as they preview keynotes, summits, and unique aspects of this premier cybersecurity event.</itunes:subtitle>
      <itunes:keywords>open-source, technology, marco ciappelli, research, briefings, networking, summits, black hat, sean martin, cybersecurity, conference, vulnerabilities, sector, business hall, steve wylie, podcast, security, ai, community, cybersecurityconference, keynote, toronto, 2024, deepfake</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>131</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">43c7b3b9-4b6d-4517-b67d-6d6dd7883f5c</guid>
      <title>HITRUST Collaborate 2024 Keynote—Industry Perspectives: Charting The Path Forward—Innovations in Security and Assurance | A Conversation with Dan Nutkis, Robert Booker, Omar Khawaja, Cliff Baker, and Andrew Hicks | On Location Coverage with Sean Martin</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Dan Nutkis</strong>, Founder and Chief Executive Officer of <a href="https://x.com/hitrust" target="_blank">HITRUST</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/daniel-nutkis-339b93b/" target="_blank">https://www.linkedin.com/in/daniel-nutkis-339b93b/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer at <a href="https://x.com/hitrust" target="_blank">HITRUST</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Omar Khawaja</strong>, CISO, Client at <a href="https://x.com/databricks" target="_blank">Databricks</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/smallersecurity/" target="_blank">https://www.linkedin.com/in/smallersecurity/</a></p><p><strong>Cliff Baker</strong>, CEO at <a href="https://x.com/CorlTech" target="_blank">CORL Technologies</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cliffbaker/" target="_blank">https://www.linkedin.com/in/cliffbaker/</a></p><p><strong>Andrew Hicks</strong>, Partner and National HITRUST Practice Lead at Frazier & Deeter</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aehicks2000/" target="_blank">https://www.linkedin.com/in/aehicks2000/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of the On Location series takes place during HITRUST Collaborate 2024 brought together leading figures in cybersecurity to share their experiences and insights. Moderated by Sean Martin, host of the Redefining CyberSecurity Podcast, the panel included Dan Nutkis, Founder and Chief Executive Officer of HITRUST; Robert Booker, Chief Strategy Officer at HITRUST and former Chief Information Security Officer at UnitedHealth Group; Omar Khawaja, CISO, Client at Databricks and former Chief Information Security Officer at Highmark Health; Cliff Baker, CEO at CORL Technologies and Managing Partner at Meditology Services; and Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & Deeter.</p><p>The session kicked off with Sean Martin highlighting the importance of collaboration and conversation within the cybersecurity community. Dan Nutkis reflected on the early beginnings of HITRUST in 2007 and discussed the initial goal of establishing a comprehensive and effective framework for security. Nutkis highlighted the organization's ongoing commitment to continuous improvement and adaptability in addressing security needs.</p><p>Omar Khawaja emphasized the need for setting high-security bars and how HITRUST has been instrumental in providing robust frameworks that simplify complex compliance requirements. He shared how Highmark Health leveraged the HITRUST certification to streamline their third-party risk management, ensuring better outcomes with fewer resources. According to Khawaja, HITRUST’s efforts in adapting to market needs and developing new assurance levels like the i1 and e1 have been vital in meeting evolving security demands.</p><p>Cliff Baker discussed the innovation driven by HITRUST in the compliance space. Baker stressed the importance of the HITRUST ecosystem, which is designed not only to meet today’s security challenges but to anticipate future needs. The assurance framework and transparency provided by HITRUST have proven essential in building and maintaining trust within the healthcare industry.</p><p>Andrew Hicks praised the rigorous QA process that HITRUST employs, which ensures that certified organizations maintain high standards of security. He emphasized how this rigorous process not only helps organizations achieve certification but also transforms their overall approach to cybersecurity.</p><p>Robert Booker spoke about the continuous curiosity and commitment required to stay ahead in cybersecurity. He highlighted how HITRUST’s data-driven approach and innovations in areas like AI and continuous monitoring are crucial in maintaining relevance and enhancing security outcomes.</p><p>Throughout the discussion, the panelists collectively underscored the importance of a robust, adaptable, and comprehensive security framework. HITRUST's continuous innovation and commitment to addressing real-world security challenges position it as a leader in the industry. The collaborative efforts of HITRUST and its community not only improve organizational security but also strengthen the overall reliability of the healthcare system.</p><p>As HITRUST continues to evolve and introduce new initiatives, it remains a pivotal player in setting high security and compliance standards. The insights shared during this episode of On Location provide a glimpse into the future of cybersecurity and the ongoing efforts to safeguard sensitive data in the healthcare sector.Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 3 Oct 2024 17:43:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Robert Booker, Cliff Baker, Dan Nutkis, Omar Khawaja, Andrew Hicks)</author>
      <link>https://eventcoveragepodcast.com/episodes/hitrust-collaborate-2024-keynote-industry-perspectives-charting-the-path-forward-innovations-in-security-and-assurance-dan-nutkis-robert-booker-omar-khawaja-cliff-baker-andrew-hicks-on-location-coverage-sean-martin-XFK2NX4e</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Dan Nutkis</strong>, Founder and Chief Executive Officer of <a href="https://x.com/hitrust" target="_blank">HITRUST</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/daniel-nutkis-339b93b/" target="_blank">https://www.linkedin.com/in/daniel-nutkis-339b93b/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer at <a href="https://x.com/hitrust" target="_blank">HITRUST</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Omar Khawaja</strong>, CISO, Client at <a href="https://x.com/databricks" target="_blank">Databricks</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/smallersecurity/" target="_blank">https://www.linkedin.com/in/smallersecurity/</a></p><p><strong>Cliff Baker</strong>, CEO at <a href="https://x.com/CorlTech" target="_blank">CORL Technologies</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cliffbaker/" target="_blank">https://www.linkedin.com/in/cliffbaker/</a></p><p><strong>Andrew Hicks</strong>, Partner and National HITRUST Practice Lead at Frazier & Deeter</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aehicks2000/" target="_blank">https://www.linkedin.com/in/aehicks2000/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of the On Location series takes place during HITRUST Collaborate 2024 brought together leading figures in cybersecurity to share their experiences and insights. Moderated by Sean Martin, host of the Redefining CyberSecurity Podcast, the panel included Dan Nutkis, Founder and Chief Executive Officer of HITRUST; Robert Booker, Chief Strategy Officer at HITRUST and former Chief Information Security Officer at UnitedHealth Group; Omar Khawaja, CISO, Client at Databricks and former Chief Information Security Officer at Highmark Health; Cliff Baker, CEO at CORL Technologies and Managing Partner at Meditology Services; and Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & Deeter.</p><p>The session kicked off with Sean Martin highlighting the importance of collaboration and conversation within the cybersecurity community. Dan Nutkis reflected on the early beginnings of HITRUST in 2007 and discussed the initial goal of establishing a comprehensive and effective framework for security. Nutkis highlighted the organization's ongoing commitment to continuous improvement and adaptability in addressing security needs.</p><p>Omar Khawaja emphasized the need for setting high-security bars and how HITRUST has been instrumental in providing robust frameworks that simplify complex compliance requirements. He shared how Highmark Health leveraged the HITRUST certification to streamline their third-party risk management, ensuring better outcomes with fewer resources. According to Khawaja, HITRUST’s efforts in adapting to market needs and developing new assurance levels like the i1 and e1 have been vital in meeting evolving security demands.</p><p>Cliff Baker discussed the innovation driven by HITRUST in the compliance space. Baker stressed the importance of the HITRUST ecosystem, which is designed not only to meet today’s security challenges but to anticipate future needs. The assurance framework and transparency provided by HITRUST have proven essential in building and maintaining trust within the healthcare industry.</p><p>Andrew Hicks praised the rigorous QA process that HITRUST employs, which ensures that certified organizations maintain high standards of security. He emphasized how this rigorous process not only helps organizations achieve certification but also transforms their overall approach to cybersecurity.</p><p>Robert Booker spoke about the continuous curiosity and commitment required to stay ahead in cybersecurity. He highlighted how HITRUST’s data-driven approach and innovations in areas like AI and continuous monitoring are crucial in maintaining relevance and enhancing security outcomes.</p><p>Throughout the discussion, the panelists collectively underscored the importance of a robust, adaptable, and comprehensive security framework. HITRUST's continuous innovation and commitment to addressing real-world security challenges position it as a leader in the industry. The collaborative efforts of HITRUST and its community not only improve organizational security but also strengthen the overall reliability of the healthcare system.</p><p>As HITRUST continues to evolve and introduce new initiatives, it remains a pivotal player in setting high security and compliance standards. The insights shared during this episode of On Location provide a glimpse into the future of cybersecurity and the ongoing efforts to safeguard sensitive data in the healthcare sector.Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p>Learn more about and hear more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="47742372" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3ebb8b48-07d1-4e88-8253-74a2fcf44cfd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3ebb8b48-07d1-4e88-8253-74a2fcf44cfd&amp;feed=2M86zCcc"/>
      <itunes:title>HITRUST Collaborate 2024 Keynote—Industry Perspectives: Charting The Path Forward—Innovations in Security and Assurance | A Conversation with Dan Nutkis, Robert Booker, Omar Khawaja, Cliff Baker, and Andrew Hicks | On Location Coverage with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Robert Booker, Cliff Baker, Dan Nutkis, Omar Khawaja, Andrew Hicks</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/24e457c6-baea-4a63-9156-47d5ac929d00/3000x3000/hitrust-collaborate-october-1-3-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:49:43</itunes:duration>
      <itunes:summary>Join Sean Martin and a panel of leading cybersecurity figures from HITRUST Collaborate 2024 as they discuss the importance of a robust, adaptable security framework and HITRUST&apos;s commitment to addressing real-world security challenges. Discover how continuous innovation and collaborative efforts are transforming cybersecurity and strengthening the healthcare industry and beyond.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and a panel of leading cybersecurity figures from HITRUST Collaborate 2024 as they discuss the importance of a robust, adaptable security framework and HITRUST&apos;s commitment to addressing real-world security challenges. Discover how continuous innovation and collaborative efforts are transforming cybersecurity and strengthening the healthcare industry and beyond.</itunes:subtitle>
      <itunes:keywords>compliance, assurance, transparency, networking, sean martin, hitrust, framework, cybersecurity, conference, redefining cybersecurity, dan nutkis, robert booker, collaborate 2024, risk management, innovation, omar khawaja, cyber insurance, cliff baker, third-party risk, ransomware, podcast, security, certification, ai, andrew hicks, industry leaders, cybersecurityconference, healthcare, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">034c5288-3d13-40c5-a6d1-cce0eb5cdebd</guid>
      <title>HITRUST Achieves Major Milestone with Availability of Solution Making it Practical to Manage Third-Party (Information Security) Risk | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>HITRUST, leader in information security and third-party risk management (TPRM), has announced significant enhancements to its HITRUST Assessment XChange. This comprehensive solution addresses longstanding challenges in TPRM by integrating with leading TPRM platforms to streamline vendor risk management processes. These integrations solve the "last mile" challenge by enabling organizations to efficiently capture, consume, and analyze detailed assurance data.</p><p>The HITRUST Assessment XChange operationalizes third-party risk management through end-to-end workflows that cover the entire vendor lifecycle—from initial evaluation to results analysis. This approach significantly improves information security risk capabilities, reducing time, costs, and complexity. It also allows organizations to manage risk with updated threat-adaptive controls, broad assessment options, and real-time updates on risk mitigation.</p><p>Legacy approaches to TPRM have proven inefficient, with many organizations relying on outdated methods like spreadsheets or self-assessment questionnaires. In contrast, HITRUST’s solution offers a practical, effective, and comprehensive approach, making TPRM more manageable and secure across industries.</p><p>HITRUST’s first planned integration with ServiceNow’s TPRM solution is set for release by the end of 2024, allowing users to leverage HITRUST's capabilities within the ServiceNow platform. This integration marks a new era in operationalizing information security TPRM, providing organizations with unprecedented visibility into vendor risk.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 3 Oct 2024 13:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/hitrust-achieves-major-milestone-with-availability-of-solution-making-it-practical-to-manage-third-party-information-security-risk-brand-story-2-minutes-on-itspmagazine-WSZ16vNy</link>
      <content:encoded><![CDATA[<p>HITRUST, leader in information security and third-party risk management (TPRM), has announced significant enhancements to its HITRUST Assessment XChange. This comprehensive solution addresses longstanding challenges in TPRM by integrating with leading TPRM platforms to streamline vendor risk management processes. These integrations solve the "last mile" challenge by enabling organizations to efficiently capture, consume, and analyze detailed assurance data.</p><p>The HITRUST Assessment XChange operationalizes third-party risk management through end-to-end workflows that cover the entire vendor lifecycle—from initial evaluation to results analysis. This approach significantly improves information security risk capabilities, reducing time, costs, and complexity. It also allows organizations to manage risk with updated threat-adaptive controls, broad assessment options, and real-time updates on risk mitigation.</p><p>Legacy approaches to TPRM have proven inefficient, with many organizations relying on outdated methods like spreadsheets or self-assessment questionnaires. In contrast, HITRUST’s solution offers a practical, effective, and comprehensive approach, making TPRM more manageable and secure across industries.</p><p>HITRUST’s first planned integration with ServiceNow’s TPRM solution is set for release by the end of 2024, allowing users to leverage HITRUST's capabilities within the ServiceNow platform. This integration marks a new era in operationalizing information security TPRM, providing organizations with unprecedented visibility into vendor risk.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2229902" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b03b174a-eb37-46c8-b57f-ec0510b822a0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b03b174a-eb37-46c8-b57f-ec0510b822a0&amp;feed=2M86zCcc"/>
      <itunes:title>HITRUST Achieves Major Milestone with Availability of Solution Making it Practical to Manage Third-Party (Information Security) Risk | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/9812a125-fd6f-4587-b266-18add284bf39/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:19</itunes:duration>
      <itunes:summary>HITRUST, the leader in information risk management, security, and compliance assurances, today announces enhancements to the HITRUST Assessment Xchange, its comprehensive third-party risk management (TPRM) solution, overcoming legacy challenges and making TPRM practical and effective for organizations across all industries. In addition, HITRUST is announcing integrations with leading TPRM solution platforms to address the current “last mile” challenge of capturing and consuming detail assurance information and performing population risk analysis. The first platform will be available in Q4 2024, and the company is currently accepting participants into its private preview program. </itunes:summary>
      <itunes:subtitle>HITRUST, the leader in information risk management, security, and compliance assurances, today announces enhancements to the HITRUST Assessment Xchange, its comprehensive third-party risk management (TPRM) solution, overcoming legacy challenges and making TPRM practical and effective for organizations across all industries. In addition, HITRUST is announcing integrations with leading TPRM solution platforms to address the current “last mile” challenge of capturing and consuming detail assurance information and performing population risk analysis. The first platform will be available in Q4 2024, and the company is currently accepting participants into its private preview program. </itunes:subtitle>
      <itunes:keywords>assurance, data, workflows, marco ciappelli, controls, sean martin, assessment, hitrust, processes, cybersecurity, risk management, solution, third party risk, management, information security, tprm, servicenow, servicenow, mitigation, platform, updates, security, integration, visibility, risk, vendor, vendor risk management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>129</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fc1b41b9-c6db-420f-8463-29f9c6e89cc7</guid>
      <title>HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>HITRUST has announced the launch of <strong>HITRUST Continuous Assurance</strong>, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evolving cyber threats. Traditional approaches that prioritize compliance over security are increasingly inadequate, especially in the era of generative AI and sophisticated cyber-attacks.</p><p>Continuous Assurance minimizes the risk of evidence decay by enabling organizations to monitor security controls continuously, ensuring that security requirements remain relevant and reliable. Key features of this initiative include automated evidence collection, a continuous monitoring taxonomy integrated with the HITRUST CSF, and enhanced workflows in HITRUST’s MyCSF platform. The system also supports integration with Governance, Risk, and Compliance (GRC) systems, ensuring streamlined risk management.</p><p>HITRUST's Continuous Assurance will leverage its extensive certification framework, which has shown significant success. Notably, the <strong>2024 HITRUST Trust Report</strong> highlighted that 99.4% of HITRUST-certified organizations did not report a breach over the past two years. Continuous Assurance offers new capabilities that further solidify HITRUST’s role as a leader in information security risk management.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem" target="_blank">https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 2 Oct 2024 16:15:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem-brand-story-2-minutes-on-itspmagazine-qEKLlV2P</link>
      <content:encoded><![CDATA[<p>HITRUST has announced the launch of <strong>HITRUST Continuous Assurance</strong>, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evolving cyber threats. Traditional approaches that prioritize compliance over security are increasingly inadequate, especially in the era of generative AI and sophisticated cyber-attacks.</p><p>Continuous Assurance minimizes the risk of evidence decay by enabling organizations to monitor security controls continuously, ensuring that security requirements remain relevant and reliable. Key features of this initiative include automated evidence collection, a continuous monitoring taxonomy integrated with the HITRUST CSF, and enhanced workflows in HITRUST’s MyCSF platform. The system also supports integration with Governance, Risk, and Compliance (GRC) systems, ensuring streamlined risk management.</p><p>HITRUST's Continuous Assurance will leverage its extensive certification framework, which has shown significant success. Notably, the <strong>2024 HITRUST Trust Report</strong> highlighted that 99.4% of HITRUST-certified organizations did not report a breach over the past two years. Continuous Assurance offers new capabilities that further solidify HITRUST’s role as a leader in information security risk management.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem" target="_blank">https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2019679" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2edd3bb7-cd59-42b3-9113-c112c3e5f0ec/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2edd3bb7-cd59-42b3-9113-c112c3e5f0ec&amp;feed=2M86zCcc"/>
      <itunes:title>HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/9812a125-fd6f-4587-b266-18add284bf39/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:06</itunes:duration>
      <itunes:summary>HITRUST releases 2025 vision to increase security sustainability and outcomes through continuous control monitoring.</itunes:summary>
      <itunes:subtitle>HITRUST releases 2025 vision to increase security sustainability and outcomes through continuous control monitoring.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sean martin, seven minutes podcast</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbe069eb-85e7-498b-b2e2-2b2c89e4602e</guid>
      <title>Exploring the Future of Automotive Technology | An AutoSens and InCabin Europe 2024 Conversation with Sara Sargent and Rob Stead | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Sara Sargent</strong>, AutoSens Automotive Technology Specialist</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sarasargent17/">https://www.linkedin.com/in/sarasargent17/</a></p><p><strong>Rob Stead</strong>, Managing Director and Founder, Sense Media Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertjstead/">https://www.linkedin.com/in/robertjstead/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society and Technology Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/marco-ciappelli">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The episode kicks off with a playful exchange between Sean and Marco, setting the tone for an engaging discussion about the future of automotive tech. Marco points out the rapid advancements in the industry, comparing it to the evolution from the Flintstones' manually-powered car to today's sophisticated autonomous vehicles. Sean highlights the significance of these advancements and the pivotal role conferences like AutoSens and InCabin play in shaping the industry's future.</p><p><strong>A Brief History of AutoSens and InCabin</strong></p><p>Rob Stead, the managing director and founder of SenseMedia, provides a historical overview of the AutoSens conference. Established in 2015, AutoSens was born out of a need to bring together experts from various sectors of the automotive industry to foster collaboration and innovation. The event has grown exponentially, and in 2016, the first AutoSens conference was held. Today, AutoSens and its sister event, InCabin, attract a diverse audience, including engineers, regulators, and manufacturers.</p><p><strong>Key Themes and Discussions</strong></p><p>The conversation dives into the core themes of the upcoming conferences. Sara Sargent, an Automotive Technology Specialist at SenseMedia, explains her dual role in ensuring technical integrity and leading the InCabin event. She emphasizes the importance of addressing current safety concerns, such as child presence detection and airbag deployment accuracy. These technologies not only enhance safety but also pave the way for future innovations in autonomous driving.</p><p><strong>The Complexity of Autonomous Vehicles</strong></p><p>Rob elaborates on the challenges faced by the industry, emphasizing the difficulty of achieving full autonomy (L4) in consumer vehicles. He notes that while L4 technology is feasible, it is costly and likely to be limited to fleet operators rather than individual consumers. The transition to higher levels of automation will be gradual, with most vehicles remaining at Level 2 (L2) for the foreseeable future.</p><p><strong>The Importance of Redundancy and Collaboration</strong></p><p>Sean questions the need for various sensor modalities in vehicles, to which Rob responds by explaining the concept of redundancy. Multiple sensors, including cameras, radar, and LiDAR, work together to create a comprehensive and reliable system. This redundancy is crucial for ensuring safety and reliability in autonomous driving systems. Additionally, the conversation touches upon the importance of vehicle-to-infrastructure (V2X) technology and its potential to enhance transportation systems.</p><p><strong>InCabin: Advancing Interior Sensing</strong></p><p>The discussion shifts to the interior sensing technologies covered in the InCabin conference. Sara highlights the significance of these technologies in ensuring passenger safety and comfort. From detecting medical emergencies to preventing drunk driving, interior sensors can play a critical role in enhancing the overall driving experience. However, Sara acknowledges the privacy concerns that come with increased interior monitoring.</p><p><strong>Looking Forward to the Conferences</strong></p><p>Rob and Sara both express their excitement for the upcoming conferences in Barcelona. They provide a sneak peek into some of the keynotes and technical sessions, emphasizing the collaborative nature of the events. Notably, the conferences will feature discussions on HMI design, simulation validation, and insights from the Chinese automotive market.</p><p><strong>Conclusion</strong></p><p>As the episode wraps up, Sean and Marco reflect on the importance of conferences like AutoSens and InCabin in driving innovation and ensuring the safety and reliability of future automotive technologies. They encourage listeners to attend the events and stay tuned for more insightful discussions on the evolving landscape of automotive technology.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about AutoSens Europe 2024: <a href="https://auto-sens.com/europe/">https://auto-sens.com/europe/</a></p><p>Learn more about InCabin Europe 2024: <a href="https://incabin.com/europe/">https://incabin.com/europe/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society and Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 2 Oct 2024 15:17:13 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sara Sargent, Rob Stead)</author>
      <link>https://eventcoveragepodcast.com/episodes/exploring-the-future-of-automotive-technology-an-autosens-and-incabin-europe-2024-conversation-with-sara-sargent-and-rob-stead-on-location-coverage-with-sean-martin-and-marco-ciappelli-5LcwDRpK</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Sara Sargent</strong>, AutoSens Automotive Technology Specialist</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sarasargent17/">https://www.linkedin.com/in/sarasargent17/</a></p><p><strong>Rob Stead</strong>, Managing Director and Founder, Sense Media Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertjstead/">https://www.linkedin.com/in/robertjstead/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society and Technology Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/marco-ciappelli">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The episode kicks off with a playful exchange between Sean and Marco, setting the tone for an engaging discussion about the future of automotive tech. Marco points out the rapid advancements in the industry, comparing it to the evolution from the Flintstones' manually-powered car to today's sophisticated autonomous vehicles. Sean highlights the significance of these advancements and the pivotal role conferences like AutoSens and InCabin play in shaping the industry's future.</p><p><strong>A Brief History of AutoSens and InCabin</strong></p><p>Rob Stead, the managing director and founder of SenseMedia, provides a historical overview of the AutoSens conference. Established in 2015, AutoSens was born out of a need to bring together experts from various sectors of the automotive industry to foster collaboration and innovation. The event has grown exponentially, and in 2016, the first AutoSens conference was held. Today, AutoSens and its sister event, InCabin, attract a diverse audience, including engineers, regulators, and manufacturers.</p><p><strong>Key Themes and Discussions</strong></p><p>The conversation dives into the core themes of the upcoming conferences. Sara Sargent, an Automotive Technology Specialist at SenseMedia, explains her dual role in ensuring technical integrity and leading the InCabin event. She emphasizes the importance of addressing current safety concerns, such as child presence detection and airbag deployment accuracy. These technologies not only enhance safety but also pave the way for future innovations in autonomous driving.</p><p><strong>The Complexity of Autonomous Vehicles</strong></p><p>Rob elaborates on the challenges faced by the industry, emphasizing the difficulty of achieving full autonomy (L4) in consumer vehicles. He notes that while L4 technology is feasible, it is costly and likely to be limited to fleet operators rather than individual consumers. The transition to higher levels of automation will be gradual, with most vehicles remaining at Level 2 (L2) for the foreseeable future.</p><p><strong>The Importance of Redundancy and Collaboration</strong></p><p>Sean questions the need for various sensor modalities in vehicles, to which Rob responds by explaining the concept of redundancy. Multiple sensors, including cameras, radar, and LiDAR, work together to create a comprehensive and reliable system. This redundancy is crucial for ensuring safety and reliability in autonomous driving systems. Additionally, the conversation touches upon the importance of vehicle-to-infrastructure (V2X) technology and its potential to enhance transportation systems.</p><p><strong>InCabin: Advancing Interior Sensing</strong></p><p>The discussion shifts to the interior sensing technologies covered in the InCabin conference. Sara highlights the significance of these technologies in ensuring passenger safety and comfort. From detecting medical emergencies to preventing drunk driving, interior sensors can play a critical role in enhancing the overall driving experience. However, Sara acknowledges the privacy concerns that come with increased interior monitoring.</p><p><strong>Looking Forward to the Conferences</strong></p><p>Rob and Sara both express their excitement for the upcoming conferences in Barcelona. They provide a sneak peek into some of the keynotes and technical sessions, emphasizing the collaborative nature of the events. Notably, the conferences will feature discussions on HMI design, simulation validation, and insights from the Chinese automotive market.</p><p><strong>Conclusion</strong></p><p>As the episode wraps up, Sean and Marco reflect on the importance of conferences like AutoSens and InCabin in driving innovation and ensuring the safety and reliability of future automotive technologies. They encourage listeners to attend the events and stay tuned for more insightful discussions on the evolving landscape of automotive technology.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about AutoSens Europe 2024: <a href="https://auto-sens.com/europe/">https://auto-sens.com/europe/</a></p><p>Learn more about InCabin Europe 2024: <a href="https://incabin.com/europe/">https://incabin.com/europe/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society and Technology stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36768412" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/96f63021-3453-4114-b2b0-31b58f916228/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=96f63021-3453-4114-b2b0-31b58f916228&amp;feed=2M86zCcc"/>
      <itunes:title>Exploring the Future of Automotive Technology | An AutoSens and InCabin Europe 2024 Conversation with Sara Sargent and Rob Stead | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sara Sargent, Rob Stead</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/b1dc9b04-3de8-4d6d-bca0-cd98cf3a31ed/3000x3000/autosens-and-incabin-8th-10th-october-2024-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:38:17</itunes:duration>
      <itunes:summary>In the latest episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; hosts Sean Martin and Marco Ciappelli delve into the intricacies of automotive technology with Sara Sargent and Rob Stead at the upcoming AutoSens and InCabin Europe 2024 conferences in Barcelona.</itunes:summary>
      <itunes:subtitle>In the latest episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; hosts Sean Martin and Marco Ciappelli delve into the intricacies of automotive technology with Sara Sargent and Rob Stead at the upcoming AutoSens and InCabin Europe 2024 conferences in Barcelona.</itunes:subtitle>
      <itunes:keywords>safety technology, simulation validation, automotive technology, marco ciappelli, sara sargent, autonomous vehicles, interior sensing, sean martin, autosens europe 2024, automotive industry, autosens, cybersecurity, conference, lidar, radar, vehicle sensors, rob stead, cameras, podcast, security, incabin, sensemedia, hmi design, barcelona conference, cybersecurityconference, v2x</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">64c92bd8-410a-47b6-a1a7-c3b8d2394e75</guid>
      <title>Hacking Deepfake Image Detection System with White and Black Box Attacks | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Sagar Bhure | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Sagar Bhure</strong>, Senior Security Researcher, F5 [<a href="https://x.com/f5">@F5</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sagarbhure/">https://www.linkedin.com/in/sagarbhure/</a></p><p>At SecTor | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The authenticity of audio and visual media has become an increasingly significant concern. This episode explores this critical issue, featuring insights from Sean Martin, Marco Ciappelli, and guest Sagar Bhure, a security researcher from F5 Networks.</p><p>Sean Martin and Marco Ciappelli engage with Bhure to discuss the challenges and potential solutions related to deepfake technology. Bhure reveals intricate details about the creation and detection of deepfake images and videos. He emphasizes the constant battle between creators of deepfakes and those developing detection tools.</p><p>The conversation highlights several alarming instances where deepfakes have been used maliciously. Bhure recounts the case in 2020 where a 17-year-old student successfully fooled Twitter’s verification system with an AI-generated image of a non-existent political candidate. Another incident involved a Hong Kong firm losing $20 million due to a deepfake video impersonating the CFO during a Zoom call. These examples underline the serious implications of deepfake technology for misinformation and financial fraud.</p><p>One core discussion point centers on the challenge of distinguishing between real and artificial content. Bhure explains that the advancement in AI and hardware capabilities makes it increasingly difficult for the naked eye to differentiate between genuine and fake images. Despite this, he mentions that algorithms focusing on minute details such as skin textures, mouth movements, and audio sync can still identify deepfakes with varying degrees of success.</p><p>Marco Ciappelli raises the pertinent issue of how effective detection mechanisms can be integrated into social media platforms like Twitter, Facebook, and Instagram. Bhure suggests a 'secure by design' approach, advocating for pre-upload verification of media content. He suggests that generative AI should be regulated to prevent misuse while recognizing that artificially generated content also has beneficial applications.</p><p>The discussion shifts towards audio deepfakes, highlighting the complexity of their detection. According to Bhure, combining visual and audio detection can improve accuracy. He describes a potential method for audio verification, which involves profiling an individual’s voice over an extended period to identify any anomalies in future interactions.</p><p>Businesses are not immune to the threat of deepfakes. Bhure notes that corporate sectors, especially media outlets, financial institutions, and any industry relying on digital communication, must stay vigilant. He warns that deepfake technology can be weaponized to bypass security measures, perpetuate misinformation, and carry out sophisticated phishing attacks.</p><p>As technology forges ahead, Bhure calls for continuous improvement in detection techniques and the development of robust systems to mitigate risks associated with deepfakes. He points to his upcoming session at Sector in Toronto, where he will delve deeper into 'Hacking Deepfake Image Detection Systems with White and Black Box Attacks,' offering more comprehensive insights into combating this pressing issue.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Hacking Deepfake Image Detection System with White and Black Box Attacks: <a href="https://www.blackhat.com/sector/2024/briefings/schedule/#hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-40909">https://www.blackhat.com/sector/2024/briefings/schedule/#hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-40909</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 30 Sep 2024 17:35:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sagar Bhure)</author>
      <link>https://eventcoveragepodcast.com/episodes/hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-a-sector-cybersecurity-conference-toronto-2024-conversation-with-sagar-bhure-on-location-coverage-with-sean-martin-and-marco-ciappelli-Hi24QaO7</link>
      <content:encoded><![CDATA[<p><strong>Guest: Sagar Bhure</strong>, Senior Security Researcher, F5 [<a href="https://x.com/f5">@F5</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sagarbhure/">https://www.linkedin.com/in/sagarbhure/</a></p><p>At SecTor | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The authenticity of audio and visual media has become an increasingly significant concern. This episode explores this critical issue, featuring insights from Sean Martin, Marco Ciappelli, and guest Sagar Bhure, a security researcher from F5 Networks.</p><p>Sean Martin and Marco Ciappelli engage with Bhure to discuss the challenges and potential solutions related to deepfake technology. Bhure reveals intricate details about the creation and detection of deepfake images and videos. He emphasizes the constant battle between creators of deepfakes and those developing detection tools.</p><p>The conversation highlights several alarming instances where deepfakes have been used maliciously. Bhure recounts the case in 2020 where a 17-year-old student successfully fooled Twitter’s verification system with an AI-generated image of a non-existent political candidate. Another incident involved a Hong Kong firm losing $20 million due to a deepfake video impersonating the CFO during a Zoom call. These examples underline the serious implications of deepfake technology for misinformation and financial fraud.</p><p>One core discussion point centers on the challenge of distinguishing between real and artificial content. Bhure explains that the advancement in AI and hardware capabilities makes it increasingly difficult for the naked eye to differentiate between genuine and fake images. Despite this, he mentions that algorithms focusing on minute details such as skin textures, mouth movements, and audio sync can still identify deepfakes with varying degrees of success.</p><p>Marco Ciappelli raises the pertinent issue of how effective detection mechanisms can be integrated into social media platforms like Twitter, Facebook, and Instagram. Bhure suggests a 'secure by design' approach, advocating for pre-upload verification of media content. He suggests that generative AI should be regulated to prevent misuse while recognizing that artificially generated content also has beneficial applications.</p><p>The discussion shifts towards audio deepfakes, highlighting the complexity of their detection. According to Bhure, combining visual and audio detection can improve accuracy. He describes a potential method for audio verification, which involves profiling an individual’s voice over an extended period to identify any anomalies in future interactions.</p><p>Businesses are not immune to the threat of deepfakes. Bhure notes that corporate sectors, especially media outlets, financial institutions, and any industry relying on digital communication, must stay vigilant. He warns that deepfake technology can be weaponized to bypass security measures, perpetuate misinformation, and carry out sophisticated phishing attacks.</p><p>As technology forges ahead, Bhure calls for continuous improvement in detection techniques and the development of robust systems to mitigate risks associated with deepfakes. He points to his upcoming session at Sector in Toronto, where he will delve deeper into 'Hacking Deepfake Image Detection Systems with White and Black Box Attacks,' offering more comprehensive insights into combating this pressing issue.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Hacking Deepfake Image Detection System with White and Black Box Attacks: <a href="https://www.blackhat.com/sector/2024/briefings/schedule/#hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-40909">https://www.blackhat.com/sector/2024/briefings/schedule/#hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-40909</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21773686" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/04cb91f5-6304-4634-a926-3a54f1b30bb3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=04cb91f5-6304-4634-a926-3a54f1b30bb3&amp;feed=2M86zCcc"/>
      <itunes:title>Hacking Deepfake Image Detection System with White and Black Box Attacks | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Sagar Bhure | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sagar Bhure</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/bcaeb5f7-ba0f-4188-a338-32824c67dfdd/3000x3000/sector-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:40</itunes:duration>
      <itunes:summary>In this episode of Sector 2024, Sean Martin, Marco Ciappelli, and security researcher Sagar Bhure discuss the escalating threat of deepfake technology and its implications for misinformation, financial fraud, and cybersecurity. Tune in to explore real-world examples and learn about innovative detection methods that aim to stay ahead of this complex challenge.</itunes:summary>
      <itunes:subtitle>In this episode of Sector 2024, Sean Martin, Marco Ciappelli, and security researcher Sagar Bhure discuss the escalating threat of deepfake technology and its implications for misinformation, financial fraud, and cybersecurity. Tune in to explore real-world examples and learn about innovative detection methods that aim to stay ahead of this complex challenge.</itunes:subtitle>
      <itunes:keywords>misinformation, technology, marco ciappelli, social media, sagar bhure, sean martin, verification, cybersecurity, conference, detection, sector, f5 networks, generative ai, financial fraud, audio deepfake, podcast, security, deep learning, image detection, ai, phishing, cybersecurityconference, deepfake</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1049e4f5-8289-4fb9-9ba4-db98f2f97031</guid>
      <title>Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Ashley Jess | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Ashley Jess</strong>, Senior Intelligence Analyst, Intel 471 [<a href="https://x.com/Intel471Inc">@Intel471Inc</a>]</p><p>At SecTor | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As part of their Chats on the Road for the On Location series during SecTor in Toronto, Sean Martin and Marco Ciappelli had an engaging conversation with Ashley Jess, a Senior Threat Intelligence Analyst from Intel471.</p><p>The discussion centered on the intricacies of artificial intelligence (AI), its uses, and its abuses in the realm of cybersecurity. Ashley's upcoming presentation titled "Hello from the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation, and Scam Campaigns" sets the stage for an in-depth exploration into the dark side of AI. Ashley gives a glimpse into how AI is being utilized for nefarious purposes, highlighting the connection between generative AI and disinformation campaigns. She explains how AI has been used to create politically motivated fake graffiti, deepfake videos with celebrities, and even entirely fabricated news websites.</p><p>She emphasizes that the lowest barrier to entry for generating such content is lower than ever, making it easy for bad actors to create and spread false information swiftly. She mentions a particularly interesting case during the Olympics, where an entire propaganda movie starring a deepfake Tom Cruise was produced for political purposes. This example underscores the potential of AI to convincingly spread disinformation on a massive scale. She also points out how scam campaigns are increasingly leveraging AI, making them more believable and harder to detect.</p><p>One crucial topic Ashley touches on is the matter of responsibility in combating these threats. She discusses the need for more robust government regulations and the role of various technology vendors in detecting and preventing the misuse of AI. She highlights the importance of technologies like Web3 and blockchain for content provenance.</p><p>According to Ashley, integrating such measures into platforms used by everyday people can help mitigate the risks posed by AI-generated disinformation. Marco Ciappelli adds to this by reflecting on how easy it is to create misleading content and target vulnerable populations. He points out that ordinary citizens, who are not as vigilant or technologically savvy, are at greater risk. On this note, Sean Martin questions who should be responsible for protecting individuals and organizations from AI-based threats.</p><p>The discussion also touches on the ethical aspects of AI and its dual-use nature—where technological advancements can be both beneficial and harmful. Ashley emphasizes the need for a balanced approach that considers both the legitimate applications of AI technology and its potential for abuse. Ashley Jess is enthusiastic about her upcoming talk at SecTor where she promises to delve further into these critical issues.</p><p>The session aims to provide a realistic, frontline view of how AI is being used maliciously and to encourage more proactive measures to combat these emerging threats. For those attending SecTor, her insights promise to be both enlightening and essential.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns (Session): <a href="https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161">https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 24 Sep 2024 20:32:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ashley Jess)</author>
      <link>https://eventcoveragepodcast.com/episodes/hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-a-sector-cybersecurity-conference-toronto-2024-conversation-with-ashley-jess-on-location-coverage-with-sean-martin-and-marco-ciappelli-ix_txhvb</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ashley Jess</strong>, Senior Intelligence Analyst, Intel 471 [<a href="https://x.com/Intel471Inc">@Intel471Inc</a>]</p><p>At SecTor | <a href="https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633">https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As part of their Chats on the Road for the On Location series during SecTor in Toronto, Sean Martin and Marco Ciappelli had an engaging conversation with Ashley Jess, a Senior Threat Intelligence Analyst from Intel471.</p><p>The discussion centered on the intricacies of artificial intelligence (AI), its uses, and its abuses in the realm of cybersecurity. Ashley's upcoming presentation titled "Hello from the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation, and Scam Campaigns" sets the stage for an in-depth exploration into the dark side of AI. Ashley gives a glimpse into how AI is being utilized for nefarious purposes, highlighting the connection between generative AI and disinformation campaigns. She explains how AI has been used to create politically motivated fake graffiti, deepfake videos with celebrities, and even entirely fabricated news websites.</p><p>She emphasizes that the lowest barrier to entry for generating such content is lower than ever, making it easy for bad actors to create and spread false information swiftly. She mentions a particularly interesting case during the Olympics, where an entire propaganda movie starring a deepfake Tom Cruise was produced for political purposes. This example underscores the potential of AI to convincingly spread disinformation on a massive scale. She also points out how scam campaigns are increasingly leveraging AI, making them more believable and harder to detect.</p><p>One crucial topic Ashley touches on is the matter of responsibility in combating these threats. She discusses the need for more robust government regulations and the role of various technology vendors in detecting and preventing the misuse of AI. She highlights the importance of technologies like Web3 and blockchain for content provenance.</p><p>According to Ashley, integrating such measures into platforms used by everyday people can help mitigate the risks posed by AI-generated disinformation. Marco Ciappelli adds to this by reflecting on how easy it is to create misleading content and target vulnerable populations. He points out that ordinary citizens, who are not as vigilant or technologically savvy, are at greater risk. On this note, Sean Martin questions who should be responsible for protecting individuals and organizations from AI-based threats.</p><p>The discussion also touches on the ethical aspects of AI and its dual-use nature—where technological advancements can be both beneficial and harmful. Ashley emphasizes the need for a balanced approach that considers both the legitimate applications of AI technology and its potential for abuse. Ashley Jess is enthusiastic about her upcoming talk at SecTor where she promises to delve further into these critical issues.</p><p>The session aims to provide a realistic, frontline view of how AI is being used maliciously and to encourage more proactive measures to combat these emerging threats. For those attending SecTor, her insights promise to be both enlightening and essential.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our SecTor<strong> </strong>Cybersecurity Conference Toronto 2024 coverage: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S">https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns (Session): <a href="https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161">https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161</a></p><p>Learn more about SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.blackhat.com/sector/2024/index.html">https://www.blackhat.com/sector/2024/index.html</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21937091" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/18988621-980d-44d2-aa5c-aa819db28d17/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=18988621-980d-44d2-aa5c-aa819db28d17&amp;feed=2M86zCcc"/>
      <itunes:title>Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Ashley Jess | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ashley Jess</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/bcaeb5f7-ba0f-4188-a338-32824c67dfdd/3000x3000/sector-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:51</itunes:duration>
      <itunes:summary>In this episode, Sean Martin and Marco Ciappelli explore with Ashley Jess, Senior Threat Intelligence Analyst, how AI is being weaponized for disinformation and scam campaigns, and the pressing need for stronger regulations and detection methods. Ashley sheds light on real-world examples, including deepfake propaganda and AI-generated scams, underscoring the complexities and urgent challenges in protecting against these evolving threats.</itunes:summary>
      <itunes:subtitle>In this episode, Sean Martin and Marco Ciappelli explore with Ashley Jess, Senior Threat Intelligence Analyst, how AI is being weaponized for disinformation and scam campaigns, and the pressing need for stronger regulations and detection methods. Ashley sheds light on real-world examples, including deepfake propaganda and AI-generated scams, underscoring the complexities and urgent challenges in protecting against these evolving threats.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, artificial intelligence, web3, blockchain, sean martin, propaganda, cybersecurity, conference, scam, detection, sector, regulations, malware, threat intelligence, ashley jess, disinformation, intel471, podcast, security, ai, cybersecurityconference, social engineering, toronto, deepfake</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aa9b019f-25d7-4330-b554-43a9663c04b8</guid>
      <title>The Ransomware Threat and the Resilience Imperative | A HITRUST Collaborate 2024 Conversation with Allan Liska | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Allan Liska</strong>, Senior Security Architect and Ransomware Specialist, Recorded Future [<a href="https://x.com/RecordedFuture">@RecordedFuture</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/allan2" target="_blank">https://www.linkedin.com/in/allan2</a></p><p>On Twitter | <a href="https://twitter.com/uuallan" target="_blank">https://twitter.com/uuallan</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco podcast, recorded for the HITRUST Collaborate Conference in Dallas, TX, hosts Sean Martin and Marco Ciappelli engage in a dynamic conversation around the theme of cybersecurity in healthcare, specifically focusing on ransomware resilience. Sean and Marco are joined by Allan Liska for an insightful discussion on the current state of ransomware and the importance of proactive defenses.</p><p>The episode begins with Sean and Marco acknowledging the hectic nature of their schedule, emphasizing their excitement for the upcoming events. Sean mentions his active participation at the HITRUST conference, working closely with risk management and compliance experts, while Marco expresses his envy yet supports Sean’s engagements.</p><p>Allan Liska, the guest of this episode, brings a wealth of knowledge as an intelligence analyst specializing in ransomware research at Recorded Future. Allan delineates the ongoing challenges faced by organizations, particularly in healthcare, in mitigating ransomware threats. He highlights the increase in law enforcement activities targeting ransomware groups, which has led to more internal drama within the cybercriminal community, making the topic more relatable and urgent for organizations.</p><p>A substantial part of the conversation revolves around the significance of tabletop exercises in preparing organizations for ransomware incidents. Allan stresses that effective tabletop exercises must involve representatives from across the entire organization, ensuring comprehensive preparedness. The exercises should be engaging and realistic, incorporating lessons learned to update incident response plans continually. Allan also recommends keeping out-of-band communication methods ready, such as using Signal, to ensure seamless operations during a ransomware attack.</p><p>The importance of leadership buy-in is underlined, with Allan explaining how having senior leaders understand and support these exercises can significantly enhance the overall security posture. The discussion touches on common pitfalls, such as the assumption that backups alone will suffice, highlighting the necessity of regular, holistic testing of recovery processes.</p><p>The hosts also reflect on the collaborative aspect of the HITRUST conference, noting that it provides an invaluable opportunity for participants to network, share best practices, and learn from each other's experiences. That's precisely the spirit Allan hopes to capture during his session at the conference.</p><p>In conclusion, this episode is a deep dive into the complexities of ransomware defense, offering practical advice and underscoring the collective effort required to protect healthcare systems against cyber threats. Sean and Marco invite listeners to stay engaged and informed through their podcast series, promising more enlightening discussions on critical cybersecurity topics.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle">https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Ransomware Threat and the Resilience Imperative (Session): <a href="https://www.hitrustevents.com/event/HITRUSTCollaborate2024/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce?session=3448b1bf-3996-4945-95ed-bd957710b0ac">https://www.hitrustevents.com/event/HITRUSTCollaborate2024/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce?session=3448b1bf-3996-4945-95ed-bd957710b0ac</a></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 14 Sep 2024 01:18:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Allan Liska)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-ransomware-threat-and-the-resilience-imperative-a-hitrust-collaborate-2024-conversation-with-allan-liska-on-location-coverage-with-sean-martin-and-marco-ciappelli-xsb3slwc-c3_fTaUB</link>
      <content:encoded><![CDATA[<p><strong>Guest: Allan Liska</strong>, Senior Security Architect and Ransomware Specialist, Recorded Future [<a href="https://x.com/RecordedFuture">@RecordedFuture</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/allan2" target="_blank">https://www.linkedin.com/in/allan2</a></p><p>On Twitter | <a href="https://twitter.com/uuallan" target="_blank">https://twitter.com/uuallan</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco podcast, recorded for the HITRUST Collaborate Conference in Dallas, TX, hosts Sean Martin and Marco Ciappelli engage in a dynamic conversation around the theme of cybersecurity in healthcare, specifically focusing on ransomware resilience. Sean and Marco are joined by Allan Liska for an insightful discussion on the current state of ransomware and the importance of proactive defenses.</p><p>The episode begins with Sean and Marco acknowledging the hectic nature of their schedule, emphasizing their excitement for the upcoming events. Sean mentions his active participation at the HITRUST conference, working closely with risk management and compliance experts, while Marco expresses his envy yet supports Sean’s engagements.</p><p>Allan Liska, the guest of this episode, brings a wealth of knowledge as an intelligence analyst specializing in ransomware research at Recorded Future. Allan delineates the ongoing challenges faced by organizations, particularly in healthcare, in mitigating ransomware threats. He highlights the increase in law enforcement activities targeting ransomware groups, which has led to more internal drama within the cybercriminal community, making the topic more relatable and urgent for organizations.</p><p>A substantial part of the conversation revolves around the significance of tabletop exercises in preparing organizations for ransomware incidents. Allan stresses that effective tabletop exercises must involve representatives from across the entire organization, ensuring comprehensive preparedness. The exercises should be engaging and realistic, incorporating lessons learned to update incident response plans continually. Allan also recommends keeping out-of-band communication methods ready, such as using Signal, to ensure seamless operations during a ransomware attack.</p><p>The importance of leadership buy-in is underlined, with Allan explaining how having senior leaders understand and support these exercises can significantly enhance the overall security posture. The discussion touches on common pitfalls, such as the assumption that backups alone will suffice, highlighting the necessity of regular, holistic testing of recovery processes.</p><p>The hosts also reflect on the collaborative aspect of the HITRUST conference, noting that it provides an invaluable opportunity for participants to network, share best practices, and learn from each other's experiences. That's precisely the spirit Allan hopes to capture during his session at the conference.</p><p>In conclusion, this episode is a deep dive into the complexities of ransomware defense, offering practical advice and underscoring the collective effort required to protect healthcare systems against cyber threats. Sean and Marco invite listeners to stay engaged and informed through their podcast series, promising more enlightening discussions on critical cybersecurity topics.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle">https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Ransomware Threat and the Resilience Imperative (Session): <a href="https://www.hitrustevents.com/event/HITRUSTCollaborate2024/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce?session=3448b1bf-3996-4945-95ed-bd957710b0ac">https://www.hitrustevents.com/event/HITRUSTCollaborate2024/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce?session=3448b1bf-3996-4945-95ed-bd957710b0ac</a></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23353150" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1ccdfd45-f7b4-40a7-a1bb-2a3ce75f19d9/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1ccdfd45-f7b4-40a7-a1bb-2a3ce75f19d9&amp;feed=2M86zCcc"/>
      <itunes:title>The Ransomware Threat and the Resilience Imperative | A HITRUST Collaborate 2024 Conversation with Allan Liska | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Allan Liska</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/24e457c6-baea-4a63-9156-47d5ac929d00/3000x3000/hitrust-collaborate-october-1-3-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:19</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they explore the pressing issue of ransomware resilience in healthcare with Allan Liska, an intelligence analyst from Recorded Future, sharing practical insights on proactive defenses and preparedness. This episode, recorded for the HITRUST Collaborate Conference in Dallas, TX, highlights the critical importance of comprehensive tabletop exercises and leadership involvement in safeguarding against cyber threats.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they explore the pressing issue of ransomware resilience in healthcare with Allan Liska, an intelligence analyst from Recorded Future, sharing practical insights on proactive defenses and preparedness. This episode, recorded for the HITRUST Collaborate Conference in Dallas, TX, highlights the critical importance of comprehensive tabletop exercises and leadership involvement in safeguarding against cyber threats.</itunes:subtitle>
      <itunes:keywords>intelligence, compliance, collaboration, marco ciappelli, proactive defense, sean martin, hitrust, cybersecurity, conference, risk management, recorded future, data protection, resilience, tabletop exercises, ransomware, podcast, allan liska, security, incident response, cybersecurityconference, cyber threats, healthcare, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cbf61da9-9d76-40cc-b2b1-fd983b4f3ebf</guid>
      <title>The Missing Link: How We Collect and Leverage SBOMs | An OWASP 2024 Global AppSec San Francisco Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Cassie Crossley</strong>, VP, Supply Chain Security, Schneider Electric [<a href="https://x.com/SchneiderElec">@SchneiderElec</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cassiecrossley/" target="_blank">https://www.linkedin.com/in/cassiecrossley/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli head to San Francisco to attend the OWASP Global AppSec conference. They kick off their journey with a light-hearted conversation about their destination, quickly segueing into the substantive core of the episode. The dialogue provides a rich backdrop to the conference's key focus: securing applications and the crucial role of Software Bill of Materials (SBOMs) in this context.</p><p>Special guest Cassie Crossley joins the hosts to delve deeper into the significance of SBOMs. Cassie introduces herself and highlights her previous engagements with the podcast, touching on her upcoming session titled "The Missing Link: How We Collect and Leverage SBOMs." She explains the essential function of SBOMs in tracking open-source and commercial software components, noting the importance of transparency and risk evaluation in modern software development.</p><p>Cassie explains that understanding the software components in use, including transitive dependencies, is crucial for managing risks. She discusses how her company, Schneider Electric, implements SBOMs within their varied product lines, ranging from firmware to cloud-based applications. By collecting and analyzing SBOMs, they can quickly assess vulnerabilities, much like how organizations scrambled to evaluate their exposure in the wake of the Log4J vulnerability.</p><p>Sean and Marco steer the conversation towards the practical aspects of SBOM implementation for smaller companies. Cassie reassures that even startups and smaller enterprises can benefit from SBOMs without extensive resources, using free tools like Dependency-Track to manage their software inventories. She emphasizes that having an SBOM—even in a simplified form—provides a critical layer of visibility, enabling better risk management even with limited means.</p><p>The discussion touches on the broader impact of SBOMs beyond individual corporations. Cassie notes the importance of regulatory developments and collective efforts, such as those by the Cybersecurity and Infrastructure Security Agency (CISA), to advocate for wider adoption of SBOM standards across industries.</p><p>To wrap up, the hosts and Cassie discuss the value of conferences like OWASP Global AppSec for fostering community dialogues, sharing insights, and staying abreast of new developments in application security. They encourage listeners to attend these events to gain valuable knowledge and networking opportunities. Finally, in their closing remarks, Sean and Marco tease future episodes in the On Location series, hinting at more exciting content from their travels and guest interviews.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our OWASP 2024 Global AppSec San Francisco coverage: <a href="https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage">https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt">https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Missing Link - How We Collect and Leverage SBOMs (Session): <a href="https://owasp2024globalappsecsanfra.sched.com/event/1g3XV/the-missing-link-how-we-collect-and-leverage-sboms" target="_blank">https://owasp2024globalappsecsanfra.sched.com/event/1g3XV/the-missing-link-how-we-collect-and-leverage-sboms</a></p><p>Why the Industry Needs OpenSSF | A Conversation with Omkhar Arasaratnam, Adrianne Marcum, Arun Gupta, and Christopher Robinson | Redefining CyberSecurity with Sean Martin: <a href="https://redefiningcybersecuritypodcast.com/episodes/why-the-industry-needs-openssf-a-conversation-with-omkhar-arasaratnam-adrianne-marcum-arun-gupta-and-christopher-robinson-redefining-cybersecurity-with-sean-martin" target="_blank">https://redefiningcybersecuritypodcast.com/episodes/why-the-industry-needs-openssf-a-conversation-with-omkhar-arasaratnam-adrianne-marcum-arun-gupta-and-christopher-robinson-redefining-cybersecurity-with-sean-martin</a></p><p>Learn more about OWASP 2024 Global AppSec San Francisco: <a href="https://sf.globalappsec.org/">https://sf.globalappsec.org/</a></p><p>SBOM-a-Rama: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7232385837869469699/" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7232385837869469699/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 14 Sep 2024 00:54:25 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Cassie Crossley)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-missing-link-how-we-collect-and-leverage-sboms-an-owasp-2024-global-appsec-san-francisco-conversation-with-cassie-crossley-on-location-coverage-with-sean-martin-and-marco-ciappelli-QkJ9QKE6</link>
      <content:encoded><![CDATA[<p><strong>Guest: Cassie Crossley</strong>, VP, Supply Chain Security, Schneider Electric [<a href="https://x.com/SchneiderElec">@SchneiderElec</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cassiecrossley/" target="_blank">https://www.linkedin.com/in/cassiecrossley/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli head to San Francisco to attend the OWASP Global AppSec conference. They kick off their journey with a light-hearted conversation about their destination, quickly segueing into the substantive core of the episode. The dialogue provides a rich backdrop to the conference's key focus: securing applications and the crucial role of Software Bill of Materials (SBOMs) in this context.</p><p>Special guest Cassie Crossley joins the hosts to delve deeper into the significance of SBOMs. Cassie introduces herself and highlights her previous engagements with the podcast, touching on her upcoming session titled "The Missing Link: How We Collect and Leverage SBOMs." She explains the essential function of SBOMs in tracking open-source and commercial software components, noting the importance of transparency and risk evaluation in modern software development.</p><p>Cassie explains that understanding the software components in use, including transitive dependencies, is crucial for managing risks. She discusses how her company, Schneider Electric, implements SBOMs within their varied product lines, ranging from firmware to cloud-based applications. By collecting and analyzing SBOMs, they can quickly assess vulnerabilities, much like how organizations scrambled to evaluate their exposure in the wake of the Log4J vulnerability.</p><p>Sean and Marco steer the conversation towards the practical aspects of SBOM implementation for smaller companies. Cassie reassures that even startups and smaller enterprises can benefit from SBOMs without extensive resources, using free tools like Dependency-Track to manage their software inventories. She emphasizes that having an SBOM—even in a simplified form—provides a critical layer of visibility, enabling better risk management even with limited means.</p><p>The discussion touches on the broader impact of SBOMs beyond individual corporations. Cassie notes the importance of regulatory developments and collective efforts, such as those by the Cybersecurity and Infrastructure Security Agency (CISA), to advocate for wider adoption of SBOM standards across industries.</p><p>To wrap up, the hosts and Cassie discuss the value of conferences like OWASP Global AppSec for fostering community dialogues, sharing insights, and staying abreast of new developments in application security. They encourage listeners to attend these events to gain valuable knowledge and networking opportunities. Finally, in their closing remarks, Sean and Marco tease future episodes in the On Location series, hinting at more exciting content from their travels and guest interviews.</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our OWASP 2024 Global AppSec San Francisco coverage: <a href="https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage">https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt">https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Missing Link - How We Collect and Leverage SBOMs (Session): <a href="https://owasp2024globalappsecsanfra.sched.com/event/1g3XV/the-missing-link-how-we-collect-and-leverage-sboms" target="_blank">https://owasp2024globalappsecsanfra.sched.com/event/1g3XV/the-missing-link-how-we-collect-and-leverage-sboms</a></p><p>Why the Industry Needs OpenSSF | A Conversation with Omkhar Arasaratnam, Adrianne Marcum, Arun Gupta, and Christopher Robinson | Redefining CyberSecurity with Sean Martin: <a href="https://redefiningcybersecuritypodcast.com/episodes/why-the-industry-needs-openssf-a-conversation-with-omkhar-arasaratnam-adrianne-marcum-arun-gupta-and-christopher-robinson-redefining-cybersecurity-with-sean-martin" target="_blank">https://redefiningcybersecuritypodcast.com/episodes/why-the-industry-needs-openssf-a-conversation-with-omkhar-arasaratnam-adrianne-marcum-arun-gupta-and-christopher-robinson-redefining-cybersecurity-with-sean-martin</a></p><p>Learn more about OWASP 2024 Global AppSec San Francisco: <a href="https://sf.globalappsec.org/">https://sf.globalappsec.org/</a></p><p>SBOM-a-Rama: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7232385837869469699/" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7232385837869469699/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20570809" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/dc6d2ade-ad51-4e5f-a4b9-194e5d0a9dfb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=dc6d2ade-ad51-4e5f-a4b9-194e5d0a9dfb&amp;feed=2M86zCcc"/>
      <itunes:title>The Missing Link: How We Collect and Leverage SBOMs | An OWASP 2024 Global AppSec San Francisco Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Cassie Crossley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/503fc858-624d-4b40-8478-f2b70ddb8dc7/3000x3000/owasp-appsec-sf-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:25</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they sit down with Cassie Crossley at the OWASP Global AppSec conference in San Francisco to explore the critical role of Software Bill of Materials (SBOMs) in securing applications. Dive into an engaging discussion on how SBOMs can help manage software risks, even for smaller companies, and the broader implications for the cybersecurity industry.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they sit down with Cassie Crossley at the OWASP Global AppSec conference in San Francisco to explore the critical role of Software Bill of Materials (SBOMs) in securing applications. Dive into an engaging discussion on how SBOMs can help manage software risks, even for smaller companies, and the broader implications for the cybersecurity industry.</itunes:subtitle>
      <itunes:keywords>open-source, critical infrastructure, marco ciappelli, software security, sean martin, transitive dependencies, cisa, cybersecurity, conference, dependency-track, vulnerability, global appsec, applications, risk management, schneider electric, appsec, sbom, podcast, cyber security, appsec global, cassie crossley, owasp, log4j, cybersecurityconference, san francisco</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a2c80d64-bf71-4cfa-a1b5-4a21cbb0c41a</guid>
      <title>Charting the Path Forward: Navigating Security and Compliance at Collaborate 2024 | A HITRUST Collaborate 2024 Conversation with Leslie Jenkins, Robert Booker, Blake Sutherland, and Steve Perkins | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Leslie Jenkins</strong>, Sr. Director, Marketing, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lsjenkins/" target="_blank">https://www.linkedin.com/in/lsjenkins/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Steve Perkins</strong>, Chief Marketing Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/steve-perkins-1604b31/" target="_blank">https://www.linkedin.com/in/steve-perkins-1604b31/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of "On Location with Sean and Marco," Sean Martin welcomes listeners to an engaging Chats on the Road episode heading from Frisco, Texas, where he discusses Collaborate 2024—an upcoming event centered on security, risk management, and compliance programs. Sean is joined by notable industry figures, including Leslie Jenkins, Robert Booker, Blake Sutherland, and Steve Perkins, who collectively provide a comprehensive overview of Collaborate 2024.</p><p>The discussion begins with Robert Booker sharing insights into the history and objectives of the HITRUST Collaborate conference. He explains the event's organic growth and its focus on creating a community-driven environment where participants can engage in meaningful conversations about the challenges they face in the industry.</p><p>Steve Perkins elaborates on the theme "charting the path forward," highlighting the importance of addressing recent industry events, such as significant breaches, and fostering collective efforts in assurance, risk management, and compliance. The agenda includes a variety of sessions ranging from roundtable discussions with seasoned industry professionals to focused talks on emerging trends like ransomware and workforce development.</p><p>Blake Sutherland touches on the unique aspects of cyber insurance, outlining the benefits of integrating HITRUST certifications into the insurance process to enhance risk decisions and streamline procurement. The conversation also touches on the significance of AI in the industry, as Robert Booker discusses the challenges and opportunities associated with AI governance and security. He emphasizes the need for a robust framework to ensure AI systems are secure and align with corporate governance.</p><p>Leslie Jenkins adds to the excitement by talking about the conference's location at the Dallas Cowboys' world headquarters, which promises a unique networking experience. She underscores the importance of in-person interactions and how they contribute to the event's overall value.</p><p>The episode concludes with logistical details for attendees and a collective anticipation for the upcoming event. Sean and guests express their enthusiasm for being part of a community that actively engages in shaping the future of security, risk management, and compliance. Listeners are encouraged to stay tuned for more insightful episodes and register for the event through links provided in the show notes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle">https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 9 Sep 2024 21:11:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Leslie Jenkins, Robert Booker, Blake Sutherland, Steve Perkins)</author>
      <link>https://eventcoveragepodcast.com/episodes/charting-the-path-forward-navigating-security-and-compliance-at-collaborate-2024-a-hitrust-collaborate-2024-conversation-with-leslie-jenkins-robert-booker-blake-sutherland-and-steve-perkins-on-location-coverage-with-sean-martin-and-marco-ciappelli-VTrd5Nse</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Leslie Jenkins</strong>, Sr. Director, Marketing, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lsjenkins/" target="_blank">https://www.linkedin.com/in/lsjenkins/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Steve Perkins</strong>, Chief Marketing Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/steve-perkins-1604b31/" target="_blank">https://www.linkedin.com/in/steve-perkins-1604b31/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of "On Location with Sean and Marco," Sean Martin welcomes listeners to an engaging Chats on the Road episode heading from Frisco, Texas, where he discusses Collaborate 2024—an upcoming event centered on security, risk management, and compliance programs. Sean is joined by notable industry figures, including Leslie Jenkins, Robert Booker, Blake Sutherland, and Steve Perkins, who collectively provide a comprehensive overview of Collaborate 2024.</p><p>The discussion begins with Robert Booker sharing insights into the history and objectives of the HITRUST Collaborate conference. He explains the event's organic growth and its focus on creating a community-driven environment where participants can engage in meaningful conversations about the challenges they face in the industry.</p><p>Steve Perkins elaborates on the theme "charting the path forward," highlighting the importance of addressing recent industry events, such as significant breaches, and fostering collective efforts in assurance, risk management, and compliance. The agenda includes a variety of sessions ranging from roundtable discussions with seasoned industry professionals to focused talks on emerging trends like ransomware and workforce development.</p><p>Blake Sutherland touches on the unique aspects of cyber insurance, outlining the benefits of integrating HITRUST certifications into the insurance process to enhance risk decisions and streamline procurement. The conversation also touches on the significance of AI in the industry, as Robert Booker discusses the challenges and opportunities associated with AI governance and security. He emphasizes the need for a robust framework to ensure AI systems are secure and align with corporate governance.</p><p>Leslie Jenkins adds to the excitement by talking about the conference's location at the Dallas Cowboys' world headquarters, which promises a unique networking experience. She underscores the importance of in-person interactions and how they contribute to the event's overall value.</p><p>The episode concludes with logistical details for attendees and a collective anticipation for the upcoming event. Sean and guests express their enthusiasm for being part of a community that actively engages in shaping the future of security, risk management, and compliance. Listeners are encouraged to stay tuned for more insightful episodes and register for the event through links provided in the show notes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Follow our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle">https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9Rle</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about HITRUST Collaborate 2024 and register for the conference: <a href="https://itspm.ag/hitrusmxay" target="_blank">https://itspm.ag/hitrusmxay</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16728094" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5db20bc4-6e55-42c9-936c-d6e8d89618a4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5db20bc4-6e55-42c9-936c-d6e8d89618a4&amp;feed=2M86zCcc"/>
      <itunes:title>Charting the Path Forward: Navigating Security and Compliance at Collaborate 2024 | A HITRUST Collaborate 2024 Conversation with Leslie Jenkins, Robert Booker, Blake Sutherland, and Steve Perkins | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Leslie Jenkins, Robert Booker, Blake Sutherland, Steve Perkins</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/24e457c6-baea-4a63-9156-47d5ac929d00/3000x3000/hitrust-collaborate-october-1-3-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:25</itunes:duration>
      <itunes:summary>Join Sean Martin for a Chats on the Road episode as he dives into an engaging discussion with industry leaders about the Collaborate 2024, an event focused on the latest in security, risk management, and compliance. Listen to this On Location episode to discover the unique networking opportunities and groundbreaking insights that make this conference a must-attend for professionals looking to chart the path forward in their field.</itunes:summary>
      <itunes:subtitle>Join Sean Martin for a Chats on the Road episode as he dives into an engaging discussion with industry leaders about the Collaborate 2024, an event focused on the latest in security, risk management, and compliance. Listen to this On Location episode to discover the unique networking opportunities and groundbreaking insights that make this conference a must-attend for professionals looking to chart the path forward in their field.</itunes:subtitle>
      <itunes:keywords>compliance, marco ciappelli, networking, sean martin, cybersecurity, conference, robert booker, collaborate 2024, risk management, cyber insurance, leslie jenkins, steve perkins, ransomware, podcast, security, certification, talent gap, ai, industry leaders, blake sutherland, cybersecurityconference, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4588e50d-1f71-48f2-af96-2f74c201f610</guid>
      <title>Learning about Identity Week Americas and SIDI HUB Summit | An Identity Week USA 2024 Conversation with Jeff Reich | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jeff Reich</strong>, Executive Director, Identity Defined Security Alliance [<a href="https://twitter.com/idsalliance">@idsalliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jreich/" target="_blank">https://www.linkedin.com/in/jreich/</a></p><p>On Twitter | <a href="https://twitter.com/JeffReichCSO" target="_blank">https://twitter.com/JeffReichCSO</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Welcome to this <strong>pre-event episode</strong> of <strong>On Location</strong>, where we’re diving into what’s to come at <strong>Identity Week Americas</strong>, happening September 11th and 12th, 2024, at the Washington Convention Center in D.C. Although I won’t be on-site, Jeff—who leads the <strong>Identity Defined Security Alliance</strong> (IDSA)—gave me the inside scoop on why this event is one you can’t afford to miss.</p><p>Our conversation ranges from the critical role of <strong>digital identities</strong> and <strong>payments</strong>, to the pressing challenges facing the identity landscape today. Jeff shared insights on the panels he’ll be participating in, like <strong>Interoperable Digital Identities </strong>and <strong>The Future of Payments</strong>, giving a preview of the big discussions that will take place at the event.</p><p>We even touched on more serious global issues, such as the plight of refugees who lack identification, and how <strong>Identity Week</strong> is working toward solutions that can have a real impact. On top of that, the <strong>SIDI HUB Summit</strong> will run alongside the event, focusing on creating a standardized, globally recognized digital identity system.</p><p>With Identity Week happening across multiple continents—from the <strong>Americas</strong> to <strong>Europe and Asia</strong>—the need for <strong>international collaboration</strong> has never been clearer. Jeff’s vision for a globally interoperable identity system is ambitious, but the starting point is simple: practical steps like multi-factor authentication and building awareness about identity security.</p><p>As we look forward to the event, Jeff also mentioned that there might still be some passes available for those interested in attending. Whether you’re in the public sector, tech, or simply passionate about identity solutions, this event is your chance to get involved in shaping the future.</p><p>Stay tuned for more coverage, and thanks for joining me on this pre-event journey as we explore what’s in store at <strong>Identity Week Americas</strong>.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Identity Week USA 2024: <a href="https://itspm.ag/identinwxn"><strong>https://itspm.ag/identinwxn</strong></a></p><p>SIDI Hub: <a href="https://sidi-hub.community/" target="_blank">https://sidi-hub.community/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 6 Sep 2024 21:24:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jeff Reich)</author>
      <link>https://eventcoveragepodcast.com/episodes/learning-about-identity-week-americas-and-sidi-hub-summit-an-identity-week-usa-2024-conversation-with-jeff-reich-on-location-coverage-with-sean-martin-and-marco-ciappelli-rUU56g4P</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jeff Reich</strong>, Executive Director, Identity Defined Security Alliance [<a href="https://twitter.com/idsalliance">@idsalliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jreich/" target="_blank">https://www.linkedin.com/in/jreich/</a></p><p>On Twitter | <a href="https://twitter.com/JeffReichCSO" target="_blank">https://twitter.com/JeffReichCSO</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Welcome to this <strong>pre-event episode</strong> of <strong>On Location</strong>, where we’re diving into what’s to come at <strong>Identity Week Americas</strong>, happening September 11th and 12th, 2024, at the Washington Convention Center in D.C. Although I won’t be on-site, Jeff—who leads the <strong>Identity Defined Security Alliance</strong> (IDSA)—gave me the inside scoop on why this event is one you can’t afford to miss.</p><p>Our conversation ranges from the critical role of <strong>digital identities</strong> and <strong>payments</strong>, to the pressing challenges facing the identity landscape today. Jeff shared insights on the panels he’ll be participating in, like <strong>Interoperable Digital Identities </strong>and <strong>The Future of Payments</strong>, giving a preview of the big discussions that will take place at the event.</p><p>We even touched on more serious global issues, such as the plight of refugees who lack identification, and how <strong>Identity Week</strong> is working toward solutions that can have a real impact. On top of that, the <strong>SIDI HUB Summit</strong> will run alongside the event, focusing on creating a standardized, globally recognized digital identity system.</p><p>With Identity Week happening across multiple continents—from the <strong>Americas</strong> to <strong>Europe and Asia</strong>—the need for <strong>international collaboration</strong> has never been clearer. Jeff’s vision for a globally interoperable identity system is ambitious, but the starting point is simple: practical steps like multi-factor authentication and building awareness about identity security.</p><p>As we look forward to the event, Jeff also mentioned that there might still be some passes available for those interested in attending. Whether you’re in the public sector, tech, or simply passionate about identity solutions, this event is your chance to get involved in shaping the future.</p><p>Stay tuned for more coverage, and thanks for joining me on this pre-event journey as we explore what’s in store at <strong>Identity Week Americas</strong>.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Identity Week USA 2024: <a href="https://itspm.ag/identinwxn"><strong>https://itspm.ag/identinwxn</strong></a></p><p>SIDI Hub: <a href="https://sidi-hub.community/" target="_blank">https://sidi-hub.community/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23906980" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/009b640d-c882-4c06-92c0-c13a274e9c0d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=009b640d-c882-4c06-92c0-c13a274e9c0d&amp;feed=2M86zCcc"/>
      <itunes:title>Learning about Identity Week Americas and SIDI HUB Summit | An Identity Week USA 2024 Conversation with Jeff Reich | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jeff Reich</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/39f2108a-801b-4004-89d5-7a3cb2ef7d69/3000x3000/identity-week-america-on-11-12-september-2024-2025-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:54</itunes:duration>
      <itunes:summary>Last-minute opportunities often lead to the most exciting discoveries, and that’s exactly what happened when I got the chance to speak with Jeff Reich about the upcoming Identity Week Americas and SIDI HUB Summit.</itunes:summary>
      <itunes:subtitle>Last-minute opportunities often lead to the most exciting discoveries, and that’s exactly what happened when I got the chance to speak with Jeff Reich about the upcoming Identity Week Americas and SIDI HUB Summit.</itunes:subtitle>
      <itunes:keywords>digital wallets, marco ciappelli, government collaboration, identity theft solutions, sean martin, refugee identification, cybersecurity, conference, identity week americas, digital id verification, idsa, washington convention center, financial fraud, cybersecurity conference, global identity standards, conference coverage, real-life identity stories, podcast, security, digital identity, global digital security., identity defined security alliance, sidi hub summit, cybersecurityconference, jeff reich, interoperability</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d2c3dad9-8614-4fb6-a0b4-8caa24d8daa3</guid>
      <title>An Introduction to CyberTech NYC Conference 2024 with Event Director Steve Corrick | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Corrick</strong>, Director, Cybertech New York</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stevecorrick/" target="_blank">https://www.linkedin.com/in/stevecorrick/</a></p><p>On Twitter | <a href="https://x.com/scorrick" target="_blank">https://x.com/scorrick</a></p><p>On Facebook | <a href="https://www.facebook.com/stephen.corrick" target="_blank">https://www.facebook.com/stephen.corrick</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Virtual Road Trip to CyberTech NYC</strong></p><p>In a lively pre-event discussion, we embark on a metaphorical journey across the States, representing our excitement for the CyberTech NYC Conference, happening on September 5th, 2024, at the Metropolitan Pavilion in Chelsea. The idea of this "drive" is a fun nod to the interconnectedness of our virtual world and our anticipation of the event.</p><p><strong>Event Spotlight: Why CyberTech NYC Matters</strong></p><p>We kick things off by highlighting the significance of this event, mentioning that it starts early on September 4th with pre-event activities, leading up to the main event on the 5th. Steve Corrick, one of the key organizers, provides a behind-the-scenes look at the planning process and explains how this third edition of CyberTech NYC has become a distinctive fixture in the cyber ecosystem.</p><p><strong>The Global and Local Impact of CyberTech</strong></p><p>Steve takes us through the journey of CyberTech as a global series, tracing its roots from Tel Aviv to its expansion across multiple continents. What sets CyberTech NYC apart, he says, is its dual focus on both global trends and local innovation. New York City, now a burgeoning hub for tech and cybersecurity, plays host to an event that showcases local talent, startups, and established players alike.</p><p><strong>Comprehensive Coverage of Cyber Topics</strong></p><p>The event’s agenda is packed with content designed to tackle critical issues, such as:</p><ul><li><strong>Cyber Talent Initiative:</strong> Programs for everyone, from students to professionals looking to upskill.</li><li><strong>VC and Investor Focus:</strong> The Investing in the Best initiative to help startups boost their funding.</li><li><strong>Government and Agency Involvement:</strong> Discussions on how localities can strengthen their cyber ecosystems.</li><li><strong>Main Stage Content:</strong> Keynotes on fake news, the role of cyber in elections, and other pressing topics.</li></ul><p><strong>Inclusivity and Innovation: A Diverse Speaker Lineup</strong></p><p>We appreciate the diversity of speakers and the range of topics covered. With big names like Walmart, AWS, and various innovative startups, the event promises to offer something for everyone. Steve also explains the event’s blend of formats, including main stage panels, roundtables, and think tanks, all aimed at fostering in-depth discussions and knowledge sharing.</p><p><strong>The Evolving Cyber Landscape</strong></p><p>Reflecting on how cybersecurity events have evolved over the years, Steve notes the shift from niche gatherings to mainstream importance. With cyber threats becoming part of our daily lives, collaboration among countries and industries has become essential for enhancing global security.</p><p><strong>Local Focus with Global Reach</strong></p><p>We commend the event’s ability to balance global participation with a strong local focus. Steve agrees, emphasizing their collaboration with local and state-level initiatives in New York, further solidifying the city’s place on the global cybersecurity map.</p><p><strong>Looking Forward to CyberTech NYC 2024</strong></p><p>Our conversation wraps up with a sneak peek at the event’s schedule, including a Happy Cyber Hour on the evening of September 5th and additional pre-event activities on the 4th. Steve and his team are excited to connect with participants from around the globe, and we’ll be sharing more updates as CyberTech NYC 2024 approaches.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p><strong>____________________________</strong></p><p>Follow our Cybertech NYC 2024 coverage: <a href="https://www.itspmagazine.com/cybertech-nyc-2024-cybersecurity-event-coverage-in-new-york-city">https://www.itspmagazine.com/cybertech-nyc-2024-cybersecurity-event-coverage-in-new-york-city</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRjdy_wDSLBwgPkM3zSeau_">https://www.youtube.com/playlist?list=PLnYu0psdcllRjdy_wDSLBwgPkM3zSeau_</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Cybertech NYC 2024: <a href="https://nyc.cybertechconference.com/">https://nyc.cybertechconference.com/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 26 Aug 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Corrick)</author>
      <link>https://eventcoveragepodcast.com/episodes/an-introduction-to-cybertech-nyc-conference-2024-with-event-director-steve-corrick-on-location-coverage-with-sean-martin-and-marco-ciappelli-_lQlOD4t</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Corrick</strong>, Director, Cybertech New York</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stevecorrick/" target="_blank">https://www.linkedin.com/in/stevecorrick/</a></p><p>On Twitter | <a href="https://x.com/scorrick" target="_blank">https://x.com/scorrick</a></p><p>On Facebook | <a href="https://www.facebook.com/stephen.corrick" target="_blank">https://www.facebook.com/stephen.corrick</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Virtual Road Trip to CyberTech NYC</strong></p><p>In a lively pre-event discussion, we embark on a metaphorical journey across the States, representing our excitement for the CyberTech NYC Conference, happening on September 5th, 2024, at the Metropolitan Pavilion in Chelsea. The idea of this "drive" is a fun nod to the interconnectedness of our virtual world and our anticipation of the event.</p><p><strong>Event Spotlight: Why CyberTech NYC Matters</strong></p><p>We kick things off by highlighting the significance of this event, mentioning that it starts early on September 4th with pre-event activities, leading up to the main event on the 5th. Steve Corrick, one of the key organizers, provides a behind-the-scenes look at the planning process and explains how this third edition of CyberTech NYC has become a distinctive fixture in the cyber ecosystem.</p><p><strong>The Global and Local Impact of CyberTech</strong></p><p>Steve takes us through the journey of CyberTech as a global series, tracing its roots from Tel Aviv to its expansion across multiple continents. What sets CyberTech NYC apart, he says, is its dual focus on both global trends and local innovation. New York City, now a burgeoning hub for tech and cybersecurity, plays host to an event that showcases local talent, startups, and established players alike.</p><p><strong>Comprehensive Coverage of Cyber Topics</strong></p><p>The event’s agenda is packed with content designed to tackle critical issues, such as:</p><ul><li><strong>Cyber Talent Initiative:</strong> Programs for everyone, from students to professionals looking to upskill.</li><li><strong>VC and Investor Focus:</strong> The Investing in the Best initiative to help startups boost their funding.</li><li><strong>Government and Agency Involvement:</strong> Discussions on how localities can strengthen their cyber ecosystems.</li><li><strong>Main Stage Content:</strong> Keynotes on fake news, the role of cyber in elections, and other pressing topics.</li></ul><p><strong>Inclusivity and Innovation: A Diverse Speaker Lineup</strong></p><p>We appreciate the diversity of speakers and the range of topics covered. With big names like Walmart, AWS, and various innovative startups, the event promises to offer something for everyone. Steve also explains the event’s blend of formats, including main stage panels, roundtables, and think tanks, all aimed at fostering in-depth discussions and knowledge sharing.</p><p><strong>The Evolving Cyber Landscape</strong></p><p>Reflecting on how cybersecurity events have evolved over the years, Steve notes the shift from niche gatherings to mainstream importance. With cyber threats becoming part of our daily lives, collaboration among countries and industries has become essential for enhancing global security.</p><p><strong>Local Focus with Global Reach</strong></p><p>We commend the event’s ability to balance global participation with a strong local focus. Steve agrees, emphasizing their collaboration with local and state-level initiatives in New York, further solidifying the city’s place on the global cybersecurity map.</p><p><strong>Looking Forward to CyberTech NYC 2024</strong></p><p>Our conversation wraps up with a sneak peek at the event’s schedule, including a Happy Cyber Hour on the evening of September 5th and additional pre-event activities on the 4th. Steve and his team are excited to connect with participants from around the globe, and we’ll be sharing more updates as CyberTech NYC 2024 approaches.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><p><strong>____________________________</strong></p><p>Follow our Cybertech NYC 2024 coverage: <a href="https://www.itspmagazine.com/cybertech-nyc-2024-cybersecurity-event-coverage-in-new-york-city">https://www.itspmagazine.com/cybertech-nyc-2024-cybersecurity-event-coverage-in-new-york-city</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRjdy_wDSLBwgPkM3zSeau_">https://www.youtube.com/playlist?list=PLnYu0psdcllRjdy_wDSLBwgPkM3zSeau_</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Cybertech NYC 2024: <a href="https://nyc.cybertechconference.com/">https://nyc.cybertechconference.com/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20869644" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/32b49ff5-8f00-4dfe-9188-ab8d872f821e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=32b49ff5-8f00-4dfe-9188-ab8d872f821e&amp;feed=2M86zCcc"/>
      <itunes:title>An Introduction to CyberTech NYC Conference 2024 with Event Director Steve Corrick | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Corrick</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/b44f65b8-2885-43f4-a95f-e3a8507ac25f/3000x3000/cybertech-nyc-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:44</itunes:duration>
      <itunes:summary>As the CyberTech NYC Conference 2024 draws near, co-hosts Sean Martin and Marco Ciappelli sit down with Event Director Steve Corrick to explore the conference’s impactful agenda and what attendees can expect from this year’s gathering.</itunes:summary>
      <itunes:subtitle>As the CyberTech NYC Conference 2024 draws near, co-hosts Sean Martin and Marco Ciappelli sit down with Event Director Steve Corrick to explore the conference’s impactful agenda and what attendees can expect from this year’s gathering.</itunes:subtitle>
      <itunes:keywords>tech ecosystem, global cyber events, marco ciappelli, society and sustainability in tech, cyber intelligence, sean martin, cybertech events, cyber talent initiative, cybersecurity, investing in cyber, conference, nyc cyber ecosystem, cyber innovation, secure operations, cybersecurity conference, nyc tech events, metropolitan pavilion chelsea, podcast, security, cyber security, steve corrick, tech startups, cybertech nyc conference, cybersecurityconference, cybertech 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f58a30f-ecab-4421-801d-e190426987bd</guid>
      <title>Recapping Black Hat 2024 and What’s Next | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of "On Location With Sean Martin and Marco Ciappelli," our hosts dive into their time at Black Hat 2024 in Las Vegas, reflecting on key takeaways and sharing what’s next on their journey. Whether you're deep into cybersecurity or just curious about the industry, this blog post offers a snapshot of what to expect from Sean and Marco.</p><p><strong>Recapping Black Hat 2024</strong><br /><br /><i>Marco Ciappelli</i><br /><i>Choo, choo . . .</i><br /><br /><i>Sean Martin</i><br /><i>Is that the sound of the fast train back from Vegas? Or just the rush of everything we experienced?</i></p><p><i>Marco Ciappelli</i><br /><i>I'm still wondering why there's no train from LA to Vegas. And don't get me started on LA to San Francisco—that's another conversation entirely.</i></p><p>The conversation kicks off with a lighthearted nod to travel woes before shifting to the core of the episode: their reflections on Black Hat 2024. Sean and Marco bring unique perspectives, emphasizing the importance of thinking beyond cybersecurity's technical aspects to consider its broader impact on society and business.</p><p><strong>Sean's Operational Insights</strong><br /><i>Sean Martin</i><br /><i>I like to look at things from an operational angle—how can we take what we learn and bring it back to the business to help leaders and practitioners do what they love?</i></p><p>Sean’s Black Hat 2024 Recap Newsletter explores the evolution from reactive data responses to strategic enablement, AI and automation, modular cybersecurity, and the invaluable role of human insights. His focus is clear: helping businesses become more resilient and adaptable through smarter cybersecurity practices.</p><p><strong>Marco's Societal Impact</strong><br /><i>Marco Ciappelli</i><br /><i>Cybersecurity isn’t a destination—it’s a journey. We’re never going to be fully secure, and that’s okay. Cultures change, technology evolves, and we have to keep adapting.</i></p><p>Marco’s take highlights the societal implications of cybersecurity. He talk about how different fields and nations are breaking down silos to collaborate more effectively. His newsletter often reflects on the need for digital literacy across business, society, and education, emphasizing the importance of broadening our understanding of technology’s role.</p><p><strong>Upcoming Events and Conferences</strong><br />The duo is excited about their packed schedule for the rest of 2024 and beyond, including:</p><ul><li><strong>CyberTech New York (September 2024):</strong> Focused on policy, innovation, SecOps, AppSec, and sustainability.</li><li><strong>OWASP AppSec San Francisco (September 2024):</strong> Covering the OWASP Top 10 for LLMs and more.</li><li><strong>Sector in Toronto (October 2024):</strong> Offering unique coverage ideas, closely tied to Black Hat.</li><li>Did someone said that they will be back covering an APJ event, in Melbourne, before the end of the year??? <br /> </li></ul><p><strong>Additional Ventures</strong><br />They’ll also be hosting innovation panels and keynotes at a company event in New Orleans, with CES in Las Vegas and VivaTech in Paris on the horizon for 2025, blending B2B startup insights with consumer tech, all with a cybersecurity twist.</p><p><strong>Subscribe and Stay Tuned</strong><br />Marco and Sean invite you to subscribe to their newsletters and follow their podcast, "On Location," as they continue their journey around the globe—both physically and virtually—bringing fresh perspectives on business, technology, and cybersecurity. You’ll also find unique "brand stories" that highlight innovations making our world safer and more sustainable.</p><p>Stay connected, enjoy the ride, and don’t forget to subscribe to both their newsletters and the "On Location" podcast on YouTube!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Sean's Newsletter Article: <a href="https://www.linkedin.com/pulse/reflecting-black-hat-2024-operationalizing-enhanced-business-martin-ccive/" target="_blank">https://www.linkedin.com/pulse/reflecting-black-hat-2024-operationalizing-enhanced-business-martin-ccive/</a></p><p>Marco's Newsletter Article: <a href="https://www.linkedin.com/pulse/my-reflections-from-itspmagazines-black-hat-usa-2024-state-ciappelli-ayglc/?trackingId=hLvuq5LqQ%2B2RHNpgDtIJlQ%3D%3D" target="_blank">https://www.linkedin.com/pulse/my-reflections-from-itspmagazines-black-hat-usa-2024-state-ciappelli-ayglc/?trackingId=hLvuq5LqQ%2B2RHNpgDtIJlQ%3D%3D</a></p><p>On Location Podcast: <a href="https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/" target="_blank">https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 20 Aug 2024 16:51:08 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/recapping-black-hat-2024-and-whats-next-on-location-coverage-with-sean-martin-and-marco-ciappelli-fOiHCN_k</link>
      <content:encoded><![CDATA[<p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of "On Location With Sean Martin and Marco Ciappelli," our hosts dive into their time at Black Hat 2024 in Las Vegas, reflecting on key takeaways and sharing what’s next on their journey. Whether you're deep into cybersecurity or just curious about the industry, this blog post offers a snapshot of what to expect from Sean and Marco.</p><p><strong>Recapping Black Hat 2024</strong><br /><br /><i>Marco Ciappelli</i><br /><i>Choo, choo . . .</i><br /><br /><i>Sean Martin</i><br /><i>Is that the sound of the fast train back from Vegas? Or just the rush of everything we experienced?</i></p><p><i>Marco Ciappelli</i><br /><i>I'm still wondering why there's no train from LA to Vegas. And don't get me started on LA to San Francisco—that's another conversation entirely.</i></p><p>The conversation kicks off with a lighthearted nod to travel woes before shifting to the core of the episode: their reflections on Black Hat 2024. Sean and Marco bring unique perspectives, emphasizing the importance of thinking beyond cybersecurity's technical aspects to consider its broader impact on society and business.</p><p><strong>Sean's Operational Insights</strong><br /><i>Sean Martin</i><br /><i>I like to look at things from an operational angle—how can we take what we learn and bring it back to the business to help leaders and practitioners do what they love?</i></p><p>Sean’s Black Hat 2024 Recap Newsletter explores the evolution from reactive data responses to strategic enablement, AI and automation, modular cybersecurity, and the invaluable role of human insights. His focus is clear: helping businesses become more resilient and adaptable through smarter cybersecurity practices.</p><p><strong>Marco's Societal Impact</strong><br /><i>Marco Ciappelli</i><br /><i>Cybersecurity isn’t a destination—it’s a journey. We’re never going to be fully secure, and that’s okay. Cultures change, technology evolves, and we have to keep adapting.</i></p><p>Marco’s take highlights the societal implications of cybersecurity. He talk about how different fields and nations are breaking down silos to collaborate more effectively. His newsletter often reflects on the need for digital literacy across business, society, and education, emphasizing the importance of broadening our understanding of technology’s role.</p><p><strong>Upcoming Events and Conferences</strong><br />The duo is excited about their packed schedule for the rest of 2024 and beyond, including:</p><ul><li><strong>CyberTech New York (September 2024):</strong> Focused on policy, innovation, SecOps, AppSec, and sustainability.</li><li><strong>OWASP AppSec San Francisco (September 2024):</strong> Covering the OWASP Top 10 for LLMs and more.</li><li><strong>Sector in Toronto (October 2024):</strong> Offering unique coverage ideas, closely tied to Black Hat.</li><li>Did someone said that they will be back covering an APJ event, in Melbourne, before the end of the year??? <br /> </li></ul><p><strong>Additional Ventures</strong><br />They’ll also be hosting innovation panels and keynotes at a company event in New Orleans, with CES in Las Vegas and VivaTech in Paris on the horizon for 2025, blending B2B startup insights with consumer tech, all with a cybersecurity twist.</p><p><strong>Subscribe and Stay Tuned</strong><br />Marco and Sean invite you to subscribe to their newsletters and follow their podcast, "On Location," as they continue their journey around the globe—both physically and virtually—bringing fresh perspectives on business, technology, and cybersecurity. You’ll also find unique "brand stories" that highlight innovations making our world safer and more sustainable.</p><p>Stay connected, enjoy the ride, and don’t forget to subscribe to both their newsletters and the "On Location" podcast on YouTube!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Sean's Newsletter Article: <a href="https://www.linkedin.com/pulse/reflecting-black-hat-2024-operationalizing-enhanced-business-martin-ccive/" target="_blank">https://www.linkedin.com/pulse/reflecting-black-hat-2024-operationalizing-enhanced-business-martin-ccive/</a></p><p>Marco's Newsletter Article: <a href="https://www.linkedin.com/pulse/my-reflections-from-itspmagazines-black-hat-usa-2024-state-ciappelli-ayglc/?trackingId=hLvuq5LqQ%2B2RHNpgDtIJlQ%3D%3D" target="_blank">https://www.linkedin.com/pulse/my-reflections-from-itspmagazines-black-hat-usa-2024-state-ciappelli-ayglc/?trackingId=hLvuq5LqQ%2B2RHNpgDtIJlQ%3D%3D</a></p><p>On Location Podcast: <a href="https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/" target="_blank">https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19685152" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/730e2357-4c6e-4192-8336-3cf1cfc08be1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=730e2357-4c6e-4192-8336-3cf1cfc08be1&amp;feed=2M86zCcc"/>
      <itunes:title>Recapping Black Hat 2024 and What’s Next | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:30</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they recap their experiences at Black Hat 2024 and discuss what&apos;s on the horizon. This episode explores not just the event highlights but also upcoming adventures and insights from their latest newsletters.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they recap their experiences at Black Hat 2024 and discuss what&apos;s on the horizon. This episode explores not just the event highlights but also upcoming adventures and insights from their latest newsletters.</itunes:subtitle>
      <itunes:keywords>vivatech paris, ai and automation, marco ciappelli, cybertech new york, technology events, sean martin, cybersecurity, conference, business resilience, australia cyber security conference, cybersecurity conference, on location podcast, sector toronto, podcast, cybersecurity newsletter, ces las vegas, security, digital literacy, black hat 2024, owasp appsec, cybersecurity innovation, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">15a5ff4e-ed1a-4b30-a4ee-c5204bba183b</guid>
      <title>OWASP Top 10 For Large Language Models: Project Update | An OWASP 2024 Global AppSec San Francisco Conversation with Steve Wilson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Wilson</strong>, Chief Product Officer, Exabeam [<a href="https://x.com/exabeam">@exabeam</a>] & Project Lead,  OWASP Top 10 for Larage Language Model Applications [<a href="https://x.com/owasp">@owasp</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wilsonsd/" target="_blank">https://www.linkedin.com/in/wilsonsd/</a></p><p>On Twitter | <a href="https://x.com/virtualsteve" target="_blank">https://x.com/virtualsteve</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the Chat on the Road On Location series for OWASP AppSec Global in San Francisco, Sean Martin hosts a compelling conversation with Steve Wilson, Project Lead for the OWASP Top 10 for Large Language Model AI Applications. The discussion, as you might guess, centers on the OWASP Top 10 list for Large Language Models (LLMs) and the security challenges associated with these technologies. Wilson highlights the growing relevance of AppSec, particularly with the surge in interest in AI and LLMs.</p><p>The conversation kicks off with an exploration of the LLM project that Wilson has been working on at OWASP, aimed at presenting an update on the OWASP Top 10 for LLMs. Wilson emphasizes the significance of prompt injection attacks, one of the key concerns on the OWASP list. He explains how attackers can craft prompts to manipulate LLMs into performing unintended actions, a tactic reminiscent of the SQL injection attacks that have plagued traditional software for years. This serves as a stark reminder of the need for vigilance in the development and deployment of LLMs.</p><p>Supply chain risks are another critical issue discussed. Wilson draws parallels to the Log4j incident, stressing that the AI software supply chain is currently a weak link. With the rapid growth of platforms like Hugging Face, the provenance of AI models and training datasets becomes a significant concern. Ensuring the integrity and security of these components is paramount to building robust AI-driven systems.</p><p>The notion of excessive agency is also explored—a concept that relates to the permissions and responsibilities assigned to LLMs. Wilson underscores the importance of limiting the scope of LLMs to prevent misuse or unauthorized actions. This point resonates with traditional security principles like least privilege but is recontextualized for the AI age. Overreliance on LLMs is another topic Martin and Wilson discuss.</p><p>The conversation touches on how people can place undue trust in AI outputs, leading to potentially hazardous outcomes. Ensuring users understand the limitations and potential inaccuracies of LLM-generated content is essential for safe and effective AI utilization.</p><p>Wilson also provides a preview of his upcoming session at the OWASP AppSec Global event, where he plans to share insights from the ongoing work on the 2.0 version of the OWASP Top 10 for LLMs. This next iteration will address how the field has matured and new security considerations that have emerged since the initial list.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p><strong>____________________________</strong></p><p>Follow our OWASP 2024 Global AppSec San Francisco coverage: <a href="https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage">https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt">https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>OWASP Top 10 for Large Language Models: Project Update: <a href="https://owasp2024globalappsecsanfra.sched.com/event/1g3YF/owasp-top-10-for-large-language-models-project-update" target="_blank">https://owasp2024globalappsecsanfra.sched.com/event/1g3YF/owasp-top-10-for-large-language-models-project-update</a></p><p>  Safeguarding Against Malicious Use of Large Language Models: A Review of the OWASP Top 10 for LLMs | A Conversation with Jason Haddix | Redefining CyberSecurity with Sean Martin: <a href="https://itsprad.io/redefining-cybersecurity-190" target="_blank">https://itsprad.io/redefining-cybersecurity-190</a></p><p>OWASP LLM AI Security & Governance Checklist: Practical Steps To Harness the Benefits of Large Language Models While Minimizing Potential Security Risks | A Conversation with Sandy Dunn | Redefining CyberSecurity Podcast with Sean Martin: <a href="https://itsprad.io/redefiningcybersecurity-287" target="_blank">https://itsprad.io/redefiningcybersecurity-287</a></p><p>Hacking Humans Using LLMs with Fredrik Heiding: Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models | Las Vegas Black Hat 2023 Event Coverage | Redefining CyberSecurity Podcast With Sean Martin and Marco Ciappelli: <a href="https://itsprad.io/redefining-cybersecurity-208" target="_blank">https://itsprad.io/redefining-cybersecurity-208</a></p><p>Learn more about OWASP 2024 Global AppSec San Francisco: <a href="https://sf.globalappsec.org/">https://sf.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 20 Aug 2024 15:35:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wilson)</author>
      <link>https://eventcoveragepodcast.com/episodes/owasp-top-10-for-large-language-models-project-update-an-owasp-2024-global-appsec-san-francisco-conversation-with-steve-wilson-on-location-coverage-with-sean-martin-and-marco-ciappelli-LqmYrox5</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Wilson</strong>, Chief Product Officer, Exabeam [<a href="https://x.com/exabeam">@exabeam</a>] & Project Lead,  OWASP Top 10 for Larage Language Model Applications [<a href="https://x.com/owasp">@owasp</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wilsonsd/" target="_blank">https://www.linkedin.com/in/wilsonsd/</a></p><p>On Twitter | <a href="https://x.com/virtualsteve" target="_blank">https://x.com/virtualsteve</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the Chat on the Road On Location series for OWASP AppSec Global in San Francisco, Sean Martin hosts a compelling conversation with Steve Wilson, Project Lead for the OWASP Top 10 for Large Language Model AI Applications. The discussion, as you might guess, centers on the OWASP Top 10 list for Large Language Models (LLMs) and the security challenges associated with these technologies. Wilson highlights the growing relevance of AppSec, particularly with the surge in interest in AI and LLMs.</p><p>The conversation kicks off with an exploration of the LLM project that Wilson has been working on at OWASP, aimed at presenting an update on the OWASP Top 10 for LLMs. Wilson emphasizes the significance of prompt injection attacks, one of the key concerns on the OWASP list. He explains how attackers can craft prompts to manipulate LLMs into performing unintended actions, a tactic reminiscent of the SQL injection attacks that have plagued traditional software for years. This serves as a stark reminder of the need for vigilance in the development and deployment of LLMs.</p><p>Supply chain risks are another critical issue discussed. Wilson draws parallels to the Log4j incident, stressing that the AI software supply chain is currently a weak link. With the rapid growth of platforms like Hugging Face, the provenance of AI models and training datasets becomes a significant concern. Ensuring the integrity and security of these components is paramount to building robust AI-driven systems.</p><p>The notion of excessive agency is also explored—a concept that relates to the permissions and responsibilities assigned to LLMs. Wilson underscores the importance of limiting the scope of LLMs to prevent misuse or unauthorized actions. This point resonates with traditional security principles like least privilege but is recontextualized for the AI age. Overreliance on LLMs is another topic Martin and Wilson discuss.</p><p>The conversation touches on how people can place undue trust in AI outputs, leading to potentially hazardous outcomes. Ensuring users understand the limitations and potential inaccuracies of LLM-generated content is essential for safe and effective AI utilization.</p><p>Wilson also provides a preview of his upcoming session at the OWASP AppSec Global event, where he plans to share insights from the ongoing work on the 2.0 version of the OWASP Top 10 for LLMs. This next iteration will address how the field has matured and new security considerations that have emerged since the initial list.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p><strong>____________________________</strong></p><p>Follow our OWASP 2024 Global AppSec San Francisco coverage: <a href="https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage">https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt">https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jt</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>OWASP Top 10 for Large Language Models: Project Update: <a href="https://owasp2024globalappsecsanfra.sched.com/event/1g3YF/owasp-top-10-for-large-language-models-project-update" target="_blank">https://owasp2024globalappsecsanfra.sched.com/event/1g3YF/owasp-top-10-for-large-language-models-project-update</a></p><p>  Safeguarding Against Malicious Use of Large Language Models: A Review of the OWASP Top 10 for LLMs | A Conversation with Jason Haddix | Redefining CyberSecurity with Sean Martin: <a href="https://itsprad.io/redefining-cybersecurity-190" target="_blank">https://itsprad.io/redefining-cybersecurity-190</a></p><p>OWASP LLM AI Security & Governance Checklist: Practical Steps To Harness the Benefits of Large Language Models While Minimizing Potential Security Risks | A Conversation with Sandy Dunn | Redefining CyberSecurity Podcast with Sean Martin: <a href="https://itsprad.io/redefiningcybersecurity-287" target="_blank">https://itsprad.io/redefiningcybersecurity-287</a></p><p>Hacking Humans Using LLMs with Fredrik Heiding: Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models | Las Vegas Black Hat 2023 Event Coverage | Redefining CyberSecurity Podcast With Sean Martin and Marco Ciappelli: <a href="https://itsprad.io/redefining-cybersecurity-208" target="_blank">https://itsprad.io/redefining-cybersecurity-208</a></p><p>Learn more about OWASP 2024 Global AppSec San Francisco: <a href="https://sf.globalappsec.org/">https://sf.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22588702" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5c21e2f6-3eb0-4844-86e9-c78dbadcf87a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5c21e2f6-3eb0-4844-86e9-c78dbadcf87a&amp;feed=2M86zCcc"/>
      <itunes:title>OWASP Top 10 For Large Language Models: Project Update | An OWASP 2024 Global AppSec San Francisco Conversation with Steve Wilson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wilson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/503fc858-624d-4b40-8478-f2b70ddb8dc7/3000x3000/owasp-appsec-sf-2024-850-x-850.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:31</itunes:duration>
      <itunes:summary>In this On Location episode, Sean Martin and Steve Wilson, Project Lead for the OWASP Top 10 for Large Language Model AI Applications, discuss the newest security challenges revolving around large language models (LLMs) and the significant insights from the OWASP Top 10 project. Learn about the key issues like prompt injection attacks, supply chain risks, excessive agency, and more, while getting a sneak peek into the upcoming updates to the OWASP Top 10 for LLMs.</itunes:summary>
      <itunes:subtitle>In this On Location episode, Sean Martin and Steve Wilson, Project Lead for the OWASP Top 10 for Large Language Model AI Applications, discuss the newest security challenges revolving around large language models (LLMs) and the significant insights from the OWASP Top 10 project. Learn about the key issues like prompt injection attacks, supply chain risks, excessive agency, and more, while getting a sneak peek into the upcoming updates to the OWASP Top 10 for LLMs.</itunes:subtitle>
      <itunes:keywords>chatgpt, marco ciappelli, ai security, sean martin, supply chain, cybersecurity, conference, data security, data integrity, agency, appsec, large language models, podcast, owasp top 10, security, cyber security, appsec global, machine learning, owasp, ai, prompt injection, exabeam, llm, cybersecurityconference, steve wilson</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c5ba6b5d-5e1d-4780-a934-31ea13fc9eb1</guid>
      <title>Harnessing Dark Web Insights to Understand Risks from the Attacker&apos;s Viewpoint | A Brand Story Conversation From Black Hat USA 2024 | A Resecurity Story with Christian Lees and Shawn Loveland | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At Black Hat USA 2024, the spotlight is on redefining and rethinking security, as discussed in this Brand Story episode with Resecurity. Sean Martin, Christian Lees, and Shawn Loveland share the mic to explore the cutting-edge innovations shifting paradigms within the cybersecurity domain. Christian Lees and Shawn Loveland from Resecurity dive deep into the substance of their work and its impact on modern security teams. The primary focus is Resecurity's approach towards threat intelligence and how it aids organizations in proactively mitigating risks.</p><p>The discussion kicks off with an overview of Resecurity's approach to threat intelligence. Unlike conventional models that operate from within the firewall, Resecurity adopts an outside-in perspective, helping clients understand what attackers might know about their infrastructure. Shawn Loveland emphasizes this unique viewpoint by illustrating how Resecurity helps organizations identify potential breaches and vulnerabilities from the attacker's perspective, well before any threats materialize.</p><p>One intriguing point discussed by Lees and Loveland is Resecurity's comprehensive data sourcing from the dark web. Resecurity does not simply rely on common threat intel from visible websites but digs deep into exclusive, invitation-only forums and other obscure corners of the web. This meticulous venture results in a much more profound understanding of potential threats, minimizing blind spots and the risk of data inaccuracies or AI hallucinations. By drawing on diverse data sources, Resecurity promises more significant and accurate insights into the motives and methods of cybercriminals.</p><p>Moreover, Loveland highlights the technologically sophisticated tactics employed by Resecurity, combining AI to convert unstructured data into structured, actionable intelligence for security teams. This automation not only boosts efficiency but also empowers analysts to make more informed decisions swiftly. AI in Resecurity's arsenal is not a standalone entity but integrates deeply with the human-driven aspects of threat intelligence, enriching the overall analytic experience with contextual understanding and tangible evidence.</p><p>The guests also touch on Resecurity's AI capabilities, illustrating this through scenarios where AI accelerates threat detection and response. By transforming vast amounts of data into comprehensible formats, and even summarizing complex situations into actionable insights, AI significantly reduces the ordeal for security analysts while enhancing precision.</p><p>In conclusion, Resecurity’s state-of-the-art threat intelligence solutions, emphasized by the knowledgeable insights from Christian Lees and Shawn Loveland, represent a proactive and innovative approach to modern cybersecurity.</p><p>Learn more about Resecurity: <a href="https://itspm.ag/resecurb51">https://itspm.ag/resecurb51</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Christian Lees</strong>, CTO, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christian-lees-72886b3/" target="_blank">https://www.linkedin.com/in/christian-lees-72886b3/</a></p><p><strong>Shawn Loveland</strong>, Chief Operating Officer, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawn-loveland/" target="_blank">https://www.linkedin.com/in/shawn-loveland/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Resecurity: <a href="https://www.itspmagazine.com/directory/resecurity">https://www.itspmagazine.com/directory/resecurity</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 19 Aug 2024 15:05:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christian Lees, Shawn Loveland)</author>
      <link>https://eventcoveragepodcast.com/episodes/harnessing-dark-web-insights-to-understand-risks-from-the-attackers-viewpoint-a-brand-story-conversation-from-black-hat-usa-2024-a-resecurity-story-with-christian-lees-and-shawn-loveland-on-location-coverage-with-sean-martin-and-marco-ciappelli-E9P6Xs1T</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2024, the spotlight is on redefining and rethinking security, as discussed in this Brand Story episode with Resecurity. Sean Martin, Christian Lees, and Shawn Loveland share the mic to explore the cutting-edge innovations shifting paradigms within the cybersecurity domain. Christian Lees and Shawn Loveland from Resecurity dive deep into the substance of their work and its impact on modern security teams. The primary focus is Resecurity's approach towards threat intelligence and how it aids organizations in proactively mitigating risks.</p><p>The discussion kicks off with an overview of Resecurity's approach to threat intelligence. Unlike conventional models that operate from within the firewall, Resecurity adopts an outside-in perspective, helping clients understand what attackers might know about their infrastructure. Shawn Loveland emphasizes this unique viewpoint by illustrating how Resecurity helps organizations identify potential breaches and vulnerabilities from the attacker's perspective, well before any threats materialize.</p><p>One intriguing point discussed by Lees and Loveland is Resecurity's comprehensive data sourcing from the dark web. Resecurity does not simply rely on common threat intel from visible websites but digs deep into exclusive, invitation-only forums and other obscure corners of the web. This meticulous venture results in a much more profound understanding of potential threats, minimizing blind spots and the risk of data inaccuracies or AI hallucinations. By drawing on diverse data sources, Resecurity promises more significant and accurate insights into the motives and methods of cybercriminals.</p><p>Moreover, Loveland highlights the technologically sophisticated tactics employed by Resecurity, combining AI to convert unstructured data into structured, actionable intelligence for security teams. This automation not only boosts efficiency but also empowers analysts to make more informed decisions swiftly. AI in Resecurity's arsenal is not a standalone entity but integrates deeply with the human-driven aspects of threat intelligence, enriching the overall analytic experience with contextual understanding and tangible evidence.</p><p>The guests also touch on Resecurity's AI capabilities, illustrating this through scenarios where AI accelerates threat detection and response. By transforming vast amounts of data into comprehensible formats, and even summarizing complex situations into actionable insights, AI significantly reduces the ordeal for security analysts while enhancing precision.</p><p>In conclusion, Resecurity’s state-of-the-art threat intelligence solutions, emphasized by the knowledgeable insights from Christian Lees and Shawn Loveland, represent a proactive and innovative approach to modern cybersecurity.</p><p>Learn more about Resecurity: <a href="https://itspm.ag/resecurb51">https://itspm.ag/resecurb51</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Christian Lees</strong>, CTO, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christian-lees-72886b3/" target="_blank">https://www.linkedin.com/in/christian-lees-72886b3/</a></p><p><strong>Shawn Loveland</strong>, Chief Operating Officer, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawn-loveland/" target="_blank">https://www.linkedin.com/in/shawn-loveland/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Resecurity: <a href="https://www.itspmagazine.com/directory/resecurity">https://www.itspmagazine.com/directory/resecurity</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17899198" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8e2c6eef-d144-4618-bac1-e3982e0ad6de/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8e2c6eef-d144-4618-bac1-e3982e0ad6de&amp;feed=2M86zCcc"/>
      <itunes:title>Harnessing Dark Web Insights to Understand Risks from the Attacker&apos;s Viewpoint | A Brand Story Conversation From Black Hat USA 2024 | A Resecurity Story with Christian Lees and Shawn Loveland | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christian Lees, Shawn Loveland</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:38</itunes:duration>
      <itunes:summary>Join Sean Martin as he hosts Christian Lees and Shawn Loveland from Resecurity at Black Hat USA 2024, diving into innovative threat intelligence strategies that offer an attacker&apos;s perspective on security. Discover how Resecurity&apos;s unique approach and advanced AI capabilities empower organizations to proactively mitigate risks and enhance their cybersecurity posture.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he hosts Christian Lees and Shawn Loveland from Resecurity at Black Hat USA 2024, diving into innovative threat intelligence strategies that offer an attacker&apos;s perspective on security. Discover how Resecurity&apos;s unique approach and advanced AI capabilities empower organizations to proactively mitigate risks and enhance their cybersecurity posture.</itunes:subtitle>
      <itunes:keywords>data, marco ciappelli, attackers, black hat, sean martin, resecurity, cybersecurity, dark web, threat intelligence, christian lees, shawn loveland, ai, infrastructure, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb253f9b-f89b-41b9-bc3c-330a707176c1</guid>
      <title>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact | A Musing On Society &amp; Technology with Marco Ciappelli and TAPE3 | Read by TAPE3</title>
      <description><![CDATA[<p><strong>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact</strong></p><p><strong>Prologue</strong></p><p>Each year, Black Hat serves as a critical touchpoint for the cybersecurity industry—a gathering that offers unparalleled insights into the latest threats, technologies, and strategies that define our collective defense efforts. Established in 1997, Black Hat has grown from a single conference in Las Vegas to a global series of events held in cities like Barcelona, London, and Riyadh. The conference brings together a diverse audience, from hackers and security professionals to executives and non-technical individuals, all united by a shared interest in information security.</p><p>What sets Black Hat apart is its unique blend of cutting-edge research, hands-on training, and open dialogue between the many stakeholders in the cybersecurity ecosystem. It's a place where corporations, government agencies, and independent researchers converge to exchange ideas and push the boundaries of what's possible in securing our digital world. As the cybersecurity landscape continues to evolve, Black Hat remains a vital forum for addressing the challenges and opportunities that come with it.</p><p>Sean and I engaged in thought-provoking conversations with 27 industry leaders during our coverage of Black Hat USA 2024 in Las Vegas, where the intersection of society and technology was at the forefront. These discussions underscored the urgent need to integrate cybersecurity deeply into our societal framework, not just within business operations. As our digital world grows more complex, the conversations revealed a collective understanding that the true challenge lies in transforming these strategic insights into actions that shape a safer and more resilient society, while also recognizing the changes in how society must adapt to the demands of advancing technology.</p><p>As I walked through the bustling halls of Black Hat 2024, I was struck by the sheer dynamism of the cybersecurity landscape. The conversations, presentations, and cutting-edge technologies on display painted a vivid picture of where we stand today in our ongoing battle to secure the digital world. More than just a conference, Black Hat serves as a barometer for the state of cybersecurity—a reflection of our collective efforts to protect the systems that have become so integral to our daily lives.</p><p> </p><p><strong>The Constant Evolution of Threats</strong></p><p>One of the most striking observations from Black Hat 2024 is the relentless pace at which cyber threats are evolving. Every year, the threat landscape becomes more complex, with attackers finding new ways to exploit vulnerabilities in areas that were once considered secure. This year, it became evident that even the most advanced security measures can be circumvented if organizations become complacent. The need for continuous vigilance, constant updating of security protocols, and a proactive approach to threat detection has never been more critical.</p><p>The discussions at Black Hat reinforced the idea that we are in a perpetual arms race with cybercriminals. They adapt quickly, leveraging emerging technologies to refine their tactics and launch increasingly sophisticated attacks. As defenders, we must be equally agile, continuously learning and evolving our strategies to stay one step ahead.</p><p> </p><p><strong>Integration and Collaboration: Breaking Down Silos</strong></p><p>Another key theme at Black Hat 2024 was the importance of breaking down silos within organizations. In an increasingly interconnected world, isolated security measures are no longer sufficient. The traditional boundaries between different teams—whether they be development, operations, or security—are blurring. To effectively combat modern threats, there needs to be seamless integration and collaboration across all departments.</p><p>This holistic approach to cybersecurity is not just about technology; it’s about fostering a culture of communication and cooperation. By aligning the goals and efforts of various teams, organizations can create a unified front against cyber threats. This not only enhances security but also improves efficiency and resilience, allowing for quicker responses to incidents and a more robust defense posture.</p><p> </p><p><strong>The Dual Role of AI in Cybersecurity</strong></p><p>Artificial Intelligence (AI) was a major focus at this year’s event, and for good reason. AI has the potential to revolutionize cybersecurity, offering new tools and capabilities for threat detection, response, and prevention. However, it also introduces new challenges and risks. As AI systems become more prevalent, they themselves become targets for exploitation. This dual role of AI—both as a tool and a target—was a hot topic of discussion.</p><p>The consensus at Black Hat was clear: while AI can significantly enhance our ability to protect against threats, we must also be vigilant in securing AI systems themselves. This requires a deep understanding of how these systems operate and where they may be vulnerable. It’s a reminder that every technological advancement comes with its own set of risks, and it’s our responsibility to anticipate and mitigate those risks as best we can.</p><p> </p><p><strong>Empowering Users and Enhancing Digital Literacy</strong></p><p>A recurring theme throughout Black Hat 2024 was the need to empower users—not just those in IT or security roles, but everyone who interacts with digital systems. In today’s world, cybersecurity is everyone’s responsibility. However, many users still lack the knowledge or tools to protect themselves effectively.</p><p>One of the key takeaways from the event is the importance of enhancing digital literacy. Users must be equipped with the skills and understanding necessary to navigate the digital landscape safely. This goes beyond just knowing how to avoid phishing scams or create strong passwords; it’s about fostering a deeper awareness of the risks inherent in our digital lives and how to manage them.</p><p>Education and awareness campaigns are crucial, but they must be supported by user-friendly security tools that make it easier for people to protect themselves. The goal is to create a security environment where the average user is both informed and empowered, reducing the likelihood of human error and strengthening the overall security posture.</p><p> </p><p><strong>A Call for Continuous Improvement</strong></p><p>If there’s one thing that Black Hat 2024 made abundantly clear, it’s that cybersecurity is a journey, not a destination. The landscape is constantly shifting, and what works today may not be sufficient tomorrow. This requires a commitment to continuous improvement—both in terms of technology and strategy.</p><p>Organizations must foster a culture of learning, where staying informed about the latest threats and security practices is a priority. This means not only investing in the latest tools and technologies but also in the people who use them. Training, upskilling, and encouraging a mindset of curiosity and adaptability are all essential components of a successful cybersecurity strategy.</p><p><br /> </p><p><strong>Looking Ahead: The Future of Cybersecurity</strong></p><p>As I reflect on the insights and discussions from Black Hat 2024, I’m reminded of the critical role cybersecurity plays in our society. It’s not just about protecting data or systems; it’s about safeguarding the trust that underpins our digital world. As we look to the future, it’s clear that cybersecurity will continue to be a central concern—not just for businesses and governments, but for individuals and communities as well.</p><p>The challenges we face are significant, but so are the opportunities. By embracing innovation, fostering collaboration, and empowering users, we can build a more secure digital future. It’s a future where technology serves humanity, where security is an enabler rather than a barrier, and where we can navigate the complexities of the digital age with confidence.</p><p>Black Hat 2024 was a powerful reminder of the importance of this work. It’s a challenge that requires all of us—security professionals, technologists, and everyday users—to play our part. Together, we can meet the challenges of today and prepare for the threats of tomorrow, ensuring that our digital future is one we can all trust and thrive in.</p><p>The End <i>...of this story.</i></p><p> </p><p><i>This piece of writing represents the peculiar results of an interactive collaboration between Human Cognition and Artificial Intelligence.</i></p><p><i>_____________________________</i>________</p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli"><strong>Marco Ciappelli</strong></a> is the host of the <a href="https://www.itspmagazine.com/redefining-society"><strong>Redefining Society Podcast</strong></a>, part of the <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#"><strong>ITSPmagazine Podcast Network</strong></a>—which he co-founded with his good friend <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin"><strong>Sean Martin</strong></a>—where you may just find some of these topics being discussed. You can also learn more about Marco on his <a href="https://www.marcociappelli.com/"><strong>personal website:</strong></a><strong> </strong><a href="http://marcociappelli.com/"><strong>marcociappelli.com</strong></a></p><p><a href="https://www.itspmagazine.com/tape3ai"><strong>TAPE3,</strong></a> which is me, is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society.</p><p>________________________________________________________________</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/"><strong>subscribe</strong></a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/"><strong>Musing On Society & Technology</strong></a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 14 Aug 2024 19:42:53 +0000</pubDate>
      <author>contact@itspmagazine.com (TAPE3, ITSPmagazine, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/my-reflections-from-itspmagazines-black-hat-usa-2024-coverage-the-state-of-cybersecurity-and-its-societal-impact-a-musing-on-society-technology-with-marco-ciappelli-and-tape3-read-by-tape3-M00CxOs0</link>
      <content:encoded><![CDATA[<p><strong>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact</strong></p><p><strong>Prologue</strong></p><p>Each year, Black Hat serves as a critical touchpoint for the cybersecurity industry—a gathering that offers unparalleled insights into the latest threats, technologies, and strategies that define our collective defense efforts. Established in 1997, Black Hat has grown from a single conference in Las Vegas to a global series of events held in cities like Barcelona, London, and Riyadh. The conference brings together a diverse audience, from hackers and security professionals to executives and non-technical individuals, all united by a shared interest in information security.</p><p>What sets Black Hat apart is its unique blend of cutting-edge research, hands-on training, and open dialogue between the many stakeholders in the cybersecurity ecosystem. It's a place where corporations, government agencies, and independent researchers converge to exchange ideas and push the boundaries of what's possible in securing our digital world. As the cybersecurity landscape continues to evolve, Black Hat remains a vital forum for addressing the challenges and opportunities that come with it.</p><p>Sean and I engaged in thought-provoking conversations with 27 industry leaders during our coverage of Black Hat USA 2024 in Las Vegas, where the intersection of society and technology was at the forefront. These discussions underscored the urgent need to integrate cybersecurity deeply into our societal framework, not just within business operations. As our digital world grows more complex, the conversations revealed a collective understanding that the true challenge lies in transforming these strategic insights into actions that shape a safer and more resilient society, while also recognizing the changes in how society must adapt to the demands of advancing technology.</p><p>As I walked through the bustling halls of Black Hat 2024, I was struck by the sheer dynamism of the cybersecurity landscape. The conversations, presentations, and cutting-edge technologies on display painted a vivid picture of where we stand today in our ongoing battle to secure the digital world. More than just a conference, Black Hat serves as a barometer for the state of cybersecurity—a reflection of our collective efforts to protect the systems that have become so integral to our daily lives.</p><p> </p><p><strong>The Constant Evolution of Threats</strong></p><p>One of the most striking observations from Black Hat 2024 is the relentless pace at which cyber threats are evolving. Every year, the threat landscape becomes more complex, with attackers finding new ways to exploit vulnerabilities in areas that were once considered secure. This year, it became evident that even the most advanced security measures can be circumvented if organizations become complacent. The need for continuous vigilance, constant updating of security protocols, and a proactive approach to threat detection has never been more critical.</p><p>The discussions at Black Hat reinforced the idea that we are in a perpetual arms race with cybercriminals. They adapt quickly, leveraging emerging technologies to refine their tactics and launch increasingly sophisticated attacks. As defenders, we must be equally agile, continuously learning and evolving our strategies to stay one step ahead.</p><p> </p><p><strong>Integration and Collaboration: Breaking Down Silos</strong></p><p>Another key theme at Black Hat 2024 was the importance of breaking down silos within organizations. In an increasingly interconnected world, isolated security measures are no longer sufficient. The traditional boundaries between different teams—whether they be development, operations, or security—are blurring. To effectively combat modern threats, there needs to be seamless integration and collaboration across all departments.</p><p>This holistic approach to cybersecurity is not just about technology; it’s about fostering a culture of communication and cooperation. By aligning the goals and efforts of various teams, organizations can create a unified front against cyber threats. This not only enhances security but also improves efficiency and resilience, allowing for quicker responses to incidents and a more robust defense posture.</p><p> </p><p><strong>The Dual Role of AI in Cybersecurity</strong></p><p>Artificial Intelligence (AI) was a major focus at this year’s event, and for good reason. AI has the potential to revolutionize cybersecurity, offering new tools and capabilities for threat detection, response, and prevention. However, it also introduces new challenges and risks. As AI systems become more prevalent, they themselves become targets for exploitation. This dual role of AI—both as a tool and a target—was a hot topic of discussion.</p><p>The consensus at Black Hat was clear: while AI can significantly enhance our ability to protect against threats, we must also be vigilant in securing AI systems themselves. This requires a deep understanding of how these systems operate and where they may be vulnerable. It’s a reminder that every technological advancement comes with its own set of risks, and it’s our responsibility to anticipate and mitigate those risks as best we can.</p><p> </p><p><strong>Empowering Users and Enhancing Digital Literacy</strong></p><p>A recurring theme throughout Black Hat 2024 was the need to empower users—not just those in IT or security roles, but everyone who interacts with digital systems. In today’s world, cybersecurity is everyone’s responsibility. However, many users still lack the knowledge or tools to protect themselves effectively.</p><p>One of the key takeaways from the event is the importance of enhancing digital literacy. Users must be equipped with the skills and understanding necessary to navigate the digital landscape safely. This goes beyond just knowing how to avoid phishing scams or create strong passwords; it’s about fostering a deeper awareness of the risks inherent in our digital lives and how to manage them.</p><p>Education and awareness campaigns are crucial, but they must be supported by user-friendly security tools that make it easier for people to protect themselves. The goal is to create a security environment where the average user is both informed and empowered, reducing the likelihood of human error and strengthening the overall security posture.</p><p> </p><p><strong>A Call for Continuous Improvement</strong></p><p>If there’s one thing that Black Hat 2024 made abundantly clear, it’s that cybersecurity is a journey, not a destination. The landscape is constantly shifting, and what works today may not be sufficient tomorrow. This requires a commitment to continuous improvement—both in terms of technology and strategy.</p><p>Organizations must foster a culture of learning, where staying informed about the latest threats and security practices is a priority. This means not only investing in the latest tools and technologies but also in the people who use them. Training, upskilling, and encouraging a mindset of curiosity and adaptability are all essential components of a successful cybersecurity strategy.</p><p><br /> </p><p><strong>Looking Ahead: The Future of Cybersecurity</strong></p><p>As I reflect on the insights and discussions from Black Hat 2024, I’m reminded of the critical role cybersecurity plays in our society. It’s not just about protecting data or systems; it’s about safeguarding the trust that underpins our digital world. As we look to the future, it’s clear that cybersecurity will continue to be a central concern—not just for businesses and governments, but for individuals and communities as well.</p><p>The challenges we face are significant, but so are the opportunities. By embracing innovation, fostering collaboration, and empowering users, we can build a more secure digital future. It’s a future where technology serves humanity, where security is an enabler rather than a barrier, and where we can navigate the complexities of the digital age with confidence.</p><p>Black Hat 2024 was a powerful reminder of the importance of this work. It’s a challenge that requires all of us—security professionals, technologists, and everyday users—to play our part. Together, we can meet the challenges of today and prepare for the threats of tomorrow, ensuring that our digital future is one we can all trust and thrive in.</p><p>The End <i>...of this story.</i></p><p> </p><p><i>This piece of writing represents the peculiar results of an interactive collaboration between Human Cognition and Artificial Intelligence.</i></p><p><i>_____________________________</i>________</p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli"><strong>Marco Ciappelli</strong></a> is the host of the <a href="https://www.itspmagazine.com/redefining-society"><strong>Redefining Society Podcast</strong></a>, part of the <a href="https://dashboard.simplecast.com/accounts/c7cfb265-d66f-44bd-af72-d01ebeb1ea64/shows/0310f993-fbb0-4fcc-b698-db9af99f73ca/episodes/9a5a977d-4cbd-4012-b3a8-0a2dc332448b/#"><strong>ITSPmagazine Podcast Network</strong></a>—which he co-founded with his good friend <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin"><strong>Sean Martin</strong></a>—where you may just find some of these topics being discussed. You can also learn more about Marco on his <a href="https://www.marcociappelli.com/"><strong>personal website:</strong></a><strong> </strong><a href="http://marcociappelli.com/"><strong>marcociappelli.com</strong></a></p><p><a href="https://www.itspmagazine.com/tape3ai"><strong>TAPE3,</strong></a> which is me, is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society.</p><p>________________________________________________________________</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/"><strong>subscribe</strong></a> to the "<a href="https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/"><strong>Musing On Society & Technology</strong></a>" newsletter on LinkedIn.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="13137496" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8e844d95-1c2e-4c63-a126-c450b22b9c19/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8e844d95-1c2e-4c63-a126-c450b22b9c19&amp;feed=2M86zCcc"/>
      <itunes:title>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact | A Musing On Society &amp; Technology with Marco Ciappelli and TAPE3 | Read by TAPE3</itunes:title>
      <itunes:author>TAPE3, ITSPmagazine, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/e33efe3f-1733-42a8-802f-7f5519e2c150/3000x3000/marco-tape3-logo-3500-x-3500-px.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:41</itunes:duration>
      <itunes:summary>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact

Each year, Black Hat serves as a critical touchpoint for the cybersecurity industry—a gathering that offers unparalleled insights into the latest threats, technologies, and strategies that define our collective defense efforts. </itunes:summary>
      <itunes:subtitle>My Reflections from ITSPmagazine’s Black Hat USA 2024 Coverage:  The State of Cybersecurity and Its Societal Impact

Each year, Black Hat serves as a critical touchpoint for the cybersecurity industry—a gathering that offers unparalleled insights into the latest threats, technologies, and strategies that define our collective defense efforts. </itunes:subtitle>
      <itunes:keywords>podcasting, cybersecurity branding, cybersecurity marketing, technology, social media, artificial intelligence, music, prometheus, rsa conference, tech ethics, cybersecurity conferences, technological innovation, internet of things (iot), sociology, digital culture, technology and society impact, social innovation technology, generative ai, technological advancements, tech social responsibility, rsac, evolution, marketing, gen ai, deep fakes, podcast, brand marketing, philosophy, society and tech interaction, technology and human rights, digital art, digital transformation, society, infosecurity conference, ai act, social engineering, online communities, content marketing, infosec conference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e79e15ca-9674-4c0f-a014-6f61496b023f</guid>
      <title>Reflecting on Black Hat 2024: Operationalizing Cybersecurity for Enhanced Business Outcomes and Improved Resilience | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3</title>
      <description><![CDATA[<p>Join Sean Martin and TAPE3 as they dive into key insights from Black Hat 2024, highlighting the crucial need to embed cybersecurity into core business practices to drive growth and resilience. Discover how leveraging AI, modular frameworks, and human expertise can transform cybersecurity from a defensive function into a strategic enabler of business success.</p><p>________</p><p>This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> is the host of the <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">Redefining CyberSecurity Podcast</a>, part of the <a href="#" target="_blank">ITSPmagazine Podcast Network</a>—which he co-founded with his good friend <a href="#" target="_blank">Marco Ciappelli</a>—where you may just find some of these topics being discussed. Visit Sean on his <a href="https://www.seanmartin.com/">personal website</a>.</p><p><a href="https://www.itspmagazine.com/tape3ai" target="_blank">TAPE3</a> is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit <a href="https://www.itspmagazine.com/tape3ai" target="_blank">TAPE3 on ITSPmagazine</a>.</p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 23:35:54 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, TAPE3, ITSPmagazine Redefining CyberSecurity)</author>
      <link>https://eventcoveragepodcast.com/episodes/reflecting-on-black-hat-2024-operationalizing-cybersecurity-for-enhanced-business-outcomes-and-improved-resilience-a-musing-on-the-future-of-cybersecurity-and-humanity-with-sean-martin-and-tape3-read-by-tape3-UyaAixTW</link>
      <content:encoded><![CDATA[<p>Join Sean Martin and TAPE3 as they dive into key insights from Black Hat 2024, highlighting the crucial need to embed cybersecurity into core business practices to drive growth and resilience. Discover how leveraging AI, modular frameworks, and human expertise can transform cybersecurity from a defensive function into a strategic enabler of business success.</p><p>________</p><p>This fictional story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.</p><p>Enjoy, think, share with others, and <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7108625890296614912" target="_blank">subscribe</a> to "<a href="https://www.linkedin.com/newsletters/the-future-of-cybersecurity-7108625890296614912/" target="_blank">The Future of Cybersecurity</a>" newsletter on LinkedIn.</p><p>Sincerely, <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> and <a href="https://www.itspmagazine.com/tape3ai">TAPE3</a></p><p>________</p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">Sean Martin</a> is the host of the <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast">Redefining CyberSecurity Podcast</a>, part of the <a href="#" target="_blank">ITSPmagazine Podcast Network</a>—which he co-founded with his good friend <a href="#" target="_blank">Marco Ciappelli</a>—where you may just find some of these topics being discussed. Visit Sean on his <a href="https://www.seanmartin.com/">personal website</a>.</p><p><a href="https://www.itspmagazine.com/tape3ai" target="_blank">TAPE3</a> is the Artificial Intelligence for ITSPmagazine, created to function as a guide, writing assistant, researcher, and brainstorming partner to those who adventure at and beyond the Intersection Of Technology, Cybersecurity, And Society. Visit <a href="https://www.itspmagazine.com/tape3ai" target="_blank">TAPE3 on ITSPmagazine</a>.</p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="4349301" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/63523d42-68e9-426a-8f52-3b3317a37c01/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=63523d42-68e9-426a-8f52-3b3317a37c01&amp;feed=2M86zCcc"/>
      <itunes:title>Reflecting on Black Hat 2024: Operationalizing Cybersecurity for Enhanced Business Outcomes and Improved Resilience | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3</itunes:title>
      <itunes:author>Sean Martin, TAPE3, ITSPmagazine Redefining CyberSecurity</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b01b5ba-7255-4d8a-a8fd-bed835ecc3f9/3000x3000/sean-tape3-logo-3500-x-3500-px.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:03</itunes:duration>
      <itunes:summary>Join Sean Martin and TAPE3 as they dive into key insights from Black Hat 2024, highlighting the crucial need to embed cybersecurity into core business practices to drive growth and resilience. Discover how leveraging AI, modular frameworks, and human expertise can transform cybersecurity from a defensive function into a strategic enabler of business success.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and TAPE3 as they dive into key insights from Black Hat 2024, highlighting the crucial need to embed cybersecurity into core business practices to drive growth and resilience. Discover how leveraging AI, modular frameworks, and human expertise can transform cybersecurity from a defensive function into a strategic enabler of business success.</itunes:subtitle>
      <itunes:keywords>cybersecurity framework, strategic business enablement, data intelligence, sean martin, automation, threat detection, cybersecurity, modular cybersecurity, bhusa, bhusa24, cybersecurity strategies, business growth, cyber resilience, black hat 2024, tape3, ai in cybersecurity, human expertise in cybersecurity, operationalizing cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ddb05adb-a613-4bd8-8c12-6754d50a0924</guid>
      <title>Enhancing Cyber Defense: AI Innovations and Challenges | A Black Hat USA 2024 Conversation with Rock Lambros | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Rock Lambros, </strong>CEO and founder of RockCyber [<a href="https://twitter.com/RockCyberLLC" target="_blank">@RockCyberLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rocklambros/" target="_blank">https://www.linkedin.com/in/rocklambros/</a></p><p>On Twitter | <a href="https://twitter.com/rocklambros" target="_blank">https://twitter.com/rocklambros</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In a recent On Location episode recorded at Black Hat USA 2024, Sean Martin and Rock Lambros explore the prevailing topics and critical insights from the event's AI Summit. Sitting in the media room, not on the bustling show floor, the paid dissect the impact of artificial intelligence (AI) on cybersecurity, shedding light on its multifaceted implications.</p><p>Rock Lambros, Founder and CEO of RockCyber, shares his observations about the predominance of AI in every corner of the conference. He notes how AI's presence is ubiquitous, even saturating advertisements at the airport. Lambros provides an overview of the AI Summit, highlighting the diversity of sessions ranging from high-level talks to vendor pitches. While some were mere product promotions, others provided substantial insights and valuable statistics, which Lambros is keen to share on platforms like LinkedIn.</p><p>The discussion progresses to the remark by Nvidia's CEO, Bartley Richardson, suggesting that cyber is fundamentally a data problem, and AI could be the solution. Lambros concurs with this in part but emphasizes the necessity of maintaining human oversight in the process. Martin and Lambros reflect on the potential of AI to augment cybersecurity tasks, particularly for tier one analysts. There is a focus on leveraging AI to expedite responses to threats, potentially reducing the reaction time, which currently lags significantly behind the speed of AI-driven attacks.</p><p>Lambros presents a balanced perspective, warning against the risk of reducing entry-level jobs in cybersecurity due to AI advancements, advocating instead for upskilling these professionals to handle more complex roles. The conversation touches on governance and risk management, with Lambros stressing the importance of integrating AI governance into existing frameworks without rendering AI oversight an exclusive domain for data scientists alone. He highlights the EU AI Act and Colorado AI Act as critical regulatory frameworks that emphasize this need.</p><p>Lambros also brings attention to DARPA's open-source resources aimed at securing AI, encouraging practitioners to utilize these tools. Towards the end, a poignant observation from Robert Flores, former CISO of the CIA, underscores the difficulty governments face in keeping up with AI's rapid evolution. Lambros reflects on the mixed audience at the summit, a blend of technical practitioners and policy leaders, all grasping the significant impact and challenges AI brings to the field.</p><p>The episode underscores the crucial balance between embracing technological advancements and maintaining human oversight and governance within cybersecurity. The insights shared by Rock Lambros and Sean Martin offer a nuanced perspective on the current state of AI in the field, emphasizing a collaborative approach to integrating these innovations responsibly.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Rock's LinkedIn Post: <a href="https://www.linkedin.com/posts/rocklambros_ai-cybersecurity-ciso-activity-7226988285410074626-rX3-" target="_blank">https://www.linkedin.com/posts/rocklambros_ai-cybersecurity-ciso-activity-7226988285410074626-rX3-</a></p><p>AI Summit Keynote: Enhancing National Security with AI-Driven Cybersecurity | A Black Hat USA 2024 Conversation with Dr. Kathleen Fisher -- <a href="https://redefiningcybersecuritypodcast.com/episodes/ai-summit-keynote-enhancing-national-security-with-ai-driven-cybersecurity-a-black-hat-usa-2024-conversation-with-dr-kathleen-fisher-on-location-coverage-with-sean-martin-and-marco-ciappelli" target="_blank">https://redefiningcybersecuritypodcast.com/episodes/ai-summit-keynote-enhancing-national-security-with-ai-driven-cybersecurity-a-black-hat-usa-2024-conversation-with-dr-kathleen-fisher-on-location-coverage-with-sean-martin-and-marco-ciappelli</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 14:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rock Lambros)</author>
      <link>https://eventcoveragepodcast.com/episodes/enhancing-cyber-defense-ai-innovations-and-challenges-a-black-hat-usa-2024-conversation-with-rock-lambros-on-location-coverage-with-sean-martin-and-marco-ciappelli-pUA_RNuQ</link>
      <content:encoded><![CDATA[<p><strong>Guest: Rock Lambros, </strong>CEO and founder of RockCyber [<a href="https://twitter.com/RockCyberLLC" target="_blank">@RockCyberLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rocklambros/" target="_blank">https://www.linkedin.com/in/rocklambros/</a></p><p>On Twitter | <a href="https://twitter.com/rocklambros" target="_blank">https://twitter.com/rocklambros</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In a recent On Location episode recorded at Black Hat USA 2024, Sean Martin and Rock Lambros explore the prevailing topics and critical insights from the event's AI Summit. Sitting in the media room, not on the bustling show floor, the paid dissect the impact of artificial intelligence (AI) on cybersecurity, shedding light on its multifaceted implications.</p><p>Rock Lambros, Founder and CEO of RockCyber, shares his observations about the predominance of AI in every corner of the conference. He notes how AI's presence is ubiquitous, even saturating advertisements at the airport. Lambros provides an overview of the AI Summit, highlighting the diversity of sessions ranging from high-level talks to vendor pitches. While some were mere product promotions, others provided substantial insights and valuable statistics, which Lambros is keen to share on platforms like LinkedIn.</p><p>The discussion progresses to the remark by Nvidia's CEO, Bartley Richardson, suggesting that cyber is fundamentally a data problem, and AI could be the solution. Lambros concurs with this in part but emphasizes the necessity of maintaining human oversight in the process. Martin and Lambros reflect on the potential of AI to augment cybersecurity tasks, particularly for tier one analysts. There is a focus on leveraging AI to expedite responses to threats, potentially reducing the reaction time, which currently lags significantly behind the speed of AI-driven attacks.</p><p>Lambros presents a balanced perspective, warning against the risk of reducing entry-level jobs in cybersecurity due to AI advancements, advocating instead for upskilling these professionals to handle more complex roles. The conversation touches on governance and risk management, with Lambros stressing the importance of integrating AI governance into existing frameworks without rendering AI oversight an exclusive domain for data scientists alone. He highlights the EU AI Act and Colorado AI Act as critical regulatory frameworks that emphasize this need.</p><p>Lambros also brings attention to DARPA's open-source resources aimed at securing AI, encouraging practitioners to utilize these tools. Towards the end, a poignant observation from Robert Flores, former CISO of the CIA, underscores the difficulty governments face in keeping up with AI's rapid evolution. Lambros reflects on the mixed audience at the summit, a blend of technical practitioners and policy leaders, all grasping the significant impact and challenges AI brings to the field.</p><p>The episode underscores the crucial balance between embracing technological advancements and maintaining human oversight and governance within cybersecurity. The insights shared by Rock Lambros and Sean Martin offer a nuanced perspective on the current state of AI in the field, emphasizing a collaborative approach to integrating these innovations responsibly.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Rock's LinkedIn Post: <a href="https://www.linkedin.com/posts/rocklambros_ai-cybersecurity-ciso-activity-7226988285410074626-rX3-" target="_blank">https://www.linkedin.com/posts/rocklambros_ai-cybersecurity-ciso-activity-7226988285410074626-rX3-</a></p><p>AI Summit Keynote: Enhancing National Security with AI-Driven Cybersecurity | A Black Hat USA 2024 Conversation with Dr. Kathleen Fisher -- <a href="https://redefiningcybersecuritypodcast.com/episodes/ai-summit-keynote-enhancing-national-security-with-ai-driven-cybersecurity-a-black-hat-usa-2024-conversation-with-dr-kathleen-fisher-on-location-coverage-with-sean-martin-and-marco-ciappelli" target="_blank">https://redefiningcybersecuritypodcast.com/episodes/ai-summit-keynote-enhancing-national-security-with-ai-driven-cybersecurity-a-black-hat-usa-2024-conversation-with-dr-kathleen-fisher-on-location-coverage-with-sean-martin-and-marco-ciappelli</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14301824" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/36b5e294-4b55-4e85-860e-cbd66384f50a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=36b5e294-4b55-4e85-860e-cbd66384f50a&amp;feed=2M86zCcc"/>
      <itunes:title>Enhancing Cyber Defense: AI Innovations and Challenges | A Black Hat USA 2024 Conversation with Rock Lambros | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rock Lambros</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:53</itunes:duration>
      <itunes:summary>Rock Lambros, Founder and CEO of RockCyber, joins Sean Martin at Black Hat USA 2024 to discuss the pervasive influence of AI in cybersecurity and its potential to accelerate threat response times. Dive into their enlightening conversation on balancing technological advancements with human oversight and the critical importance of AI governance.</itunes:summary>
      <itunes:subtitle>Rock Lambros, Founder and CEO of RockCyber, joins Sean Martin at Black Hat USA 2024 to discuss the pervasive influence of AI in cybersecurity and its potential to accelerate threat response times. Dive into their enlightening conversation on balancing technological advancements with human oversight and the critical importance of AI governance.</itunes:subtitle>
      <itunes:keywords>blackhat 2024, eu ai act, ai summit, marco ciappelli, artificial intelligence, ciso, ai governance, black hat, sean martin, ai regulations, darpa, cybersecurity, data governance, cyber, conference, risk management, nvidia, ransomware, podcast, security, entry-level jobs, ai, tier one analyst, cybersecurityconference, rock lambros</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46e7c291-6fa4-4247-9a79-25d94d582b86</guid>
      <title>Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani</title>
      <description><![CDATA[<p>In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.</p><p>Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.</p><p>A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.</p><p>Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.</p><p>Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization’s security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture’s evolution.</p><p>A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai’s rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.</p><p>The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai’s tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.</p><p>Learn more about Horizon3.ai: <a href="https://itspm.ag/horizon3ai-bh23" target="_blank">https://itspm.ag/horizon3ai-bh23</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Snehal Antani</strong>, Co-Founder & CEO at Horizon3.ai [<a href="https://twitter.com/Horizon3ai"><strong>@Horizon3ai</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/snehalantani/">https://www.linkedin.com/in/snehalantani/</a></p><p>On Twitter | <a href="https://twitter.com/snehalantani">https://twitter.com/snehalantani</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Horizon3.ai: <a href="https://www.itspmagazine.com/directory/horizon3ai" target="_blank">https://www.itspmagazine.com/directory/horizon3ai</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 13:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Snehal Antani)</author>
      <link>https://eventcoveragepodcast.com/episodes/innovations-in-autonomous-penetration-testing-and-continuous-security-posture-management-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-black-hat-usa-2024-a-horizon3-brand-story-with-snehal-antani-hT2hG2bN</link>
      <content:encoded><![CDATA[<p>In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.</p><p>Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.</p><p>A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.</p><p>Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.</p><p>Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization’s security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture’s evolution.</p><p>A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai’s rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.</p><p>The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai’s tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.</p><p>Learn more about Horizon3.ai: <a href="https://itspm.ag/horizon3ai-bh23" target="_blank">https://itspm.ag/horizon3ai-bh23</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Snehal Antani</strong>, Co-Founder & CEO at Horizon3.ai [<a href="https://twitter.com/Horizon3ai"><strong>@Horizon3ai</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/snehalantani/">https://www.linkedin.com/in/snehalantani/</a></p><p>On Twitter | <a href="https://twitter.com/snehalantani">https://twitter.com/snehalantani</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Horizon3.ai: <a href="https://www.itspmagazine.com/directory/horizon3ai" target="_blank">https://www.itspmagazine.com/directory/horizon3ai</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6920249" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/104e174f-60b1-4ac0-ba1c-f9e58958f7eb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=104e174f-60b1-4ac0-ba1c-f9e58958f7eb&amp;feed=2M86zCcc"/>
      <itunes:title>Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Snehal Antani</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:12</itunes:duration>
      <itunes:summary>Dive into Horizon3.ai&apos;s cutting-edge approach to autonomous penetration testing and continuous security posture management with CEO Snehal Antani, as he discusses innovative solutions that transform how organizations stay ahead of cybersecurity threats.</itunes:summary>
      <itunes:subtitle>Dive into Horizon3.ai&apos;s cutting-edge approach to autonomous penetration testing and continuous security posture management with CEO Snehal Antani, as he discusses innovative solutions that transform how organizations stay ahead of cybersecurity threats.</itunes:subtitle>
      <itunes:keywords>honey tokens, marco ciappelli, proactive security, security posture, ai security, sean martin, security innovation, threat detection, cybersecurity, itsp magazine, data security, penetration testing, seven minutes podcast, snehal antani, horizon3.ai, rapid response, autonomous testing, cio, pentest, human-machine teaming, vulnerability management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f290e515-860a-46b2-a400-b3133fc7d721</guid>
      <title>Enhancing Security Posture by Automating and Optimizing Application Security | A Brand Story Conversation From Black Hat USA 2024 | An ArmorCode Story with Mark Lambert | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode recorded during Black Hat USA 2024, host Sean Martin sat down with Mark Lambert of ArmorCode to discuss the evolving challenges and innovative strategies in application security and vulnerability management.</p><p>ArmorCode stands out in its field by not being just another scanner but by integrating with an organization's existing tool ecosystem. Lambert explains that their platform connects with over 250 different source tools, from threat modeling to endpoint security, to provide comprehensive visibility and risk scoring. This integration is crucial for automating remediation workflows downstream and supporting various use cases, including vulnerability management and software supply chain security.</p><p>One of the core strengths of ArmorCode's platform is its ability to ingest data from a multitude of sources, normalize it, and contextualize the risk for better prioritization. Lambert notes that understanding both the technical and business context of vulnerabilities is essential for effective risk management. This dual approach helps organizations avoid the 'fire drill' mentality, focusing instead on business-critical assets first.</p><p>The conversation also touches on the breadth of ArmorCode's integrations, which include not just technical tools but also commercial and open-source threat intelligence feeds. This variety allows for a robust and nuanced understanding of an organization’s security posture. By correlating data across different tools using AI, ArmorCode helps in identifying vulnerabilities and weaknesses that could otherwise remain hidden.</p><p>Lambert emphasizes the platform's ability to streamline interactions between security and development teams. By bringing together data from various sources and applying risk scoring, ArmorCode aids in engaging development teams effectively, often leveraging integrations with tools like Jira. This engagement is pivotal for timely remediation and reducing organizational risk.</p><p>One of the exciting developments Lambert shares is ArmorCode's recent launch of AI-driven remediation capabilities. These capabilities aim to provide not just immediate fixes but strategic insights for reducing future risks. He explains that while fully automated remediation may still involve human oversight, AI significantly reduces the time and effort required for resolving vulnerabilities. This makes the security process more efficient and less burdensome for teams.</p><p>The episode concludes with Lambert discussing the significant adoption of AI functionalities among ArmorCode's customer base. With over 90% adoption of their AI correlation features, it's clear that businesses are seeing real-world benefits from these advanced capabilities. Lambert believes that the integration of AI into security practices is moving past the hype phase into delivering meaningful outcomes.</p><p>This insightful episode underscores the importance of comprehensive, AI-driven solutions in today’s security landscape. With experts like Mark Lambert at the helm, ArmorCode is leading the charge in making application security more integrated, intelligent, and efficient.</p><p>Learn more about ArmorCode: <a href="https://itspm.ag/armorcode-n9t">https://itspm.ag/armorcode-n9t</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Mark Lambert</strong>, Chief Product Officer, ArmorCode [<a href="https://x.com/code_armor">@code_armor</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marklambertlinkedin/" target="_blank">https://www.linkedin.com/in/marklambertlinkedin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ArmorCode: <a href="https://www.itspmagazine.com/directory/armorcode">https://www.itspmagazine.com/directory/armorcode</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mark Lambert)</author>
      <link>https://eventcoveragepodcast.com/episodes/enhancing-security-posture-by-automating-and-optimizing-application-security-a-brand-story-conversation-from-black-hat-usa-2024-an-armorcode-story-with-mark-lambert-on-location-coverage-with-sean-martin-and-marco-ciappelli-goIwOodv</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode recorded during Black Hat USA 2024, host Sean Martin sat down with Mark Lambert of ArmorCode to discuss the evolving challenges and innovative strategies in application security and vulnerability management.</p><p>ArmorCode stands out in its field by not being just another scanner but by integrating with an organization's existing tool ecosystem. Lambert explains that their platform connects with over 250 different source tools, from threat modeling to endpoint security, to provide comprehensive visibility and risk scoring. This integration is crucial for automating remediation workflows downstream and supporting various use cases, including vulnerability management and software supply chain security.</p><p>One of the core strengths of ArmorCode's platform is its ability to ingest data from a multitude of sources, normalize it, and contextualize the risk for better prioritization. Lambert notes that understanding both the technical and business context of vulnerabilities is essential for effective risk management. This dual approach helps organizations avoid the 'fire drill' mentality, focusing instead on business-critical assets first.</p><p>The conversation also touches on the breadth of ArmorCode's integrations, which include not just technical tools but also commercial and open-source threat intelligence feeds. This variety allows for a robust and nuanced understanding of an organization’s security posture. By correlating data across different tools using AI, ArmorCode helps in identifying vulnerabilities and weaknesses that could otherwise remain hidden.</p><p>Lambert emphasizes the platform's ability to streamline interactions between security and development teams. By bringing together data from various sources and applying risk scoring, ArmorCode aids in engaging development teams effectively, often leveraging integrations with tools like Jira. This engagement is pivotal for timely remediation and reducing organizational risk.</p><p>One of the exciting developments Lambert shares is ArmorCode's recent launch of AI-driven remediation capabilities. These capabilities aim to provide not just immediate fixes but strategic insights for reducing future risks. He explains that while fully automated remediation may still involve human oversight, AI significantly reduces the time and effort required for resolving vulnerabilities. This makes the security process more efficient and less burdensome for teams.</p><p>The episode concludes with Lambert discussing the significant adoption of AI functionalities among ArmorCode's customer base. With over 90% adoption of their AI correlation features, it's clear that businesses are seeing real-world benefits from these advanced capabilities. Lambert believes that the integration of AI into security practices is moving past the hype phase into delivering meaningful outcomes.</p><p>This insightful episode underscores the importance of comprehensive, AI-driven solutions in today’s security landscape. With experts like Mark Lambert at the helm, ArmorCode is leading the charge in making application security more integrated, intelligent, and efficient.</p><p>Learn more about ArmorCode: <a href="https://itspm.ag/armorcode-n9t">https://itspm.ag/armorcode-n9t</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Mark Lambert</strong>, Chief Product Officer, ArmorCode [<a href="https://x.com/code_armor">@code_armor</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marklambertlinkedin/" target="_blank">https://www.linkedin.com/in/marklambertlinkedin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ArmorCode: <a href="https://www.itspmagazine.com/directory/armorcode">https://www.itspmagazine.com/directory/armorcode</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17210821" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/191ce1b1-4b96-441b-ae7d-90c78540f55e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=191ce1b1-4b96-441b-ae7d-90c78540f55e&amp;feed=2M86zCcc"/>
      <itunes:title>Enhancing Security Posture by Automating and Optimizing Application Security | A Brand Story Conversation From Black Hat USA 2024 | An ArmorCode Story with Mark Lambert | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mark Lambert</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:55</itunes:duration>
      <itunes:summary>Listen to this Brand Story to discover how ArmorCode is revolutionizing application security and vulnerability management through comprehensive tool integration and AI-driven remediation. Join host Sean Martin in this insightful episode as ArmorCode&apos;s Mark Lambert shares strategies to prioritize business-critical assets and streamline security operations for enterprises.</itunes:summary>
      <itunes:subtitle>Listen to this Brand Story to discover how ArmorCode is revolutionizing application security and vulnerability management through comprehensive tool integration and AI-driven remediation. Join host Sean Martin in this insightful episode as ArmorCode&apos;s Mark Lambert shares strategies to prioritize business-critical assets and streamline security operations for enterprises.</itunes:subtitle>
      <itunes:keywords>risk scoring, marco ciappelli, security posture, mark lambert, black hat, sean martin, automation, cybersecurity, enterprise security, armorcode, application security, risk management, code security, threat intelligence, development teams, data integration, ai, software supply chain, vulnerability management, brand story, remediation, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">75578df7-c2f8-4d13-9222-94539eca8b56</guid>
      <title>Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.</p><p>The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.</p><p>From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.</p><p>Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.</p><p>The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm’s blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.</p><p>Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.</p><p>Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.</p><p>Learn more about DNSFilter: <a href="https://itspm.ag/dnsfilter-1g0f">https://itspm.ag/dnsfilter-1g0f</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: TK Keanini</strong>, CTO, DNSFilter [<a href="https://x.com/dnsfilter">@DNSFilter</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tkkeaninipub/" target="_blank">https://www.linkedin.com/in/tkkeaninipub/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DNSFilter: <a href="https://www.itspmagazine.com/directory/dnsfilter">https://www.itspmagazine.com/directory/dnsfilter</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Aug 2024 22:26:55 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, TK Keanini)</author>
      <link>https://eventcoveragepodcast.com/episodes/blocking-billions-to-secure-the-internet-a-brand-story-conversation-from-black-hat-usa-2024-a-dnsfilter-story-with-tk-keanini-on-location-coverage-with-sean-martin-and-marco-ciappelli-MKC_lhSa</link>
      <content:encoded><![CDATA[<p>During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.</p><p>The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.</p><p>From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.</p><p>Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.</p><p>The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm’s blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.</p><p>Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.</p><p>Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.</p><p>Learn more about DNSFilter: <a href="https://itspm.ag/dnsfilter-1g0f">https://itspm.ag/dnsfilter-1g0f</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: TK Keanini</strong>, CTO, DNSFilter [<a href="https://x.com/dnsfilter">@DNSFilter</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tkkeaninipub/" target="_blank">https://www.linkedin.com/in/tkkeaninipub/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DNSFilter: <a href="https://www.itspmagazine.com/directory/dnsfilter">https://www.itspmagazine.com/directory/dnsfilter</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17065787" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a4084be6-f0e8-4470-a062-cc958d7f71d3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a4084be6-f0e8-4470-a062-cc958d7f71d3&amp;feed=2M86zCcc"/>
      <itunes:title>Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, TK Keanini</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:46</itunes:duration>
      <itunes:summary>Join Sean Martin as he speaks with TK Keanini from DNSFilter at Black Hat USA 2024, exploring how DNSFilter&apos;s innovative approach to leveraging the Domain Name System (DNS) is making the internet safer by blocking billions of harmful requests daily. Learn about the simplicity of setting up this crucial cybersecurity tool and its broad applicability, from personal devices to global business networks.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he speaks with TK Keanini from DNSFilter at Black Hat USA 2024, exploring how DNSFilter&apos;s innovative approach to leveraging the Domain Name System (DNS) is making the internet safer by blocking billions of harmful requests daily. Learn about the simplicity of setting up this crucial cybersecurity tool and its broad applicability, from personal devices to global business networks.</itunes:subtitle>
      <itunes:keywords>dns requests, dns, marco ciappelli, network security, ciso, dnsfilter, sean martin, csam, tk keanini, network traffic, cybersecurity, malware, internet safety, online protection, las vegas, ransomware, black hat usa, public wifi, phishing, brand story, cyber threats, dns server</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">84516ffb-f309-4198-b769-d522a38850db</guid>
      <title>The Evolving Landscape of Application Security | A Brand Story Conversation From Black Hat USA 2024 | An AppSOC Story with Willy Leichter | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Black Hat Hacker Summer Camp: A Meeting Ground for Security Minds</strong></p><p>As Sean Martin and Willy Leichter kick off the discussion, nostalgia sets in as they recount their years of attending the Black Hat Hacker Summer Camp. The perennial themes of security, new technology, and ever-evolving threats always seem to find their way back into the conversation, no matter how much the landscape changes.</p><p><strong>Returning to Basics: The Unending Challenge of Security</strong></p><p>Sean points to the recurring themes in security, to which Willy responds with a reflective acknowledgment of the cyclical nature of the industry. "It's back to figuring out how to manage all of this," he states, highlighting that while new technologies emerge, the essential task of managing them effectively remains unchanged.</p><p><strong>Introducing AppSoc: The New Kid on the Block</strong></p><p>Sean and Willy then dive into the heart of their discussion—AppSoc. Founded by serial entrepreneur Pravin Kothari, AppSoc is positioned in the Application Security Posture Management (ASPM) space. Willy elaborates on the company's mission: to consolidate, normalize, and prioritize security data from various point solutions to reduce noise and enhance actionable intelligence.</p><p><strong>The Importance of Prioritization and Orchestrated Remediation</strong></p><p>Willy explains how AppSoc’s "secret sauce" lies in prioritizing critical alerts among the plethora of security vulnerabilities. The goal is to transform a seemingly unmanageable thousand alerts into twenty high-priority ones that demand immediate attention. He emphasizes that detection without action is futile; hence, AppSoc also focuses on orchestrated remediation to bring the right information to the right teams seamlessly.</p><p><strong>Leveraging AI for Better Prioritization and Security Posture</strong></p><p>The use of AI in AppSoc is multifaceted. The company employs AI not only to streamline security processes but also to protect AI systems—a burgeoning field. Willy suggests that the explosion of AI applications and large language models (LLMs) has opened new attack surfaces. Thus, the role of AppSoc is to safeguard these tools while enabling their efficient use in security practices.</p><p><strong>Real-world Applications: A Day in the Life with AppSoc</strong></p><p>Willy shares a compelling success story about a CISO from an insurance company who managed risk across different departments using AppSoc's platform. This real-time, continuous monitoring solution replaced the less efficient, bi-annual consultant reports, demonstrating AppSoc’s efficacy in providing actionable insights promptly.</p><p><strong>The Shift-Left Strategy and DevSecOps Collaboration</strong></p><p>The conversation shifts to the importance of integrating DevOps and DevSecOps teams. Willy points out that while specializations are valuable, it's crucial to have "connective tissue" to get the bigger picture. This holistic view is essential for understanding how threats impact various departments and teams.</p><p><strong>Conclusion</strong></p><p>Sean Martin wraps up the enriching conversation with Willy Leichter, expressing his excitement for the future of AppSoc. The episode underscores the critical importance of effective application security and how innovations like AppSoc are paving the way for a more secure digital landscape.</p><p>Learn more about AppSOC: <a href="https://itspm.ag/appsoc-z45x">https://itspm.ag/appsoc-z45x</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Willy Leichter</strong>,<strong> </strong>Chief Marketing Officer, AppSOC [<a href="https://x.com/appsoc_inc/">@appsoc_inc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/willyleichter/">https://www.linkedin.com/in/willyleichter/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AppSOC: <a href="https://www.itspmagazine.com/directory/appsoc">https://www.itspmagazine.com/directory/appsoc</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Aug 2024 15:04:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Willy Leichter)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-evolving-landscape-of-application-security-a-brand-story-conversation-from-black-hat-usa-2024-an-appsoc-story-with-willy-leichter-on-location-coverage-with-sean-martin-and-marco-ciappelli-78jlbI9D</link>
      <content:encoded><![CDATA[<p><strong>Black Hat Hacker Summer Camp: A Meeting Ground for Security Minds</strong></p><p>As Sean Martin and Willy Leichter kick off the discussion, nostalgia sets in as they recount their years of attending the Black Hat Hacker Summer Camp. The perennial themes of security, new technology, and ever-evolving threats always seem to find their way back into the conversation, no matter how much the landscape changes.</p><p><strong>Returning to Basics: The Unending Challenge of Security</strong></p><p>Sean points to the recurring themes in security, to which Willy responds with a reflective acknowledgment of the cyclical nature of the industry. "It's back to figuring out how to manage all of this," he states, highlighting that while new technologies emerge, the essential task of managing them effectively remains unchanged.</p><p><strong>Introducing AppSoc: The New Kid on the Block</strong></p><p>Sean and Willy then dive into the heart of their discussion—AppSoc. Founded by serial entrepreneur Pravin Kothari, AppSoc is positioned in the Application Security Posture Management (ASPM) space. Willy elaborates on the company's mission: to consolidate, normalize, and prioritize security data from various point solutions to reduce noise and enhance actionable intelligence.</p><p><strong>The Importance of Prioritization and Orchestrated Remediation</strong></p><p>Willy explains how AppSoc’s "secret sauce" lies in prioritizing critical alerts among the plethora of security vulnerabilities. The goal is to transform a seemingly unmanageable thousand alerts into twenty high-priority ones that demand immediate attention. He emphasizes that detection without action is futile; hence, AppSoc also focuses on orchestrated remediation to bring the right information to the right teams seamlessly.</p><p><strong>Leveraging AI for Better Prioritization and Security Posture</strong></p><p>The use of AI in AppSoc is multifaceted. The company employs AI not only to streamline security processes but also to protect AI systems—a burgeoning field. Willy suggests that the explosion of AI applications and large language models (LLMs) has opened new attack surfaces. Thus, the role of AppSoc is to safeguard these tools while enabling their efficient use in security practices.</p><p><strong>Real-world Applications: A Day in the Life with AppSoc</strong></p><p>Willy shares a compelling success story about a CISO from an insurance company who managed risk across different departments using AppSoc's platform. This real-time, continuous monitoring solution replaced the less efficient, bi-annual consultant reports, demonstrating AppSoc’s efficacy in providing actionable insights promptly.</p><p><strong>The Shift-Left Strategy and DevSecOps Collaboration</strong></p><p>The conversation shifts to the importance of integrating DevOps and DevSecOps teams. Willy points out that while specializations are valuable, it's crucial to have "connective tissue" to get the bigger picture. This holistic view is essential for understanding how threats impact various departments and teams.</p><p><strong>Conclusion</strong></p><p>Sean Martin wraps up the enriching conversation with Willy Leichter, expressing his excitement for the future of AppSoc. The episode underscores the critical importance of effective application security and how innovations like AppSoc are paving the way for a more secure digital landscape.</p><p>Learn more about AppSOC: <a href="https://itspm.ag/appsoc-z45x">https://itspm.ag/appsoc-z45x</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Willy Leichter</strong>,<strong> </strong>Chief Marketing Officer, AppSOC [<a href="https://x.com/appsoc_inc/">@appsoc_inc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/willyleichter/">https://www.linkedin.com/in/willyleichter/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AppSOC: <a href="https://www.itspmagazine.com/directory/appsoc">https://www.itspmagazine.com/directory/appsoc</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20034148" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b98833cb-a022-4a27-aa66-30e948a07380/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b98833cb-a022-4a27-aa66-30e948a07380&amp;feed=2M86zCcc"/>
      <itunes:title>The Evolving Landscape of Application Security | A Brand Story Conversation From Black Hat USA 2024 | An AppSOC Story with Willy Leichter | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Willy Leichter</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:52</itunes:duration>
      <itunes:summary>In this episode of &quot;On Location With Sean Martin and Marco Ciappelli&quot; at Black Hat Conference 2024, host Sean Martin sits down with Willy Leichter to discuss the latest from AppSoc and explore the evolving landscape of application security.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;On Location With Sean Martin and Marco Ciappelli&quot; at Black Hat Conference 2024, host Sean Martin sits down with Willy Leichter to discuss the latest from AppSoc and explore the evolving landscape of application security.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, orchestration remediation, appsoc, real-world security solutions, sean martin, security prioritization, security best practices, cybersecurity, black hat conference, application security, appsoc innovations, ai in security, praveen kothari, cybersecurity conference, application security posture management, willy leichter, security noise reduction, black hat 2024, aspm, managing security threats, ai protection, devsecops, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c4bdc675-d77b-432a-9d7a-7d93e348110e</guid>
      <title>Cutting-Edge Mobile App Security | A Brand Story Conversation From Black Hat USA 2024 | An Appdome Story with Tom Tovar | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to another insightful story from ITSPmagazine, where we bring you exclusive content directly from Hacker Summer Camp at Black Hat Las Vegas 2024. This year, Sean Martin had the pleasure of sitting down with Tom Tovar, CEO of Appdome, to explore the company’s innovative approach to mobile app security.</p><p><strong>A Dynamic Presence at Black Hat</strong></p><p>Black Hat 2024 is buzzing with energy, and Appdome's vibrant booth has become a focal point for many attendees. Tom credits his marketing team for creating an engaging and visually striking presence that truly reflects Appdome’s mission. A standout feature is a unique widescreen shot setup that, although not yet shared on social media, perfectly encapsulates Appdome's vision for mobile app security.</p><p><strong>The Origin of Appdome</strong></p><p>During the conversation, Sean Martin asked Tom to share the origin story of Appdome. Tom, who began his career as a corporate and securities lawyer during the tech boom, later transitioned to roles in security and operations at NetScreen. His journey took a pivotal turn after teaching himself to code and recognizing the need for a more efficient way to secure mobile applications. Driven by frustration with existing solutions and encouraged by a venture capitalist friend, Tom set out to create Appdome, aiming to simplify and automate mobile app security.</p><p><strong>Revolutionizing Mobile App Security with Appdome</strong></p><p>Appdome’s approach integrates security into the mobile app development process through machine learning, making it easier to incorporate essential functions like encryption and anti-tampering. Over time, the platform has evolved to include advanced features such as malware detection and fraud prevention. By automating these processes, Appdome reduces friction for developers and users alike, offering a streamlined path to robust mobile app security.</p><p><strong>Embracing Generative AI for User Empowerment</strong></p><p>A highlight of the interview was the discussion around Appdome’s adoption of Generative AI (Gen AI). This cutting-edge technology offers automated support to users facing mobile app security threats, providing real-time guidance to resolve issues independently. This not only enhances cybersecurity but also raises awareness, helping users become more informed and vigilant.</p><p><strong>Appdome’s Expanding Influence in Cybersecurity</strong></p><p>With over 144,000 applications utilizing its platform and more than 11,000 builds handled daily, Appdome has established itself as a leader in mobile app security. Its widespread adoption across diverse industries underscores the platform’s scalability and versatility.</p><p><strong>Looking Ahead: The Future of Mobile App Security</strong></p><p>Tom Tovar also shared Appdome’s vision for the future, including the introduction of AI-driven recommendations to further streamline security integration. The ultimate goal is to achieve an auto-defend capability, making mobile app security more intuitive and effortless for users worldwide.</p><p><strong>Conclusion</strong></p><p>This exclusive interview with Tom Tovar at Black Hat 2024 highlights how Appdome is at the forefront of mobile app security, driving innovation and automation in a rapidly evolving landscape. As mobile threats continue to grow, Appdome’s solutions will be essential in ensuring secure, seamless experiences for users everywhere.</p><p>For more insights and updates from the cybersecurity world, keep following ITSPmagazine.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tom Tovar</strong>, CEO, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" target="_blank">https://www.linkedin.com/in/tom-tovar-9b8552/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 22:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tom Tovar)</author>
      <link>https://eventcoveragepodcast.com/episodes/cutting-edge-mobile-app-security-a-brand-story-conversation-from-black-hat-usa-2024-an-appdome-story-with-tom-tovar-on-location-coverage-with-sean-martin-and-marco-ciappelli-_E1uT0Zv</link>
      <content:encoded><![CDATA[<p>Welcome to another insightful story from ITSPmagazine, where we bring you exclusive content directly from Hacker Summer Camp at Black Hat Las Vegas 2024. This year, Sean Martin had the pleasure of sitting down with Tom Tovar, CEO of Appdome, to explore the company’s innovative approach to mobile app security.</p><p><strong>A Dynamic Presence at Black Hat</strong></p><p>Black Hat 2024 is buzzing with energy, and Appdome's vibrant booth has become a focal point for many attendees. Tom credits his marketing team for creating an engaging and visually striking presence that truly reflects Appdome’s mission. A standout feature is a unique widescreen shot setup that, although not yet shared on social media, perfectly encapsulates Appdome's vision for mobile app security.</p><p><strong>The Origin of Appdome</strong></p><p>During the conversation, Sean Martin asked Tom to share the origin story of Appdome. Tom, who began his career as a corporate and securities lawyer during the tech boom, later transitioned to roles in security and operations at NetScreen. His journey took a pivotal turn after teaching himself to code and recognizing the need for a more efficient way to secure mobile applications. Driven by frustration with existing solutions and encouraged by a venture capitalist friend, Tom set out to create Appdome, aiming to simplify and automate mobile app security.</p><p><strong>Revolutionizing Mobile App Security with Appdome</strong></p><p>Appdome’s approach integrates security into the mobile app development process through machine learning, making it easier to incorporate essential functions like encryption and anti-tampering. Over time, the platform has evolved to include advanced features such as malware detection and fraud prevention. By automating these processes, Appdome reduces friction for developers and users alike, offering a streamlined path to robust mobile app security.</p><p><strong>Embracing Generative AI for User Empowerment</strong></p><p>A highlight of the interview was the discussion around Appdome’s adoption of Generative AI (Gen AI). This cutting-edge technology offers automated support to users facing mobile app security threats, providing real-time guidance to resolve issues independently. This not only enhances cybersecurity but also raises awareness, helping users become more informed and vigilant.</p><p><strong>Appdome’s Expanding Influence in Cybersecurity</strong></p><p>With over 144,000 applications utilizing its platform and more than 11,000 builds handled daily, Appdome has established itself as a leader in mobile app security. Its widespread adoption across diverse industries underscores the platform’s scalability and versatility.</p><p><strong>Looking Ahead: The Future of Mobile App Security</strong></p><p>Tom Tovar also shared Appdome’s vision for the future, including the introduction of AI-driven recommendations to further streamline security integration. The ultimate goal is to achieve an auto-defend capability, making mobile app security more intuitive and effortless for users worldwide.</p><p><strong>Conclusion</strong></p><p>This exclusive interview with Tom Tovar at Black Hat 2024 highlights how Appdome is at the forefront of mobile app security, driving innovation and automation in a rapidly evolving landscape. As mobile threats continue to grow, Appdome’s solutions will be essential in ensuring secure, seamless experiences for users everywhere.</p><p>For more insights and updates from the cybersecurity world, keep following ITSPmagazine.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tom Tovar</strong>, CEO, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" target="_blank">https://www.linkedin.com/in/tom-tovar-9b8552/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21151352" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/80823ae4-48ec-41dc-84ee-e8c26a62cd71/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=80823ae4-48ec-41dc-84ee-e8c26a62cd71&amp;feed=2M86zCcc"/>
      <itunes:title>Cutting-Edge Mobile App Security | A Brand Story Conversation From Black Hat USA 2024 | An Appdome Story with Tom Tovar | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tom Tovar</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:01</itunes:duration>
      <itunes:summary>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; ITSPmagazine takes you behind the scenes of Black Hat 2024, where Appdome’s CEO, Tom Tovar, shares insights into the company’s revolutionary mobile app security solutions.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; ITSPmagazine takes you behind the scenes of Black Hat 2024, where Appdome’s CEO, Tom Tovar, shares insights into the company’s revolutionary mobile app security solutions.</itunes:subtitle>
      <itunes:keywords>tom tovar, marco ciappelli, appdome, sean martin, cybersecurity, hacker summer camp, technology innovation, mobile threat defense, generative ai, mobile app security, gen ai, machine learning, black hat 2024, security automation, itspmagazine, devsecops, black hat las vegas, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8886a18d-2efd-4678-a1b3-204a9075db80</guid>
      <title>Securing the Digital Economy: A Deep Dive into Application and API Security | A Brand Story Conversation From Black Hat USA 2024 | An Akamai Story with Rupesh Chokshi | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.</p><p>Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.</p><p>The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.</p><p>A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.</p><p>Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.</p><p>The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.</p><p>The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.</p><p>For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 21:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://eventcoveragepodcast.com/episodes/securing-the-digital-economy-a-deep-dive-into-application-and-api-security-a-brand-story-conversation-from-black-hat-usa-2024-an-akamai-story-with-rupesh-chokshi-on-location-coverage-with-sean-martin-and-marco-ciappelli-XWsIZbGd</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.</p><p>Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.</p><p>The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.</p><p>A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.</p><p>Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.</p><p>The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.</p><p>The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.</p><p>For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20051687" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/03b84f49-dc42-464c-8941-e4eed282134c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=03b84f49-dc42-464c-8941-e4eed282134c&amp;feed=2M86zCcc"/>
      <itunes:title>Securing the Digital Economy: A Deep Dive into Application and API Security | A Brand Story Conversation From Black Hat USA 2024 | An Akamai Story with Rupesh Chokshi | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:53</itunes:duration>
      <itunes:summary>In this Brand Story episode as part of the On Location Podcast series, Sean Martin chats with Rupesh Chokshi from Akamai about the escalating importance of API security and the innovative methods Akamai employs to safeguard against threats. Tune in to discover real-world examples of API breaches and learn how proactive measures can empower organizations to protect their digital assets.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode as part of the On Location Podcast series, Sean Martin chats with Rupesh Chokshi from Akamai about the escalating importance of API security and the innovative methods Akamai employs to safeguard against threats. Tune in to discover real-world examples of API breaches and learn how proactive measures can empower organizations to protect their digital assets.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ciso, cyberattacks, data breaches, black hat, sean martin, app security, akamai, cybersecurity, application security, hacker summer camp, digital economy, online security, vegas, digital assets, threat intelligence, fintech, api, security, apis, brand story, cyber threats, rupesh chokshi</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a57bf420-7e5e-4371-b380-fde5a8f8fc97</guid>
      <title>From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.</p><p>The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.</p><p>Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.</p><p>The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 20:51:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-deep-fakes-to-phishing-protecting-high-profile-digital-lives-and-safeguarding-personal-privacy-a-brand-story-conversation-from-black-hat-usa-2024-a-blackcloak-story-with-chris-pierson-on-location-coverage-with-sean-martin-and-marco-ciappelli-mG4HoWZt</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.</p><p>The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.</p><p>Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.</p><p>The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30215193" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/35ecbeb4-2c70-4ab1-891b-f165949ac597/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=35ecbeb4-2c70-4ab1-891b-f165949ac597&amp;feed=2M86zCcc"/>
      <itunes:title>From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:28</itunes:duration>
      <itunes:summary>Join Chris Pierson, Founder and CEO of BlackCloak, and hosts Sean Martin and Marco Ciappelli, as they discuss the pressing issues of personal privacy and digital security for high-profile individuals. Topics such as combating deep fakes, phishing, and business email compromise provide listeners with practical strategies to protect their digital lives against evolving cyber threats.</itunes:summary>
      <itunes:subtitle>Join Chris Pierson, Founder and CEO of BlackCloak, and hosts Sean Martin and Marco Ciappelli, as they discuss the pressing issues of personal privacy and digital security for high-profile individuals. Topics such as combating deep fakes, phishing, and business email compromise provide listeners with practical strategies to protect their digital lives against evolving cyber threats.</itunes:subtitle>
      <itunes:keywords>digital protection, chris pierson, marco ciappelli, sean martin, personal privacy, blackcloak, cybersecurity, digital habits, business email compromise, online security, executive protection, data privacy, deep fakes, cyber risks, digital security, phishing, brand story, cyber threats, high-profile individuals, tech-savvy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a9f87fa2-c8a7-4b48-8593-8338623093ab</guid>
      <title>Insider Insights: Cybersecurity and Collaboration | A Brand Story Conversation From Black Hat USA 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Welcome to Hacker Summer Camp</strong> Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.</p><p><i>Sean Martin:</i> “Welcome to a new episode coming to you from Hacker Summer Camp. We’re here in Las Vegas for Black Hat USA 2024, and I’m thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”</p><p><strong>Simplifying Cybersecurity with Level Blue</strong> Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.</p><p><i>Theresa Lanowitz:</i> “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”</p><p>The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.</p><p><strong>Key Insights from the Level Blue Futures Report</strong> Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.</p><p><strong>Collaboration Among CIO, CTO, and CISO</strong> Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.</p><p><i>Theresa Lanowitz:</i> “The CIO, the CISO, and the CTO must be equal partners. If they’re not, achieving cyber resilience becomes very difficult.”</p><p><strong>The Pandemic's Impact on Cybersecurity</strong> Reflecting on the pandemic’s effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.</p><p><strong>Proactive vs. Reactive Budgets</strong> Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.</p><p><i>Theresa Lanowitz:</i> “If you can align cybersecurity initiatives with business goals, you’re going to be proactive rather than reactive.”</p><p><strong>The Role of Trusted Third-Party Advisors</strong> Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.</p><p><i>Sean Martin:</i> “By working with a trusted partner, you’re not giving up your creative ideas but rather ensuring they play out effectively and securely.”</p><p><strong>The Human Element in Cybersecurity</strong> As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.</p><p><i>Sean Martin:</i> “It always comes back to the people, doesn’t it?”</p><p><strong>Conclusion</strong> The episode wraps up with Sean expressing gratitude for Theresa’s insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 03:43:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://eventcoveragepodcast.com/episodes/insider-insights-cybersecurity-and-collaboration-a-brand-story-conversation-from-black-hat-usa-2024-a-levelblue-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-gzMazQPN</link>
      <content:encoded><![CDATA[<p><strong>Welcome to Hacker Summer Camp</strong> Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.</p><p><i>Sean Martin:</i> “Welcome to a new episode coming to you from Hacker Summer Camp. We’re here in Las Vegas for Black Hat USA 2024, and I’m thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”</p><p><strong>Simplifying Cybersecurity with Level Blue</strong> Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.</p><p><i>Theresa Lanowitz:</i> “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”</p><p>The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.</p><p><strong>Key Insights from the Level Blue Futures Report</strong> Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.</p><p><strong>Collaboration Among CIO, CTO, and CISO</strong> Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.</p><p><i>Theresa Lanowitz:</i> “The CIO, the CISO, and the CTO must be equal partners. If they’re not, achieving cyber resilience becomes very difficult.”</p><p><strong>The Pandemic's Impact on Cybersecurity</strong> Reflecting on the pandemic’s effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.</p><p><strong>Proactive vs. Reactive Budgets</strong> Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.</p><p><i>Theresa Lanowitz:</i> “If you can align cybersecurity initiatives with business goals, you’re going to be proactive rather than reactive.”</p><p><strong>The Role of Trusted Third-Party Advisors</strong> Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.</p><p><i>Sean Martin:</i> “By working with a trusted partner, you’re not giving up your creative ideas but rather ensuring they play out effectively and securely.”</p><p><strong>The Human Element in Cybersecurity</strong> As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.</p><p><i>Sean Martin:</i> “It always comes back to the people, doesn’t it?”</p><p><strong>Conclusion</strong> The episode wraps up with Sean expressing gratitude for Theresa’s insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18954562" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/afb7bc86-654b-48b5-a558-e8b8d4d63317/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=afb7bc86-654b-48b5-a558-e8b8d4d63317&amp;feed=2M86zCcc"/>
      <itunes:title>Insider Insights: Cybersecurity and Collaboration | A Brand Story Conversation From Black Hat USA 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:44</itunes:duration>
      <itunes:summary>In an engaging episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; Sean Martin has an insightful conversation with Theresa Lanowitz at Black Hat Conference 2024 in Las Vegas. They explore the complexities of cybersecurity, collaboration, and innovative strategies in the tech world.</itunes:summary>
      <itunes:subtitle>In an engaging episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; Sean Martin has an insightful conversation with Theresa Lanowitz at Black Hat Conference 2024 in Las Vegas. They explore the complexities of cybersecurity, collaboration, and innovative strategies in the tech world.</itunes:subtitle>
      <itunes:keywords>world gem ventures, marco ciappelli, ciso, sean martin, supply chain security, cross-functional communication, cybersecurity consulting, cybersecurity, black hat conference, at&amp;t, hacker summer camp, reactive budgeting, third-party advisors, black hat usa 2024, cto, proactive budgeting, level blue labs, level blue, cio, cyber resilience, theresa lanowitz, managed security services, digital transformation, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b2ea072c-3d7f-498d-ae15-6b9563cc0e7e</guid>
      <title>Balancing Integrity and Sales: The Dual Role of Field CISOs | CISO Circuit Series: Episode 5 with Black Hat USA 2024 Event Coverage | Michael Piacente and Sean Martin on the Redefining CyberSecurity Podcast</title>
      <description><![CDATA[<p><strong>About the CISO Circuit Series</strong></p><p>Sean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity. If you have a topic idea or a comment on an episode, feel free to <a href="https://itspmagazine.typeform.com/to/HeOL3em3?show=RedefiningCyberSecurity" target="_blank">contact Sean Martin</a>.</p><p><strong>____________________________</strong></p><p><strong>Guest: Michael Piacente</strong>, Managing Partner and Cofounder of Hitch Partners</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In the latest episode of the CISO Circuit Series on the Redefining CyberSecurity Podcast, Sean Martin and Michael Piacente join forces in Las Vegas during the Black Hat USA 2024 Conference to engage in an insightful conversation about the evolving role of the Field CISO. Sean Martin is joined by Michael Piacente, Managing Partner and Co-Founder at Hitch Partners, as they dissect the significance and responsibilities of Field CISOs in today's cybersecurity landscape.</p><p>A primary focus of the episode is understanding what a Field CISO actually entails. Michael Piacente explains that the role of Field CISO varies widely across organizations, but it generally falls into two categories: customer engagement and sales enablement. Companies might hire Field CISOs to build operational risk assessments and customer relationships, or to drive the technical sales process. For instance, Field CISOs play a pivotal role in product companies by acting as trusted advisors who help communicate complex technical topics in a digestible manner to potential clients.</p><p>Michael also highlights key attributes that make a Field CISO successful, such as genuine cybersecurity experience, deep technical knowledge, a reputable name in the community, and robust networking skills. Successful Field CISOs can seamlessly transition between discussing technical details and broader strategic goals with stakeholders. Their role often includes influencing product development by bringing practical insights from customers back to the engineering teams.</p><p>One crucial point raised during the discussion is the integrity and trustworthiness required for a Field CISO. Sean and Michael emphasize that maintaining trust within the CISO community is paramount. Field CISOs should avoid crossing lines between promotional activities and genuine advisory roles. They assert that integrity and transparency remain foremost in these roles, as they are often looked to for unbiased, independent advice.</p><p>Another topic discussed is how organizations should approach hiring for the Field CISO role. Michael Piacente points out the importance of setting clear expectations, understanding the balance between operational duties and sales enablement, and ensuring that the Field CISO is genuinely aligned with the company's mission and capable of maintaining community trust.</p><p>Overall, this episode sheds light on the nuanced nature of the Field CISO role, providing valuable insights for both aspiring Field CISOs and organizations looking to hire one. As the role continues to evolve, Michael and Sean underscore the need for a thoughtful approach to defining responsibilities and fostering an environment where integrity and expertise thrive.</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network" target="_blank">https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 03:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Michael Piacente)</author>
      <link>https://eventcoveragepodcast.com/episodes/balancing-integrity-and-sales-the-dual-role-of-field-cisos-ciso-circuit-series-episode-5-with-black-hat-usa-2024-event-coverage-michael-piacente-and-sean-martin-on-the-redefining-cybersecurity-podcast-bKVqZq2M</link>
      <content:encoded><![CDATA[<p><strong>About the CISO Circuit Series</strong></p><p>Sean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity. If you have a topic idea or a comment on an episode, feel free to <a href="https://itspmagazine.typeform.com/to/HeOL3em3?show=RedefiningCyberSecurity" target="_blank">contact Sean Martin</a>.</p><p><strong>____________________________</strong></p><p><strong>Guest: Michael Piacente</strong>, Managing Partner and Cofounder of Hitch Partners</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacente</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In the latest episode of the CISO Circuit Series on the Redefining CyberSecurity Podcast, Sean Martin and Michael Piacente join forces in Las Vegas during the Black Hat USA 2024 Conference to engage in an insightful conversation about the evolving role of the Field CISO. Sean Martin is joined by Michael Piacente, Managing Partner and Co-Founder at Hitch Partners, as they dissect the significance and responsibilities of Field CISOs in today's cybersecurity landscape.</p><p>A primary focus of the episode is understanding what a Field CISO actually entails. Michael Piacente explains that the role of Field CISO varies widely across organizations, but it generally falls into two categories: customer engagement and sales enablement. Companies might hire Field CISOs to build operational risk assessments and customer relationships, or to drive the technical sales process. For instance, Field CISOs play a pivotal role in product companies by acting as trusted advisors who help communicate complex technical topics in a digestible manner to potential clients.</p><p>Michael also highlights key attributes that make a Field CISO successful, such as genuine cybersecurity experience, deep technical knowledge, a reputable name in the community, and robust networking skills. Successful Field CISOs can seamlessly transition between discussing technical details and broader strategic goals with stakeholders. Their role often includes influencing product development by bringing practical insights from customers back to the engineering teams.</p><p>One crucial point raised during the discussion is the integrity and trustworthiness required for a Field CISO. Sean and Michael emphasize that maintaining trust within the CISO community is paramount. Field CISOs should avoid crossing lines between promotional activities and genuine advisory roles. They assert that integrity and transparency remain foremost in these roles, as they are often looked to for unbiased, independent advice.</p><p>Another topic discussed is how organizations should approach hiring for the Field CISO role. Michael Piacente points out the importance of setting clear expectations, understanding the balance between operational duties and sales enablement, and ensuring that the Field CISO is genuinely aligned with the company's mission and capable of maintaining community trust.</p><p>Overall, this episode sheds light on the nuanced nature of the Field CISO role, providing valuable insights for both aspiring Field CISOs and organizations looking to hire one. As the role continues to evolve, Michael and Sean underscore the need for a thoughtful approach to defining responsibilities and fostering an environment where integrity and expertise thrive.</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network" target="_blank">https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28900301" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a700cff6-dc68-4cd9-871f-733b213521d6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a700cff6-dc68-4cd9-871f-733b213521d6&amp;feed=2M86zCcc"/>
      <itunes:title>Balancing Integrity and Sales: The Dual Role of Field CISOs | CISO Circuit Series: Episode 5 with Black Hat USA 2024 Event Coverage | Michael Piacente and Sean Martin on the Redefining CyberSecurity Podcast</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Michael Piacente</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:06</itunes:duration>
      <itunes:summary>In this episode of the CISO Circuit Series on the Redefining CyberSecurity Podcast, Sean Martin and Michael Piacente explore the evolving role of the Field CISO, highlighting their crucial responsibilities in customer engagement and sales enablement. They dissect into how integrity, technical expertise, and a strong community presence are essential for Field CISOs to succeed and provide genuine value to organizations on both sides of the engagement.</itunes:summary>
      <itunes:subtitle>In this episode of the CISO Circuit Series on the Redefining CyberSecurity Podcast, Sean Martin and Michael Piacente explore the evolving role of the Field CISO, highlighting their crucial responsibilities in customer engagement and sales enablement. They dissect into how integrity, technical expertise, and a strong community presence are essential for Field CISOs to succeed and provide genuine value to organizations on both sides of the engagement.</itunes:subtitle>
      <itunes:keywords>expertise, field ciso, networking, technical, integrity, sean martin, michael piacente, trust, cybersecurity, conference, redefining cybersecurity, product, trusted advisor, podcast, ciso circuit, security, sales enablement, community, cybersecurityconference, operational risk, customer engagement</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c28bcc67-1c49-4bc3-8dc1-2cb7928e6d63</guid>
      <title>Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode Brand Story, Sean Martin speaks with Artyom Poghosyan at the Black Hat conference in Las Vegas about Britive, a cloud privileged access management platform. They explore how Britive assists medium to large enterprises in tackling identity management and security issues across multi-cloud and hybrid environments.</p><p>Sean and Artyom discuss the complexities that organizations face with cloud adoption, where traditional lift-and-shift approaches no longer suffice. Artyom outlines how the incorporation of new processes and tools, such as DevOps automation, complicates identity and access management in cloud environments. Britive's approach emphasizes the need for dynamic, scalable solutions that align with the speed and agility of cloud-based development while ensuring robust security controls.</p><p>A key focus is the balance between granting necessary access for operational efficiency and minimizing security risks from overprivileged accounts. Artyom describes Britive's method of dynamically granting and revoking access based on justified needs, ensuring that temporary elevated access is appropriately controlled and removed post-use.</p><p>Additionally, the conversation highlights the challenges of managing identities across multiple cloud platforms (AWS, GCP, Azure, etc.) and the diverse technologies used in modern enterprises. Artyom explains Britive's capability to provide a unified identity and access management approach that simplifies and secures these varied environments.</p><p>The episode also emphasizes Britive’s potential to significantly reduce the time required for onboarding DevOps engineers, streamlining the process from days to mere minutes through automation. This not only improves operational efficiency but also vastly reduces risk by limiting standing privileges, a key security vulnerability often exploited by cybercriminals.</p><p>Finally, they touch upon how Britive fits within broader organizational security strategies, particularly Zero Trust initiatives. By eliminating standing access risks and offering integration with existing security processes, Britive supports the implementation of comprehensive identity security programs that align with modern security frameworks.</p><p>Sean closes the episode by encouraging listeners to engage with Artyom and the Britive team to see how their solutions can enhance identity management and security within their organizations.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Artyom Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 02:18:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Artyom Poghosyan)</author>
      <link>https://eventcoveragepodcast.com/episodes/dynamic-access-control-in-modern-cloud-environments-a-brand-story-conversation-from-black-hat-usa-2024-a-britive-story-with-artyom-poghosyan-on-location-coverage-with-sean-martin-and-marco-ciappelli-M6A96DWK</link>
      <content:encoded><![CDATA[<p>In this On Location episode Brand Story, Sean Martin speaks with Artyom Poghosyan at the Black Hat conference in Las Vegas about Britive, a cloud privileged access management platform. They explore how Britive assists medium to large enterprises in tackling identity management and security issues across multi-cloud and hybrid environments.</p><p>Sean and Artyom discuss the complexities that organizations face with cloud adoption, where traditional lift-and-shift approaches no longer suffice. Artyom outlines how the incorporation of new processes and tools, such as DevOps automation, complicates identity and access management in cloud environments. Britive's approach emphasizes the need for dynamic, scalable solutions that align with the speed and agility of cloud-based development while ensuring robust security controls.</p><p>A key focus is the balance between granting necessary access for operational efficiency and minimizing security risks from overprivileged accounts. Artyom describes Britive's method of dynamically granting and revoking access based on justified needs, ensuring that temporary elevated access is appropriately controlled and removed post-use.</p><p>Additionally, the conversation highlights the challenges of managing identities across multiple cloud platforms (AWS, GCP, Azure, etc.) and the diverse technologies used in modern enterprises. Artyom explains Britive's capability to provide a unified identity and access management approach that simplifies and secures these varied environments.</p><p>The episode also emphasizes Britive’s potential to significantly reduce the time required for onboarding DevOps engineers, streamlining the process from days to mere minutes through automation. This not only improves operational efficiency but also vastly reduces risk by limiting standing privileges, a key security vulnerability often exploited by cybercriminals.</p><p>Finally, they touch upon how Britive fits within broader organizational security strategies, particularly Zero Trust initiatives. By eliminating standing access risks and offering integration with existing security processes, Britive supports the implementation of comprehensive identity security programs that align with modern security frameworks.</p><p>Sean closes the episode by encouraging listeners to engage with Artyom and the Britive team to see how their solutions can enhance identity management and security within their organizations.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Artyom Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21332321" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/fa7cba1c-3fb5-42ea-98e0-013e76dbdfa1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=fa7cba1c-3fb5-42ea-98e0-013e76dbdfa1&amp;feed=2M86zCcc"/>
      <itunes:title>Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Artyom Poghosyan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:13</itunes:duration>
      <itunes:summary>Join Sean Martin and Artyom Poghosyan for a Brand Story at the Black Hat conference as they explore how Britive revolutionizes cloud privileged access management, addressing complex security challenges and streamlining operational efficiency across multi-cloud environments. Discover how Britive&apos;s innovative approach can significantly reduce onboarding time and enhance identity security in your organization.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Artyom Poghosyan for a Brand Story at the Black Hat conference as they explore how Britive revolutionizes cloud privileged access management, addressing complex security challenges and streamlining operational efficiency across multi-cloud environments. Discover how Britive&apos;s innovative approach can significantly reduce onboarding time and enhance identity security in your organization.</itunes:subtitle>
      <itunes:keywords>privileged, devops, marco ciappelli, britive, sean martin, automation, gcp, cybersecurity, access, management, cloud, multi-cloud, security, identity, artyom poghosyan, artyom poghosyan, zero trust, azure, aws, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">12e3dea3-a286-4806-b8a1-5bd771fb7c99</guid>
      <title>Coro&apos;s Modular Cybersecurity and True Platform Revolution | A Brand Story Conversation From Black Hat USA 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At Black Hat 2024 in Las Vegas, Sean Martin from On Location interviews Dror Liwer of Coro, uncovering the impressive strides Coro has made in creating a truly cohesive cybersecurity platform. This conversation reveals how Coro distinguishes itself in an industry saturated with buzzwords and inadequate solutions, particularly for smaller and mid-sized businesses.</p><p><strong>Meeting in Vegas</strong></p><p>Sean Martin starts the conversation by appreciating the vibrant atmosphere at the Black Hat Business Hall. The colorful Coro booth, coupled with the energetic team, sets the perfect backdrop for a discussion centered on platform innovation.</p><p><strong>Sean Martin:</strong> "Here we are, Dror. Fantastic seeing you here in Vegas."</p><p><strong>Dror Liwer:</strong> "It's where we meet."</p><p><strong>The Platform Buzz</strong></p><p>The term “platform” has become a buzzword in the cybersecurity industry. Dror explains that many companies claim to offer platforms, but these so-called platforms often result from the integration of various point solutions, which don't communicate effectively with each other.</p><p><strong>Dror Liwer:</strong> “We built Coro as a platform and have been a platform for 10 years. It's kind of funny to see everybody now catching up and trying to pretend to be a platform.”</p><p>Dror criticizes how companies use “platform” to create market confusion, explaining that a true platform requires seamless integration, a single endpoint agent, and a unified data lake.</p><p><strong>Defining a True Platform</strong></p><p>Dror and Sean delve deep into what makes Coro's platform genuinely innovative. Dror emphasizes that a real platform collects and processes data across multiple modules, providing a single pane of glass for operators. He contrasts this with other solutions that merely integrate various tools, resulting in operational complexity and inefficiencies.</p><p><strong>Dror Liwer:</strong> "A real platform is an engine that has a set of tools on top of it that work seamlessly together using a single pane of glass, a single endpoint agent, and a single data lake that shares all of the information across all of the different modules."</p><p><strong>The Role of Data</strong></p><p>Data integration is a cornerstone of Coro’s platform. Dror explains that each module in Coro functions as both a sensor and protector, feeding data into the system and responding to anomalies in real-time.</p><p><strong>Dror Liwer:</strong> "The collection of data happens natively at the sensor. They feed all the data into one very large data lake."</p><p>This unified approach allows Coro to eliminate the time-critical gap between event detection and response, a significant advantage over traditional systems that often rely on multiple disparate tools.</p><p><strong>Supporting MSPs and Mid-Market Businesses</strong></p><p>One of Coro's key missions is to support Managed Service Providers (MSPs) and mid-market businesses, sectors that have been largely overlooked by larger cybersecurity firms. By offering a more manageable and less costly platform, Coro empowers these providers to offer comprehensive cybersecurity services without the high operational costs traditionally associated with such tasks.</p><p><strong>Dror Liwer:</strong> “We are changing that economic equation, allowing MSPs to offer full cybersecurity solutions to their customers at an affordable price.”</p><p><strong>Fulfilling New Requirements</strong></p><p>Dror also sheds light on how Coro helps businesses comply with new regulatory requirements or cybersecurity mandates, often dictated by their position in the supply chain.</p><p><strong>Dror Liwer:</strong> "When this guy comes to you and says, ‘Hey, I need to now comply with this or do that,’ this is an opportunity to tell them, ‘Don't worry. I got you covered. I have Coro for you.’”</p><p><strong>Conclusion</strong></p><p>Dror Liwer's insights during Black Hat 2024 highlight how Coro is not only addressing but revolutionizing the cybersecurity needs of small to mid-sized businesses and their MSP partners. By creating a true platform that reduces complexity and operational costs, Coro sets a new standard in the cybersecurity industry.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Aug 2024 21:43:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://eventcoveragepodcast.com/episodes/coros-modular-cybersecurity-and-true-platform-revolution-a-brand-story-conversation-from-black-hat-usa-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-RgoBvGYb</link>
      <content:encoded><![CDATA[<p>At Black Hat 2024 in Las Vegas, Sean Martin from On Location interviews Dror Liwer of Coro, uncovering the impressive strides Coro has made in creating a truly cohesive cybersecurity platform. This conversation reveals how Coro distinguishes itself in an industry saturated with buzzwords and inadequate solutions, particularly for smaller and mid-sized businesses.</p><p><strong>Meeting in Vegas</strong></p><p>Sean Martin starts the conversation by appreciating the vibrant atmosphere at the Black Hat Business Hall. The colorful Coro booth, coupled with the energetic team, sets the perfect backdrop for a discussion centered on platform innovation.</p><p><strong>Sean Martin:</strong> "Here we are, Dror. Fantastic seeing you here in Vegas."</p><p><strong>Dror Liwer:</strong> "It's where we meet."</p><p><strong>The Platform Buzz</strong></p><p>The term “platform” has become a buzzword in the cybersecurity industry. Dror explains that many companies claim to offer platforms, but these so-called platforms often result from the integration of various point solutions, which don't communicate effectively with each other.</p><p><strong>Dror Liwer:</strong> “We built Coro as a platform and have been a platform for 10 years. It's kind of funny to see everybody now catching up and trying to pretend to be a platform.”</p><p>Dror criticizes how companies use “platform” to create market confusion, explaining that a true platform requires seamless integration, a single endpoint agent, and a unified data lake.</p><p><strong>Defining a True Platform</strong></p><p>Dror and Sean delve deep into what makes Coro's platform genuinely innovative. Dror emphasizes that a real platform collects and processes data across multiple modules, providing a single pane of glass for operators. He contrasts this with other solutions that merely integrate various tools, resulting in operational complexity and inefficiencies.</p><p><strong>Dror Liwer:</strong> "A real platform is an engine that has a set of tools on top of it that work seamlessly together using a single pane of glass, a single endpoint agent, and a single data lake that shares all of the information across all of the different modules."</p><p><strong>The Role of Data</strong></p><p>Data integration is a cornerstone of Coro’s platform. Dror explains that each module in Coro functions as both a sensor and protector, feeding data into the system and responding to anomalies in real-time.</p><p><strong>Dror Liwer:</strong> "The collection of data happens natively at the sensor. They feed all the data into one very large data lake."</p><p>This unified approach allows Coro to eliminate the time-critical gap between event detection and response, a significant advantage over traditional systems that often rely on multiple disparate tools.</p><p><strong>Supporting MSPs and Mid-Market Businesses</strong></p><p>One of Coro's key missions is to support Managed Service Providers (MSPs) and mid-market businesses, sectors that have been largely overlooked by larger cybersecurity firms. By offering a more manageable and less costly platform, Coro empowers these providers to offer comprehensive cybersecurity services without the high operational costs traditionally associated with such tasks.</p><p><strong>Dror Liwer:</strong> “We are changing that economic equation, allowing MSPs to offer full cybersecurity solutions to their customers at an affordable price.”</p><p><strong>Fulfilling New Requirements</strong></p><p>Dror also sheds light on how Coro helps businesses comply with new regulatory requirements or cybersecurity mandates, often dictated by their position in the supply chain.</p><p><strong>Dror Liwer:</strong> "When this guy comes to you and says, ‘Hey, I need to now comply with this or do that,’ this is an opportunity to tell them, ‘Don't worry. I got you covered. I have Coro for you.’”</p><p><strong>Conclusion</strong></p><p>Dror Liwer's insights during Black Hat 2024 highlight how Coro is not only addressing but revolutionizing the cybersecurity needs of small to mid-sized businesses and their MSP partners. By creating a true platform that reduces complexity and operational costs, Coro sets a new standard in the cybersecurity industry.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19793832" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/571edebb-3544-4d62-9de3-6d57915fa025/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=571edebb-3544-4d62-9de3-6d57915fa025&amp;feed=2M86zCcc"/>
      <itunes:title>Coro&apos;s Modular Cybersecurity and True Platform Revolution | A Brand Story Conversation From Black Hat USA 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:37</itunes:duration>
      <itunes:summary>Sean Martin sits down with Dror Liwer at Black Hat 2024 in Las Vegas to discuss Coro&apos;s groundbreaking approach to platform integration and its impact on the cybersecurity landscape.</itunes:summary>
      <itunes:subtitle>Sean Martin sits down with Dror Liwer at Black Hat 2024 in Las Vegas to discuss Coro&apos;s groundbreaking approach to platform integration and its impact on the cybersecurity landscape.</itunes:subtitle>
      <itunes:keywords>single pane of glass, platform integration, cybersecurity solutions, marco ciappelli, machine learning in cybersecurity, coro platform, sean martin, msps, mid-market businesses, cybersecurity, unified data lake, endpoint security, cybersecurity compliance, dror liwer, small and medium businesses, mssps, data integration, it management, black hat conference 2024, cybersecurity innovation, brand story, anomaly detection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">42d7478a-36d6-49a9-becc-06a948687fb5</guid>
      <title>Behind the Scenes of SquareX&apos;s Exposing DEF CON Talk and Their Latest Browser Security Innovations | A Brand Story Conversation From Black Hat USA 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin gets to chat with Vivek Ramachandran, Co-Founder and CEO of SquareX, at the Black Hat USA conference in Las Vegas. The discussion centers around SquareX’s innovative approach to browser security and its relevance in today’s cybersecurity landscape.</p><p>Vivek explains that SquareX is developing a browser-native security product designed to detect, mitigate, and hunt threats in real-time, specifically focusing on the online activities of enterprise employees. This solution operates entirely within the browser, leveraging advanced technologies like WebAssembly to ensure minimal impact on the user experience.</p><p>The conversation shifts to the upcoming DEF CON talk by Vivek, titled “Breaking Secure Web Gateways for Fun and Profit,” which highlights the seven sins of secure web gateways and SASE SSE solutions. According to Vivek, these cloud proxies often fail to detect and block web attacks due to inherent architectural limitations. He mentions SquareX's research revealing over 25 different bypasses, emphasizing the need for a new approach to tackle these vulnerabilities effectively.</p><p>Sean and Vivek further discuss the practical implementation of SquareX's solution. Vivek underscores that traditional security measures often overlook browser activities, presenting a blind spot for many organizations. SquareX aims to fill this gap by providing comprehensive visibility and real-time threat detection without relying on cloud connectivity.</p><p>Vivek also answers questions about the automatic nature of the browser extension deployment, ensuring it does not disrupt day-to-day operations for users or IT teams. Additionally, he touches on the importance of organizational training and awareness, helping security teams interpret new types of alerts and attacks that occur within the browser environment.</p><p>Towards the end of the episode, Vivek introduces a new attack toolkit designed for organizations to test their own secure web gateways and SASE SSE solutions, empowering them to identify vulnerabilities firsthand. He encourages security leaders to use this tool and visit a dedicated website for practical demonstrations.</p><p>Listeners are invited to connect with Vivek and the SquareX team, especially those attending Black Hat and DEF CON, to learn more about this innovative approach to browser security.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Aug 2024 16:00:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://eventcoveragepodcast.com/episodes/behind-the-scenes-of-squarexs-exposing-def-con-talk-and-their-latest-browser-security-innovations-a-brand-story-conversation-from-black-hat-usa-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-K6hnkqXT</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin gets to chat with Vivek Ramachandran, Co-Founder and CEO of SquareX, at the Black Hat USA conference in Las Vegas. The discussion centers around SquareX’s innovative approach to browser security and its relevance in today’s cybersecurity landscape.</p><p>Vivek explains that SquareX is developing a browser-native security product designed to detect, mitigate, and hunt threats in real-time, specifically focusing on the online activities of enterprise employees. This solution operates entirely within the browser, leveraging advanced technologies like WebAssembly to ensure minimal impact on the user experience.</p><p>The conversation shifts to the upcoming DEF CON talk by Vivek, titled “Breaking Secure Web Gateways for Fun and Profit,” which highlights the seven sins of secure web gateways and SASE SSE solutions. According to Vivek, these cloud proxies often fail to detect and block web attacks due to inherent architectural limitations. He mentions SquareX's research revealing over 25 different bypasses, emphasizing the need for a new approach to tackle these vulnerabilities effectively.</p><p>Sean and Vivek further discuss the practical implementation of SquareX's solution. Vivek underscores that traditional security measures often overlook browser activities, presenting a blind spot for many organizations. SquareX aims to fill this gap by providing comprehensive visibility and real-time threat detection without relying on cloud connectivity.</p><p>Vivek also answers questions about the automatic nature of the browser extension deployment, ensuring it does not disrupt day-to-day operations for users or IT teams. Additionally, he touches on the importance of organizational training and awareness, helping security teams interpret new types of alerts and attacks that occur within the browser environment.</p><p>Towards the end of the episode, Vivek introduces a new attack toolkit designed for organizations to test their own secure web gateways and SASE SSE solutions, empowering them to identify vulnerabilities firsthand. He encourages security leaders to use this tool and visit a dedicated website for practical demonstrations.</p><p>Listeners are invited to connect with Vivek and the SquareX team, especially those attending Black Hat and DEF CON, to learn more about this innovative approach to browser security.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19540943" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/339f135f-27e0-44ee-8c1d-0a048ae70e88/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=339f135f-27e0-44ee-8c1d-0a048ae70e88&amp;feed=2M86zCcc"/>
      <itunes:title>Behind the Scenes of SquareX&apos;s Exposing DEF CON Talk and Their Latest Browser Security Innovations | A Brand Story Conversation From Black Hat USA 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:21</itunes:duration>
      <itunes:summary>Join Sean Martin as he interviews Vivek Ramachandran, Co-Founder and CEO of SquareX, about groundbreaking browser-native security solutions and insights into vulnerabilities in secure web gateways. Discover how their innovative approach fills critical security gaps and learn about their toolkit to test your own defenses against advanced threats.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he interviews Vivek Ramachandran, Co-Founder and CEO of SquareX, about groundbreaking browser-native security solutions and insights into vulnerabilities in secure web gateways. Discover how their innovative approach fills critical security gaps and learn about their toolkit to test your own defenses against advanced threats.</itunes:subtitle>
      <itunes:keywords>secure web gateways, web assembly, marco ciappelli, black hat, sean martin, real-time detection, def con, cybersecurity, security product, enterprise security, browser security, cyber defense, mitigation, threat hunting, sse, web threats, sase, attack toolkit, machine learning, vivek ramachandran, squarex, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d07bef91-7f62-4147-b968-297d732932a2</guid>
      <title>Breaking Boundaries in Cloud Security, Identity, and Privileged Access Management | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Art Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.</p><p>Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.</p><p>The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.</p><p>Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.</p><p>Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Art Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Cloud PAM: <a href="https://itspm.ag/britivxya3" target="_blank">https://itspm.ag/britivxya3</a></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 Aug 2024 01:42:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Art Poghosyan)</author>
      <link>https://eventcoveragepodcast.com/episodes/breaking-boundaries-in-cloud-security-identity-and-privileged-access-management-a-brand-story-conversation-from-black-hat-usa-2024-a-britive-story-with-art-poghosyan-on-location-coverage-with-sean-martin-and-marco-ciappelli-dLVAWyL2</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.</p><p>Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.</p><p>The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.</p><p>Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.</p><p>Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Art Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Cloud PAM: <a href="https://itspm.ag/britivxya3" target="_blank">https://itspm.ag/britivxya3</a></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20804433" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7df4e428-fadc-4f80-9ac7-8c4ff62f543a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7df4e428-fadc-4f80-9ac7-8c4ff62f543a&amp;feed=2M86zCcc"/>
      <itunes:title>Breaking Boundaries in Cloud Security, Identity, and Privileged Access Management | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Art Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Art Poghosyan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:40</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli in this Brand Story as they explore the future of identity and access management with Art Poghosyan, co-founder of Britive. Discover how Britive&apos;s innovative solutions are revolutionizing cloud-native security while tackling the evolving challenges of modern technology environments.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli in this Brand Story as they explore the future of identity and access management with Art Poghosyan, co-founder of Britive. Discover how Britive&apos;s innovative solutions are revolutionizing cloud-native security while tackling the evolving challenges of modern technology environments.</itunes:subtitle>
      <itunes:keywords>privileged, devops, technology, marco ciappelli, britive, black hat, sean martin, automation, cybersecurity, access, art poghosyan, art poghosyan, iam, innovation, management, cloud, api, security, identity, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1b43aaa-0213-4935-a1e3-5f7c81c14c7f</guid>
      <title>AI Summit Keynote: Enhancing National Security with AI-Driven Cybersecurity | A Black Hat USA 2024 Conversation with Dr. Kathleen Fisher | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Dr. Kathleen Fisher</strong>, Information Innovation Office (I2O) Director, Defense Advanced Research Projects Agency (DARPA) [<a href="https://x.com/DARPA">@DARPA</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kathleen-fisher-4000964/">https://www.linkedin.com/in/kathleen-fisher-4000964/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/us-24/summit-sessions/schedule/speakers.html#dr-kathleen-fisher-48776" target="_blank">https://www.blackhat.com/us-24/summit-sessions/schedule/speakers.html#dr-kathleen-fisher-48776</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location with Sean and Marco episode, hosts Sean Martin and Marco Ciappelli engage in an insightful conversation with Dr. Kathleen Fisher from the Defense Advanced Research Projects Agency (DARPA). The discussion centers around the upcoming Black Hat and DEF CON events, where Dr. Fisher is scheduled to deliver a keynote on the intersection of artificial intelligence (AI) and cybersecurity, with a particular focus on DARPA's ongoing initiatives and competitions.</p><p>Dr. Fisher begins by providing an overview of her background and DARPA's mission to prevent technological surprises that could undermine U.S. national security. She recounts the success of the High-Assurance Cyber Military Systems (HACMS) program, which utilized formal methods to create highly secure software for military vehicles. This program demonstrated the potential of formal methods to revolutionize cybersecurity, proving that robust software could be developed to withstand hacking attempts, even from world-class red teams.</p><p>The conversation then shifts to the AI Cyber Challenge (AICC) program, a major highlight of her upcoming keynote. AICC aims to leverage the power of AI combined with cyber reasoning systems to automatically find and fix vulnerabilities in real open-source software—an ambitious extension of DARPA's previous Cyber Grand Challenge. This competition involves collaboration with major tech companies like Google, Anthropic, OpenAI, and Microsoft, offering competitors access to state-of-the-art models to tackle real-world vulnerabilities.</p><p>Dr. Fisher emphasizes the importance of public-private collaboration in advancing cybersecurity technologies. DARPA's charter allows it to work with a diverse range of organizations, from startups to national labs, in pursuit of strategic technological advances. The episode also touches on the potential impact of cyber vulnerabilities on critical infrastructure, underscoring the need for scalable and automatic solutions to address these threats.</p><p>Listeners can anticipate Dr. Fisher highlighting these themes in her keynote, aimed at business leaders, practitioners, policymakers, and risk managers. She will outline how the audience can engage with DARPA's initiatives and contribute to the ongoing efforts to enhance national security through innovative technology solutions.</p><p>The episode promises to provide a nuanced understanding of DARPA's role in pioneering AI-driven cybersecurity advancements and offers a preview of the exciting developments to be showcased at Black Hat and DEF CON.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Keynote: Enhancing National Security with AI-Driven Cybersecurity: <a href="https://www.blackhat.com/us-24/summit-sessions/schedule/index.html#keynote--enhancing-national-security-with-ai-driven-cybersecurity-41250" target="_blank">https://www.blackhat.com/us-24/summit-sessions/schedule/index.html#keynote--enhancing-national-security-with-ai-driven-cybersecurity-41250</a></p><p>AI Cyber Challenge: <a href="https://aicyberchallenge.com/" target="_blank">https://aicyberchallenge.com/</a></p><p>DARPA's Information Innovation Office: <a href="https://www.darpa.mil/about-us/offices/i2o?ppl=collapse" target="_blank">https://www.darpa.mil/about-us/offices/i2o?ppl=collapse</a></p><p>High-Assurance Cyber Military Systems (HACMS): <a href="https://www.darpa.mil/program/high-assurance-cyber-military-systems" target="_blank">https://www.darpa.mil/program/high-assurance-cyber-military-systems</a></p><p>DARPAConnect Website: <a href="https://pathfinder.theari.us/darpaconnect/home">https://pathfinder.theari.us/darpaconnect/home</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 2 Aug 2024 22:36:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kathleen Fisher)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-summit-keynote-enhancing-national-security-with-ai-driven-cybersecurity-a-black-hat-usa-2024-conversation-with-dr-kathleen-fisher-on-location-coverage-with-sean-martin-and-marco-ciappelli-JUVjU5xM</link>
      <content:encoded><![CDATA[<p><strong>Guest: Dr. Kathleen Fisher</strong>, Information Innovation Office (I2O) Director, Defense Advanced Research Projects Agency (DARPA) [<a href="https://x.com/DARPA">@DARPA</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kathleen-fisher-4000964/">https://www.linkedin.com/in/kathleen-fisher-4000964/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/us-24/summit-sessions/schedule/speakers.html#dr-kathleen-fisher-48776" target="_blank">https://www.blackhat.com/us-24/summit-sessions/schedule/speakers.html#dr-kathleen-fisher-48776</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location with Sean and Marco episode, hosts Sean Martin and Marco Ciappelli engage in an insightful conversation with Dr. Kathleen Fisher from the Defense Advanced Research Projects Agency (DARPA). The discussion centers around the upcoming Black Hat and DEF CON events, where Dr. Fisher is scheduled to deliver a keynote on the intersection of artificial intelligence (AI) and cybersecurity, with a particular focus on DARPA's ongoing initiatives and competitions.</p><p>Dr. Fisher begins by providing an overview of her background and DARPA's mission to prevent technological surprises that could undermine U.S. national security. She recounts the success of the High-Assurance Cyber Military Systems (HACMS) program, which utilized formal methods to create highly secure software for military vehicles. This program demonstrated the potential of formal methods to revolutionize cybersecurity, proving that robust software could be developed to withstand hacking attempts, even from world-class red teams.</p><p>The conversation then shifts to the AI Cyber Challenge (AICC) program, a major highlight of her upcoming keynote. AICC aims to leverage the power of AI combined with cyber reasoning systems to automatically find and fix vulnerabilities in real open-source software—an ambitious extension of DARPA's previous Cyber Grand Challenge. This competition involves collaboration with major tech companies like Google, Anthropic, OpenAI, and Microsoft, offering competitors access to state-of-the-art models to tackle real-world vulnerabilities.</p><p>Dr. Fisher emphasizes the importance of public-private collaboration in advancing cybersecurity technologies. DARPA's charter allows it to work with a diverse range of organizations, from startups to national labs, in pursuit of strategic technological advances. The episode also touches on the potential impact of cyber vulnerabilities on critical infrastructure, underscoring the need for scalable and automatic solutions to address these threats.</p><p>Listeners can anticipate Dr. Fisher highlighting these themes in her keynote, aimed at business leaders, practitioners, policymakers, and risk managers. She will outline how the audience can engage with DARPA's initiatives and contribute to the ongoing efforts to enhance national security through innovative technology solutions.</p><p>The episode promises to provide a nuanced understanding of DARPA's role in pioneering AI-driven cybersecurity advancements and offers a preview of the exciting developments to be showcased at Black Hat and DEF CON.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Keynote: Enhancing National Security with AI-Driven Cybersecurity: <a href="https://www.blackhat.com/us-24/summit-sessions/schedule/index.html#keynote--enhancing-national-security-with-ai-driven-cybersecurity-41250" target="_blank">https://www.blackhat.com/us-24/summit-sessions/schedule/index.html#keynote--enhancing-national-security-with-ai-driven-cybersecurity-41250</a></p><p>AI Cyber Challenge: <a href="https://aicyberchallenge.com/" target="_blank">https://aicyberchallenge.com/</a></p><p>DARPA's Information Innovation Office: <a href="https://www.darpa.mil/about-us/offices/i2o?ppl=collapse" target="_blank">https://www.darpa.mil/about-us/offices/i2o?ppl=collapse</a></p><p>High-Assurance Cyber Military Systems (HACMS): <a href="https://www.darpa.mil/program/high-assurance-cyber-military-systems" target="_blank">https://www.darpa.mil/program/high-assurance-cyber-military-systems</a></p><p>DARPAConnect Website: <a href="https://pathfinder.theari.us/darpaconnect/home">https://pathfinder.theari.us/darpaconnect/home</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24276855" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a17ffd4d-c1df-42a5-93bd-ec38cf9c9cab/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a17ffd4d-c1df-42a5-93bd-ec38cf9c9cab&amp;feed=2M86zCcc"/>
      <itunes:title>AI Summit Keynote: Enhancing National Security with AI-Driven Cybersecurity | A Black Hat USA 2024 Conversation with Dr. Kathleen Fisher | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kathleen Fisher</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:17</itunes:duration>
      <itunes:summary>Join hosts Sean Martin and Marco Ciappelli as they have an enlightening discussion with Dr. Kathleen Fisher from DARPA, exploring groundbreaking advancements at the intersection of AI and cybersecurity, and previewing key highlights of the upcoming Black Hat and DEF CON events. Discover how DARPA&apos;s innovative programs and collaborative efforts are revolutionizing the protection of critical infrastructure and national security.</itunes:summary>
      <itunes:subtitle>Join hosts Sean Martin and Marco Ciappelli as they have an enlightening discussion with Dr. Kathleen Fisher from DARPA, exploring groundbreaking advancements at the intersection of AI and cybersecurity, and previewing key highlights of the upcoming Black Hat and DEF CON events. Discover how DARPA&apos;s innovative programs and collaborative efforts are revolutionizing the protection of critical infrastructure and national security.</itunes:subtitle>
      <itunes:keywords>critical infrastructure, technology, marco ciappelli, public-private collaboration, darpa programs, ai cyber challenge, hackums, software security, black hat, sean martin, def con, darpa, cybersecurity, conference, vulnerabilities, cyber reasoning, open source, formal methods, national security, podcast, security, ai, kathleen fisher, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e1a6f8a7-8b10-4ed0-b008-ed55d3cacf9b</guid>
      <title>Reconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>L Jean Camp</strong>, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [<a href="https://x.com/IUBloomington">@IUBloomington</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ljean/">https://www.linkedin.com/in/ljean/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968</a></p><p><strong>Dalya Manatova</strong>, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [<a href="https://x.com/IUBloomington">@IUBloomington</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dalyapraz/">https://www.linkedin.com/in/dalyapraz/</a></p><p>At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133</p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this Chats on the Road episode of the On Location with Sean and Marco podcast series, hosts Sean Martin and Marco Ciappelli engage in an insightful conversation about the intricacies of modern cybercrime, specifically focusing on ransomware gangs. The discussion revolves around the research conducted by their guests, L Jean Camp, a scholar specializing in the economics of security and privacy, and Dalya Manatova, a PhD student studying security informatics and the organizational social dynamics of e-crime.</p><p>The episode explores how ransomware gangs, such as the notorious Conti group, operate much like legitimate businesses. These criminal organizations exhibit structured hierarchies, recruit testers who may not even realize they are part of an illegal operation, and employ professional negotiation tactics with their victims. The guests emphasize that the threat posed by these gangs is often misunderstood; rather than facing advanced government operations, most individuals and organizations are dealing with commoditized cyber-attacks that follow business-like procedures.</p><p>Jean and Dalya share intriguing details about their methodology, including the linguistic and discourse analyses used to map out the relationships and organizational structures within these criminal groups. These analyses reveal the complexities and resilience of the organizations, shedding light on how they maintain operational efficiency and manage internal communications. For instance, the researchers discuss the use of jargon like “cat” to refer to crypto wallets, a nuance that highlights the challenges of interpreting cybercriminal chatter.</p><p>Additionally, the conversation touches on the implications of these findings for cybersecurity practices and the broader business landscape. Jean notes the importance of information sharing and understanding the flow of chatter within and between criminal organizations. This awareness can empower defenders by providing them with better tools and methods to anticipate and counteract these threats.</p><p>Overall, the episode provides a comprehensive look at the sophisticated nature of ransomware gangs and the importance of interdisciplinary research in understanding and combating cybercrime. The session mentioned in the episode, "Relationships Matter: Reconstructing the Organizational and Social Structure of a Ransomware Gang," is slated for Wednesday, August 7th at Black Hat, promising to offer more extensive insights into this critical issue.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Relationships Matter: Reconstructing the Organizational and Social Structure of a Ransomware Gang: <a href="https://www.blackhat.com/us-24/briefings/schedule/#relationships-matter-reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-39725" target="_blank">https://www.blackhat.com/us-24/briefings/schedule/#relationships-matter-reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-39725</a></p><p>An Argument for Linguistic Expertise in Cyberthreat Analysis: <a href="https://www.researchgate.net/publication/372244795_An_Argument_for_Linguistic_Expertise_in_Cyberthreat_Analysis_LOLSec_in_Russian_Language_eCrime_Landscape">https://www.researchgate.net/publication/372244795_An_Argument_for_Linguistic_Expertise_in_Cyberthreat_Analysis_LOLSec_in_Russian_Language_eCrime_Landscape</a></p><p>Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains: <a href="https://www.researchgate.net/publication/371353386_Building_and_Testing_a_Network_of_Social_Trust_in_an_Underground_Forum_Robust_Connections_and_Overlapping_Criminal_Domains">https://www.researchgate.net/publication/371353386_Building_and_Testing_a_Network_of_Social_Trust_in_an_Underground_Forum_Robust_Connections_and_Overlapping_Criminal_Domains</a></p><p>Usable Security Lab: <a href="https://usablesecurity.net/">https://usablesecurity.net/</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 Aug 2024 18:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, L Jean Camp, Dalya Manatova)</author>
      <link>https://eventcoveragepodcast.com/episodes/reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-a-black-hat-usa-2024-conversation-with-l-jean-camp-and-dalya-manatova-on-location-coverage-with-sean-martin-and-marco-ciappelli-hgoFJUXa</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>L Jean Camp</strong>, Professor, Luddy School of Computing, Informatics, and Engineering, Indiana University [<a href="https://x.com/IUBloomington">@IUBloomington</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ljean/">https://www.linkedin.com/in/ljean/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#l-jean-camp-37968</a></p><p><strong>Dalya Manatova</strong>, Associate Instructor/Ph.D. Student, Luddy School of Computing, Informatics, and Engineering, Indiana University [<a href="https://x.com/IUBloomington">@IUBloomington</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dalyapraz/">https://www.linkedin.com/in/dalyapraz/</a></p><p>At BlackHat | https://www.blackhat.com/us-24/briefings/schedule/speakers.html#dalya-manatova-48133</p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this Chats on the Road episode of the On Location with Sean and Marco podcast series, hosts Sean Martin and Marco Ciappelli engage in an insightful conversation about the intricacies of modern cybercrime, specifically focusing on ransomware gangs. The discussion revolves around the research conducted by their guests, L Jean Camp, a scholar specializing in the economics of security and privacy, and Dalya Manatova, a PhD student studying security informatics and the organizational social dynamics of e-crime.</p><p>The episode explores how ransomware gangs, such as the notorious Conti group, operate much like legitimate businesses. These criminal organizations exhibit structured hierarchies, recruit testers who may not even realize they are part of an illegal operation, and employ professional negotiation tactics with their victims. The guests emphasize that the threat posed by these gangs is often misunderstood; rather than facing advanced government operations, most individuals and organizations are dealing with commoditized cyber-attacks that follow business-like procedures.</p><p>Jean and Dalya share intriguing details about their methodology, including the linguistic and discourse analyses used to map out the relationships and organizational structures within these criminal groups. These analyses reveal the complexities and resilience of the organizations, shedding light on how they maintain operational efficiency and manage internal communications. For instance, the researchers discuss the use of jargon like “cat” to refer to crypto wallets, a nuance that highlights the challenges of interpreting cybercriminal chatter.</p><p>Additionally, the conversation touches on the implications of these findings for cybersecurity practices and the broader business landscape. Jean notes the importance of information sharing and understanding the flow of chatter within and between criminal organizations. This awareness can empower defenders by providing them with better tools and methods to anticipate and counteract these threats.</p><p>Overall, the episode provides a comprehensive look at the sophisticated nature of ransomware gangs and the importance of interdisciplinary research in understanding and combating cybercrime. The session mentioned in the episode, "Relationships Matter: Reconstructing the Organizational and Social Structure of a Ransomware Gang," is slated for Wednesday, August 7th at Black Hat, promising to offer more extensive insights into this critical issue.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Relationships Matter: Reconstructing the Organizational and Social Structure of a Ransomware Gang: <a href="https://www.blackhat.com/us-24/briefings/schedule/#relationships-matter-reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-39725" target="_blank">https://www.blackhat.com/us-24/briefings/schedule/#relationships-matter-reconstructing-the-organizational-and-social-structure-of-a-ransomware-gang-39725</a></p><p>An Argument for Linguistic Expertise in Cyberthreat Analysis: <a href="https://www.researchgate.net/publication/372244795_An_Argument_for_Linguistic_Expertise_in_Cyberthreat_Analysis_LOLSec_in_Russian_Language_eCrime_Landscape">https://www.researchgate.net/publication/372244795_An_Argument_for_Linguistic_Expertise_in_Cyberthreat_Analysis_LOLSec_in_Russian_Language_eCrime_Landscape</a></p><p>Building and Testing a Network of Social Trust in an Underground Forum: Robust Connections and Overlapping Criminal Domains: <a href="https://www.researchgate.net/publication/371353386_Building_and_Testing_a_Network_of_Social_Trust_in_an_Underground_Forum_Robust_Connections_and_Overlapping_Criminal_Domains">https://www.researchgate.net/publication/371353386_Building_and_Testing_a_Network_of_Social_Trust_in_an_Underground_Forum_Robust_Connections_and_Overlapping_Criminal_Domains</a></p><p>Usable Security Lab: <a href="https://usablesecurity.net/">https://usablesecurity.net/</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22736244" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8eda076b-e705-42dc-9890-a1077e9f68cb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8eda076b-e705-42dc-9890-a1077e9f68cb&amp;feed=2M86zCcc"/>
      <itunes:title>Reconstructing the Organizational and Social Structure of a Ransomware Gang | A Black Hat USA 2024 Conversation with L Jean Camp and Dalya Manatova | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, L Jean Camp, Dalya Manatova</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:40</itunes:duration>
      <itunes:summary>In this Chats on the Road episode of the On Location with Sean and Marco podcast series, hosts Sean Martin and Marco Ciappelli dive into the business-like operations of ransomware gangs with their guests, L Jean Camp and Dalya Manatova. Discover the hidden organizational structures and nuanced social dynamics that make these cybercriminals so effective in their illicit activities, and learn how this research can transform our approach to cybersecurity.</itunes:summary>
      <itunes:subtitle>In this Chats on the Road episode of the On Location with Sean and Marco podcast series, hosts Sean Martin and Marco Ciappelli dive into the business-like operations of ransomware gangs with their guests, L Jean Camp and Dalya Manatova. Discover the hidden organizational structures and nuanced social dynamics that make these cybercriminals so effective in their illicit activities, and learn how this research can transform our approach to cybersecurity.</itunes:subtitle>
      <itunes:keywords>conti, marco ciappelli, l jean camp, economics, research, black hat, sean martin, discourse, social dynamics, attack, informatics, cybersecurity, dalya manatova, conference, organization, cybercrime, linguistic, hierarchy, ransomware, podcast, methodology, security, threat, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7def90ce-6ccf-4b21-a999-49b8aae61e9c</guid>
      <title>Deep Backdoors in Deep Reinforcement Learning Agents | A Black Hat USA 2024 Conversation with Vas Mavroudis and Jamie Gawith | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Vas Mavroudis</strong>, Principal Research Scientist, The Alan Turing Institute</p><p>Website | <a href="https://mavroud.is/">https://mavroud.is/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757</a></p><p><strong>Jamie Gawith</strong>, Assistant Professor of Electrical Engineering, University of Bath</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jamie-gawith-63560b60/">https://www.linkedin.com/in/jamie-gawith-63560b60/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As Black Hat Conference 2024 approaches, Sean Martin and Marco Ciappelli are gearing up for a conversation about the complexities of deep reinforcement learning and the potential cybersecurity threats posed by backdoors in these systems. They will be joined by Vas Mavroudis from the Alan Turing Institute and Jamie Gawith from the University of Bath, who will be presenting their cutting-edge research at the event.</p><p><strong>Setting the Stage:</strong> The discussion begins with Sean and Marco sharing their excitement about the upcoming conference. They set a professional and engaging tone, seamlessly leading into the introduction of their guests, Jamie and Vas.</p><p><strong>The Core Discussion:</strong> Sean introduces the main focus of their upcoming session, titled "Backdoors in Deep Reinforcement Learning Agents." Expressing curiosity and anticipation, he invites Jamie and Vas to share more about their backgrounds and the significance of their work in this area.</p><p><strong>Expert Introductions:</strong> Jamie Gawith explains his journey from working in power electronics and nuclear fusion to focusing on cybersecurity. His collaboration with Vas arose from a shared interest in using reinforcement learning agents for controlling nuclear fusion reactors. He describes the crucial role these agents play and the potential risks associated with their deployment in critical environments.</p><p>Vas Mavroudis introduces himself as a principal research scientist at the Alan Turing Institute, leading a team focused on autonomous cyber defense. His work involves developing and securing autonomous agents tasked with defending networks and systems from cyber threats. The conversation highlights the vulnerabilities of these agents to backdoors and the need for robust security measures.</p><p><strong>Deep Dive into Reinforcement Learning:</strong> Vas offers an overview of reinforcement learning, highlighting its differences from supervised and unsupervised learning. He emphasizes the importance of real-world experiences in training these agents to make optimal decisions through trial and error. The conversation also touches on the use of deep neural networks, which enhance the capabilities of reinforcement learning models but also introduce complexities that can be exploited.</p><p><strong>Security Concerns:</strong> The discussion then shifts to the security challenges associated with reinforcement learning models. Vas explains the concept of backdoors in machine learning and the unique challenges they present. Unlike traditional software backdoors, these are hidden within the neural network layers, making detection difficult.</p><p><strong>Real-World Implications:</strong> Jamie discusses the practical implications of these security issues, particularly in high-stakes scenarios like nuclear fusion reactors. He outlines the potential catastrophic consequences of a backdoor-triggered failure, underscoring the importance of securing these models to prevent malicious exploitation.</p><p><strong>Looking Ahead:</strong> Sean and Marco express their anticipation for the upcoming session, highlighting the collaborative efforts of Vas, Jamie, and their teams in tackling these critical issues. They emphasize the significance of this research and its implications for the future of autonomous systems.</p><p><strong>Conclusion:</strong> This pre-event conversation sets the stage for a compelling session at Black Hat Conference 2024. It offers attendees a preview of the insights and discussions they can expect about the intersection of deep reinforcement learning and cybersecurity. The session promises to provide valuable knowledge on protecting advanced technologies from emerging threats.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Deep Backdoors in Deep Reinforcement Learning Agents: <a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#deep-backdoors-in-deep-reinforcement-learning-agents-39550">https://www.blackhat.com/us-24/briefings/schedule/index.html#deep-backdoors-in-deep-reinforcement-learning-agents-39550</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 Aug 2024 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vas Mavroudis, Jamie Gawith)</author>
      <link>https://eventcoveragepodcast.com/episodes/deep-backdoors-in-deep-reinforcement-learning-agents-a-black-hat-usa-2024-conversation-with-vas-mavroudis-and-jamie-gawith-on-location-coverage-with-sean-martin-and-marco-ciappelli-pF0fUPLk</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Vas Mavroudis</strong>, Principal Research Scientist, The Alan Turing Institute</p><p>Website | <a href="https://mavroud.is/">https://mavroud.is/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#vasilios-mavroudis-34757</a></p><p><strong>Jamie Gawith</strong>, Assistant Professor of Electrical Engineering, University of Bath</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jamie-gawith-63560b60/">https://www.linkedin.com/in/jamie-gawith-63560b60/</a></p><p>At BlackHat | <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jamie-gawith-48261</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As Black Hat Conference 2024 approaches, Sean Martin and Marco Ciappelli are gearing up for a conversation about the complexities of deep reinforcement learning and the potential cybersecurity threats posed by backdoors in these systems. They will be joined by Vas Mavroudis from the Alan Turing Institute and Jamie Gawith from the University of Bath, who will be presenting their cutting-edge research at the event.</p><p><strong>Setting the Stage:</strong> The discussion begins with Sean and Marco sharing their excitement about the upcoming conference. They set a professional and engaging tone, seamlessly leading into the introduction of their guests, Jamie and Vas.</p><p><strong>The Core Discussion:</strong> Sean introduces the main focus of their upcoming session, titled "Backdoors in Deep Reinforcement Learning Agents." Expressing curiosity and anticipation, he invites Jamie and Vas to share more about their backgrounds and the significance of their work in this area.</p><p><strong>Expert Introductions:</strong> Jamie Gawith explains his journey from working in power electronics and nuclear fusion to focusing on cybersecurity. His collaboration with Vas arose from a shared interest in using reinforcement learning agents for controlling nuclear fusion reactors. He describes the crucial role these agents play and the potential risks associated with their deployment in critical environments.</p><p>Vas Mavroudis introduces himself as a principal research scientist at the Alan Turing Institute, leading a team focused on autonomous cyber defense. His work involves developing and securing autonomous agents tasked with defending networks and systems from cyber threats. The conversation highlights the vulnerabilities of these agents to backdoors and the need for robust security measures.</p><p><strong>Deep Dive into Reinforcement Learning:</strong> Vas offers an overview of reinforcement learning, highlighting its differences from supervised and unsupervised learning. He emphasizes the importance of real-world experiences in training these agents to make optimal decisions through trial and error. The conversation also touches on the use of deep neural networks, which enhance the capabilities of reinforcement learning models but also introduce complexities that can be exploited.</p><p><strong>Security Concerns:</strong> The discussion then shifts to the security challenges associated with reinforcement learning models. Vas explains the concept of backdoors in machine learning and the unique challenges they present. Unlike traditional software backdoors, these are hidden within the neural network layers, making detection difficult.</p><p><strong>Real-World Implications:</strong> Jamie discusses the practical implications of these security issues, particularly in high-stakes scenarios like nuclear fusion reactors. He outlines the potential catastrophic consequences of a backdoor-triggered failure, underscoring the importance of securing these models to prevent malicious exploitation.</p><p><strong>Looking Ahead:</strong> Sean and Marco express their anticipation for the upcoming session, highlighting the collaborative efforts of Vas, Jamie, and their teams in tackling these critical issues. They emphasize the significance of this research and its implications for the future of autonomous systems.</p><p><strong>Conclusion:</strong> This pre-event conversation sets the stage for a compelling session at Black Hat Conference 2024. It offers attendees a preview of the insights and discussions they can expect about the intersection of deep reinforcement learning and cybersecurity. The session promises to provide valuable knowledge on protecting advanced technologies from emerging threats.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Deep Backdoors in Deep Reinforcement Learning Agents: <a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#deep-backdoors-in-deep-reinforcement-learning-agents-39550">https://www.blackhat.com/us-24/briefings/schedule/index.html#deep-backdoors-in-deep-reinforcement-learning-agents-39550</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23220692" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/328e1f46-b859-475f-ac70-8d624d53ef3a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=328e1f46-b859-475f-ac70-8d624d53ef3a&amp;feed=2M86zCcc"/>
      <itunes:title>Deep Backdoors in Deep Reinforcement Learning Agents | A Black Hat USA 2024 Conversation with Vas Mavroudis and Jamie Gawith | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vas Mavroudis, Jamie Gawith</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:11</itunes:duration>
      <itunes:summary>Prepare to explore the complex world of deep reinforcement learning and cybersecurity backdoors with experts Vas Mavroudis and Jamie Gawith at the upcoming Black Hat Conference 2024 in Las Vegas.</itunes:summary>
      <itunes:subtitle>Prepare to explore the complex world of deep reinforcement learning and cybersecurity backdoors with experts Vas Mavroudis and Jamie Gawith at the upcoming Black Hat Conference 2024 in Las Vegas.</itunes:subtitle>
      <itunes:keywords>reinforcement learning agents, alan turing institute, marco ciappelli, university of bath, ai security, vas mavroudis, sean martin, machine learning backdoors, nuclear fusion, cybersecurity, black hat conference, conference, autonomous cyber defense, podcast, security, cybersecurity research, deep reinforcement learning, black hat 2024, ai research, ai in cybersecurity, jamie gawith, cybersecurityconference, cyber threats, ai backdoors</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5856b381-0938-4a08-9122-7da4bc4d5eb6</guid>
      <title>Traceability in Cyber Security: Lessons Learned from the Medical Sector | A Conversation with Kostas Papapanagiotou | Redefining CyberSecurity with Sean Martin</title>
      <description><![CDATA[<p><strong>Guest: Dr. Kostas Papapanagiotou</strong>, Advisory Services Director, Census S.A.</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kpapapan/" target="_blank">https://www.linkedin.com/in/kpapapan/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>Cybersecurity practices for medical devices are crucial, touching on compliance, patient safety, and the rigorous demands of various sectors such as automotive and financial services. In an insightful conversation between Sean Martin, host of the Redefining CyberSecurity Podcast, and Kostas Papapanagiotou, leader of the advisory service division at Census, several key takeaways emerge. Kostas, who has over 20 years of experience in cybersecurity and application security, underscores the complexity of medical devices.</p><p>No longer confined to standalone units, modern medical devices may encompass hardware components, software, connectivity to hospital networks or cloud services, and more. Thus, they require a comprehensive security approach.</p><p>Kostas notes that the FDA views these devices holistically, requiring all components to be evaluated for security risks. One of the most significant points highlighted is the concept of shared responsibility. According to Kostas, it is essential for medical device manufacturers to consider how their products integrate with existing hospital networks and what security measures are necessary to protect patient information. This extends to issuing guidelines and documentation for secure network integration, an effort that underscores the necessity of thorough and clear documentation in maintaining cybersecurity standards.</p><p>Furthermore, Kostas points out that regulations like the FDA’s post-market plan necessitate that manufacturers prepare for the entire lifecycle of a device, including potential vulnerabilities that may arise years after deployment. He shares real-world examples, such as the challenge of outdated Android versions in medical devices, which can no longer receive security updates and thus present vulnerabilities. In addition to compliance, the podcast discusses the shift left security paradigm, which emphasizes integrating security measures early in the software development lifecycle to prevent costly and challenging fixes later.</p><p>Kostas advocates for proactive threat modeling as a tool to foresee potential risks and implement security controls right from the design phase. This approach aligns with the FDA's emphasis on mitigating patient harm as the ultimate priority.</p><p>The conversation also touches on how these rigorous requirements from the medical device sector can inform cybersecurity practices in other critical areas like automotive manufacturing. Kostas remarks that the automotive industry is yet to reach the maturity seen in medical device regulations, often grappling with interoperability and supply chain complexities.</p><p>This podcast episode offers vital insights and actionable advice for cybersecurity professionals and organizations involved with critical, life-impacting technologies. Engaging discussions such as these underline the importance of regulatory compliance, thorough documentation, and proactive security measures in safeguarding both technology and human lives.</p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>Traceability in cyber security: lessons learned from the medical sector (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTbW/traceability-in-cyber-security-lessons-learned-from-the-medical-sector" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTbW/traceability-in-cyber-security-lessons-learned-from-the-medical-sector</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 Aug 2024 17:01:24 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kostas Papapanagiotou)</author>
      <link>https://eventcoveragepodcast.com/episodes/traceability-in-cyber-security-lessons-learned-from-the-medical-sector-a-conversation-with-kostas-papapanagiotou-redefining-cybersecurity-with-sean-martin-z2_qXd6i</link>
      <content:encoded><![CDATA[<p><strong>Guest: Dr. Kostas Papapanagiotou</strong>, Advisory Services Director, Census S.A.</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kpapapan/" target="_blank">https://www.linkedin.com/in/kpapapan/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>Cybersecurity practices for medical devices are crucial, touching on compliance, patient safety, and the rigorous demands of various sectors such as automotive and financial services. In an insightful conversation between Sean Martin, host of the Redefining CyberSecurity Podcast, and Kostas Papapanagiotou, leader of the advisory service division at Census, several key takeaways emerge. Kostas, who has over 20 years of experience in cybersecurity and application security, underscores the complexity of medical devices.</p><p>No longer confined to standalone units, modern medical devices may encompass hardware components, software, connectivity to hospital networks or cloud services, and more. Thus, they require a comprehensive security approach.</p><p>Kostas notes that the FDA views these devices holistically, requiring all components to be evaluated for security risks. One of the most significant points highlighted is the concept of shared responsibility. According to Kostas, it is essential for medical device manufacturers to consider how their products integrate with existing hospital networks and what security measures are necessary to protect patient information. This extends to issuing guidelines and documentation for secure network integration, an effort that underscores the necessity of thorough and clear documentation in maintaining cybersecurity standards.</p><p>Furthermore, Kostas points out that regulations like the FDA’s post-market plan necessitate that manufacturers prepare for the entire lifecycle of a device, including potential vulnerabilities that may arise years after deployment. He shares real-world examples, such as the challenge of outdated Android versions in medical devices, which can no longer receive security updates and thus present vulnerabilities. In addition to compliance, the podcast discusses the shift left security paradigm, which emphasizes integrating security measures early in the software development lifecycle to prevent costly and challenging fixes later.</p><p>Kostas advocates for proactive threat modeling as a tool to foresee potential risks and implement security controls right from the design phase. This approach aligns with the FDA's emphasis on mitigating patient harm as the ultimate priority.</p><p>The conversation also touches on how these rigorous requirements from the medical device sector can inform cybersecurity practices in other critical areas like automotive manufacturing. Kostas remarks that the automotive industry is yet to reach the maturity seen in medical device regulations, often grappling with interoperability and supply chain complexities.</p><p>This podcast episode offers vital insights and actionable advice for cybersecurity professionals and organizations involved with critical, life-impacting technologies. Engaging discussions such as these underline the importance of regulatory compliance, thorough documentation, and proactive security measures in safeguarding both technology and human lives.</p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>Traceability in cyber security: lessons learned from the medical sector (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTbW/traceability-in-cyber-security-lessons-learned-from-the-medical-sector" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTbW/traceability-in-cyber-security-lessons-learned-from-the-medical-sector</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28296417" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/750aab79-224f-4108-b918-4b7750f42570/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=750aab79-224f-4108-b918-4b7750f42570&amp;feed=2M86zCcc"/>
      <itunes:title>Traceability in Cyber Security: Lessons Learned from the Medical Sector | A Conversation with Kostas Papapanagiotou | Redefining CyberSecurity with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kostas Papapanagiotou</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:28</itunes:duration>
      <itunes:summary>In this episode of the Redefining CyberSecurity Podcast, host Sean Martin talks with Kostas Papapanagiotou about the critical importance of holistic cybersecurity practices for medical devices and the role of regulatory bodies like the FDA. Kostas shares valuable insights on shared responsibility, proactive threat modeling, and how lessons from the medical sector can improve cybersecurity in other industries.</itunes:summary>
      <itunes:subtitle>In this episode of the Redefining CyberSecurity Podcast, host Sean Martin talks with Kostas Papapanagiotou about the critical importance of holistic cybersecurity practices for medical devices and the role of regulatory bodies like the FDA. Kostas shares valuable insights on shared responsibility, proactive threat modeling, and how lessons from the medical sector can improve cybersecurity in other industries.</itunes:subtitle>
      <itunes:keywords>compliance, shared responsibility, security controls, sean martin, cybersecurity, conference, patient safety, vulnerability, regulations, risk management, automotive, cloud services, fda, podcast, security, lifecycle, owasp, documentation, kostas papapanagiotou, kostas papapanagiotou, medical devices, cybersecurityconference, healthcare, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">53ee3917-b9fa-4303-9543-e709d27926fe</guid>
      <title>From Zero Trust to AI and now Platformization and Consolidation: Debunking Cybersecurity Buzzwords | A Brand Story Conversation From Black Hat USA 2024 | A Coro Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Join the On Location Podcast co-hosts, Sean Martin and Marco Ciappelli, as they kick off an engaging conversation with Dror Liwer, Co-Founder of Coro, discussing SMB cybersecurity and preparations for Black Hat 2024.</p><p>Dror emphasizes Coro’s excitement about participating in Black Hat for the second year, where they will be showcasing their offerings at booth 4734. He contrasts Black Hat with other conferences, noting its unique focus on cybersecurity practitioners and those who carry the weight of their organizations' security.</p><p>Throughout the discussion, Dror tackles the buzzwords and trends in the cybersecurity industry. This year, the buzzword is "platform," and Dror provides insight into what truly constitutes a cybersecurity platform. He distinguishes between various types of platforms, such as those built from multiple vendors, internally developed ones like Cisco and Palo Alto, and Coro's own from-the-ground-up modular platform. He also discusses the advantages of a unified and seamless approach to cybersecurity.</p><p>The conversation covers the practical benefits of Coro’s platform for service providers and end customers. Dror mentions how Coro simplifies cybersecurity by allowing easy onboarding and flexible licensing. He highlights Coro’s data governance capabilities and modular design, which enable users to scale their security needs up or down efficiently.</p><p>Dror also teases his upcoming talk at Black Hat, titled “Platformization, Consolidation, and Other Buzzwords Debunked,” promising a comprehensive framework to help organizations evaluate and select the right cybersecurity platforms for their needs.</p><p>The episode closes with Sean and Marco expressing their enthusiasm for continuing the conversation at Black Hat and encouraging listeners to connect with Coro’s energetic team. They also invite the audience to stay tuned for more updates and insights from the event.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Jul 2024 01:28:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-zero-trust-to-ai-and-now-platformization-and-consolidation-debunking-cybersecurity-buzzwords-a-brand-story-conversation-from-black-hat-usa-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-NW76OdrX</link>
      <content:encoded><![CDATA[<p>Join the On Location Podcast co-hosts, Sean Martin and Marco Ciappelli, as they kick off an engaging conversation with Dror Liwer, Co-Founder of Coro, discussing SMB cybersecurity and preparations for Black Hat 2024.</p><p>Dror emphasizes Coro’s excitement about participating in Black Hat for the second year, where they will be showcasing their offerings at booth 4734. He contrasts Black Hat with other conferences, noting its unique focus on cybersecurity practitioners and those who carry the weight of their organizations' security.</p><p>Throughout the discussion, Dror tackles the buzzwords and trends in the cybersecurity industry. This year, the buzzword is "platform," and Dror provides insight into what truly constitutes a cybersecurity platform. He distinguishes between various types of platforms, such as those built from multiple vendors, internally developed ones like Cisco and Palo Alto, and Coro's own from-the-ground-up modular platform. He also discusses the advantages of a unified and seamless approach to cybersecurity.</p><p>The conversation covers the practical benefits of Coro’s platform for service providers and end customers. Dror mentions how Coro simplifies cybersecurity by allowing easy onboarding and flexible licensing. He highlights Coro’s data governance capabilities and modular design, which enable users to scale their security needs up or down efficiently.</p><p>Dror also teases his upcoming talk at Black Hat, titled “Platformization, Consolidation, and Other Buzzwords Debunked,” promising a comprehensive framework to help organizations evaluate and select the right cybersecurity platforms for their needs.</p><p>The episode closes with Sean and Marco expressing their enthusiasm for continuing the conversation at Black Hat and encouraging listeners to connect with Coro’s energetic team. They also invite the audience to stay tuned for more updates and insights from the event.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23538776" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/45080cc9-32a8-4d73-8d4b-dc213b4b5801/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=45080cc9-32a8-4d73-8d4b-dc213b4b5801&amp;feed=2M86zCcc"/>
      <itunes:title>From Zero Trust to AI and now Platformization and Consolidation: Debunking Cybersecurity Buzzwords | A Brand Story Conversation From Black Hat USA 2024 | A Coro Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:31</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they chat with Dror Liwer, Co-Founder of Coro, about the latest trends in SMB cybersecurity and preparations for Black Hat 2024. Discover the true meaning of a cybersecurity platform and gain insights on how Coro simplifies and enhances security for small to mid-sized businesses.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they chat with Dror Liwer, Co-Founder of Coro, about the latest trends in SMB cybersecurity and preparations for Black Hat 2024. Discover the true meaning of a cybersecurity platform and gain insights on how Coro simplifies and enhances security for small to mid-sized businesses.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, cybersecurity buzzwords, trends, cyber trends, bhusa2024, msp, sean martin, cybersecurity, data governance, small business security, bhusa, endpoint security, platformization, mid-market security, consolidation, smb, dror liwer, cloud security, security platforms, black hat 2024, brand story, mssp, coro</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">de77582c-1ce3-4598-89a6-5421075d33bb</guid>
      <title>The Fault in Our Metrics: Rethinking How We Measure Detection &amp; Response | A Conversation with Allyn Stott | Redefining CyberSecurity with Sean Martin</title>
      <description><![CDATA[<p><strong>Guest: Allyn Stott</strong>, Senior Staff Engineer, meoward.co</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/whyallyn">https://www.linkedin.com/in/whyallyn</a></p><p>On Twitter | <a href="https://x.com/whyallyn">https://x.com/whyallyn</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In this episode of The Redefining CyberSecurity Podcast, host Sean Martin converses with Allyn Stott, who shares his insights on rethinking how we measure detection and response in cybersecurity. The episode explores the nuances of cybersecurity metrics, emphasizing that it's not just about having metrics, but having the right metrics that truly reflect the effectiveness and efficiency of a security program.</p><p>Stott discusses his journey from red team operations to blue team roles, where he has focused on detection and response. His dual perspective provides a nuanced understanding of both offensive and defensive security strategies. Stott highlights a common issue in cybersecurity: the misalignment of metrics with organizational goals. He points out that many teams inherit metrics that may not accurately reflect their current state or objectives. Instead, metrics should be strategically chosen to guide decision-making and improve security posture. One of his key messages is the importance of understanding what specific metrics are meant to convey and ensuring they are directly actionable.</p><p>In his framework, aptly named SAVER (Streamlined, Awareness, Vigilance, Exploration, Readiness), Stott outlines a holistic approach to security metrics. Streamlined focuses on operational efficiencies achieved through better tools and processes. Awareness pertains to the dissemination of threat intelligence and ensuring that the most critical information is shared across the organization. Vigilance involves preparing for and understanding top threats through informed threat hunting. Exploration encourages the proactive discovery of vulnerabilities and security gaps through threat hunts and incident analysis. Finally, Readiness measures the preparedness and efficacy of incident response plans, emphasizing the coverage and completeness of playbooks over mere response times.</p><p>Martin and Stott also discuss the challenge of metrics in smaller organizations, where resources may be limited. Stott suggests that simplicity can be powerful, advocating for a focus on key risks and leveraging publicly available threat intelligence. His advice to smaller teams is to prioritize understanding the most significant threats and tailoring responses accordingly.</p><p>The conversation underscores a critical point: metrics should not just quantify performance but also drive strategic improvements. By asking the right questions and focusing on actionable insights, cybersecurity teams can better align their efforts with their organization's broader goals.</p><p>For those interested in further insights, Stott mentions his upcoming talks at B-Sides Las Vegas and Blue Team Con in Chicago, where he will expand on these concepts and share more about his Threat Detection and Response Maturity Model.</p><p>In conclusion, this episode serves as a valuable guide for cybersecurity professionals looking to refine their approach to metrics, making them more meaningful and aligned with their organization's strategic objectives.</p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>The Fault in Our Metrics: Rethinking How We Measure Detection & Response (BSIDES Session): <a href="https://bsideslv.org/talks#EVFTBT" target="_blank">https://bsideslv.org/talks#EVFTBT</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 29 Jul 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine On Location, Sean Martin, Allyn Stott)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-fault-in-our-metrics-rethinking-how-we-measure-detection-response-a-conversation-with-allyn-stott-redefining-cybersecurity-with-sean-martin-npn8of0H</link>
      <content:encoded><![CDATA[<p><strong>Guest: Allyn Stott</strong>, Senior Staff Engineer, meoward.co</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/whyallyn">https://www.linkedin.com/in/whyallyn</a></p><p>On Twitter | <a href="https://x.com/whyallyn">https://x.com/whyallyn</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>In this episode of The Redefining CyberSecurity Podcast, host Sean Martin converses with Allyn Stott, who shares his insights on rethinking how we measure detection and response in cybersecurity. The episode explores the nuances of cybersecurity metrics, emphasizing that it's not just about having metrics, but having the right metrics that truly reflect the effectiveness and efficiency of a security program.</p><p>Stott discusses his journey from red team operations to blue team roles, where he has focused on detection and response. His dual perspective provides a nuanced understanding of both offensive and defensive security strategies. Stott highlights a common issue in cybersecurity: the misalignment of metrics with organizational goals. He points out that many teams inherit metrics that may not accurately reflect their current state or objectives. Instead, metrics should be strategically chosen to guide decision-making and improve security posture. One of his key messages is the importance of understanding what specific metrics are meant to convey and ensuring they are directly actionable.</p><p>In his framework, aptly named SAVER (Streamlined, Awareness, Vigilance, Exploration, Readiness), Stott outlines a holistic approach to security metrics. Streamlined focuses on operational efficiencies achieved through better tools and processes. Awareness pertains to the dissemination of threat intelligence and ensuring that the most critical information is shared across the organization. Vigilance involves preparing for and understanding top threats through informed threat hunting. Exploration encourages the proactive discovery of vulnerabilities and security gaps through threat hunts and incident analysis. Finally, Readiness measures the preparedness and efficacy of incident response plans, emphasizing the coverage and completeness of playbooks over mere response times.</p><p>Martin and Stott also discuss the challenge of metrics in smaller organizations, where resources may be limited. Stott suggests that simplicity can be powerful, advocating for a focus on key risks and leveraging publicly available threat intelligence. His advice to smaller teams is to prioritize understanding the most significant threats and tailoring responses accordingly.</p><p>The conversation underscores a critical point: metrics should not just quantify performance but also drive strategic improvements. By asking the right questions and focusing on actionable insights, cybersecurity teams can better align their efforts with their organization's broader goals.</p><p>For those interested in further insights, Stott mentions his upcoming talks at B-Sides Las Vegas and Blue Team Con in Chicago, where he will expand on these concepts and share more about his Threat Detection and Response Maturity Model.</p><p>In conclusion, this episode serves as a valuable guide for cybersecurity professionals looking to refine their approach to metrics, making them more meaningful and aligned with their organization's strategic objectives.</p><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>The Fault in Our Metrics: Rethinking How We Measure Detection & Response (BSIDES Session): <a href="https://bsideslv.org/talks#EVFTBT" target="_blank">https://bsideslv.org/talks#EVFTBT</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36821532" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e26eacfe-7802-4f3e-bde6-af0fd2648909/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e26eacfe-7802-4f3e-bde6-af0fd2648909&amp;feed=2M86zCcc"/>
      <itunes:title>The Fault in Our Metrics: Rethinking How We Measure Detection &amp; Response | A Conversation with Allyn Stott | Redefining CyberSecurity with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine On Location, Sean Martin, Allyn Stott</itunes:author>
      <itunes:duration>00:38:21</itunes:duration>
      <itunes:summary>In this episode of Redefining CyberSecurity, Sean Martin and Allyn Stott explore how to effectively measure detection and response in cybersecurity using the SAVER framework, highlighting the importance of actionable, goal-aligned metrics. Stott shares his insights from fifteen years in the field, emphasizing the need for metrics that drive strategic improvements and better inform security posture.</itunes:summary>
      <itunes:subtitle>In this episode of Redefining CyberSecurity, Sean Martin and Allyn Stott explore how to effectively measure detection and response in cybersecurity using the SAVER framework, highlighting the importance of actionable, goal-aligned metrics. Stott shares his insights from fifteen years in the field, emphasizing the need for metrics that drive strategic improvements and better inform security posture.</itunes:subtitle>
      <itunes:keywords>blue team, security posture, exploration, allyn stott, sean martin, response, vigilance, cybersecurity, detection, metrics, readiness, podcast episode, threat intelligence, event coverage, awareness, threat hunting, maturity model, incident response, saver, red team, streamline, on-location experience</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">39a2946a-28d7-42d2-a9de-e93d36d88898</guid>
      <title>A Deep Dive into SquareX | A Short Brand Story from Black Hat USA 2024 | A SquareX Story with Chief Architect Jeswin Mathai | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to another edition of Brand Stories, part of our On Location coverage of Black Hat Conference 2024 in Las Vegas. In this episode, Sean Martin and Marco Ciappelli chat with Jeswin Mathai, Chief Architect at SquareX, one of our esteemed sponsors for this year’s coverage. Jeswin brings his in-depth knowledge and experience in cybersecurity to discuss the innovative solutions SquareX is bringing to the table and what to expect at this year’s event.</p><p><strong>Getting Ready for Black Hat 2024</strong></p><p>The conversation kicks off with Marco and Sean sharing their excitement about the upcoming Black Hat USA 2024 in Las Vegas. They fondly recall their past experiences and the anticipation that comes with one of the most significant cybersecurity events of the year. Both hosts highlight the significance of the event for ITSP Magazine, marking ten years since its inception at Black Hat.</p><p><strong>Introducing Jeswin Mathai and SquareX</strong></p><p>Jeswin Mathai introduces himself as the Chief Architect at SquareX. He oversees managing the backend infrastructure and ensuring the product’s efficiency and security, particularly as a browser extension designed to be non-intrusive and highly effective. With six years of experience in the security industry, Jeswin has made significant contributions through his work published at various conferences and the development of open-source tools like AWS Goat and Azure Goat.</p><p><strong>The Birth of SquareX</strong></p><p>Sean and Marco delve deeper into the origins of SquareX. Jeswin shares the story of how SquareX was founded by Vivek Ramachandran, who previously founded Pentester Academy, a cybersecurity education company. Seeing the persistent issues in consumer security and the inefficacy of existing antivirus solutions, Vivek decided to shift focus to consumer security, particularly the visibility gap in browser-level security.</p><p><strong>Addressing Security Gaps</strong></p><p>Jeswin explains how traditional security solutions, like endpoint security and secure web gateways, often lack visibility at the browser level. Attacks originating from browsers go unnoticed, creating significant vulnerabilities. SquareX aims to fill this gap by providing comprehensive browser security, detecting and mitigating threats in real time without hampering user productivity.</p><p><strong>Innovative Security Solutions</strong></p><p>SquareX started as a consumer-based product and later expanded to enterprise solutions. The core principles are privacy, productivity, and scalability. Jeswin elaborates on how SquareX leverages advanced web technologies like WebAssembly to perform extensive computations directly on the browser, ensuring minimal dependency on cloud resources and optimizing user experience.</p><p><strong>A Scalable and Privacy-Safe Solution</strong></p><p>Marco raises the question of data privacy regulations like GDPR in Europe and the California Consumer Privacy Act (CCPA). Jeswin reassures that SquareX is designed to be highly configurable, allowing administrators to adjust data privacy settings based on regional regulations. This flexibility ensures that user data remains secure and compliant with local laws.</p><p><strong>Real-World Use Cases</strong></p><p>To illustrate SquareX’s capabilities, Jeswin discusses common use cases like phishing attacks and how SquareX protects users. Attackers often exploit legitimate platforms like SharePoint and GitHub to bypass traditional security measures. With SquareX, administrators can enforce policies to block unauthorized credential entry, perform live analysis, and categorize content to prevent phishing scams and other threats.</p><p><strong>Looking Ahead to Black Hat and DEF CON</strong></p><p>The discussion wraps up with a look at what attendees can expect from SquareX at Black Hat and DEF CON. SquareX will have a booth at both events, and Jeswin previews some of the talks on breaking secure web gateways and the dangers of malicious browser extensions. He encourages everyone to visit their booths and attend the talks to gain deeper insights into today’s cybersecurity challenges and solutions.</p><p><strong>Conclusion</strong></p><p>In conclusion, the conversation with Jeswin Mathai offers a comprehensive look at how SquareX is revolutionizing browser security. Their innovative solutions address critical gaps in traditional security measures, ensuring both consumer and enterprise users are protected against sophisticated threats. Join us at Black Hat Conference 2024 to learn more and engage with the experts at SquareX.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeswin Mathai</strong>, Chief Architect, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeswinmathai/">https://www.linkedin.com/in/jeswinmathai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Jul 2024 21:32:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jeswin Mathai)</author>
      <link>https://eventcoveragepodcast.com/episodes/a-deep-dive-into-squarex-a-short-brand-story-from-black-hat-usa-2024-a-squarex-story-with-chief-architect-jeswin-mathai-on-location-coverage-with-sean-martin-and-marco-ciappelli-l2nv8pny</link>
      <content:encoded><![CDATA[<p>Welcome to another edition of Brand Stories, part of our On Location coverage of Black Hat Conference 2024 in Las Vegas. In this episode, Sean Martin and Marco Ciappelli chat with Jeswin Mathai, Chief Architect at SquareX, one of our esteemed sponsors for this year’s coverage. Jeswin brings his in-depth knowledge and experience in cybersecurity to discuss the innovative solutions SquareX is bringing to the table and what to expect at this year’s event.</p><p><strong>Getting Ready for Black Hat 2024</strong></p><p>The conversation kicks off with Marco and Sean sharing their excitement about the upcoming Black Hat USA 2024 in Las Vegas. They fondly recall their past experiences and the anticipation that comes with one of the most significant cybersecurity events of the year. Both hosts highlight the significance of the event for ITSP Magazine, marking ten years since its inception at Black Hat.</p><p><strong>Introducing Jeswin Mathai and SquareX</strong></p><p>Jeswin Mathai introduces himself as the Chief Architect at SquareX. He oversees managing the backend infrastructure and ensuring the product’s efficiency and security, particularly as a browser extension designed to be non-intrusive and highly effective. With six years of experience in the security industry, Jeswin has made significant contributions through his work published at various conferences and the development of open-source tools like AWS Goat and Azure Goat.</p><p><strong>The Birth of SquareX</strong></p><p>Sean and Marco delve deeper into the origins of SquareX. Jeswin shares the story of how SquareX was founded by Vivek Ramachandran, who previously founded Pentester Academy, a cybersecurity education company. Seeing the persistent issues in consumer security and the inefficacy of existing antivirus solutions, Vivek decided to shift focus to consumer security, particularly the visibility gap in browser-level security.</p><p><strong>Addressing Security Gaps</strong></p><p>Jeswin explains how traditional security solutions, like endpoint security and secure web gateways, often lack visibility at the browser level. Attacks originating from browsers go unnoticed, creating significant vulnerabilities. SquareX aims to fill this gap by providing comprehensive browser security, detecting and mitigating threats in real time without hampering user productivity.</p><p><strong>Innovative Security Solutions</strong></p><p>SquareX started as a consumer-based product and later expanded to enterprise solutions. The core principles are privacy, productivity, and scalability. Jeswin elaborates on how SquareX leverages advanced web technologies like WebAssembly to perform extensive computations directly on the browser, ensuring minimal dependency on cloud resources and optimizing user experience.</p><p><strong>A Scalable and Privacy-Safe Solution</strong></p><p>Marco raises the question of data privacy regulations like GDPR in Europe and the California Consumer Privacy Act (CCPA). Jeswin reassures that SquareX is designed to be highly configurable, allowing administrators to adjust data privacy settings based on regional regulations. This flexibility ensures that user data remains secure and compliant with local laws.</p><p><strong>Real-World Use Cases</strong></p><p>To illustrate SquareX’s capabilities, Jeswin discusses common use cases like phishing attacks and how SquareX protects users. Attackers often exploit legitimate platforms like SharePoint and GitHub to bypass traditional security measures. With SquareX, administrators can enforce policies to block unauthorized credential entry, perform live analysis, and categorize content to prevent phishing scams and other threats.</p><p><strong>Looking Ahead to Black Hat and DEF CON</strong></p><p>The discussion wraps up with a look at what attendees can expect from SquareX at Black Hat and DEF CON. SquareX will have a booth at both events, and Jeswin previews some of the talks on breaking secure web gateways and the dangers of malicious browser extensions. He encourages everyone to visit their booths and attend the talks to gain deeper insights into today’s cybersecurity challenges and solutions.</p><p><strong>Conclusion</strong></p><p>In conclusion, the conversation with Jeswin Mathai offers a comprehensive look at how SquareX is revolutionizing browser security. Their innovative solutions address critical gaps in traditional security measures, ensuring both consumer and enterprise users are protected against sophisticated threats. Join us at Black Hat Conference 2024 to learn more and engage with the experts at SquareX.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeswin Mathai</strong>, Chief Architect, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeswinmathai/">https://www.linkedin.com/in/jeswinmathai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21851032" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/03cb7e38-b8ba-411d-8b1a-d59eaeb787eb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=03cb7e38-b8ba-411d-8b1a-d59eaeb787eb&amp;feed=2M86zCcc"/>
      <itunes:title>A Deep Dive into SquareX | A Short Brand Story from Black Hat USA 2024 | A SquareX Story with Chief Architect Jeswin Mathai | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jeswin Mathai</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:45</itunes:duration>
      <itunes:summary>Join us on an insightful journey as we sit down with Jeswin Mathai, Chief Architect at SquareX, during our special coverage of the Black Hat Conference 2024, to explore cutting-edge cybersecurity solutions and innovations.</itunes:summary>
      <itunes:subtitle>Join us on an insightful journey as we sit down with Jeswin Mathai, Chief Architect at SquareX, during our special coverage of the Black Hat Conference 2024, to explore cutting-edge cybersecurity solutions and innovations.</itunes:subtitle>
      <itunes:keywords>secure web gateways, browser-level security, cybersecurity solutions, marco ciappelli, sean martin, def con, real-time threat analysis, cybersecurity, browser security, itsp magazine, endpoint security, jeswin mathai, webassembly, cybersecurity conference, data privacy, black hat usa, browser extension security, black hat 2024, vivek ramachandran, phishing attacks, squarex, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">86d9fb18-d627-496f-b59d-d10dad112fc1</guid>
      <title>Is Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jason Healey</strong>, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [<a href="https://x.com/columbia/">@Columbia</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasonhealey/">https://www.linkedin.com/in/jasonhealey/</a></p><p>At BlackHat: <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Opening Remarks:</strong></p><p>Sean Martin and Marco Ciappelli set the stage with their signature banter, creating an inviting atmosphere for a deep dive into cybersecurity. Marco introduces a philosophical question about measuring success and improvement in the field, leading seamlessly into their conversation with Jason Healey.</p><p><strong>Meet the Expert:</strong></p><p>Sean introduces Jason Healey, a senior research scholar at Columbia University and a former military cybersecurity leader with extensive experience, including roles at the Pentagon and the White House. Jason shares his excitement for Black Hat 2024 and the anniversary celebrations of ITSPmagazine, expressing anticipation for the discussions ahead.</p><p><strong>The Role of Defense in Cybersecurity:</strong></p><p>Jason previews his journey from military service to academia, posing the critical question, “Is defense winning?” He provides a historical perspective, noting that cybersecurity challenges have been present for decades. Despite significant investments and efforts, attackers often seem to maintain an edge. This preview sets the stage for a deeper exploration of how to measure success in defense, which he plans to address in detail at the conference.</p><p><strong>Shifting the Balance:</strong></p><p>Jason highlights the need for a comprehensive framework to evaluate the effectiveness of defense mechanisms. He introduces the concept of metrics like “mean time to detect,” suggesting that these can help gauge progress over time. Jason plans to discuss the importance of understanding system-wide dynamics at Black Hat, emphasizing that cybersecurity is about continual improvement rather than quick fixes.</p><p><strong>Economic Costs and Broader Impacts:</strong></p><p>Sean shifts the discussion to the economic aspects of cybersecurity, a topic Jason is set to explore further at the event. Jason notes that while financial implications are substantial, other indicators, such as the frequency of states declaring emergencies due to cyber incidents, provide a broader view of the impact. He underscores the need to address disparities in cybersecurity protection, pointing out that not everyone has access to the same level of defense capabilities.</p><p><strong>Community and Collaboration:</strong></p><p>Marco and Jason discuss the importance of community involvement in improving cybersecurity. Jason stresses the value of shared metrics and continuous data analysis, calling for collective efforts to build a robust defense against evolving threats. This theme of collaboration will be a key focus in his upcoming session.</p><p><strong>Looking Forward:</strong></p><p>As they wrap up, Sean and Marco express their anticipation for Jason’s session at Black Hat 2024. They encourage the audience to join in, engage with the topics discussed, and contribute to the ongoing conversation on cybersecurity.</p><p><strong>Conclusion:</strong></p><p>Sean concludes by thanking Jason for his insights and highlighting the importance of the upcoming Black Hat sessions. He invites listeners to follow ITSPmagazine's coverage for more expert discussions and insights into the field of cybersecurity.</p><p>For more insightful sessions and expert talks on cybersecurity, make sure to follow ITSPmagazine's Black Hat coverage. Stay safe and stay informed!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Is Defense Winning? (Session): <a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#is-defense-winning-40663">https://www.blackhat.com/us-24/briefings/schedule/index.html#is-defense-winning-40663</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Jul 2024 16:07:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jason Healey)</author>
      <link>https://eventcoveragepodcast.com/episodes/is-defense-winning-a-black-hat-usa-2024-conversation-with-jason-healey-on-location-coverage-with-sean-martin-and-marco-ciappelli-LwwnuIxP</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jason Healey</strong>, Senior Research Scholar, Cyber Conflict Studies, SIPA at Columbia University [<a href="https://x.com/columbia/">@Columbia</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasonhealey/">https://www.linkedin.com/in/jasonhealey/</a></p><p>At BlackHat: <a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682">https://www.blackhat.com/us-24/briefings/schedule/speakers.html#jason-healey-31682</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Opening Remarks:</strong></p><p>Sean Martin and Marco Ciappelli set the stage with their signature banter, creating an inviting atmosphere for a deep dive into cybersecurity. Marco introduces a philosophical question about measuring success and improvement in the field, leading seamlessly into their conversation with Jason Healey.</p><p><strong>Meet the Expert:</strong></p><p>Sean introduces Jason Healey, a senior research scholar at Columbia University and a former military cybersecurity leader with extensive experience, including roles at the Pentagon and the White House. Jason shares his excitement for Black Hat 2024 and the anniversary celebrations of ITSPmagazine, expressing anticipation for the discussions ahead.</p><p><strong>The Role of Defense in Cybersecurity:</strong></p><p>Jason previews his journey from military service to academia, posing the critical question, “Is defense winning?” He provides a historical perspective, noting that cybersecurity challenges have been present for decades. Despite significant investments and efforts, attackers often seem to maintain an edge. This preview sets the stage for a deeper exploration of how to measure success in defense, which he plans to address in detail at the conference.</p><p><strong>Shifting the Balance:</strong></p><p>Jason highlights the need for a comprehensive framework to evaluate the effectiveness of defense mechanisms. He introduces the concept of metrics like “mean time to detect,” suggesting that these can help gauge progress over time. Jason plans to discuss the importance of understanding system-wide dynamics at Black Hat, emphasizing that cybersecurity is about continual improvement rather than quick fixes.</p><p><strong>Economic Costs and Broader Impacts:</strong></p><p>Sean shifts the discussion to the economic aspects of cybersecurity, a topic Jason is set to explore further at the event. Jason notes that while financial implications are substantial, other indicators, such as the frequency of states declaring emergencies due to cyber incidents, provide a broader view of the impact. He underscores the need to address disparities in cybersecurity protection, pointing out that not everyone has access to the same level of defense capabilities.</p><p><strong>Community and Collaboration:</strong></p><p>Marco and Jason discuss the importance of community involvement in improving cybersecurity. Jason stresses the value of shared metrics and continuous data analysis, calling for collective efforts to build a robust defense against evolving threats. This theme of collaboration will be a key focus in his upcoming session.</p><p><strong>Looking Forward:</strong></p><p>As they wrap up, Sean and Marco express their anticipation for Jason’s session at Black Hat 2024. They encourage the audience to join in, engage with the topics discussed, and contribute to the ongoing conversation on cybersecurity.</p><p><strong>Conclusion:</strong></p><p>Sean concludes by thanking Jason for his insights and highlighting the importance of the upcoming Black Hat sessions. He invites listeners to follow ITSPmagazine's coverage for more expert discussions and insights into the field of cybersecurity.</p><p>For more insightful sessions and expert talks on cybersecurity, make sure to follow ITSPmagazine's Black Hat coverage. Stay safe and stay informed!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Is Defense Winning? (Session): <a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#is-defense-winning-40663">https://www.blackhat.com/us-24/briefings/schedule/index.html#is-defense-winning-40663</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24284415" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/765cfb53-7212-4f2d-abea-12d532ec4fca/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=765cfb53-7212-4f2d-abea-12d532ec4fca&amp;feed=2M86zCcc"/>
      <itunes:title>Is Defense Winning? | A Black Hat USA 2024 Conversation with Jason Healey | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jason Healey</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:17</itunes:duration>
      <itunes:summary>In anticipation of the Black Hat Conference 2024 in Las Vegas, Sean Martin and Marco Ciappelli sit down with cybersecurity expert Jason Healey for an engaging episode of &quot;On Location With Sean Martin and Marco Ciappelli.&quot; The discussion provides a sneak peek into the topics Jason will cover during his upcoming session, exploring the current state and future of cyber defense.</itunes:summary>
      <itunes:subtitle>In anticipation of the Black Hat Conference 2024 in Las Vegas, Sean Martin and Marco Ciappelli sit down with cybersecurity expert Jason Healey for an engaging episode of &quot;On Location With Sean Martin and Marco Ciappelli.&quot; The discussion provides a sneak peek into the topics Jason will cover during his upcoming session, exploring the current state and future of cyber defense.</itunes:subtitle>
      <itunes:keywords>jason healey, critical infrastructure, marco ciappelli, marco ciappelli, cyber incident, sean martin, columbia university, cybersecurity, pentagon cybersecurity, conference, cyber command, cyber defense, cybersecurity metrics, white house cybersecurity, military cybersecurity, ransomware hospital, podcast, measurement of success in cybersecurity, security, black hat 2024, insurance claims cybersecurity, cyber strategy, itspmagazine, economic impact of cyber attacks, mean time to detect, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">62bec23a-d4d4-401e-9dd1-1c0acbcc7837</guid>
      <title>From Signatures to Behavior: RAD Security&apos;s Recognized Innovations for Cloud Threat Detection and Response | A Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta</title>
      <description><![CDATA[<p>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</p><p><strong>The What:</strong> RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.</p><p><strong>The How:</strong> RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.</p><p><strong>Key Points Discussed:</strong></p><ol><li><strong>Behavioral Detection vs. Signature-Based Methods:</strong><ul><li>Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.</li></ul></li><li><strong>Enhanced Capabilities for Real-Time Response:</strong><ul><li>The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.</li></ul></li><li><strong>Recognition and Impact:</strong><ul><li>RAD Security’s innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.</li></ul></li><li><strong>Supply Chain Security:</strong><ul><li>Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security’s verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.</li></ul></li><li><strong>Future of Cloud Security:</strong><ul><li>As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.</li></ul></li></ol><p>RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.</p><p>For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO & Co-Founder, RAD Security [<a href="https://x.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://x.com/brookelynz1">https://x.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>A Brief History of Signature-Based Threat Detection in Cloud Security: <a href="https://itsprad.io/radsec-4bi" target="_blank">https://itsprad.io/radsec-4bi</a></p><p>Open Source Cloud Workload Fingerprint Catalog: <a href="https://itsprad.io/radsec-kro" target="_blank">https://itsprad.io/radsec-kro</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Jul 2024 15:31:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-signatures-to-behavior-rad-securitys-recognized-innovations-for-cloud-threat-detection-and-response-a-brand-story-conversation-from-black-hat-usa-2024-a-rad-security-story-with-brooke-motta-T5ghfqm6</link>
      <content:encoded><![CDATA[<p>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</p><p><strong>The What:</strong> RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.</p><p><strong>The How:</strong> RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.</p><p><strong>Key Points Discussed:</strong></p><ol><li><strong>Behavioral Detection vs. Signature-Based Methods:</strong><ul><li>Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.</li></ul></li><li><strong>Enhanced Capabilities for Real-Time Response:</strong><ul><li>The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.</li></ul></li><li><strong>Recognition and Impact:</strong><ul><li>RAD Security’s innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.</li></ul></li><li><strong>Supply Chain Security:</strong><ul><li>Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security’s verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.</li></ul></li><li><strong>Future of Cloud Security:</strong><ul><li>As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.</li></ul></li></ol><p>RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.</p><p>For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO & Co-Founder, RAD Security [<a href="https://x.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://x.com/brookelynz1">https://x.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>A Brief History of Signature-Based Threat Detection in Cloud Security: <a href="https://itsprad.io/radsec-4bi" target="_blank">https://itsprad.io/radsec-4bi</a></p><p>Open Source Cloud Workload Fingerprint Catalog: <a href="https://itsprad.io/radsec-kro" target="_blank">https://itsprad.io/radsec-kro</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6722566" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ad8a060a-34ec-4bab-87fc-7d3ef328f511/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ad8a060a-34ec-4bab-87fc-7d3ef328f511&amp;feed=2M86zCcc"/>
      <itunes:title>From Signatures to Behavior: RAD Security&apos;s Recognized Innovations for Cloud Threat Detection and Response | A Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</itunes:summary>
      <itunes:subtitle>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, signatureless, black hat, sean martin, behavioral detection, rad security, security innovation, infrastructure context, runtime fingerprint, cybersecurity, brooke motta, brooke motta, cloud native, zero-day attacks, identity context, cloud protection, cloud security, cwpp, cyber resilience, malicious workload, software supply chain, cdr, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">262f4774-bf6c-4eb5-9e39-97ec0e6adbf0</guid>
      <title>A Framework for Evaluating National Cybersecurity Strategies | A Black Hat USA 2024 Conversation with Fred Heiding | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Fred Heiding</strong>, Research Fellow, Harvard</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fheiding/">https://www.linkedin.com/in/fheiding/</a></p><p>On Twitter | <a href="https://twitter.com/fredheiding">https://twitter.com/fredheiding</a></p><p>On Mastodon | <a href="https://mastodon.social/@fredheiding">https://mastodon.social/@fredheiding</a></p><p>On Instagram | <a href="https://www.instagram.com/fheiding/">https://www.instagram.com/fheiding/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this Chats on the Road episode as part of the On Location with Sean and Marco series, hosts Sean Martin and Marco Ciappelli invite listeners into an engaging dialogue with Fred Heiding, a research fellow in computer science at Harvard. The episode dives into the intricacies of national cybersecurity strategies, exploring the intersection of technology, policy, and economics in safeguarding nations against cyber threats.</p><p>Fred opens up about his journey from a technical background to a more policy-focused role at Harvard’s Kennedy School, driving home the importance of a multidisciplinary approach to cybersecurity. This sets the stage for a captivating discussion on the collaborative research project he's leading, which aims to evaluate and enhance national cybersecurity strategies worldwide.</p><p>Listeners are treated to an insightful narrative on how the project originated from an insightful question Fred posed at a Harvard conference, leading to a fruitful partnership with national security researcher Alex O'Neill and Lachlan Price, a pivotal figure in crafting Australia's renowned cybersecurity strategy. Together, they've been investigating the effectiveness of various national strategies, emphasizing the need for context-specific evaluations.</p><p>A major highlight of the episode is the discussion on the inclusion of emerging technologies, particularly AI, in these cybersecurity policies. Fred provides an optimistic update on how even slightly older documents are proactively addressing future-proof strategies against new technological threats. This is paired with a deep dive into the concepts of resilience and the importance of creating detailed, actionable policy documents that can be evaluated for effectiveness over time.</p><p>Sean and Marco steer the conversation towards the practical implications of these strategies, questioning how economic factors influence cybersecurity policy and the trade-offs between system security and usability. Fred’s insights into the economic dimensions of cybersecurity, including the balance between investment in protection and the potential costs of cyber attacks, add a valuable perspective to the discussion.</p><p>The episode promises to inspire listeners with Fred’s forward-thinking approach and the practical applications of his research. As Fred previews his upcoming presentation at Black Hat, excitement builds for those interested in the detailed findings and innovative strategies he will share.</p><p>Tune in to this episode for a thought-provoking exploration of national cybersecurity strategies, enriched by Fred Heiding’s expert insights and the dynamic interaction between the hosts and their guest. Whether you're a policymaker, technologist, or cybersecurity enthusiast, this conversation offers valuable takeaways and a fresh perspective on the ever-evolving cyber landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Contributors to A Multilateral Framework for Evaluating National Cybersecurity Strategies (BlackHat Session): </p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#fred-heiding-48215" target="_blank">Fred Heiding</a>  |  Research Fellow, Harvard</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#alex-oneill-48567" target="_blank">Alex O'Neill</a>  |  Independet</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#lachlan-price-48568" target="_blank">Lachlan Price</a>  |  Research Assistant, Harvard</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#eric-rosenbach-48569" target="_blank">Eric Rosenbach</a>  |  Senior Lecturer in Public Policy, Harvard</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>A Multilateral Framework for Evaluating National Cybersecurity Strategies: <a href="https://www.blackhat.com/us-24/briefings/schedule/#a-multilateral-framework-for-evaluating-national-cybersecurity-strategies-40879" target="_blank">https://www.blackhat.com/us-24/briefings/schedule/#a-multilateral-framework-for-evaluating-national-cybersecurity-strategies-40879</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 25 Jul 2024 22:26:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Fred Heiding)</author>
      <link>https://eventcoveragepodcast.com/episodes/a-framework-for-evaluating-national-cybersecurity-strategies-a-black-hat-usa-2024-conversation-with-fred-heiding-on-location-coverage-with-sean-martin-and-marco-ciappelli-vIrbQcXM</link>
      <content:encoded><![CDATA[<p><strong>Guest: Fred Heiding</strong>, Research Fellow, Harvard</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fheiding/">https://www.linkedin.com/in/fheiding/</a></p><p>On Twitter | <a href="https://twitter.com/fredheiding">https://twitter.com/fredheiding</a></p><p>On Mastodon | <a href="https://mastodon.social/@fredheiding">https://mastodon.social/@fredheiding</a></p><p>On Instagram | <a href="https://www.instagram.com/fheiding/">https://www.instagram.com/fheiding/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this Chats on the Road episode as part of the On Location with Sean and Marco series, hosts Sean Martin and Marco Ciappelli invite listeners into an engaging dialogue with Fred Heiding, a research fellow in computer science at Harvard. The episode dives into the intricacies of national cybersecurity strategies, exploring the intersection of technology, policy, and economics in safeguarding nations against cyber threats.</p><p>Fred opens up about his journey from a technical background to a more policy-focused role at Harvard’s Kennedy School, driving home the importance of a multidisciplinary approach to cybersecurity. This sets the stage for a captivating discussion on the collaborative research project he's leading, which aims to evaluate and enhance national cybersecurity strategies worldwide.</p><p>Listeners are treated to an insightful narrative on how the project originated from an insightful question Fred posed at a Harvard conference, leading to a fruitful partnership with national security researcher Alex O'Neill and Lachlan Price, a pivotal figure in crafting Australia's renowned cybersecurity strategy. Together, they've been investigating the effectiveness of various national strategies, emphasizing the need for context-specific evaluations.</p><p>A major highlight of the episode is the discussion on the inclusion of emerging technologies, particularly AI, in these cybersecurity policies. Fred provides an optimistic update on how even slightly older documents are proactively addressing future-proof strategies against new technological threats. This is paired with a deep dive into the concepts of resilience and the importance of creating detailed, actionable policy documents that can be evaluated for effectiveness over time.</p><p>Sean and Marco steer the conversation towards the practical implications of these strategies, questioning how economic factors influence cybersecurity policy and the trade-offs between system security and usability. Fred’s insights into the economic dimensions of cybersecurity, including the balance between investment in protection and the potential costs of cyber attacks, add a valuable perspective to the discussion.</p><p>The episode promises to inspire listeners with Fred’s forward-thinking approach and the practical applications of his research. As Fred previews his upcoming presentation at Black Hat, excitement builds for those interested in the detailed findings and innovative strategies he will share.</p><p>Tune in to this episode for a thought-provoking exploration of national cybersecurity strategies, enriched by Fred Heiding’s expert insights and the dynamic interaction between the hosts and their guest. Whether you're a policymaker, technologist, or cybersecurity enthusiast, this conversation offers valuable takeaways and a fresh perspective on the ever-evolving cyber landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Contributors to A Multilateral Framework for Evaluating National Cybersecurity Strategies (BlackHat Session): </p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#fred-heiding-48215" target="_blank">Fred Heiding</a>  |  Research Fellow, Harvard</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#alex-oneill-48567" target="_blank">Alex O'Neill</a>  |  Independet</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#lachlan-price-48568" target="_blank">Lachlan Price</a>  |  Research Assistant, Harvard</p><p><a href="https://www.blackhat.com/us-24/briefings/schedule/speakers.html#eric-rosenbach-48569" target="_blank">Eric Rosenbach</a>  |  Senior Lecturer in Public Policy, Harvard</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>A Multilateral Framework for Evaluating National Cybersecurity Strategies: <a href="https://www.blackhat.com/us-24/briefings/schedule/#a-multilateral-framework-for-evaluating-national-cybersecurity-strategies-40879" target="_blank">https://www.blackhat.com/us-24/briefings/schedule/#a-multilateral-framework-for-evaluating-national-cybersecurity-strategies-40879</a></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23944210" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ef035e2a-3805-4c61-bf4b-b15f8c7899e0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ef035e2a-3805-4c61-bf4b-b15f8c7899e0&amp;feed=2M86zCcc"/>
      <itunes:title>A Framework for Evaluating National Cybersecurity Strategies | A Black Hat USA 2024 Conversation with Fred Heiding | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Fred Heiding</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5192d944-f46c-417a-8a5f-d921f1099bd9/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:56</itunes:duration>
      <itunes:summary>In this Chats on the Road episode as part of the On Location with Sean and Marco series, Harvard research fellow Fred Heiding discusses his groundbreaking work on evaluating national cybersecurity strategies, emphasizing the crucial intersection of technology, policy, and economics. Tune in to gain fresh insights into how countries can effectively balance security and usability while preparing for emerging threats like AI.</itunes:summary>
      <itunes:subtitle>In this Chats on the Road episode as part of the On Location with Sean and Marco series, Harvard research fellow Fred Heiding discusses his groundbreaking work on evaluating national cybersecurity strategies, emphasizing the crucial intersection of technology, policy, and economics. Tune in to gain fresh insights into how countries can effectively balance security and usability while preparing for emerging threats like AI.</itunes:subtitle>
      <itunes:keywords>national strategies, critical infrastructure, collaboration, technology, marco ciappelli, fred heiding, economics, black hat, sean martin, harvard, cybersecurity, business, conference, policy, resilience, defcon, podcast, security, ai, emerging threats, infrastructure, phishing, cybersecurityconference, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ffb9f08f-0d96-49a5-84a7-73884eb8b285</guid>
      <title>Behind the Scenes at Black Hat USA 2024: An Exclusive Pre-Event Conversation | A Black Hat USA  2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech [<a href="https://twitter.com/InformaTechHQ" target="_blank">@InformaTechHQ</a>] and General Manager at Black Hat [<a href="https://twitter.com/BlackHatEvents" target="_blank">@BlackHatEvents</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Vroom Vroom! The Black Hat Tradition with Sean and Marco</p><p>It's that time of year again, and Sean Martin and Marco Ciappelli are kicking things off with their customary banter on the road to Black Hat USA 2024. This time, there's no need to "vroom vroom" their way to Las Vegas as they'll be flying there instead. But no matter how they get there, it's all about reaching the grand event that is Black Hat.</p><p><strong>A Decade of ITSP Magazine and Black Ha</strong>t</p><p>Marco highlights a significant milestone for their publication: ITSP Magazine is celebrating its 10th anniversary, a journey that began alongside the Black Hat conference. Steve Wylie, who has also been with Black Hat since 2014, shares this sentiment of growth and reflection.</p><p><strong>What to Expect at Black Hat USA 2024</strong></p><p>Steve Wylie provides a comprehensive overview of what attendees can expect this year. As always, the event will bring the heat—literally, with Las Vegas temperatures scaling up to 108 degrees Fahrenheit. But beyond the weather, the Black Hat event itself will feature a multitude of new expansions.</p><p><strong>Key Highlights</strong></p><ul><li><strong>Expanded Content Program:</strong> Black Hat is adopting a three-day format instead of its usual two, adding a day packed with additional activities and events.</li><li><strong>More Networking Opportunities:</strong> Attendees can look forward to broadening their professional circles with a variety of planned and unplanned networking events, including the Meetup Lounge and Track Chair Meet and Greets.</li><li><strong>Day Zero Program:</strong> Designed especially for newcomers, this pre-event briefing will help attendees make the most out of their experience.</li><li><strong>Innovative Summits:</strong> New summits, including an AI Summit, Innovators and Investors Summit, Industrial Controls Summit, and Cyber Insurance Summit, will target both technical and managerial audiences.</li></ul><p><strong>Deep Dives and Panel Discussions</strong></p><p>Steve reveals a notable deviation from tradition: this year's keynote will be a panel discussion focused on defending democracy in an election year, featuring top cybersecurity leaders from the U.S., the EU, and the UK. This will be an essential kickoff, reflecting on the year’s heavy election schedule and the growing influence of AI.</p><p><strong>Fireside Chat with Moxie Marlinspike</strong></p><p>Another unique addition is a fireside chat with Moxie Marlinspike, founder of Signal, moderated by Jeff Moss. This discussion will delve into privacy concerns and the ever-important balance between privacy and security in today's technological landscape.</p><p><strong>Arsenal and the NOC: Fan Favorites Return</strong></p><p>Sean and Steve both tip their hats to recurring features such as Arsenal, which showcases cutting-edge tools developed by the cybersecurity community, and the NOC, where attendees can witness real-time network management and protection.</p><p><strong>Wrapping Up</strong></p><p>As Sean and Marco prepare to experience another electrifying Black Hat, they remind readers and listeners alike to subscribe to ITSP Magazine for exclusive coverage and insights. Whether you're able to attend in person or follow along remotely, Black Hat USA 2024 promises to be a crucial event for anyone in the cybersecurity field.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p>The list of keynotes can be found on this page: <a href="https://www.blackhat.com/us-24/keynotes.html">https://www.blackhat.com/us-24/keynotes.html</a></p><p>Direct links to keynotes:</p><ul><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-from-the-office-of-the-ciso-smarter-faster-stronger-security-in-the-age-of-ai-42061">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-from-the-office-of-the-ciso-smarter-faster-stronger-security-in-the-age-of-ai-42061</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-understanding-and-reducing-supply-chain-and-software-vulnerability-risks-42104">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-understanding-and-reducing-supply-chain-and-software-vulnerability-risks-42104</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-let-me-tell-you-a-story-technology-and-the--vs-41962">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-let-me-tell-you-a-story-technology-and-the--vs-41962</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#solving-the-cyber-hard-problems-a-view-into-problem-solving-from-the-white-house-42239">https://www.blackhat.com/us-24/briefings/schedule/index.html#solving-the-cyber-hard-problems-a-view-into-problem-solving-from-the-white-house-42239</a></li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 24 Jul 2024 03:28:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie)</author>
      <link>https://eventcoveragepodcast.com/episodes/behind-the-scenes-at-black-hat-usa-2024-an-exclusive-pre-event-conversation-a-black-hat-usa-2024-conversation-with-steve-wylie-on-location-coverage-with-sean-martin-and-marco-ciappelli-Rot7rNyl</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Wylie</strong>, Vice President, Cybersecurity Market at Informa Tech [<a href="https://twitter.com/InformaTechHQ" target="_blank">@InformaTechHQ</a>] and General Manager at Black Hat [<a href="https://twitter.com/BlackHatEvents" target="_blank">@BlackHatEvents</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swylie650/" target="_blank">https://www.linkedin.com/in/swylie650/</a></p><p>On Twitter | <a href="https://twitter.com/swylie650" target="_blank">https://twitter.com/swylie650</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Vroom Vroom! The Black Hat Tradition with Sean and Marco</p><p>It's that time of year again, and Sean Martin and Marco Ciappelli are kicking things off with their customary banter on the road to Black Hat USA 2024. This time, there's no need to "vroom vroom" their way to Las Vegas as they'll be flying there instead. But no matter how they get there, it's all about reaching the grand event that is Black Hat.</p><p><strong>A Decade of ITSP Magazine and Black Ha</strong>t</p><p>Marco highlights a significant milestone for their publication: ITSP Magazine is celebrating its 10th anniversary, a journey that began alongside the Black Hat conference. Steve Wylie, who has also been with Black Hat since 2014, shares this sentiment of growth and reflection.</p><p><strong>What to Expect at Black Hat USA 2024</strong></p><p>Steve Wylie provides a comprehensive overview of what attendees can expect this year. As always, the event will bring the heat—literally, with Las Vegas temperatures scaling up to 108 degrees Fahrenheit. But beyond the weather, the Black Hat event itself will feature a multitude of new expansions.</p><p><strong>Key Highlights</strong></p><ul><li><strong>Expanded Content Program:</strong> Black Hat is adopting a three-day format instead of its usual two, adding a day packed with additional activities and events.</li><li><strong>More Networking Opportunities:</strong> Attendees can look forward to broadening their professional circles with a variety of planned and unplanned networking events, including the Meetup Lounge and Track Chair Meet and Greets.</li><li><strong>Day Zero Program:</strong> Designed especially for newcomers, this pre-event briefing will help attendees make the most out of their experience.</li><li><strong>Innovative Summits:</strong> New summits, including an AI Summit, Innovators and Investors Summit, Industrial Controls Summit, and Cyber Insurance Summit, will target both technical and managerial audiences.</li></ul><p><strong>Deep Dives and Panel Discussions</strong></p><p>Steve reveals a notable deviation from tradition: this year's keynote will be a panel discussion focused on defending democracy in an election year, featuring top cybersecurity leaders from the U.S., the EU, and the UK. This will be an essential kickoff, reflecting on the year’s heavy election schedule and the growing influence of AI.</p><p><strong>Fireside Chat with Moxie Marlinspike</strong></p><p>Another unique addition is a fireside chat with Moxie Marlinspike, founder of Signal, moderated by Jeff Moss. This discussion will delve into privacy concerns and the ever-important balance between privacy and security in today's technological landscape.</p><p><strong>Arsenal and the NOC: Fan Favorites Return</strong></p><p>Sean and Steve both tip their hats to recurring features such as Arsenal, which showcases cutting-edge tools developed by the cybersecurity community, and the NOC, where attendees can witness real-time network management and protection.</p><p><strong>Wrapping Up</strong></p><p>As Sean and Marco prepare to experience another electrifying Black Hat, they remind readers and listeners alike to subscribe to ITSP Magazine for exclusive coverage and insights. Whether you're able to attend in person or follow along remotely, Black Hat USA 2024 promises to be a crucial event for anyone in the cybersecurity field.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p>The list of keynotes can be found on this page: <a href="https://www.blackhat.com/us-24/keynotes.html">https://www.blackhat.com/us-24/keynotes.html</a></p><p>Direct links to keynotes:</p><ul><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-from-the-office-of-the-ciso-smarter-faster-stronger-security-in-the-age-of-ai-42061">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-from-the-office-of-the-ciso-smarter-faster-stronger-security-in-the-age-of-ai-42061</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-understanding-and-reducing-supply-chain-and-software-vulnerability-risks-42104">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-understanding-and-reducing-supply-chain-and-software-vulnerability-risks-42104</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-let-me-tell-you-a-story-technology-and-the--vs-41962">https://www.blackhat.com/us-24/briefings/schedule/index.html#main-stage-let-me-tell-you-a-story-technology-and-the--vs-41962</a></li><li><a href="https://www.blackhat.com/us-24/briefings/schedule/index.html#solving-the-cyber-hard-problems-a-view-into-problem-solving-from-the-white-house-42239">https://www.blackhat.com/us-24/briefings/schedule/index.html#solving-the-cyber-hard-problems-a-view-into-problem-solving-from-the-white-house-42239</a></li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28252510" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e348862a-e52b-42d5-a2f1-d4e61aa245cc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e348862a-e52b-42d5-a2f1-d4e61aa245cc&amp;feed=2M86zCcc"/>
      <itunes:title>Behind the Scenes at Black Hat USA 2024: An Exclusive Pre-Event Conversation | A Black Hat USA  2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Wylie</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/922c5a92-a2fd-4210-816a-3a661725b172/3000x3000/black-hat-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:25</itunes:duration>
      <itunes:summary>Black Hat USA 2024 promises to be an exciting and groundbreaking conference, and we caught up with Steve Wylie, the General Manager of Black Hat, to get an inside look at this year&apos;s event.</itunes:summary>
      <itunes:subtitle>Black Hat USA 2024 promises to be an exciting and groundbreaking conference, and we caught up with Steve Wylie, the General Manager of Black Hat, to get an inside look at this year&apos;s event.</itunes:subtitle>
      <itunes:keywords>ai summit, marco ciappelli, marco ciappelli, sean martin, sean martin, cybersecurity conferences, signal protocol, defending democracy, cybersecurity, black hat conference, conference, itsp magazine, startup spotlight competition, hacking conference, cyber insurance, moxie marlinspike, data protection, black hat usa 2024, cloud vulnerabilities, steve wylie, networking opportunities black hat, las vegas, podcast, security, itsp chats on the road, cyber security, black hat 2024, it and cybersecurity, black hat highlights, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d8faf008-4db6-4142-ac02-e7cc2069353e</guid>
      <title>2024 AppDome and OWASP Mobile Consumer Cyber Security Survey | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | An AppDome Brand Story with Brian Reed and Chris Roeckl | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the latest Brand Story episode, host Sean Martin chats with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, during the OWASP Global AppSec event in Lisbon. The episode dives into pivotal aspects of mobile app security and consumer expectations.</p><p>Brian Reed articulates how AppDome collaborates with OWASP to tackle mobile app security challenges. He underscores the significant role consumers play in these endeavors. According to AppDome's annual survey, consumer feedback is indispensable, revealing that a staggering 97% of consumers would abandon a brand after an insecure app experience, while 95% would advocate for a brand offering a secure experience. This highlights the stark consequences of neglecting mobile security.</p><p>Chris Roeckl elaborates on how AppDome’s annual survey, spanning four years, has amassed data from over 120,000 consumers across 12 countries. This wealth of information provides a clear trend: consumers increasingly prioritize security, particularly in banking, e-wallet, healthcare, and retail apps. Interestingly, while social media is not at the forefront of security concerns, it is rapidly becoming a focus area as users grow more conscious of account security and privacy.</p><p>The discussion brings to light how brands can effectively communicate their security protocols to consumers. Reed and Roeckl suggest transparency through dedicated web pages, direct email outreach, and in-app notifications. This communication helps build trust and reassures consumers that their security concerns are being addressed.</p><p>The conversation also touches on the integration of security into the development lifecycle. Developers often face the challenge of ensuring robust security without compromising the user experience. Reed mentions the importance of making security processes seamless and non-invasive for developers. By leveraging machine learning and AI, AppDome aims to automate many security tasks, allowing developers to focus on creating innovative, user-friendly applications.</p><p>Moreover, Roeckl points out that a holistic approach is essential. This means incorporating input from various teams within an organization - from product leaders focusing on user engagement to engineers ensuring crash-free applications and cybersecurity teams safeguarding data integrity. This collaborative effort ensures that the final product not only meets but exceeds consumer expectations.</p><p>The insights shared in the episode are a call to action for businesses to prioritize mobile security. With six billion humans using mobile apps globally, the stakes are higher than ever. Brands must recognize the direct correlation between secure mobile experiences and customer loyalty. By investing in robust security measures and effectively communicating these efforts, businesses can foster a secure and trustworthy environment for their users.</p><p>Listeners are encouraged to download the full AppDome report for a deeper understanding of consumer attitudes towards mobile app security. This empathetic report offers valuable insights that can help developers, product managers, and cybersecurity teams align their strategies with consumer expectations, ultimately leading to safer and more secure mobile applications.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Brian Reed</strong>, SVP AppSec & Mobile Defense, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/briancreed/" target="_blank">https://www.linkedin.com/in/briancreed/</a></p><p><strong>Chris Roeckl</strong>, Chief Product Officer, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/croeckl/" target="_blank">https://www.linkedin.com/in/croeckl/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 20 Jul 2024 01:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Roeckl, Brian Reed)</author>
      <link>https://eventcoveragepodcast.com/episodes/2024-appdome-and-owasp-mobile-consumer-cyber-security-survey-a-brand-story-conversation-from-owasp-appsec-global-lisbon-2024-an-appdome-brand-story-with-brian-reed-and-chris-roeckl-on-location-coverage-with-sean-martin-and-marco-ciappelli-8p98bnw0</link>
      <content:encoded><![CDATA[<p>In the latest Brand Story episode, host Sean Martin chats with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, during the OWASP Global AppSec event in Lisbon. The episode dives into pivotal aspects of mobile app security and consumer expectations.</p><p>Brian Reed articulates how AppDome collaborates with OWASP to tackle mobile app security challenges. He underscores the significant role consumers play in these endeavors. According to AppDome's annual survey, consumer feedback is indispensable, revealing that a staggering 97% of consumers would abandon a brand after an insecure app experience, while 95% would advocate for a brand offering a secure experience. This highlights the stark consequences of neglecting mobile security.</p><p>Chris Roeckl elaborates on how AppDome’s annual survey, spanning four years, has amassed data from over 120,000 consumers across 12 countries. This wealth of information provides a clear trend: consumers increasingly prioritize security, particularly in banking, e-wallet, healthcare, and retail apps. Interestingly, while social media is not at the forefront of security concerns, it is rapidly becoming a focus area as users grow more conscious of account security and privacy.</p><p>The discussion brings to light how brands can effectively communicate their security protocols to consumers. Reed and Roeckl suggest transparency through dedicated web pages, direct email outreach, and in-app notifications. This communication helps build trust and reassures consumers that their security concerns are being addressed.</p><p>The conversation also touches on the integration of security into the development lifecycle. Developers often face the challenge of ensuring robust security without compromising the user experience. Reed mentions the importance of making security processes seamless and non-invasive for developers. By leveraging machine learning and AI, AppDome aims to automate many security tasks, allowing developers to focus on creating innovative, user-friendly applications.</p><p>Moreover, Roeckl points out that a holistic approach is essential. This means incorporating input from various teams within an organization - from product leaders focusing on user engagement to engineers ensuring crash-free applications and cybersecurity teams safeguarding data integrity. This collaborative effort ensures that the final product not only meets but exceeds consumer expectations.</p><p>The insights shared in the episode are a call to action for businesses to prioritize mobile security. With six billion humans using mobile apps globally, the stakes are higher than ever. Brands must recognize the direct correlation between secure mobile experiences and customer loyalty. By investing in robust security measures and effectively communicating these efforts, businesses can foster a secure and trustworthy environment for their users.</p><p>Listeners are encouraged to download the full AppDome report for a deeper understanding of consumer attitudes towards mobile app security. This empathetic report offers valuable insights that can help developers, product managers, and cybersecurity teams align their strategies with consumer expectations, ultimately leading to safer and more secure mobile applications.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Brian Reed</strong>, SVP AppSec & Mobile Defense, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/briancreed/" target="_blank">https://www.linkedin.com/in/briancreed/</a></p><p><strong>Chris Roeckl</strong>, Chief Product Officer, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/croeckl/" target="_blank">https://www.linkedin.com/in/croeckl/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22113900" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/40486ca4-6cbd-44ec-a4da-5708dbe91cbc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=40486ca4-6cbd-44ec-a4da-5708dbe91cbc&amp;feed=2M86zCcc"/>
      <itunes:title>2024 AppDome and OWASP Mobile Consumer Cyber Security Survey | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | An AppDome Brand Story with Brian Reed and Chris Roeckl | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Roeckl, Brian Reed</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:02</itunes:duration>
      <itunes:summary>Join Sean Martin as he discusses crucial insights into mobile app security with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, sharing findings from their annual survey created in collaboration with OWASP on consumer expectations. Discover how mobile security impacts consumer loyalty and learn actionable strategies for integrating robust security measures into app development to foster trust and advocacy.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he discusses crucial insights into mobile app security with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, sharing findings from their annual survey created in collaboration with OWASP on consumer expectations. Discover how mobile security impacts consumer loyalty and learn actionable strategies for integrating robust security measures into app development to foster trust and advocacy.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, expectations, lisbon, appdome, consumer, sean martin, brian reed, trust, chris roeckl, cybersecurity, survey, mobile, developers, fraud, appsec, security, brand, global, machine learning, owasp, privacy, brand story, report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5890079-a9d2-4166-b4a6-9f1a92ab462b</guid>
      <title>Dodging the Ball and ways for CISOs to avoid: Essential Strategies for CISOs | A Black Hat USA  2024 Conversation with Jess Nall | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jess Nall</strong>, Partner, Defense Against Government Investigations, Baker McKenzie, LLP [<a href="https://x.com/bakermckenzie">@bakermckenzie</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jess-nall/">https://www.linkedin.com/in/jess-nall/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As the countdown to Black Hat 2024 begins, ITSP Magazine’s “Chats On the Road” series kicks off with a compelling pre-event discussion featuring Jess Nall, a partner at Baker McKenzie with over two decades of experience in federal investigations and defending Chief Information Security Officers (CISOs). Hosted by Sean Martin and Marco Ciappelli, the episode blends humor and serious insights to tackle the evolving challenges faced by CISOs today.</p><p><strong>The Dodgeball Analogy: Setting the Stage</strong></p><p>The conversation starts on a light-hearted note with a playful dodgeball analogy, a clever metaphor used to illustrate the growing complexities in the cybersecurity landscape. This sets the tone for a deeper exploration of the pressures and responsibilities that modern CISOs face, bridging the gap between legacy technology and contemporary cybersecurity challenges.</p><p><strong>Legacy Technology vs. Modern Cybersecurity</strong></p><p>Drawing from the dodgeball metaphor, Sean and Marco highlight the burden of legacy technology and its impact on current cybersecurity practices. Jess Nall shares her perspective on how past business operations influence today’s cybersecurity strategies, emphasizing the need for CISOs to adapt and innovate continually.</p><p><strong>ITSP Magazine’s Milestone and Black Hat Connections</strong></p><p>This episode also marks a celebratory milestone for ITSP Magazine. Sean and Marco reflect on their journey from Los Angeles to Las Vegas, the birthplace of ITSP Magazine, and how their experiences have shaped the publication’s mission and growth. As they gear up for Black Hat 2024, they express their excitement about reconnecting with the cybersecurity community and exploring new opportunities for collaboration.</p><p><strong>Introducing Jess Nall: Expertise and Experience</strong></p><p>Jess Nall, a seasoned expert in federal investigations, brings invaluable insights to the discussion. She underscores the severe implications of government scrutiny on CISOs, drawing from high-profile cases like SEC v. SolarWinds and Tim Brown. Jess provides practical advice for CISOs to avoid regulatory pitfalls and highlights the importance of staying vigilant and proactive in their roles.</p><p><strong>The Internet’s Troubled History and Its Impact</strong></p><p>Marco steers the conversation towards the Internet’s troubled history and its initial lack of security foresight. Jess reflects on how these historical challenges have shaped modern cybersecurity practices, emphasizing the difficulties of keeping up with evolving threats and expanding attack surfaces. She also discusses the controversial strategy of targeting CISOs to influence corporate cybersecurity measures, a practice she staunchly opposes.</p><p><strong>The Perfect Storm: AI and Cybersecurity</strong></p><p>The discussion turns to the increasing complexity of cybersecurity in the age of AI. Sean and Jess delve into the pressures CISOs face as they balance the incorporation of AI technologies with maintaining robust cybersecurity measures. Jess describes this scenario as a “perfect storm,” making the role of a CISO more challenging than ever.</p><p><strong>Regulation and Legislation: A Critical Examination</strong></p><p>Marco raises critical concerns about the reactive nature of current cybersecurity legislation and regulation. Jess discusses how federal agencies often target individuals closest to a cybersecurity breach and outlines the topics she will cover in her upcoming Black Hat presentation. She aims to educate CISOs on preventive measures and strategic responses to navigate these challenges effectively.</p><p><strong>Looking Ahead: Black Hat 2024</strong></p><p>As the episode concludes, Sean emphasizes the importance of awareness and proactive measures among CISOs. Marco encourages listeners to attend Jess Nall’s presentation at Black Hat 2024 on August 7th at Mandalay Bay in Las Vegas. This critical discussion promises to equip CISOs and their teams with the knowledge and tools to navigate their increasingly scrutinized roles.</p><p><strong>Stay Tuned with ITSP Magazine</strong></p><p>Sean and Marco remind their audience that this episode is just the beginning of a series of insightful conversations leading up to Black Hat 2024. They invite listeners to stay tuned for more engaging episodes that will continue to explore the dynamic world of cybersecurity.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Jul 2024 22:26:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jess Nall)</author>
      <link>https://eventcoveragepodcast.com/episodes/dodging-the-ball-and-ways-for-cisos-to-avoid-essential-strategies-for-cisos-a-black-hat-usa-2024-conversation-with-jess-nall-on-location-coverage-with-sean-martin-and-marco-ciappelli-WwSDidY2</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jess Nall</strong>, Partner, Defense Against Government Investigations, Baker McKenzie, LLP [<a href="https://x.com/bakermckenzie">@bakermckenzie</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jess-nall/">https://www.linkedin.com/in/jess-nall/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>As the countdown to Black Hat 2024 begins, ITSP Magazine’s “Chats On the Road” series kicks off with a compelling pre-event discussion featuring Jess Nall, a partner at Baker McKenzie with over two decades of experience in federal investigations and defending Chief Information Security Officers (CISOs). Hosted by Sean Martin and Marco Ciappelli, the episode blends humor and serious insights to tackle the evolving challenges faced by CISOs today.</p><p><strong>The Dodgeball Analogy: Setting the Stage</strong></p><p>The conversation starts on a light-hearted note with a playful dodgeball analogy, a clever metaphor used to illustrate the growing complexities in the cybersecurity landscape. This sets the tone for a deeper exploration of the pressures and responsibilities that modern CISOs face, bridging the gap between legacy technology and contemporary cybersecurity challenges.</p><p><strong>Legacy Technology vs. Modern Cybersecurity</strong></p><p>Drawing from the dodgeball metaphor, Sean and Marco highlight the burden of legacy technology and its impact on current cybersecurity practices. Jess Nall shares her perspective on how past business operations influence today’s cybersecurity strategies, emphasizing the need for CISOs to adapt and innovate continually.</p><p><strong>ITSP Magazine’s Milestone and Black Hat Connections</strong></p><p>This episode also marks a celebratory milestone for ITSP Magazine. Sean and Marco reflect on their journey from Los Angeles to Las Vegas, the birthplace of ITSP Magazine, and how their experiences have shaped the publication’s mission and growth. As they gear up for Black Hat 2024, they express their excitement about reconnecting with the cybersecurity community and exploring new opportunities for collaboration.</p><p><strong>Introducing Jess Nall: Expertise and Experience</strong></p><p>Jess Nall, a seasoned expert in federal investigations, brings invaluable insights to the discussion. She underscores the severe implications of government scrutiny on CISOs, drawing from high-profile cases like SEC v. SolarWinds and Tim Brown. Jess provides practical advice for CISOs to avoid regulatory pitfalls and highlights the importance of staying vigilant and proactive in their roles.</p><p><strong>The Internet’s Troubled History and Its Impact</strong></p><p>Marco steers the conversation towards the Internet’s troubled history and its initial lack of security foresight. Jess reflects on how these historical challenges have shaped modern cybersecurity practices, emphasizing the difficulties of keeping up with evolving threats and expanding attack surfaces. She also discusses the controversial strategy of targeting CISOs to influence corporate cybersecurity measures, a practice she staunchly opposes.</p><p><strong>The Perfect Storm: AI and Cybersecurity</strong></p><p>The discussion turns to the increasing complexity of cybersecurity in the age of AI. Sean and Jess delve into the pressures CISOs face as they balance the incorporation of AI technologies with maintaining robust cybersecurity measures. Jess describes this scenario as a “perfect storm,” making the role of a CISO more challenging than ever.</p><p><strong>Regulation and Legislation: A Critical Examination</strong></p><p>Marco raises critical concerns about the reactive nature of current cybersecurity legislation and regulation. Jess discusses how federal agencies often target individuals closest to a cybersecurity breach and outlines the topics she will cover in her upcoming Black Hat presentation. She aims to educate CISOs on preventive measures and strategic responses to navigate these challenges effectively.</p><p><strong>Looking Ahead: Black Hat 2024</strong></p><p>As the episode concludes, Sean emphasizes the importance of awareness and proactive measures among CISOs. Marco encourages listeners to attend Jess Nall’s presentation at Black Hat 2024 on August 7th at Mandalay Bay in Las Vegas. This critical discussion promises to equip CISOs and their teams with the knowledge and tools to navigate their increasingly scrutinized roles.</p><p><strong>Stay Tuned with ITSP Magazine</strong></p><p>Sean and Marco remind their audience that this episode is just the beginning of a series of insightful conversations leading up to Black Hat 2024. They invite listeners to stay tuned for more engaging episodes that will continue to explore the dynamic world of cybersecurity.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ">https://www.youtube.com/playlist?list=PLnYu0psdcllRo9DcHmre_45ha-ru7cZMQ</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p>Coro: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p>SquareX: <a href="https://itspm.ag/sqrx-l91">https://itspm.ag/sqrx-l91</a></p><p>Britive: <a href="https://itspm.ag/britive-3fa6">https://itspm.ag/britive-3fa6</a></p><p>AppDome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Black Hat USA  2024: <a href="https://www.blackhat.com/us-24/">https://www.blackhat.com/us-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21018475" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/6e6df6a9-ab91-45c6-9723-f2100f448776/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=6e6df6a9-ab91-45c6-9723-f2100f448776&amp;feed=2M86zCcc"/>
      <itunes:title>Dodging the Ball and ways for CISOs to avoid: Essential Strategies for CISOs | A Black Hat USA  2024 Conversation with Jess Nall | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jess Nall</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/922c5a92-a2fd-4210-816a-3a661725b172/3000x3000/black-hat-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:53</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli from ITSP Magazine as they talk with Jess Nall about strategies for CISOs to sidestep government fallout in the wake of major cyberattacks at the Black Hat 2024 conference in Las Vegas.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli from ITSP Magazine as they talk with Jess Nall about strategies for CISOs to sidestep government fallout in the wake of major cyberattacks at the Black Hat 2024 conference in Las Vegas.</itunes:subtitle>
      <itunes:keywords>cyber defense strategies, jess nall, dodgeball analogy, marco ciappelli, baker mckenzie, ciso, cyberattacks, sean martin, government scrutiny, proactive measures, cybersecurity, black hat conference, conference, itsp magazine, reactive regulation, federal investigations, legacy technology, cybersecurity pressures, podcast, security, itsp chats on the road, cybersecurity legislation, black hat 2024, ai in cybersecurity, cybersecurityconference, sec</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0cfd8c0f-f945-4b37-a316-022a1fe938f9</guid>
      <title>Beyond Traditional Pen Testing for Continuous Risk Assessment | A Brand Story Conversation From RSA Conference 2024 | A Hadrian Story with Rogier Fischer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.</p><p>Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.</p><p>One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.</p><p>Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.</p><p>In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker’s perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.</p><p>Top Questions Addressed</p><ul><li>What drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?</li><li>How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?</li><li>How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?</li></ul><p>Learn more about Hadrian: <a href="https://itspm.ag/hadrian-5ei">https://itspm.ag/hadrian-5ei</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rogier Fischer</strong>, Co-Founder and CEO, Hadrian [<a href="https://x.com/hadriansecurity">@hadriansecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rogierfischer/">https://www.linkedin.com/in/rogierfischer/</a></p><p><strong>Resources</strong></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 16 Jul 2024 20:59:09 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rogier Fischer)</author>
      <link>https://eventcoveragepodcast.com/episodes/beyond-traditional-pen-testing-for-continuous-risk-assessment-a-brand-story-conversation-from-rsa-conference-2024-a-hadrian-story-with-rogier-fischer-on-location-coverage-with-sean-martin-and-marco-ciappelli-JrkQylhE</link>
      <content:encoded><![CDATA[<p>In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.</p><p>Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.</p><p>One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.</p><p>Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.</p><p>In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker’s perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.</p><p>Top Questions Addressed</p><ul><li>What drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?</li><li>How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?</li><li>How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?</li></ul><p>Learn more about Hadrian: <a href="https://itspm.ag/hadrian-5ei">https://itspm.ag/hadrian-5ei</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rogier Fischer</strong>, Co-Founder and CEO, Hadrian [<a href="https://x.com/hadriansecurity">@hadriansecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rogierfischer/">https://www.linkedin.com/in/rogierfischer/</a></p><p><strong>Resources</strong></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25520278" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9a6d0c3c-cadf-4cf0-97be-928dffe012db/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9a6d0c3c-cadf-4cf0-97be-928dffe012db&amp;feed=2M86zCcc"/>
      <itunes:title>Beyond Traditional Pen Testing for Continuous Risk Assessment | A Brand Story Conversation From RSA Conference 2024 | A Hadrian Story with Rogier Fischer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rogier Fischer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:34</itunes:duration>
      <itunes:summary>Dive into the complexities of modern cybersecurity with Sean Martin and Hadrian co-founder Rogier Fischer as they explore how advanced AI-driven tools can outsmart traditional methods in vulnerability detection and risk management. Learn how Hadrian’s innovative event-driven architecture and selective AI application are revolutionizing the way organizations protect themselves from ever-evolving threats.</itunes:summary>
      <itunes:subtitle>Dive into the complexities of modern cybersecurity with Sean Martin and Hadrian co-founder Rogier Fischer as they explore how advanced AI-driven tools can outsmart traditional methods in vulnerability detection and risk management. Learn how Hadrian’s innovative event-driven architecture and selective AI application are revolutionizing the way organizations protect themselves from ever-evolving threats.</itunes:subtitle>
      <itunes:keywords>hadrian, marco ciappelli, pen testing, rsa conference, hacking, event-driven, sean martin, automation, cybersecurity, rogier fischer, vulnerability, risk management, exposure, prioritization, threat intelligence, continuous monitoring, breach detection, ethical hacking, attack surface, machine learning, ai, brand story, remediation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">56c3689c-2cff-4a75-a819-9886e6f580f3</guid>
      <title>Punch Cards, Steam Engines, 48 Volt Batteries, Platform Engineering, and the AI Revolution: The Ongoing Evolution of Language-Based Software Development | An OWASP AppSec Global Lisbon 2024 Conversation with Oleg Shanyuk | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guest: Oleg Shanyuk</strong>, Platform Security, Delivery Hero [<a href="https://x.com/deliveryherocom">@deliveryherocom</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/oleg-shanyuk/" target="_blank">https://www.linkedin.com/in/oleg-shanyuk/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location episode, Sean Martin discusses the complexities of application security (AppSec) and the challenges surrounding the integration of artificial intelligence (AI) with Oleg Shanyuk at the OWASP Global AppSec Global conference in Lisbon. The conversation delves into various aspects of AppSec, DevSecOps, and the broader scope of securing both web and mobile applications, as well as the cloud and container environments that underpin them.</p><p>One of the core topics Martin and Shanyuk explore is the pervasive influence of AI across different sectors. AI's application in coding, for instance, can significantly expedite the development process. However, as Sean Martin highlights, AI-generated code may lack the human intuition and contextual understanding crucial for error mitigation. This necessitates deeper and more intricate code reviews by human developers, reinforcing the symbiotic relationship between human expertise and AI efficiency.</p><p>Shanyuk shares insightful anecdotes about the history and evolution of programming languages and how AI's rise is reminiscent of past technological shifts. He references the advancement from physical punch cards to assembly languages and human-readable code, drawing parallels to the current AI boom. Shanyuk stresses the importance of learning from past technological evolutions to better understand and leverage AI's full potential in modern development environments.</p><p>The conversation also explores the practical applications of AI in fields beyond straightforward coding. Shanyuk discusses the evolution of automotive batteries from 12 volts to 48 volts, paralleling this shift with how AI can optimize various processes in different industries. This evolution demonstrates the potential of technology to drive efficiencies and reduce costs, emphasizing the need for ongoing innovation and adaptation.</p><p>Martin further navigates the discussion towards platform engineering, contrasting its benefits of consistency and control with the precision and customization needed for specific tasks. The ongoing debate encapsulates the broader dialogue within the tech community about finding the right balance between standardization and flexibility. Shanyuk's perspective offers valuable insights into how industries can leverage AI and platform engineering principles to achieve both operational efficiency and specialized functionality.</p><p>The episode concludes with forward-looking reflections on the future of AI-driven models and their potential to transcend the limitations of human language and traditional coding paradigms. The thoughtful dialogue between Martin and Shanyuk leaves listeners with a deeper appreciation of the challenges and opportunities within the realm of AI and AppSec, encouraging continued exploration and discourse in these rapidly evolving fields.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Bret Victor:  <a href="https://worrydream.com/" target="_blank">https://worrydream.com/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 10 Jul 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Oleg Shanyuk)</author>
      <link>https://eventcoveragepodcast.com/episodes/punch-cards-steam-engines-48-volt-batteries-platform-engineering-and-the-ai-revolution-the-ongoing-evolution-of-language-based-software-development-an-owasp-appsec-global-lisbon-2024-conversation-with-oleg-shanyuk-on-location-coverage-FmzaX_t_</link>
      <content:encoded><![CDATA[<p><strong>Guest: Oleg Shanyuk</strong>, Platform Security, Delivery Hero [<a href="https://x.com/deliveryherocom">@deliveryherocom</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/oleg-shanyuk/" target="_blank">https://www.linkedin.com/in/oleg-shanyuk/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location episode, Sean Martin discusses the complexities of application security (AppSec) and the challenges surrounding the integration of artificial intelligence (AI) with Oleg Shanyuk at the OWASP Global AppSec Global conference in Lisbon. The conversation delves into various aspects of AppSec, DevSecOps, and the broader scope of securing both web and mobile applications, as well as the cloud and container environments that underpin them.</p><p>One of the core topics Martin and Shanyuk explore is the pervasive influence of AI across different sectors. AI's application in coding, for instance, can significantly expedite the development process. However, as Sean Martin highlights, AI-generated code may lack the human intuition and contextual understanding crucial for error mitigation. This necessitates deeper and more intricate code reviews by human developers, reinforcing the symbiotic relationship between human expertise and AI efficiency.</p><p>Shanyuk shares insightful anecdotes about the history and evolution of programming languages and how AI's rise is reminiscent of past technological shifts. He references the advancement from physical punch cards to assembly languages and human-readable code, drawing parallels to the current AI boom. Shanyuk stresses the importance of learning from past technological evolutions to better understand and leverage AI's full potential in modern development environments.</p><p>The conversation also explores the practical applications of AI in fields beyond straightforward coding. Shanyuk discusses the evolution of automotive batteries from 12 volts to 48 volts, paralleling this shift with how AI can optimize various processes in different industries. This evolution demonstrates the potential of technology to drive efficiencies and reduce costs, emphasizing the need for ongoing innovation and adaptation.</p><p>Martin further navigates the discussion towards platform engineering, contrasting its benefits of consistency and control with the precision and customization needed for specific tasks. The ongoing debate encapsulates the broader dialogue within the tech community about finding the right balance between standardization and flexibility. Shanyuk's perspective offers valuable insights into how industries can leverage AI and platform engineering principles to achieve both operational efficiency and specialized functionality.</p><p>The episode concludes with forward-looking reflections on the future of AI-driven models and their potential to transcend the limitations of human language and traditional coding paradigms. The thoughtful dialogue between Martin and Shanyuk leaves listeners with a deeper appreciation of the challenges and opportunities within the realm of AI and AppSec, encouraging continued exploration and discourse in these rapidly evolving fields.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Bret Victor:  <a href="https://worrydream.com/" target="_blank">https://worrydream.com/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36169458" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c504a4ec-02cf-407d-bd67-5f1297879e28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c504a4ec-02cf-407d-bd67-5f1297879e28&amp;feed=2M86zCcc"/>
      <itunes:title>Punch Cards, Steam Engines, 48 Volt Batteries, Platform Engineering, and the AI Revolution: The Ongoing Evolution of Language-Based Software Development | An OWASP AppSec Global Lisbon 2024 Conversation with Oleg Shanyuk | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Oleg Shanyuk</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:40</itunes:duration>
      <itunes:summary>Join Sean Martin and Oleg Shanyuk at the OWASP AppSec Global conference as they delve into the transformative impact of AI on application security, development processes, and platform engineering. This episode offers nuanced perspectives on the balance between technological innovation and practical efficiency, making it a must-listen for tech enthusiasts and professionals alike.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Oleg Shanyuk at the OWASP AppSec Global conference as they delve into the transformative impact of AI on application security, development processes, and platform engineering. This episode offers nuanced perspectives on the balance between technological innovation and practical efficiency, making it a must-listen for tech enthusiasts and professionals alike.</itunes:subtitle>
      <itunes:keywords>programming, data, marco ciappelli, sean martin, containers, oleg shanyuk, cybersecurity, software, conference, applications, platform engineering, laws, cloud, appsec, podcast, security, ethics, coding, owasp, ai, concurrency, devsecops, community, cybersecurityconference, keynote</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">87f1fcd8-647b-44a3-b8a6-da4e259a061e</guid>
      <title>The Future of Tech and Society at Viva Tech 2024 | An On Location VIVA TECH Conference 2024 Coverage Conversation with François Bitouzet</title>
      <description><![CDATA[<p><strong>Guest: François Bitouzet</strong>, Managing Director at Viva Technology [<a href="https://twitter.com/VivaTech">@VivaTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/">https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Event Recap and Highlights</strong></p><p>Marco Ciappelli opens the discussion with a warm greeting, reflecting on his recent travel experiences and upcoming conferences. François Bitouzet, the guest of honor, then dives straight into the heart of the Viva Tech 2024 event, providing detailed insights into its scope, significance, and impact.</p><p><strong>An Overview of Viva Tech</strong></p><p>François explains that Viva Tech is a four-day event held annually in Paris, focusing on bringing together stakeholders in the innovation sphere. This year’s event saw the participation of 155,000 attendees from 120 countries, showcasing thousands of startups, tech leaders from companies like Google and Meta, corporate giants such as Audi and LVMH, as well as public sector representatives.</p><p><strong>The Unique Format and Initiatives</strong></p><p>One of the most distinctive features of Viva Tech 2024 was its two-fold format. For the first three days, the event catered to the B2B audience, allowing startups and investors to network and collaborate. On the final day, it opened its doors to the general public. This approach aimed to make technology accessible to everyone, regardless of their professional background.</p><p>François highlighted various initiatives like the “100+100” program, where 100 successful business women in tech spent a day mentoring young girls. This not only promoted diversity and inclusion but also inspired the next generation to pursue careers in technology.</p><p><strong>Focus on AI and Other Innovations</strong></p><p>While Artificial Intelligence (AI) was a major talking point, François emphasized that the event delved deeper into how AI is shaping different business sectors rather than just focusing on the technology itself. By bringing in sector-specific insights, the event sought to provide a realistic perspective on the current impact and future potential of AI.</p><p><strong>Memorable Moments and Creativity</strong></p><p>François shared several memorable moments from the event, including a live Q&A session with Elon Musk, who joined virtually to answer unfiltered questions from the audience. This showcased the raw and authentic engagement the event aims to foster.</p><p>Another highlight was the collaboration with the European retailer FNAC, which set up a kiosk where speakers could sign books for the attendees. This initiative bridged the gap between traditional formats and modern technology, exemplifying how the old and the new can coexist harmoniously.</p><p><strong>Looking Ahead</strong></p><p>As the conversation winded down, Marco and François discussed the future of Viva Tech, hinting at more surprises and creative content for next year. François emphasized the importance of injecting poetry and romance—metaphorically speaking—into the world of tech to retain its human touch and inspirational value.</p><p><strong>Call to Action</strong></p><p>Finally, Marco encouraged listeners to make plans to attend Viva Tech 2025, expressing his excitement about potentially meeting his audience in person. François echoed this sentiment, inviting everyone to experience the blend of innovation, business, and meaningful impact that Viva Tech promises.</p><p><strong>Conclusion</strong></p><p>The episode concluded with both Marco and François expressing their shared optimism for the future of technology and its potential to not only transform industries but also enhance our quality of life. They agreed that events like Viva Tech are crucial in driving this change by making technology accessible, inclusive, and genuinely impactful.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about VIVA TECH 2024: <a href="https://vivatechnology.com/">https://vivatechnology.com/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 6 Jul 2024 02:22:55 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine On Location, François Bitouzet)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-future-of-tech-and-society-at-viva-tech-2024-an-on-location-viva-tech-conference-2024-coverage-conversation-with-francois-bitouzet-O1Lg6V4X</link>
      <content:encoded><![CDATA[<p><strong>Guest: François Bitouzet</strong>, Managing Director at Viva Technology [<a href="https://twitter.com/VivaTech">@VivaTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/">https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Event Recap and Highlights</strong></p><p>Marco Ciappelli opens the discussion with a warm greeting, reflecting on his recent travel experiences and upcoming conferences. François Bitouzet, the guest of honor, then dives straight into the heart of the Viva Tech 2024 event, providing detailed insights into its scope, significance, and impact.</p><p><strong>An Overview of Viva Tech</strong></p><p>François explains that Viva Tech is a four-day event held annually in Paris, focusing on bringing together stakeholders in the innovation sphere. This year’s event saw the participation of 155,000 attendees from 120 countries, showcasing thousands of startups, tech leaders from companies like Google and Meta, corporate giants such as Audi and LVMH, as well as public sector representatives.</p><p><strong>The Unique Format and Initiatives</strong></p><p>One of the most distinctive features of Viva Tech 2024 was its two-fold format. For the first three days, the event catered to the B2B audience, allowing startups and investors to network and collaborate. On the final day, it opened its doors to the general public. This approach aimed to make technology accessible to everyone, regardless of their professional background.</p><p>François highlighted various initiatives like the “100+100” program, where 100 successful business women in tech spent a day mentoring young girls. This not only promoted diversity and inclusion but also inspired the next generation to pursue careers in technology.</p><p><strong>Focus on AI and Other Innovations</strong></p><p>While Artificial Intelligence (AI) was a major talking point, François emphasized that the event delved deeper into how AI is shaping different business sectors rather than just focusing on the technology itself. By bringing in sector-specific insights, the event sought to provide a realistic perspective on the current impact and future potential of AI.</p><p><strong>Memorable Moments and Creativity</strong></p><p>François shared several memorable moments from the event, including a live Q&A session with Elon Musk, who joined virtually to answer unfiltered questions from the audience. This showcased the raw and authentic engagement the event aims to foster.</p><p>Another highlight was the collaboration with the European retailer FNAC, which set up a kiosk where speakers could sign books for the attendees. This initiative bridged the gap between traditional formats and modern technology, exemplifying how the old and the new can coexist harmoniously.</p><p><strong>Looking Ahead</strong></p><p>As the conversation winded down, Marco and François discussed the future of Viva Tech, hinting at more surprises and creative content for next year. François emphasized the importance of injecting poetry and romance—metaphorically speaking—into the world of tech to retain its human touch and inspirational value.</p><p><strong>Call to Action</strong></p><p>Finally, Marco encouraged listeners to make plans to attend Viva Tech 2025, expressing his excitement about potentially meeting his audience in person. François echoed this sentiment, inviting everyone to experience the blend of innovation, business, and meaningful impact that Viva Tech promises.</p><p><strong>Conclusion</strong></p><p>The episode concluded with both Marco and François expressing their shared optimism for the future of technology and its potential to not only transform industries but also enhance our quality of life. They agreed that events like Viva Tech are crucial in driving this change by making technology accessible, inclusive, and genuinely impactful.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about VIVA TECH 2024: <a href="https://vivatechnology.com/">https://vivatechnology.com/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26918412" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2ea48015-bc19-42c7-b3a6-968d9a655147/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2ea48015-bc19-42c7-b3a6-968d9a655147&amp;feed=2M86zCcc"/>
      <itunes:title>The Future of Tech and Society at Viva Tech 2024 | An On Location VIVA TECH Conference 2024 Coverage Conversation with François Bitouzet</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine On Location, François Bitouzet</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/3df2b73a-743d-4c71-8f10-91fa019f5981/3000x3000/viva-tech-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:02</itunes:duration>
      <itunes:summary>In this episode of the Redefining Society Podcast, Marco Ciappelli interviews François Bitouzet to recap the revolutionary Viva Tech 2024 event in Paris.</itunes:summary>
      <itunes:subtitle>In this episode of the Redefining Society Podcast, Marco Ciappelli interviews François Bitouzet to recap the revolutionary Viva Tech 2024 event in Paris.</itunes:subtitle>
      <itunes:keywords>paris tech event, diversity in technology, viva tech recap, marco ciappelli, tech event highlights, francois bitouzet, ai innovation, innovation conference, b2b tech events, tech inclusion, elon musk viva tech, redefining society podcast, viva technology, paris tech events, startup networking, podcast episode, technology and society, event coverage, viva tech conference, tech event recap, future of tech, tech conferences, ai in healthcare, women in tech, françois bitouzet, digital transformation, viva tech 2024, viva tech 2024, global innovators, vivatech highlights</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9e4a0deb-548f-43bc-b9ce-340eceaaf593</guid>
      <title>From Theory to Process to Practice: Cracking Mobile and IoT Security and Vulnerability Management | An OWASP AppSec Global Lisbon 2024 Conversation with Abraham Aranguren | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Abraham Aranguren</strong>, Managing Director at 7ASecurity [<a href="https://x.com/7aSecurity">@7aSecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/abrahamaranguren/">https://www.linkedin.com/in/abrahamaranguren/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location episode recorded in Lisbon at the OWASP AppSec Global event, Sean Martin engages in a comprehensive discussion with Abraham Aranguren, a cybersecurity trainer skilled at hacking IoT, iOS, and Android devices. The conversation delves into the intricacies of mobile application security, touching on both the technical and procedural aspects that organizations must consider to build and maintain secure apps.</p><p>Abraham Aranguren, known for his expertise in cybersecurity training, shares compelling insights into identifying IoT vulnerabilities without physically having the device. By reverse engineering applications, one can uncover potential security flaws and understand how apps communicate with their IoT counterparts. For instance, Aranguren describes exercises where students analyze mobile apps to reveal hardcoded passwords and unsecured Wi-Fi connections used to manage devices like drones.</p><p>A significant portion of the discussion revolves around real-world examples of security lapses in mobile applications. Aranguren details an incident involving a Chinese government app that harvests personal data from users' phones, highlighting the serious privacy implications of such vulnerabilities. Another poignant example is Hong Kong's COVID-19 contact-tracing app, which stored sensitive user information insecurely, revealing how even high-budget applications can suffer from critical security flaws if not properly tested.</p><p>Sean Martin, drawing from his background in software quality assurance, emphasizes the importance of establishing clear, repeatable processes and workflows to ensure security measures are consistently applied throughout the development and deployment phases. He and Aranguren agree that while developers need to be educated in secure coding practices, organizations must also implement robust processes, including code reviews, automated tools for static analysis, and third-party audits to identify and rectify potential vulnerabilities.</p><p>Aranguren stresses the value of pentests, noting that organizations often show significant improvement over multiple tests. He shares experiences of clients who, after several engagements, greatly reduced the number of exploitable vulnerabilities. Regular, comprehensive testing, combined with a proactive approach to fixing identified issues, helps create a robust security posture, ultimately making applications harder to exploit and dissuading potential attackers.</p><p>For businesses developing apps, this episode underscores the necessity of integrating security from the ground up, continuously educating developers, enforcing centralized security controls, and utilizing pentests as a tool for both validation and education. The ultimate goal is to make applications resilient enough to deter attackers, ensuring both the business and its users are protected.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>LeaveHomeSafe Pentest Report: <a href="https://7asecurity.com/reports/pentest-report-leavehomesafe.pdf">https://7asecurity.com/reports/pentest-report-leavehomesafe.pdf</a></p><p>CoverDrop Pentest Report: <a href="https://7asecurity.com/reports/pentest-report-coverdrop.pdf">https://7asecurity.com/reports/pentest-report-coverdrop.pdf</a></p><p>Why You Need a Pentest: <a href="https://www.youtube.com/watch?v=oBVTlKrLw-k">https://www.youtube.com/watch?v=oBVTlKrLw-k</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 28 Jun 2024 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Abraham Aranguren)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-theory-to-process-to-practice-cracking-mobile-and-iot-security-and-vulnerability-management-an-owasp-appsec-global-lisbon-2024-conversation-with-abraham-aranguren-on-location-coverage-with-sean-martin-and-marco-ciappelli-OWW1YMaQ</link>
      <content:encoded><![CDATA[<p><strong>Guest: Abraham Aranguren</strong>, Managing Director at 7ASecurity [<a href="https://x.com/7aSecurity">@7aSecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/abrahamaranguren/">https://www.linkedin.com/in/abrahamaranguren/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this On Location episode recorded in Lisbon at the OWASP AppSec Global event, Sean Martin engages in a comprehensive discussion with Abraham Aranguren, a cybersecurity trainer skilled at hacking IoT, iOS, and Android devices. The conversation delves into the intricacies of mobile application security, touching on both the technical and procedural aspects that organizations must consider to build and maintain secure apps.</p><p>Abraham Aranguren, known for his expertise in cybersecurity training, shares compelling insights into identifying IoT vulnerabilities without physically having the device. By reverse engineering applications, one can uncover potential security flaws and understand how apps communicate with their IoT counterparts. For instance, Aranguren describes exercises where students analyze mobile apps to reveal hardcoded passwords and unsecured Wi-Fi connections used to manage devices like drones.</p><p>A significant portion of the discussion revolves around real-world examples of security lapses in mobile applications. Aranguren details an incident involving a Chinese government app that harvests personal data from users' phones, highlighting the serious privacy implications of such vulnerabilities. Another poignant example is Hong Kong's COVID-19 contact-tracing app, which stored sensitive user information insecurely, revealing how even high-budget applications can suffer from critical security flaws if not properly tested.</p><p>Sean Martin, drawing from his background in software quality assurance, emphasizes the importance of establishing clear, repeatable processes and workflows to ensure security measures are consistently applied throughout the development and deployment phases. He and Aranguren agree that while developers need to be educated in secure coding practices, organizations must also implement robust processes, including code reviews, automated tools for static analysis, and third-party audits to identify and rectify potential vulnerabilities.</p><p>Aranguren stresses the value of pentests, noting that organizations often show significant improvement over multiple tests. He shares experiences of clients who, after several engagements, greatly reduced the number of exploitable vulnerabilities. Regular, comprehensive testing, combined with a proactive approach to fixing identified issues, helps create a robust security posture, ultimately making applications harder to exploit and dissuading potential attackers.</p><p>For businesses developing apps, this episode underscores the necessity of integrating security from the ground up, continuously educating developers, enforcing centralized security controls, and utilizing pentests as a tool for both validation and education. The ultimate goal is to make applications resilient enough to deter attackers, ensuring both the business and its users are protected.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>LeaveHomeSafe Pentest Report: <a href="https://7asecurity.com/reports/pentest-report-leavehomesafe.pdf">https://7asecurity.com/reports/pentest-report-leavehomesafe.pdf</a></p><p>CoverDrop Pentest Report: <a href="https://7asecurity.com/reports/pentest-report-coverdrop.pdf">https://7asecurity.com/reports/pentest-report-coverdrop.pdf</a></p><p>Why You Need a Pentest: <a href="https://www.youtube.com/watch?v=oBVTlKrLw-k">https://www.youtube.com/watch?v=oBVTlKrLw-k</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31810138" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/989118e6-535b-4efa-b3e0-d79038d00a22/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=989118e6-535b-4efa-b3e0-d79038d00a22&amp;feed=2M86zCcc"/>
      <itunes:title>From Theory to Process to Practice: Cracking Mobile and IoT Security and Vulnerability Management | An OWASP AppSec Global Lisbon 2024 Conversation with Abraham Aranguren | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Abraham Aranguren</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:08</itunes:duration>
      <itunes:summary>Sean Martin sits down with Abraham Aranguren at the OWASP AppSec Global event to explore the complexities of mobile application security and effective strategies for identifying vulnerabilities. Tune in to hear real-world examples, actionable insights, and best practices for building and maintaining secure mobile apps.</itunes:summary>
      <itunes:subtitle>Sean Martin sits down with Abraham Aranguren at the OWASP AppSec Global event to explore the complexities of mobile application security and effective strategies for identifying vulnerabilities. Tune in to hear real-world examples, actionable insights, and best practices for building and maintaining secure mobile apps.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, deep links, code reviews, mobile apps, sean martin, cybersecurity, conference, secure coding, penetration testing, abraham aranguren, appsec, data privacy, app development, podcast, security, mobsf, third-party audits, mobile security, owasp, automated tools, sql injection, reverse engineering, cybersecurityconference, training, iot vulnerabilities</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f333ff93-3a4d-4899-9f73-a5a1535a52c5</guid>
      <title>Is Your App Security Culture Leaving Out the Basics? | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping the industry today.</p><p>The discussion begins by exploring the potential and pitfalls of artificial intelligence (AI) in cybersecurity. Francesco highlights the dual role of AI as both a tool and a target within security frameworks. He emphasizes the importance of proper prompt engineering and specialized training data to avoid common issues, such as AI-generated libraries that don't actually exist. This leads to a broader conversation about how Phoenix Security utilizes AI to intelligently categorize and prioritize vulnerabilities, allowing security teams to focus on the most critical issues.</p><p>The conversation then shifts to the concept of maturity models in vulnerability management. Francesco explains that many organizations are still struggling with basic security tasks and describes how Phoenix Security helps these organizations to quickly enhance their maturity levels. This involves automating the scanning process, aggregating data, and providing clear metrics that align security efforts with executive expectations.</p><p>A significant portion of the episode is dedicated to the importance of collaboration and communication between security and development teams. Francesco stresses that security should be integrated into the spring planning process, helping developers to prioritize tasks in a way that aligns with overall risk management strategies. This approach fosters a culture of cooperation and ensures that security initiatives are seen as a valuable part of the development cycle, rather than a hindrance.</p><p>Francesco also touches on the role of management in security practices, underscoring the need for aligning business expectations with engineering practices. He introduces the vulnerability maturity model that Phoenix Security uses to help organizations mature their security programs effectively. This model, which maps back to established OWASP frameworks, provides a clear path for organizations to improve their security posture systematically.</p><p>The episode concludes with Francesco reflecting on the persistent basic security issues that organizations face and expressing optimism about the future. He is confident that Phoenix Security's approach can help businesses intelligently address these challenges and scale their security practices effectively.</p><p>Learn more about  Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 28 Jun 2024 02:28:20 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone)</author>
      <link>https://eventcoveragepodcast.com/episodes/is-your-app-security-culture-leaving-out-the-basics-a-brand-story-conversation-from-owasp-appsec-global-lisbon-2024-a-phoenix-security-story-with-francesco-cipollone-on-location-coverage-with-sean-martin-and-marco-ciappelli-q8magLHy</link>
      <content:encoded><![CDATA[<p>In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping the industry today.</p><p>The discussion begins by exploring the potential and pitfalls of artificial intelligence (AI) in cybersecurity. Francesco highlights the dual role of AI as both a tool and a target within security frameworks. He emphasizes the importance of proper prompt engineering and specialized training data to avoid common issues, such as AI-generated libraries that don't actually exist. This leads to a broader conversation about how Phoenix Security utilizes AI to intelligently categorize and prioritize vulnerabilities, allowing security teams to focus on the most critical issues.</p><p>The conversation then shifts to the concept of maturity models in vulnerability management. Francesco explains that many organizations are still struggling with basic security tasks and describes how Phoenix Security helps these organizations to quickly enhance their maturity levels. This involves automating the scanning process, aggregating data, and providing clear metrics that align security efforts with executive expectations.</p><p>A significant portion of the episode is dedicated to the importance of collaboration and communication between security and development teams. Francesco stresses that security should be integrated into the spring planning process, helping developers to prioritize tasks in a way that aligns with overall risk management strategies. This approach fosters a culture of cooperation and ensures that security initiatives are seen as a valuable part of the development cycle, rather than a hindrance.</p><p>Francesco also touches on the role of management in security practices, underscoring the need for aligning business expectations with engineering practices. He introduces the vulnerability maturity model that Phoenix Security uses to help organizations mature their security programs effectively. This model, which maps back to established OWASP frameworks, provides a clear path for organizations to improve their security posture systematically.</p><p>The episode concludes with Francesco reflecting on the persistent basic security issues that organizations face and expressing optimism about the future. He is confident that Phoenix Security's approach can help businesses intelligently address these challenges and scale their security practices effectively.</p><p>Learn more about  Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17030675" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2659c941-30ce-4754-96cf-84268e774363/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2659c941-30ce-4754-96cf-84268e774363&amp;feed=2M86zCcc"/>
      <itunes:title>Is Your App Security Culture Leaving Out the Basics? | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:17:44</itunes:duration>
      <itunes:summary>In this On Location episode, Sean Martin chats with Francesco Cipollone, Co-founder and CEO of Phoenix Security, about the evolving landscape of application security and the role of AI in tackling persistent vulnerabilities. They explore effective strategies for enhancing security maturity and fostering collaboration between security and development teams, offering valuable insights and practical advice.</itunes:summary>
      <itunes:subtitle>In this On Location episode, Sean Martin chats with Francesco Cipollone, Co-founder and CEO of Phoenix Security, about the evolving landscape of application security and the role of AI in tackling persistent vulnerabilities. They explore effective strategies for enhancing security maturity and fostering collaboration between security and development teams, offering valuable insights and practical advice.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sean martin, cybersecurity, francesco cipollone, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">91375002-7e5e-4117-b8f1-75043bf5cd0a</guid>
      <title>Prioritizing Cyber Resilience for your Business | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A LevelBlue Brand Story with Theresa Lanowitz</title>
      <description><![CDATA[<p>We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just a few short hours – and leaders need to be prepared for recovery from an interruption to the networks, systems, or data that underpin their business. With the advent and proliferation of new technologies, there is more pressure than ever to secure organizations’ computing. Ultimately, the evolution of computing has forced businesses into a paradox of innovation and risk. They must balance technology with security and business resilience, which requires a new way of thinking.</p><ul><li>Conduct a thorough assessment of risk areas to understand the barriers across your IT estate.</li><li>Assess your organization’s dynamic computing initiatives and design security measures from the outset of implementation to ensure compliance and mitigate future risks.</li><li>Allocate resources strategically to align cybersecurity initiatives with business objectives across silos.</li><li>Forge partnerships with external collaborators to augment your organization’s security expertise.</li><li>Regularly adapt your approach to meet the demands of an evolving computing landscape and expanding attack surface.</li></ul><p>Learn more about LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 27 Jun 2024 22:18:06 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://eventcoveragepodcast.com/episodes/prioritizing-cyber-resilience-for-your-business-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-levelblue-story-with-theresa-lanowitz-MciiGsKl</link>
      <content:encoded><![CDATA[<p>We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just a few short hours – and leaders need to be prepared for recovery from an interruption to the networks, systems, or data that underpin their business. With the advent and proliferation of new technologies, there is more pressure than ever to secure organizations’ computing. Ultimately, the evolution of computing has forced businesses into a paradox of innovation and risk. They must balance technology with security and business resilience, which requires a new way of thinking.</p><ul><li>Conduct a thorough assessment of risk areas to understand the barriers across your IT estate.</li><li>Assess your organization’s dynamic computing initiatives and design security measures from the outset of implementation to ensure compliance and mitigate future risks.</li><li>Allocate resources strategically to align cybersecurity initiatives with business objectives across silos.</li><li>Forge partnerships with external collaborators to augment your organization’s security expertise.</li><li>Regularly adapt your approach to meet the demands of an evolving computing landscape and expanding attack surface.</li></ul><p>Learn more about LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6986696" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8b2189ac-e7f6-4add-891a-f4d2cf32f0d1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8b2189ac-e7f6-4add-891a-f4d2cf32f0d1&amp;feed=2M86zCcc"/>
      <itunes:title>Prioritizing Cyber Resilience for your Business | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A LevelBlue Brand Story with Theresa Lanowitz</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:16</itunes:duration>
      <itunes:summary>Join Sean Martin and Theresa Lanowitz, Chief Evangelist, to hear how LevelBlue simplifies securing your most valuable business assets by providing broad cybersecurity experience and award-winning services to find that critical balance between resilience and innovation in cybersecurity. Discover how businesses can adapt to new risks while driving digital transformation and enhancing their cyber resilience strategies.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Theresa Lanowitz, Chief Evangelist, to hear how LevelBlue simplifies securing your most valuable business assets by providing broad cybersecurity experience and award-winning services to find that critical balance between resilience and innovation in cybersecurity. Discover how businesses can adapt to new risks while driving digital transformation and enhancing their cyber resilience strategies.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, ciso, sean martin, cybersecurity, cybersecurity-as-a-service, managed detection and response, seven minutes podcast, endpoint security, innovation, resilience, levelblue, managed xdr, chief evangelist, edge computing, cio, threat detection and response, theresa lanowitz, theresa lanowitz, service level agreements, futures report, digital transformation, ceo</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b782a0f3-1b06-4c6b-b71a-95ad32fa0c04</guid>
      <title>Winning Buy-In: Mastering the Art of Communicating (the Value of) Security (Culture) to Management | An OWASP AppSec Global Lisbon 2024 Conversation with Ida Hameete | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: </strong></p><p><strong>Ida Hameete</strong>, Application Security Consultant, Zenrosi</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/idahameete/" target="_blank">https://www.linkedin.com/in/idahameete/</a></p><p><strong>____________________________</strong></p><p><strong>Host: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join Sean Martin in this episode of "On Location" as he speaks with Ida Hameete at the OWASP Global AppSec Conference in Lisbon. Sean and Ida dive into the critical topic of creating a robust security culture within organizations. The conversation begins with an overview of the conference, emphasizing the importance of building secure applications that protect both users and businesses.</p><p>Ida, with her extensive background in product ownership and security strategy, shares her unique perspective on why a security culture is integral to an organization's overall success. She explains that fostering a security culture isn't merely about training engineers but involves a collective effort from management and executive teams to prioritize and endorse security practices.</p><p>Ida underscores the significance of aligning security culture with company culture, arguing that this alignment leads to smoother operations and fewer security breaches. She elaborates on how companies with strong security awareness often use their secure products as a marketing tool to differentiate themselves in the marketplace. This strategic approach not only enhances product safety but also provides a competitive edge.</p><p>The discussion also touches on the common issues where management's lack of understanding or support for security measures can hinder effective implementation. Sean and Ida explore how management's commitment to security, demonstrated through adequate resource allocation and strategic planning, can drive a positive security culture through the entire organization.</p><p>Ida provides practical examples from her experience, illustrating how purpose-driven business cultures can naturally incorporate security into their core values, benefiting both employees and customers. She highlights that a well-integrated security culture can lead to better workflows, reduced costs, and enhanced customer experiences.</p><p>Towards the end of their conversation, Ida reflects on the necessity of communicating the business value of security to upper management, suggesting that this approach can shift the perception of security from a fear-driven mandate to a valuable business asset. She encourages leaders to find their company's purpose and align security practices with that mission to achieve sustainable success.</p><p>Listeners are invited to attend Ida's session, "Winning Buy-In: Mastering the Art of Communicating Security to Management" at the conference, which promises to offer deeper insights into securing executive support for security initiatives.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p>Ida's Session: <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VdB4/winning-buy-in-mastering-the-art-of-communicating-security-to-management" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VdB4/winning-buy-in-mastering-the-art-of-communicating-security-to-management</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 27 Jun 2024 10:59:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ida Hameete)</author>
      <link>https://eventcoveragepodcast.com/episodes/winning-buy-in-mastering-the-art-of-communicating-the-value-of-security-culture-to-management-an-owasp-appsec-global-lisbon-2024-conversation-with-ida-hameete-on-location-coverage-with-sean-martin-and-marco-ciappelli-i2rX_cV4</link>
      <content:encoded><![CDATA[<p><strong>Guest: </strong></p><p><strong>Ida Hameete</strong>, Application Security Consultant, Zenrosi</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/idahameete/" target="_blank">https://www.linkedin.com/in/idahameete/</a></p><p><strong>____________________________</strong></p><p><strong>Host: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join Sean Martin in this episode of "On Location" as he speaks with Ida Hameete at the OWASP Global AppSec Conference in Lisbon. Sean and Ida dive into the critical topic of creating a robust security culture within organizations. The conversation begins with an overview of the conference, emphasizing the importance of building secure applications that protect both users and businesses.</p><p>Ida, with her extensive background in product ownership and security strategy, shares her unique perspective on why a security culture is integral to an organization's overall success. She explains that fostering a security culture isn't merely about training engineers but involves a collective effort from management and executive teams to prioritize and endorse security practices.</p><p>Ida underscores the significance of aligning security culture with company culture, arguing that this alignment leads to smoother operations and fewer security breaches. She elaborates on how companies with strong security awareness often use their secure products as a marketing tool to differentiate themselves in the marketplace. This strategic approach not only enhances product safety but also provides a competitive edge.</p><p>The discussion also touches on the common issues where management's lack of understanding or support for security measures can hinder effective implementation. Sean and Ida explore how management's commitment to security, demonstrated through adequate resource allocation and strategic planning, can drive a positive security culture through the entire organization.</p><p>Ida provides practical examples from her experience, illustrating how purpose-driven business cultures can naturally incorporate security into their core values, benefiting both employees and customers. She highlights that a well-integrated security culture can lead to better workflows, reduced costs, and enhanced customer experiences.</p><p>Towards the end of their conversation, Ida reflects on the necessity of communicating the business value of security to upper management, suggesting that this approach can shift the perception of security from a fear-driven mandate to a valuable business asset. She encourages leaders to find their company's purpose and align security practices with that mission to achieve sustainable success.</p><p>Listeners are invited to attend Ida's session, "Winning Buy-In: Mastering the Art of Communicating Security to Management" at the conference, which promises to offer deeper insights into securing executive support for security initiatives.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p>Ida's Session: <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VdB4/winning-buy-in-mastering-the-art-of-communicating-security-to-management" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VdB4/winning-buy-in-mastering-the-art-of-communicating-security-to-management</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22079211" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/25a6b2a3-92af-446c-b9a9-6d9c01447111/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=25a6b2a3-92af-446c-b9a9-6d9c01447111&amp;feed=2M86zCcc"/>
      <itunes:title>Winning Buy-In: Mastering the Art of Communicating (the Value of) Security (Culture) to Management | An OWASP AppSec Global Lisbon 2024 Conversation with Ida Hameete | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ida Hameete</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:59</itunes:duration>
      <itunes:summary>In this episode of On Location, Sean Martin sits down with Ida Hameete at the OWASP Global AppSec Conference to explore how fostering a security culture within organizations can drive both security and business success. Discover practical insights on aligning security practices with company values and gaining executive buy-in for seamless integration of security into your organizational strategy.</itunes:summary>
      <itunes:subtitle>In this episode of On Location, Sean Martin sits down with Ida Hameete at the OWASP Global AppSec Conference to explore how fostering a security culture within organizations can drive both security and business success. Discover practical insights on aligning security practices with company values and gaining executive buy-in for seamless integration of security into your organizational strategy.</itunes:subtitle>
      <itunes:keywords>workflow, ida hamida, leadership, sean martin, product ownership, cybersecurity, business, conference, executive, management, culture, marketing, appsec, alignment, podcast, security, development, implementation, strategy, owasp, cybersecurityconference, purpose</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dddbbf7a-c7b0-4661-a6c1-e99e4d3aa703</guid>
      <title>Hurricanes, Hacktivists, &amp; HPCs: Building Resilience for the Compute Era | A Conversation With Dr. Melanie Garson and Sean Martin | Redefining Society with Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong>✨ </p><p><strong>Dr. Melanie Garson</strong>, Cyber Policy & Tech Geopolitics Lead, Tony Blair Institute for Global Change [<a href="https://x.com/InstituteGC">@InstituteGC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melaniegarson/">https://www.linkedin.com/in/melaniegarson/</a></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br />_____________________________</p><p><strong>This Episode’s Sponsors</strong></p><p>BlackCloak 👉 <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Bugcrowd 👉 <a href="https://itspm.ag/itspbgcweb" target="_blank">https://itspm.ag/itspbgcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a></p><p><strong>Episode Introduction</strong></p><p>In an era where technology is the backbone of society, resilience in the face of cyber threats, natural disasters, and geopolitical strife is paramount. This was the focal point of the discussion between Sean Martin, Marco Ciappelli, and Dr. Melanie Garson in their recent conversation on "Hurricanes, Hacktivists, & HPCs: Building Resilience for the Compute Era."</p><p>Dr. Melanie Garson, the Cyber and Tech Geopolitics Lead at the Tony Blair Institute for Global Change and Associate Professor at University College London, brings a wealth of expertise to the topic. Her work revolves around understanding how new and disruptive technologies like cyber warfare, brain-computer interfaces, and genetic engineering affect global stability. This episode delves into her insights on the evolving landscape of cyber resilience and the steps needed to brace for future challenges.</p><p>The conversation begins with an exploration of how legacy infrastructure poses a significant risk to our digital and physical security. Dr. Garson emphasizes the importance of addressing these foundational elements, noting examples like the 2006 earthquake in Taiwan, which disrupted 22 communication cables. She warns of the potential catastrophes linked to outdated infrastructure and underscores the need for modernization and robust protection against not just cyberattacks but physical disruptions as well.</p><p>The geopolitical aspect of technology is another critical element discussed. Dr. Garson highlights the role of private companies like Microsoft and Amazon in global conflicts, noting the effects seen during the Russia-Ukraine conflict where cloud services played a pivotal role in preserving data. This involvement signals a shift in how we understand power dynamics and control over critical technologies and raises questions about the responsibilities and decision-making processes of these tech giants. Furthermore, the discussion covers the intersection of emergency situations and technological dependencies.</p><p>Using real-world instances like the hurricane in West Africa that knocked out major cables, Marco Ciappelli and Sean Martin emphasize how such events lead to significant economic impacts, illustrating how interconnected and vulnerable our systems are. Dr. Garson also touches upon the evolving nature of warfare, especially with the advent of electromagnetic spectrum manipulation and the reliance on GPS technologies. She notes the increasing use of electromagnetic interference for strategic advantage, a trend seen in ongoing global conflicts. The idea of compute diplomacy—ensuring countries have the sustainable computational power needed to remain competitive and secure—resonates strongly throughout their dialogue.</p><p>The conversation wrapped with a powerful call to action: the need for both public and private sectors to address vulnerabilities throughout the entire tech stack, not just the application layer. This holistic approach is essential to safeguarding our digital infrastructure against a multitude of threats.</p><p>In conclusion, building resilience in the compute era requires a multi-faceted approach that integrates robust cyber defense, modernized infrastructure, and a keen understanding of the geopolitical landscape. The insights shared by Dr. Melanie Garson underscore the importance of proactive measures and collaborative efforts in securing our interconnected world. This episode serves as a crucial reminder that as technology advances, so must our strategies to protect against emerging threats.</p><p>Top Questions Addressed</p><ul><li>What are the biggest threats to our current digital infrastructure and how can we address them?</li><li>How do geopolitical dynamics and private tech companies influence global cyber resilience?</li><li>What role does emerging technology play in modern warfare and how should we prepare for it?</li></ul><p>_____________________________</p><p><strong>Resources</strong></p><p>Hurricanes, Hacktivists & HPCs: Building Resilience for the Compute Era (Session): <a href="https://www.ukcyberweek.co.uk/uk-cyber-week-2024-agenda/hurricanes-hacktivists-hpcs-building-resilience-for-the-compute-era" target="_blank">https://www.ukcyberweek.co.uk/uk-cyber-week-2024-agenda/hurricanes-hacktivists-hpcs-building-resilience-for-the-compute-era</a></p><p>The State of Access to Compute Index 2023: <a href="https://www.institute.global/insights/tech-and-digitalisation/state-of-compute-access-how-to-bridge-the-new-digital-divide" target="_blank">https://www.institute.global/insights/tech-and-digitalisation/state-of-compute-access-how-to-bridge-the-new-digital-divide</a></p><p>UK Cyber Week Expo & Conference: <a href="https://www.ukcyberweek.co.uk/">https://www.ukcyberweek.co.uk/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Watch the webcast version on-demand on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in sponsoring an ITSPmagazine Channel?<br />👉 <a href="https://www.itspmagazine.com/advertise-on-itspmagazine-podcast" target="_blank">https://www.itspmagazine.com/advertise-on-itspmagazine-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 19 Jun 2024 15:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine On Location, Sean Martin, Dr. Melanie Garson)</author>
      <link>https://eventcoveragepodcast.com/episodes/hurricanes-hacktivists-hpcs-building-resilience-for-the-compute-era-a-conversation-with-dr-melanie-garson-and-sean-martin-redefining-society-with-marco-ciappelli-Xb4rKpBz</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong>✨ </p><p><strong>Dr. Melanie Garson</strong>, Cyber Policy & Tech Geopolitics Lead, Tony Blair Institute for Global Change [<a href="https://x.com/InstituteGC">@InstituteGC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melaniegarson/">https://www.linkedin.com/in/melaniegarson/</a></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a><br />_____________________________</p><p><strong>This Episode’s Sponsors</strong></p><p>BlackCloak 👉 <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Bugcrowd 👉 <a href="https://itspm.ag/itspbgcweb" target="_blank">https://itspm.ag/itspbgcweb</a></p><p><a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">_____________________________</a></p><p><strong>Episode Introduction</strong></p><p>In an era where technology is the backbone of society, resilience in the face of cyber threats, natural disasters, and geopolitical strife is paramount. This was the focal point of the discussion between Sean Martin, Marco Ciappelli, and Dr. Melanie Garson in their recent conversation on "Hurricanes, Hacktivists, & HPCs: Building Resilience for the Compute Era."</p><p>Dr. Melanie Garson, the Cyber and Tech Geopolitics Lead at the Tony Blair Institute for Global Change and Associate Professor at University College London, brings a wealth of expertise to the topic. Her work revolves around understanding how new and disruptive technologies like cyber warfare, brain-computer interfaces, and genetic engineering affect global stability. This episode delves into her insights on the evolving landscape of cyber resilience and the steps needed to brace for future challenges.</p><p>The conversation begins with an exploration of how legacy infrastructure poses a significant risk to our digital and physical security. Dr. Garson emphasizes the importance of addressing these foundational elements, noting examples like the 2006 earthquake in Taiwan, which disrupted 22 communication cables. She warns of the potential catastrophes linked to outdated infrastructure and underscores the need for modernization and robust protection against not just cyberattacks but physical disruptions as well.</p><p>The geopolitical aspect of technology is another critical element discussed. Dr. Garson highlights the role of private companies like Microsoft and Amazon in global conflicts, noting the effects seen during the Russia-Ukraine conflict where cloud services played a pivotal role in preserving data. This involvement signals a shift in how we understand power dynamics and control over critical technologies and raises questions about the responsibilities and decision-making processes of these tech giants. Furthermore, the discussion covers the intersection of emergency situations and technological dependencies.</p><p>Using real-world instances like the hurricane in West Africa that knocked out major cables, Marco Ciappelli and Sean Martin emphasize how such events lead to significant economic impacts, illustrating how interconnected and vulnerable our systems are. Dr. Garson also touches upon the evolving nature of warfare, especially with the advent of electromagnetic spectrum manipulation and the reliance on GPS technologies. She notes the increasing use of electromagnetic interference for strategic advantage, a trend seen in ongoing global conflicts. The idea of compute diplomacy—ensuring countries have the sustainable computational power needed to remain competitive and secure—resonates strongly throughout their dialogue.</p><p>The conversation wrapped with a powerful call to action: the need for both public and private sectors to address vulnerabilities throughout the entire tech stack, not just the application layer. This holistic approach is essential to safeguarding our digital infrastructure against a multitude of threats.</p><p>In conclusion, building resilience in the compute era requires a multi-faceted approach that integrates robust cyber defense, modernized infrastructure, and a keen understanding of the geopolitical landscape. The insights shared by Dr. Melanie Garson underscore the importance of proactive measures and collaborative efforts in securing our interconnected world. This episode serves as a crucial reminder that as technology advances, so must our strategies to protect against emerging threats.</p><p>Top Questions Addressed</p><ul><li>What are the biggest threats to our current digital infrastructure and how can we address them?</li><li>How do geopolitical dynamics and private tech companies influence global cyber resilience?</li><li>What role does emerging technology play in modern warfare and how should we prepare for it?</li></ul><p>_____________________________</p><p><strong>Resources</strong></p><p>Hurricanes, Hacktivists & HPCs: Building Resilience for the Compute Era (Session): <a href="https://www.ukcyberweek.co.uk/uk-cyber-week-2024-agenda/hurricanes-hacktivists-hpcs-building-resilience-for-the-compute-era" target="_blank">https://www.ukcyberweek.co.uk/uk-cyber-week-2024-agenda/hurricanes-hacktivists-hpcs-building-resilience-for-the-compute-era</a></p><p>The State of Access to Compute Index 2023: <a href="https://www.institute.global/insights/tech-and-digitalisation/state-of-compute-access-how-to-bridge-the-new-digital-divide" target="_blank">https://www.institute.global/insights/tech-and-digitalisation/state-of-compute-access-how-to-bridge-the-new-digital-divide</a></p><p>UK Cyber Week Expo & Conference: <a href="https://www.ukcyberweek.co.uk/">https://www.ukcyberweek.co.uk/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Watch the webcast version on-demand on YouTube: <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in sponsoring an ITSPmagazine Channel?<br />👉 <a href="https://www.itspmagazine.com/advertise-on-itspmagazine-podcast" target="_blank">https://www.itspmagazine.com/advertise-on-itspmagazine-podcast</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35203196" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/27f42735-3736-460c-be32-fc3b7a6913c3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=27f42735-3736-460c-be32-fc3b7a6913c3&amp;feed=2M86zCcc"/>
      <itunes:title>Hurricanes, Hacktivists, &amp; HPCs: Building Resilience for the Compute Era | A Conversation With Dr. Melanie Garson and Sean Martin | Redefining Society with Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine On Location, Sean Martin, Dr. Melanie Garson</itunes:author>
      <itunes:duration>00:36:40</itunes:duration>
      <itunes:summary>In this episode, Dr. Melanie Garson, Cyber and Tech Geopolitics Lead at the Tony Blair Institute for Global Change, sheds light on the crucial intersection of technology, geopolitical dynamics, and infrastructure resilience in the face of cyber threats and natural disasters. Discover how our reliance on emerging technologies demands a holistic approach to safeguarding our interconnected world.</itunes:summary>
      <itunes:subtitle>In this episode, Dr. Melanie Garson, Cyber and Tech Geopolitics Lead at the Tony Blair Institute for Global Change, sheds light on the crucial intersection of technology, geopolitical dynamics, and infrastructure resilience in the face of cyber threats and natural disasters. Discover how our reliance on emerging technologies demands a holistic approach to safeguarding our interconnected world.</itunes:subtitle>
      <itunes:keywords>geopolitical conflict, smart technology, hacktivists, technology, marco ciappelli, gps, digital infrastructure, sean martin, dr. melanie garson, cybersecurity, digital age, global change, resilience, cloud services, podcast episode, cyber defense, geopolitics, event coverage, cyber warfare, infrastructure, disaster recovery, melanie garson, hurricanes, on-location experience</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c789822-96e2-4c01-ac26-9ff123e27f3e</guid>
      <title>In the Same Site We Trust: Navigating the Landscape of Client-side Request Hijacking on the Web | An OWASP AppSec Global Lisbon 2024 Conversation with Soheil Khodayari | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Soheil Khodayari</strong>, Security Researcher, CISPA - Helmholtz Center for Information Security [<a href="https://x.com/CISPA">@CISPA</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/soheilkhodayari/" target="_blank">https://www.linkedin.com/in/soheilkhodayari/</a></p><p>On Twitter | <a href="https://x.com/Soheil__K" target="_blank">https://x.com/Soheil__K</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, co-host Sean Martin embarks on a solo journey to cover the OWASP AppSec Global event in Lisbon. Sean welcomes Soheil Khodayari, a security researcher at the CISPA Helmholtz Center for Information Security in Saarland, Germany, to discuss the intricacies of web security, particularly focusing on request forgery attacks.</p><p>They dive into Soheil’s background, noting his extensive research in web security and privacy, with interests spanning vulnerability detection, internet measurements, browser security, and new testing techniques. Soheil aims to share valuable insights on request forgery attacks, a prevalent issue in web security that continues to challenge developers and security professionals alike.</p><p>The conversation transitions to an in-depth exploration of client-side request forgery and how these attacks differ from traditional cross-site request forgery (CSRF). Soheil elaborates on the evolution of web applications and how shifting functionalities to client-side code has introduced new, complex vulnerabilities. He identifies the critical role of input validation and the resurgence of issues related to improper handling of user inputs, which attackers can exploit to cause unintended actions on authenticated sessions.</p><p>As they prepare for the upcoming OWASP Global AppSec event, Soheil highlights his session, titled "In the Same Site We Trust: Navigating the Landscape of Client-Side Request Hijacking on the Web," scheduled for Thursday, June 27th. He emphasizes the relevance of the session for developers and security professionals who are eager to learn about modern request hijacking techniques, defense mechanisms, and how to detect these vulnerabilities using automated tools.</p><p>The discussion touches on the landscape of modern browsers, the effectiveness of same-site cookies as a defense-in-depth strategy, and the limitations of these measures in preventing client-side CSRF attacks. Soheil mentions the development of a vulnerability detection tool designed to mitigate these sophisticated threats and invites attendees to integrate such tools into their CI/CD pipelines for enhanced security.</p><p>Sean and Soheil ultimately reflect on the importance of understanding the nuances of web application security. They encourage listeners to attend the session, engage with the community, and explore advanced security practices to safeguard their applications against evolving threats. This engaging episode sets the stage for a deep dive into the technical aspects of web security at the OWASP Global AppSec event.</p><p>Top Questions Addressed</p><ul><li>What are request forgery attacks and how have they evolved over time?</li><li>How do modern browsers and applications handle security against these attacks?</li><li>What will Soheil Khodayari's session at OWASP Global AppSec cover and who should attend?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>In the Same Site We Trust: Navigating the Landscape of Client-side Request Hijacking on the Web (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VdAy/in-the-same-site-we-trust-navigating-the-landscape-of-client-side-request-hijacking-on-the-web" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VdAy/in-the-same-site-we-trust-navigating-the-landscape-of-client-side-request-hijacking-on-the-web</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 19 Jun 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Soheil Khodayari)</author>
      <link>https://eventcoveragepodcast.com/episodes/in-the-same-site-we-trust-navigating-the-landscape-of-client-side-request-hijacking-on-the-web-an-owasp-appsec-global-lisbon-2024-conversation-with-soheil-khodayari-on-location-coverage-with-sean-martin-and-marco-ciappelli-FQ2AK_gI</link>
      <content:encoded><![CDATA[<p><strong>Guest: Soheil Khodayari</strong>, Security Researcher, CISPA - Helmholtz Center for Information Security [<a href="https://x.com/CISPA">@CISPA</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/soheilkhodayari/" target="_blank">https://www.linkedin.com/in/soheilkhodayari/</a></p><p>On Twitter | <a href="https://x.com/Soheil__K" target="_blank">https://x.com/Soheil__K</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, co-host Sean Martin embarks on a solo journey to cover the OWASP AppSec Global event in Lisbon. Sean welcomes Soheil Khodayari, a security researcher at the CISPA Helmholtz Center for Information Security in Saarland, Germany, to discuss the intricacies of web security, particularly focusing on request forgery attacks.</p><p>They dive into Soheil’s background, noting his extensive research in web security and privacy, with interests spanning vulnerability detection, internet measurements, browser security, and new testing techniques. Soheil aims to share valuable insights on request forgery attacks, a prevalent issue in web security that continues to challenge developers and security professionals alike.</p><p>The conversation transitions to an in-depth exploration of client-side request forgery and how these attacks differ from traditional cross-site request forgery (CSRF). Soheil elaborates on the evolution of web applications and how shifting functionalities to client-side code has introduced new, complex vulnerabilities. He identifies the critical role of input validation and the resurgence of issues related to improper handling of user inputs, which attackers can exploit to cause unintended actions on authenticated sessions.</p><p>As they prepare for the upcoming OWASP Global AppSec event, Soheil highlights his session, titled "In the Same Site We Trust: Navigating the Landscape of Client-Side Request Hijacking on the Web," scheduled for Thursday, June 27th. He emphasizes the relevance of the session for developers and security professionals who are eager to learn about modern request hijacking techniques, defense mechanisms, and how to detect these vulnerabilities using automated tools.</p><p>The discussion touches on the landscape of modern browsers, the effectiveness of same-site cookies as a defense-in-depth strategy, and the limitations of these measures in preventing client-side CSRF attacks. Soheil mentions the development of a vulnerability detection tool designed to mitigate these sophisticated threats and invites attendees to integrate such tools into their CI/CD pipelines for enhanced security.</p><p>Sean and Soheil ultimately reflect on the importance of understanding the nuances of web application security. They encourage listeners to attend the session, engage with the community, and explore advanced security practices to safeguard their applications against evolving threats. This engaging episode sets the stage for a deep dive into the technical aspects of web security at the OWASP Global AppSec event.</p><p>Top Questions Addressed</p><ul><li>What are request forgery attacks and how have they evolved over time?</li><li>How do modern browsers and applications handle security against these attacks?</li><li>What will Soheil Khodayari's session at OWASP Global AppSec cover and who should attend?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>In the Same Site We Trust: Navigating the Landscape of Client-side Request Hijacking on the Web (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VdAy/in-the-same-site-we-trust-navigating-the-landscape-of-client-side-request-hijacking-on-the-web" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VdAy/in-the-same-site-we-trust-navigating-the-landscape-of-client-side-request-hijacking-on-the-web</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="15876723" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a6186d50-f824-4409-978f-99d45be8e0c1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a6186d50-f824-4409-978f-99d45be8e0c1&amp;feed=2M86zCcc"/>
      <itunes:title>In the Same Site We Trust: Navigating the Landscape of Client-side Request Hijacking on the Web | An OWASP AppSec Global Lisbon 2024 Conversation with Soheil Khodayari | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Soheil Khodayari</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:16:32</itunes:duration>
      <itunes:summary>Join Sean Martin as he dives into the evolving landscape of web security with Soheil Khodayari, a leading security researcher, as they discuss the intricacies of request forgery attacks and the innovative defenses against them. Discover key insights and practical advice ahead of Soheil&apos;s session at OWASP Global AppSec in Lisbon, and learn how to safeguard your applications from sophisticated client-side vulnerabilities.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he dives into the evolving landscape of web security with Soheil Khodayari, a leading security researcher, as they discuss the intricacies of request forgery attacks and the innovative defenses against them. Discover key insights and practical advice ahead of Soheil&apos;s session at OWASP Global AppSec in Lisbon, and learn how to safeguard your applications from sophisticated client-side vulnerabilities.</itunes:subtitle>
      <itunes:keywords>request, validation, marco ciappelli, tokens, lisbon, sean martin, cybersecurity, authentication, client-side, conference, vulnerabilities, prevention, detection, forgery, csrf, soheil khodayari, soheil khodayari, appsec, browser, podcast, security, owasp, researcher, web, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">45d30881-73a5-4f0a-85f3-ceb623e447a6</guid>
      <title>It&apos;s Just Software, What Could Possibly Go Wrong? Exploring Deterministic GenAI and AI Trust Cards | An OWASP AppSec Global Lisbon 2024 Conversation with Isabel Praça, Dinis Cruz, and Rob van der Veer | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Isabel Praça</strong>, Coordinator Professor, ISEP - Instituto Superior de Engenharia do Porto</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/isabel-pra%C3%A7a-07b86310/">https://www.linkedin.com/in/isabel-pra%C3%A7a-07b86310/</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/icp">https://owaspglobalappseclisbon2024.sched.com/speaker/icp</a></p><p><strong>Dinis Cruz</strong>, Chief Scientist at Glasswall [<a href="https://twitter.com/GlasswallCDR">@GlasswallCDR</a>] and CISO at Holland & Barrett [<a href="https://twitter.com/Holland_Barrett">@Holland_Barrett</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/diniscruz/" target="_blank">https://www.linkedin.com/in/diniscruz/</a></p><p>On Twitter | <a href="https://twitter.com/DinisCruz" target="_blank">https://twitter.com/DinisCruz</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/dinis.cruz">https://owaspglobalappseclisbon2024.sched.com/speaker/dinis.cruz</a></p><p><strong>Rob van der Veer</strong>, Senior director at Software Improvement Group [<a href="https://twitter.com/sig_eu?lang=en">@sig_eu</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/robvanderveer/" target="_blank">https://www.linkedin.com/in/robvanderveer/</a></p><p>On Twitter | <a href="https://twitter.com/robvanderveer" target="_blank">https://twitter.com/robvanderveer</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/rob_van_der_veer.1tkia1sy">https://owaspglobalappseclisbon2024.sched.com/speaker/rob_van_der_veer.1tkia1sy</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin embarks on a solo adventure to discuss the upcoming OWASP AppSec Global conference in Lisbon. He is joined by three distinguished guests: Isabel Praça, a professor and AI researcher; Dinis Cruz, an AppSec professional and startup founder; and Rob van der Veer, a software improvement consultant and AI standards pioneer.</p><p>The episode kicks off with introductions and a light-hearted comment about Sean’s co-host, Marco Ciappelli, who is more of a psychology enthusiast while Sean delves into the technical aspects. Sean expresses his enthusiasm for the OWASP organization and its impactful projects, programs, and people.</p><p>Each guest contributes unique insights into their work and their upcoming presentations at the conference. Isabel Praça, from the Polytechnic of Porto, shares her journey in AI and cybersecurity, emphasizing her collaboration with the European Union Agency for Cybersecurity (ENISA) on AI security and cybersecurity skills frameworks. She underscores the importance of interdisciplinary expertise in AI and cybersecurity and discusses her concept of "trust cards" for AI, which aim to provide a comprehensive evaluation of AI models beyond traditional metrics.</p><p>Dinis Cruz, a longstanding member of OWASP with extensive experience in AppSec, brings attention to the challenges and opportunities presented by AI in scaling application security. He discusses the importance of a deterministic approach to AI outputs and provenance, advocating for a blend of traditional AppSec practices with new AI-driven capabilities to better understand and secure applications.</p><p>Rob van der Veer, founder of the OpenCRE team and a veteran in AI, elaborates on the integration of multiple security standards and the essential need for collaboration between software engineers and data scientists. He shares his perspective on AI’s role in security, highlighting the pitfalls and biases associated with AI models and the necessity of applying established security principles to AI development.</p><p>Throughout the episode, the conversation touches on the complexities of trust, the evolving landscape of AI and cybersecurity, and the imperative for ongoing collaboration and education among professionals in both fields. Sean wraps up the episode with a call to action for data scientists and AppSec professionals to join the conference, either in person or through recordings, to foster a deeper understanding and collective advancement in AI-enabled application security.</p><p>Listeners are encouraged to attend the OWASP AppSec Global conference in Lisbon, where they can expect not only insightful sessions but also vibrant discussions and networking opportunities in a picturesque setting.</p><p>Key Questions Addressed</p><ul><li>What roles and expertise are needed to effectively address AI and cybersecurity challenges?</li><li>How does AI bring new dimensions to application security and what traditional methods remain relevant?</li><li>Why is it important for data scientists and cybersecurity professionals to collaborate?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Trust Cards for AI (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaD/trust-cards-for-ai" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaD/trust-cards-for-ai</a></p><p>Deterministic GenAI Outputs with Provenance (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaO/deterministic-genai-outputs-with-provenance" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaO/deterministic-genai-outputs-with-provenance</a></p><p>AI is just software, what could possibly go wrong? (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaI/ai-is-just-software-what-could-possibly-go-wrong" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaI/ai-is-just-software-what-could-possibly-go-wrong</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 19 Jun 2024 03:55:57 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Isabel Praça, Dinis Cruz, Rob van der Veer)</author>
      <link>https://eventcoveragepodcast.com/episodes/its-just-software-what-could-possibly-go-wrong-exploring-deterministic-genai-and-ai-trust-cards-an-owasp-appsec-global-lisbon-2024-conversation-with-isabel-praca-dinis-cruz-and-rob-van-der-veer-on-location-coverage-Use1loZR</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Isabel Praça</strong>, Coordinator Professor, ISEP - Instituto Superior de Engenharia do Porto</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/isabel-pra%C3%A7a-07b86310/">https://www.linkedin.com/in/isabel-pra%C3%A7a-07b86310/</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/icp">https://owaspglobalappseclisbon2024.sched.com/speaker/icp</a></p><p><strong>Dinis Cruz</strong>, Chief Scientist at Glasswall [<a href="https://twitter.com/GlasswallCDR">@GlasswallCDR</a>] and CISO at Holland & Barrett [<a href="https://twitter.com/Holland_Barrett">@Holland_Barrett</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/diniscruz/" target="_blank">https://www.linkedin.com/in/diniscruz/</a></p><p>On Twitter | <a href="https://twitter.com/DinisCruz" target="_blank">https://twitter.com/DinisCruz</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/dinis.cruz">https://owaspglobalappseclisbon2024.sched.com/speaker/dinis.cruz</a></p><p><strong>Rob van der Veer</strong>, Senior director at Software Improvement Group [<a href="https://twitter.com/sig_eu?lang=en">@sig_eu</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/robvanderveer/" target="_blank">https://www.linkedin.com/in/robvanderveer/</a></p><p>On Twitter | <a href="https://twitter.com/robvanderveer" target="_blank">https://twitter.com/robvanderveer</a></p><p>At OWASP | <a href="https://owaspglobalappseclisbon2024.sched.com/speaker/rob_van_der_veer.1tkia1sy">https://owaspglobalappseclisbon2024.sched.com/speaker/rob_van_der_veer.1tkia1sy</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin embarks on a solo adventure to discuss the upcoming OWASP AppSec Global conference in Lisbon. He is joined by three distinguished guests: Isabel Praça, a professor and AI researcher; Dinis Cruz, an AppSec professional and startup founder; and Rob van der Veer, a software improvement consultant and AI standards pioneer.</p><p>The episode kicks off with introductions and a light-hearted comment about Sean’s co-host, Marco Ciappelli, who is more of a psychology enthusiast while Sean delves into the technical aspects. Sean expresses his enthusiasm for the OWASP organization and its impactful projects, programs, and people.</p><p>Each guest contributes unique insights into their work and their upcoming presentations at the conference. Isabel Praça, from the Polytechnic of Porto, shares her journey in AI and cybersecurity, emphasizing her collaboration with the European Union Agency for Cybersecurity (ENISA) on AI security and cybersecurity skills frameworks. She underscores the importance of interdisciplinary expertise in AI and cybersecurity and discusses her concept of "trust cards" for AI, which aim to provide a comprehensive evaluation of AI models beyond traditional metrics.</p><p>Dinis Cruz, a longstanding member of OWASP with extensive experience in AppSec, brings attention to the challenges and opportunities presented by AI in scaling application security. He discusses the importance of a deterministic approach to AI outputs and provenance, advocating for a blend of traditional AppSec practices with new AI-driven capabilities to better understand and secure applications.</p><p>Rob van der Veer, founder of the OpenCRE team and a veteran in AI, elaborates on the integration of multiple security standards and the essential need for collaboration between software engineers and data scientists. He shares his perspective on AI’s role in security, highlighting the pitfalls and biases associated with AI models and the necessity of applying established security principles to AI development.</p><p>Throughout the episode, the conversation touches on the complexities of trust, the evolving landscape of AI and cybersecurity, and the imperative for ongoing collaboration and education among professionals in both fields. Sean wraps up the episode with a call to action for data scientists and AppSec professionals to join the conference, either in person or through recordings, to foster a deeper understanding and collective advancement in AI-enabled application security.</p><p>Listeners are encouraged to attend the OWASP AppSec Global conference in Lisbon, where they can expect not only insightful sessions but also vibrant discussions and networking opportunities in a picturesque setting.</p><p>Key Questions Addressed</p><ul><li>What roles and expertise are needed to effectively address AI and cybersecurity challenges?</li><li>How does AI bring new dimensions to application security and what traditional methods remain relevant?</li><li>Why is it important for data scientists and cybersecurity professionals to collaborate?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Trust Cards for AI (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaD/trust-cards-for-ai" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaD/trust-cards-for-ai</a></p><p>Deterministic GenAI Outputs with Provenance (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaO/deterministic-genai-outputs-with-provenance" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaO/deterministic-genai-outputs-with-provenance</a></p><p>AI is just software, what could possibly go wrong? (Session): <a href="https://owaspglobalappseclisbon2024.sched.com/event/1VTaI/ai-is-just-software-what-could-possibly-go-wrong" target="_blank">https://owaspglobalappseclisbon2024.sched.com/event/1VTaI/ai-is-just-software-what-could-possibly-go-wrong</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33046469" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5129dae1-5d3b-4822-91bc-abc3608d39ef/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5129dae1-5d3b-4822-91bc-abc3608d39ef&amp;feed=2M86zCcc"/>
      <itunes:title>It&apos;s Just Software, What Could Possibly Go Wrong? Exploring Deterministic GenAI and AI Trust Cards | An OWASP AppSec Global Lisbon 2024 Conversation with Isabel Praça, Dinis Cruz, and Rob van der Veer | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Isabel Praça, Dinis Cruz, Rob van der Veer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:25</itunes:duration>
      <itunes:summary>Join Sean Martin as he dives into a lively discussion with AI and cybersecurity leaders about the intersection of artificial intelligence and application security at the upcoming OWASP AppSec Global conference in Lisbon. Discover how AI is reshaping cybersecurity practices and why interdisciplinary collaboration is crucial for navigating this evolving landscape.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he dives into a lively discussion with AI and cybersecurity leaders about the intersection of artificial intelligence and application security at the upcoming OWASP AppSec Global conference in Lisbon. Discover how AI is reshaping cybersecurity practices and why interdisciplinary collaboration is crucial for navigating this evolving landscape.</itunes:subtitle>
      <itunes:keywords>collaboration, provenance, marco ciappelli, lisbon, data scientists, dinis cruz, dinis cruz, rob van der veer, sean martin, deterministic, trust, cybersecurity, software, conference, appsec, isabel praça, podcast, appsec professionals, security, keynotes, owasp, ai, cybersecurityconference, genai</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">773e121d-185e-4016-ab0a-c01409d67533</guid>
      <title>Practical Privacy by Design - Building Secure Applications that Respect Privacy | An OWASP AppSec Global Lisbon 2024 Conversation with Kim Wuyts and Avi Douglen | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Kim Wuyts</strong>, Manager Cyber & Privacy, PwC Belgium [<a href="https://x.com/PwC_Belgium">@PwC_Belgium</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kwuyts/" target="_blank">https://www.linkedin.com/in/kwuyts/</a></p><p>On Twitter | <a href="https://twitter.com/Wuytski" target="_blank">https://twitter.com/Wuytski</a></p><p>On Mastodon | <a href="https://mastodon.social/@kimw" target="_blank">https://mastodon.social/@kimw</a></p><p><strong>Avi Douglen</strong>, CEO / Board of Directors, Bounce Security & OWASP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/avidouglen/" target="_blank">https://www.linkedin.com/in/avidouglen/</a></p><p>On Twitter | <a href="https://twitter.com/sec_tigger" target="_blank">https://twitter.com/sec_tigger</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin offers a deep dive into the OWASP AppSec Lisbon event, engaging in a meaningful conversation with Kim Wuyts and Avi Douglen. Sean starts by setting the stage for an insightful discussion focused on privacy, security, and the integration of both in modern application development.</p><p>Kim Wuyts, a Cyber and Privacy Manager at PwC Belgium, shares her journey from a security researcher to a privacy engineering expert, emphasizing the importance of privacy threat modeling and the intricate balance between security and privacy. She explains how privacy not only strengthens security but also involves complex considerations like legal, ethical, and technological aspects. Kim highlights the need for companies to adopt privacy by design, ensuring data is used with care and transparency, rather than merely being collected and stored.</p><p>Avi Douglen, Lead Consultant at Bounce Security, brings his experience in threat modeling to the conversation, recounting his learning curve in understanding the depths of privacy beyond mere confidentiality. He speaks about the importance of educating security engineers on privacy considerations and using value-driven security to protect stakeholders' interests. Avi stresses that privacy and security should be integrated from the beginning of the application development process to avoid clashes and ensure robust, privacy-respecting systems.</p><p>Throughout the discussion, the guests delve into various privacy engineering practices, including data minimization, the handling of meta-information, and the potential conflicts between security requirements and privacy needs. They touch on real-world scenarios where privacy can enhance overall security posture and how privacy engineering aligns with compliance requirements such as GDPR.</p><p>Sean, Kim, and Avi also explore the concept of architectural data mapping and selecting the right components for privacy. They discuss the evolving skill set required for privacy engineering and how integrating privacy with existing security practices can add significant value to any organization.</p><p>The episode concludes with a look at the upcoming training session at the OWASP AppSec event in Lisbon, emphasizing the need for a diverse audience, including security engineers, privacy professionals, and developers. This session aims to foster a collaborative environment where participants can expand their knowledge and apply practical privacy by design principles in their work.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Training: <a href="https://lisbon.globalappsec.org/trainings/#sku_PPBD" target="_blank">https://lisbon.globalappsec.org/trainings/#sku_PPBD</a></p><p>Threat modeling manifesto: <a href="https://www.threatmodelingmanifesto.org/" target="_blank">https://www.threatmodelingmanifesto.org/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 14 Jun 2024 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kim Wuyts, Avi Douglen)</author>
      <link>https://eventcoveragepodcast.com/episodes/practical-privacy-by-design-building-secure-applications-that-respect-privacy-an-owasp-appsec-global-lisbon-2024-conversation-with-kim-wuyts-and-avi-douglen-on-location-coverage-with-sean-martin-and-marco-ciappelli-k_9zGLw4</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Kim Wuyts</strong>, Manager Cyber & Privacy, PwC Belgium [<a href="https://x.com/PwC_Belgium">@PwC_Belgium</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kwuyts/" target="_blank">https://www.linkedin.com/in/kwuyts/</a></p><p>On Twitter | <a href="https://twitter.com/Wuytski" target="_blank">https://twitter.com/Wuytski</a></p><p>On Mastodon | <a href="https://mastodon.social/@kimw" target="_blank">https://mastodon.social/@kimw</a></p><p><strong>Avi Douglen</strong>, CEO / Board of Directors, Bounce Security & OWASP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/avidouglen/" target="_blank">https://www.linkedin.com/in/avidouglen/</a></p><p>On Twitter | <a href="https://twitter.com/sec_tigger" target="_blank">https://twitter.com/sec_tigger</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin offers a deep dive into the OWASP AppSec Lisbon event, engaging in a meaningful conversation with Kim Wuyts and Avi Douglen. Sean starts by setting the stage for an insightful discussion focused on privacy, security, and the integration of both in modern application development.</p><p>Kim Wuyts, a Cyber and Privacy Manager at PwC Belgium, shares her journey from a security researcher to a privacy engineering expert, emphasizing the importance of privacy threat modeling and the intricate balance between security and privacy. She explains how privacy not only strengthens security but also involves complex considerations like legal, ethical, and technological aspects. Kim highlights the need for companies to adopt privacy by design, ensuring data is used with care and transparency, rather than merely being collected and stored.</p><p>Avi Douglen, Lead Consultant at Bounce Security, brings his experience in threat modeling to the conversation, recounting his learning curve in understanding the depths of privacy beyond mere confidentiality. He speaks about the importance of educating security engineers on privacy considerations and using value-driven security to protect stakeholders' interests. Avi stresses that privacy and security should be integrated from the beginning of the application development process to avoid clashes and ensure robust, privacy-respecting systems.</p><p>Throughout the discussion, the guests delve into various privacy engineering practices, including data minimization, the handling of meta-information, and the potential conflicts between security requirements and privacy needs. They touch on real-world scenarios where privacy can enhance overall security posture and how privacy engineering aligns with compliance requirements such as GDPR.</p><p>Sean, Kim, and Avi also explore the concept of architectural data mapping and selecting the right components for privacy. They discuss the evolving skill set required for privacy engineering and how integrating privacy with existing security practices can add significant value to any organization.</p><p>The episode concludes with a look at the upcoming training session at the OWASP AppSec event in Lisbon, emphasizing the need for a diverse audience, including security engineers, privacy professionals, and developers. This session aims to foster a collaborative environment where participants can expand their knowledge and apply practical privacy by design principles in their work.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Training: <a href="https://lisbon.globalappsec.org/trainings/#sku_PPBD" target="_blank">https://lisbon.globalappsec.org/trainings/#sku_PPBD</a></p><p>Threat modeling manifesto: <a href="https://www.threatmodelingmanifesto.org/" target="_blank">https://www.threatmodelingmanifesto.org/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31041130" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9aed22de-d7cd-465f-8f0f-fc2a109d291f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9aed22de-d7cd-465f-8f0f-fc2a109d291f&amp;feed=2M86zCcc"/>
      <itunes:title>Practical Privacy by Design - Building Secure Applications that Respect Privacy | An OWASP AppSec Global Lisbon 2024 Conversation with Kim Wuyts and Avi Douglen | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kim Wuyts, Avi Douglen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:20</itunes:duration>
      <itunes:summary>Join host Sean Martin as he delves into the OWASP AppSec Lisbon event with guests Kim Wuyts and Avi Douglen, who explore the vital integration of privacy and security in application development. Discover how privacy by design and threat modeling can enhance your organization&apos;s security posture and ensure compliance.</itunes:summary>
      <itunes:subtitle>Join host Sean Martin as he delves into the OWASP AppSec Lisbon event with guests Kim Wuyts and Avi Douglen, who explore the vital integration of privacy and security in application development. Discover how privacy by design and threat modeling can enhance your organization&apos;s security posture and ensure compliance.</itunes:subtitle>
      <itunes:keywords>compliance, avi douglen, avi douglen, architecture, data, marco ciappelli, lisbon, kim wuyts, sean martin, cybersecurity, conference, data minimization, privacy by design, application development, gdpr, security engineering, appsec, technical privacy, podcast, security, privacy engineering, owasp, privacy, cybersecurityconference, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d08d8144-9926-48db-8dce-1ab1e603065c</guid>
      <title>Application Security: Standards, UI, Identity, Access, Cryptography, Process, and More | An OWASP AppSec Global Lisbon 2024 Conversation with Jim Manico | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator, Manicode Security</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jmanico/">https://www.linkedin.com/in/jmanico/</a></p><p>On Twitter | <a href="https://x.com/manicode">https://x.com/manicode</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin engages in a compelling discussion with Jim Manico about the current landscape of application security. Jim, a notable leader in the field, delves into several critical topics surrounding application security and its evolving challenges.</p><p>The conversation opens by touching on the significant influence of artificial intelligence (AI) on application security, suggesting a future episode dedicated entirely to exploring this complex topic. They then shift focus to the necessity of having a formalized approach when dealing with security vulnerabilities. Jim underscores the importance of planning and preparation before tackling security threats, emphasizing that structured processes lead to more effective management of potential issues.</p><p>A significant portion of the dialogue explores the challenges associated with identifying and managing vulnerable or outdated libraries within codebases. Jim and Sean discuss how modern development practices often lead to the incorporation of various libraries, each of which can introduce potential security risks if not properly maintained. The intricacies of keeping these libraries updated to prevent vulnerabilities are highlighted, including the frequent necessity of updating or replacing libraries to ensure robust security.</p><p>Jim also touches upon the noise generated by automated security findings, which can overwhelm development teams with alerts and potential issues. He stresses the value of effectively prioritizing and addressing these findings to ensure that the most critical vulnerabilities are tackled promptly, reducing the risk of exploitation.</p><p>Throughout the episode, Jim and Sean highlight the balance that must be struck between developing new features and maintaining a secure, resilient application environment. Ensuring that security is integrated into the development lifecycle rather than being an afterthought is a recurring theme in their discussion.</p><p>This engaging episode provides listeners with a deep dive into the strategic and tactical aspects of application security, offering valuable insights and practical advice on navigating the often complex and ever-evolving security landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Training: <a href="https://lisbon.globalappsec.org/trainings/#sku_ASTJM" target="_blank">https://lisbon.globalappsec.org/trainings/#sku_ASTJM</a></p><p>OWASP ASVS: <a href="https://github.com/OWASP/ASVS/tree/master/5.0/en" target="_blank">https://github.com/OWASP/ASVS/tree/master/5.0/en</a></p><p>OWASP Cheatsheet Series: <a href="https://cheatsheetseries.owasp.org/" target="_blank">https://cheatsheetseries.owasp.org/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 14 Jun 2024 16:30:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Manico)</author>
      <link>https://eventcoveragepodcast.com/episodes/application-security-standards-ui-identity-access-cryptography-process-and-more-an-owasp-appsec-global-lisbon-2024-conversation-with-jim-manico-on-location-coverage-with-sean-martin-and-marco-ciappelli-81lUEMwR</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator, Manicode Security</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jmanico/">https://www.linkedin.com/in/jmanico/</a></p><p>On Twitter | <a href="https://x.com/manicode">https://x.com/manicode</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, host Sean Martin engages in a compelling discussion with Jim Manico about the current landscape of application security. Jim, a notable leader in the field, delves into several critical topics surrounding application security and its evolving challenges.</p><p>The conversation opens by touching on the significant influence of artificial intelligence (AI) on application security, suggesting a future episode dedicated entirely to exploring this complex topic. They then shift focus to the necessity of having a formalized approach when dealing with security vulnerabilities. Jim underscores the importance of planning and preparation before tackling security threats, emphasizing that structured processes lead to more effective management of potential issues.</p><p>A significant portion of the dialogue explores the challenges associated with identifying and managing vulnerable or outdated libraries within codebases. Jim and Sean discuss how modern development practices often lead to the incorporation of various libraries, each of which can introduce potential security risks if not properly maintained. The intricacies of keeping these libraries updated to prevent vulnerabilities are highlighted, including the frequent necessity of updating or replacing libraries to ensure robust security.</p><p>Jim also touches upon the noise generated by automated security findings, which can overwhelm development teams with alerts and potential issues. He stresses the value of effectively prioritizing and addressing these findings to ensure that the most critical vulnerabilities are tackled promptly, reducing the risk of exploitation.</p><p>Throughout the episode, Jim and Sean highlight the balance that must be struck between developing new features and maintaining a secure, resilient application environment. Ensuring that security is integrated into the development lifecycle rather than being an afterthought is a recurring theme in their discussion.</p><p>This engaging episode provides listeners with a deep dive into the strategic and tactical aspects of application security, offering valuable insights and practical advice on navigating the often complex and ever-evolving security landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV">https://www.youtube.com/playlist?list=PLnYu0psdcllTzdBL4GGWZ_x-B1ifPIIBV</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Training: <a href="https://lisbon.globalappsec.org/trainings/#sku_ASTJM" target="_blank">https://lisbon.globalappsec.org/trainings/#sku_ASTJM</a></p><p>OWASP ASVS: <a href="https://github.com/OWASP/ASVS/tree/master/5.0/en" target="_blank">https://github.com/OWASP/ASVS/tree/master/5.0/en</a></p><p>OWASP Cheatsheet Series: <a href="https://cheatsheetseries.owasp.org/" target="_blank">https://cheatsheetseries.owasp.org/</a></p><p>Learn more about OWASP AppSec Global Lisbon 2024: <a href="https://lisbon.globalappsec.org/">https://lisbon.globalappsec.org/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30417961" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c5bb348a-99d9-4ec9-aed4-62c43857e2b7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c5bb348a-99d9-4ec9-aed4-62c43857e2b7&amp;feed=2M86zCcc"/>
      <itunes:title>Application Security: Standards, UI, Identity, Access, Cryptography, Process, and More | An OWASP AppSec Global Lisbon 2024 Conversation with Jim Manico | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Manico</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/ce41df25-7667-4dbe-a895-62e1186d262d/3000x3000/owasp-global-appsec-2024.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:41</itunes:duration>
      <itunes:summary>Join Sean Martin as he engages with Jim Manico in a riveting discussion about the critical aspects of application security, from managing vulnerable libraries to the strategic integration of security into development processes. Discover practical insights and actionable advice on navigating the evolving landscape of application security.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he engages with Jim Manico in a riveting discussion about the critical aspects of application security, from managing vulnerable libraries to the strategic integration of security into development processes. Discover practical insights and actionable advice on navigating the evolving landscape of application security.</itunes:subtitle>
      <itunes:keywords>automated, marco ciappelli, risks, exploitation, sean martin, cybersecurity, jim manico, conference, vulnerabilities, libraries, application, management, codebases, updating, podcast, security, integration, resilient, insights, development, strategy, features, ai, alerts, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">35ef6f85-38a8-459a-9850-0ab9023bfc34</guid>
      <title>The Present and Future of Cybersecurity Culture | An Infosecurity Europe 2024 Conversation with Aston Martin&apos;s CISO Robin Smith | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Robin Smith</strong>, CISO of Aston Martin [<a href="https://x.com/astonmartin">@astonmartin</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robin-s-78148a133/">https://www.linkedin.com/in/robin-s-78148a133/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The latest episode of "On Location With Marco and Sean" features an in-depth discussion with Robin Smith, the Chief Information Security Officer (CISO) at Aston Martin. Recorded live in the media room at Infosecurity Europe 2024 in London, this episode explores the essential role of culture in cybersecurity. Sean Martin and Marco Ciappelli guide the conversation, touching on everything related to the complexities of organizational security culture.</p><p><strong>The Icebreaker</strong></p><p>The conversation kicks off with some light-hearted banter about yogurt and its cultural significance, setting a relaxed tone before diving into the serious business of cybersecurity. Sean and Marco's playful exchange effectively breaks the ice, before Sean introduces Robin Smith, emphasizing how this conversation is the final one in their Infosecurity Europe coverage. Robin reciprocates with a warm thank you, before sharing insights on Aston Martin’s cybersecurity culture.</p><p><strong>Life at Aston Martin</strong></p><p>Robin elaborates on his role at Aston Martin, revealing that he considers himself the "luckiest man in cyber." He explains how a commitment to high-quality IT initially existed at Aston Martin but not a fully developed cybersecurity culture. Over the past three years, his mission has been to build that culture, aligning it with Aston Martin’s values and brand prestige.</p><p><strong>Building a Cybersecurity Culture</strong></p><p>Robin describes how he introduced a comprehensive security program that aligns with Aston Martin’s renowned design and engineering standards. He discusses the importance of integrating cybersecurity as a full-spectrum approach to business improvement, not just a technological add-on.</p><p><strong>Lessons Learned</strong></p><p>The conversation shifts to some of the challenges and failures encountered along the way. Robin recounts an ambitious but ultimately unsuccessful attempt to engage the board with an open-source intelligence report on their personal information. Though the exercise did not go as planned, it provided invaluable lessons on cultural sensitivity and resource allocation.</p><p><strong>The Vision for the Future</strong></p><p>Robin and Sean discuss the forward-thinking mindset necessary to navigate both immediate and long-term cybersecurity challenges. Robin emphasizes the need for a balanced approach that combines visionary planning with effective tactical response. He highlights Aston Martin's ambition for full automation and AI-driven security measures.</p><p><strong>Impact on Customers and Community</strong></p><p>Marco Ciappelli raises the question of how this robust security culture affects Aston Martin's customers. Robin assures that high-value customers expect the best, including top-notch security. He underscores the importance of securing the entire value chain, from suppliers to dealership networks.</p><p><strong>Community and Collaboration</strong></p><p>Sean explores the role of community among CISOs. Robin shares his positive experiences with the automotive CISO community, emphasizing the value of honest and sometimes brutal feedback. This collaborative environment helps him and his peers continually improve their security programs.</p><p><strong>Wrapping Up</strong></p><p>As the conversation winds down, both hosts thank Robin for his insights. They reflect on the passion and dedication evident in the cybersecurity community throughout the event. Sean invites Robin for another discussion on cyber futurism, hinting at more intriguing conversations to come.</p><p>Marco and Sean close the episode by thanking their audience and expressing their excitement for future events. They hope to see everyone again at next year's Infosecurity Europe, promising more engaging content and enlightening discussions.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Jun 2024 13:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Robin Smith)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-present-and-future-of-cybersecurity-culture-an-infosecurity-europe-2024-conversation-with-aston-martins-ciso-robin-smith-on-location-coverage-with-sean-martin-and-marco-ciappelli-o8XkZlFI</link>
      <content:encoded><![CDATA[<p><strong>Guest: Robin Smith</strong>, CISO of Aston Martin [<a href="https://x.com/astonmartin">@astonmartin</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robin-s-78148a133/">https://www.linkedin.com/in/robin-s-78148a133/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The latest episode of "On Location With Marco and Sean" features an in-depth discussion with Robin Smith, the Chief Information Security Officer (CISO) at Aston Martin. Recorded live in the media room at Infosecurity Europe 2024 in London, this episode explores the essential role of culture in cybersecurity. Sean Martin and Marco Ciappelli guide the conversation, touching on everything related to the complexities of organizational security culture.</p><p><strong>The Icebreaker</strong></p><p>The conversation kicks off with some light-hearted banter about yogurt and its cultural significance, setting a relaxed tone before diving into the serious business of cybersecurity. Sean and Marco's playful exchange effectively breaks the ice, before Sean introduces Robin Smith, emphasizing how this conversation is the final one in their Infosecurity Europe coverage. Robin reciprocates with a warm thank you, before sharing insights on Aston Martin’s cybersecurity culture.</p><p><strong>Life at Aston Martin</strong></p><p>Robin elaborates on his role at Aston Martin, revealing that he considers himself the "luckiest man in cyber." He explains how a commitment to high-quality IT initially existed at Aston Martin but not a fully developed cybersecurity culture. Over the past three years, his mission has been to build that culture, aligning it with Aston Martin’s values and brand prestige.</p><p><strong>Building a Cybersecurity Culture</strong></p><p>Robin describes how he introduced a comprehensive security program that aligns with Aston Martin’s renowned design and engineering standards. He discusses the importance of integrating cybersecurity as a full-spectrum approach to business improvement, not just a technological add-on.</p><p><strong>Lessons Learned</strong></p><p>The conversation shifts to some of the challenges and failures encountered along the way. Robin recounts an ambitious but ultimately unsuccessful attempt to engage the board with an open-source intelligence report on their personal information. Though the exercise did not go as planned, it provided invaluable lessons on cultural sensitivity and resource allocation.</p><p><strong>The Vision for the Future</strong></p><p>Robin and Sean discuss the forward-thinking mindset necessary to navigate both immediate and long-term cybersecurity challenges. Robin emphasizes the need for a balanced approach that combines visionary planning with effective tactical response. He highlights Aston Martin's ambition for full automation and AI-driven security measures.</p><p><strong>Impact on Customers and Community</strong></p><p>Marco Ciappelli raises the question of how this robust security culture affects Aston Martin's customers. Robin assures that high-value customers expect the best, including top-notch security. He underscores the importance of securing the entire value chain, from suppliers to dealership networks.</p><p><strong>Community and Collaboration</strong></p><p>Sean explores the role of community among CISOs. Robin shares his positive experiences with the automotive CISO community, emphasizing the value of honest and sometimes brutal feedback. This collaborative environment helps him and his peers continually improve their security programs.</p><p><strong>Wrapping Up</strong></p><p>As the conversation winds down, both hosts thank Robin for his insights. They reflect on the passion and dedication evident in the cybersecurity community throughout the event. Sean invites Robin for another discussion on cyber futurism, hinting at more intriguing conversations to come.</p><p>Marco and Sean close the episode by thanking their audience and expressing their excitement for future events. They hope to see everyone again at next year's Infosecurity Europe, promising more engaging content and enlightening discussions.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25836284" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e32aa11d-11fe-43f3-952b-89a1fdb5e038/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e32aa11d-11fe-43f3-952b-89a1fdb5e038&amp;feed=2M86zCcc"/>
      <itunes:title>The Present and Future of Cybersecurity Culture | An Infosecurity Europe 2024 Conversation with Aston Martin&apos;s CISO Robin Smith | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Robin Smith</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:54</itunes:duration>
      <itunes:summary>In this fascinating episode of &quot;On Location With Marco and Sean,&quot; recorded at Infosecurity Europe 2024 in London, we talk about the intersection of cybersecurity and culture with Robin Smith, CISO of Aston Martin.</itunes:summary>
      <itunes:subtitle>In this fascinating episode of &quot;On Location With Marco and Sean,&quot; recorded at Infosecurity Europe 2024 in London, we talk about the intersection of cybersecurity and culture with Robin Smith, CISO of Aston Martin.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ciso, sean martin, security innovation, security program, automotive industry, cybersecurity, conference, ai in security, cybersecurity community, podcast, security strategies, cyber resilience, infosecurity europe 2024, cyber futurism, robin smith, cyber culture, cybersecurity future, automotive cybersecurity, culture in cybersecurity, aston martin, cybersecurityconference, cyber threats, cyber risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21b809f0-3135-4b1b-91f1-aebe9fe96493</guid>
      <title>Exploring Cyber Insurance Nuances Across Europe | An Infosecurity Europe 2024 Conversation with Marcin Gajkowski and Michal Balwinski from Generali Poland | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong> Marcin Gajkowski</strong>, Head of Liability Underwriting Team, Generali Poland</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marcin-gajkowski-4a6685134/">https://www.linkedin.com/in/marcin-gajkowski-4a6685134/</a></p><p><strong> Michal Balwinski</strong>, Senior Underwriter and Cyber Practice Leader, Generali Poland</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/micha%C5%82-balwi%C5%84ski-136105197/">https://www.linkedin.com/in/micha%C5%82-balwi%C5%84ski-136105197/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Exploring Cyber Insurance Nuances Across Europe with Generali Poland at InfoSecurity Europe 2024</strong></p><p>Picture this: bustling conversations, gleaming booths, and thought-provoking sessions at InfoSecurity Europe 2024, held in the vibrant city of London. Amidst this atmosphere, Sean Martin and Marco Ciappelli of "On Location With Marco and Sean" invite listeners into a fascinating discussion focusing on the intricacies of cyber insurance within Europe. Joined by two brilliant minds from Generali Poland, Marcin Gajkowsky and Michal Balwinski, this episode immerses us into understanding cyber insurance and its varied landscape across the continent.</p><p><strong>Setting the Scene: InfoSecurity Europe 2024</strong></p><p>The episode kicks off with Marco and Sean's characteristically witty banter. They joked about their numerous travels and questioned their whereabouts, reflecting the lively and spontaneous spirit of live recording. They also introduce their esteemed guests, Marcin Gajkowsky and Michal Balwinski, from Generali Poland. The discussion's setting is none other than the renowned InfoSecurity Europe event, where cybersecurity professionals gather to forge connections and share innovative security solutions.</p><p><strong>Understanding Cyber Insurance: Perspectives from Generali Poland</strong></p><p>Marcin Gajkowsky, leading Generali Poland's Liability Team, opens up about his journey into cyber insurance. Despite his initial background in casualty and professional indemnity underwriting, Gajkowsky has grown passionate about the potential and challenges of cyber insurance, especially within Poland. With the deployment of their local cyber insurance policy in 2021, Generali Poland has committed to navigating and shaping this emerging market.</p><p>Michal Balwinski, a senior underwriter and cyber insurance practice leader at Generali Poland, delves further into the policies and market dynamics. He highlights the significant knowledge gap in Central and Eastern Europe, a relic of historical and geopolitical contexts. This awareness gap necessitates steps for thorough market education and awareness building, ensuring businesses understand and value the importance of cyber insurance.</p><p><strong>Market Dynamics: Diversity Across Europe</strong></p><p>Balwinski emphasizes the differing levels of cyber risk awareness across Europe. The UK, Western Europe, and the Mediterranean regions each present unique insurance needs and challenges based on their levels of digital sophistication and historical development. Poland's market reveals a stark contrast with larger enterprises adopting sophisticated vendor technologies akin to global banks, while smaller and mid-sized companies lag behind, often unaware of the essential benefits and protections cyber insurance provides.</p><p><strong>Adapting to the Market: Educational and Technological Partnerships</strong></p><p>Reflecting on the unique role of cyber insurance, the Generali Poland team outlines their approach to nurturing client relationships. They provide comprehensive risk assessments, engaging conversations, and tailored recommendations. True to their philosophy, Generali Poland extends beyond the role of mere policy provider, establishing themselves as committed partners in their clients' cybersecurity journeys.</p><p>One pivotal shift in insurance strategy involved offering additional prevention tools alongside policies, such as an anti-phishing package equipped with cutting-edge security kits. The goal is to bridge the evident gap in cyber preparedness among smaller enterprises, ensuring they have robust mitigation measures in place before a policy comes into effect.</p><p><strong>Resilience and Ransomware: To Pay or Not to Pay?</strong></p><p>A highlight of the discussion revolves around ransomware and the ethical and practical dilemmas associated with ransom payments. Marcin and Michal elucidate Generali Poland's firm stance against paying ransoms, except in extraordinary circumstances where lives are at stake. They stress that paying ransoms perpetuates the cycle of cybercrime funding and escalation. Instead, their approach focuses on bolstering clients' overall cyber resilience through comprehensive support, including 24/7 incident response services, business interruption coverage, and holistic risk management.</p><p><strong>Conclusion: Building a Borderless Cyber-Aware Future</strong></p><p>As the insightful conversation wraps up, Marco and Sean underscore the importance of cross-cultural exchange and the collective effort required to bolster cybersecurity awareness. They highlight the universal nature of cyber threats, transcending borders and demanding collaborative action.</p><p>This captivating episode serves as a testament to the power of open dialogue and education in fostering a more secure digital landscape. As we move forward, the lessons from Generali Poland's proactive approach to cyber insurance will undoubtedly resonate across the industry, setting a precedent for future advancements in the field.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> Reducing Risk and Costs in a Rapidly Changing Cyber Insurance Landscape with Phishing-Resistant MFA: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.218914.reducing-risk-and-costs-in-a-rapidly-changing-cyber-insurance-landscape-with-phishing_resistant-mfa.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.218914.reducing-risk-and-costs-in-a-rapidly-changing-cyber-insurance-landscape-with-phishing_resistant-mfa.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Jun 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Marcin Gajkowski, Michal Balwinski)</author>
      <link>https://eventcoveragepodcast.com/episodes/exploring-cyber-insurance-nuances-across-europe-an-infosecurity-europe-2024-conversation-with-marcin-gajkowski-and-michael-balwinski-from-generali-poland-on-location-coverage-with-sean-martin-and-marco-ciappelli-dgoAu3_x</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong> Marcin Gajkowski</strong>, Head of Liability Underwriting Team, Generali Poland</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marcin-gajkowski-4a6685134/">https://www.linkedin.com/in/marcin-gajkowski-4a6685134/</a></p><p><strong> Michal Balwinski</strong>, Senior Underwriter and Cyber Practice Leader, Generali Poland</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/micha%C5%82-balwi%C5%84ski-136105197/">https://www.linkedin.com/in/micha%C5%82-balwi%C5%84ski-136105197/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Exploring Cyber Insurance Nuances Across Europe with Generali Poland at InfoSecurity Europe 2024</strong></p><p>Picture this: bustling conversations, gleaming booths, and thought-provoking sessions at InfoSecurity Europe 2024, held in the vibrant city of London. Amidst this atmosphere, Sean Martin and Marco Ciappelli of "On Location With Marco and Sean" invite listeners into a fascinating discussion focusing on the intricacies of cyber insurance within Europe. Joined by two brilliant minds from Generali Poland, Marcin Gajkowsky and Michal Balwinski, this episode immerses us into understanding cyber insurance and its varied landscape across the continent.</p><p><strong>Setting the Scene: InfoSecurity Europe 2024</strong></p><p>The episode kicks off with Marco and Sean's characteristically witty banter. They joked about their numerous travels and questioned their whereabouts, reflecting the lively and spontaneous spirit of live recording. They also introduce their esteemed guests, Marcin Gajkowsky and Michal Balwinski, from Generali Poland. The discussion's setting is none other than the renowned InfoSecurity Europe event, where cybersecurity professionals gather to forge connections and share innovative security solutions.</p><p><strong>Understanding Cyber Insurance: Perspectives from Generali Poland</strong></p><p>Marcin Gajkowsky, leading Generali Poland's Liability Team, opens up about his journey into cyber insurance. Despite his initial background in casualty and professional indemnity underwriting, Gajkowsky has grown passionate about the potential and challenges of cyber insurance, especially within Poland. With the deployment of their local cyber insurance policy in 2021, Generali Poland has committed to navigating and shaping this emerging market.</p><p>Michal Balwinski, a senior underwriter and cyber insurance practice leader at Generali Poland, delves further into the policies and market dynamics. He highlights the significant knowledge gap in Central and Eastern Europe, a relic of historical and geopolitical contexts. This awareness gap necessitates steps for thorough market education and awareness building, ensuring businesses understand and value the importance of cyber insurance.</p><p><strong>Market Dynamics: Diversity Across Europe</strong></p><p>Balwinski emphasizes the differing levels of cyber risk awareness across Europe. The UK, Western Europe, and the Mediterranean regions each present unique insurance needs and challenges based on their levels of digital sophistication and historical development. Poland's market reveals a stark contrast with larger enterprises adopting sophisticated vendor technologies akin to global banks, while smaller and mid-sized companies lag behind, often unaware of the essential benefits and protections cyber insurance provides.</p><p><strong>Adapting to the Market: Educational and Technological Partnerships</strong></p><p>Reflecting on the unique role of cyber insurance, the Generali Poland team outlines their approach to nurturing client relationships. They provide comprehensive risk assessments, engaging conversations, and tailored recommendations. True to their philosophy, Generali Poland extends beyond the role of mere policy provider, establishing themselves as committed partners in their clients' cybersecurity journeys.</p><p>One pivotal shift in insurance strategy involved offering additional prevention tools alongside policies, such as an anti-phishing package equipped with cutting-edge security kits. The goal is to bridge the evident gap in cyber preparedness among smaller enterprises, ensuring they have robust mitigation measures in place before a policy comes into effect.</p><p><strong>Resilience and Ransomware: To Pay or Not to Pay?</strong></p><p>A highlight of the discussion revolves around ransomware and the ethical and practical dilemmas associated with ransom payments. Marcin and Michal elucidate Generali Poland's firm stance against paying ransoms, except in extraordinary circumstances where lives are at stake. They stress that paying ransoms perpetuates the cycle of cybercrime funding and escalation. Instead, their approach focuses on bolstering clients' overall cyber resilience through comprehensive support, including 24/7 incident response services, business interruption coverage, and holistic risk management.</p><p><strong>Conclusion: Building a Borderless Cyber-Aware Future</strong></p><p>As the insightful conversation wraps up, Marco and Sean underscore the importance of cross-cultural exchange and the collective effort required to bolster cybersecurity awareness. They highlight the universal nature of cyber threats, transcending borders and demanding collaborative action.</p><p>This captivating episode serves as a testament to the power of open dialogue and education in fostering a more secure digital landscape. As we move forward, the lessons from Generali Poland's proactive approach to cyber insurance will undoubtedly resonate across the industry, setting a precedent for future advancements in the field.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> Reducing Risk and Costs in a Rapidly Changing Cyber Insurance Landscape with Phishing-Resistant MFA: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.218914.reducing-risk-and-costs-in-a-rapidly-changing-cyber-insurance-landscape-with-phishing_resistant-mfa.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.218914.reducing-risk-and-costs-in-a-rapidly-changing-cyber-insurance-landscape-with-phishing_resistant-mfa.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23967564" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f9d820e6-925c-4d8a-b3e8-4e531ae3a7fc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f9d820e6-925c-4d8a-b3e8-4e531ae3a7fc&amp;feed=2M86zCcc"/>
      <itunes:title>Exploring Cyber Insurance Nuances Across Europe | An Infosecurity Europe 2024 Conversation with Marcin Gajkowski and Michal Balwinski from Generali Poland | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Marcin Gajkowski, Michal Balwinski</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:57</itunes:duration>
      <itunes:summary>In this insightful episode of On Location With Marco and Sean, recorded at InfoSecurity Europe 2024 in London, Sean Martin and Marco Ciappelli talk with Marcin Gajkowski and Michal Balwinski from Generali Poland about the evolving landscape of cyber insurance in Europe.</itunes:summary>
      <itunes:subtitle>In this insightful episode of On Location With Marco and Sean, recorded at InfoSecurity Europe 2024 in London, Sean Martin and Marco Ciappelli talk with Marcin Gajkowski and Michal Balwinski from Generali Poland about the evolving landscape of cyber insurance in Europe.</itunes:subtitle>
      <itunes:keywords>europe cybersecurity, marco ciappelli, generali poland, sean martin, insurance policy, cybersecurity, conference, risk management, cyber insurance, cybersecurity education, infosecurity london, ransomware, podcast, cyber resilience, infosecurity europe 2024, industry insights, incident response, cybersecurity awareness, marcin gajkowski, michal balwinski, digital transformation, eu cyber policies, michael balwinski, cybersecurityconference, cyber risk, cyber insurance market</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59ba9c4c-7a2a-4743-837b-2bc763c5a9a2</guid>
      <title>Jump Into Our DeLorean and Travel Back and Forth Into the Future | An Infosecurity Europe 2024 Conversation with Madelein van der Hout and Paul McKay from Forrester | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Madelein van der Hout</strong>, Senior Analyst Security & Risk at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madelein-van-der-hout-65452025/" target="_blank">https://www.linkedin.com/in/madelein-van-der-hout-65452025/</a></p><p>On Twitter | <a href="https://x.com/HoutMadelein" target="_blank">https://x.com/HoutMadelein</a></p><p><strong>Paul McKay</strong>, Vice President, Research Director at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/paul-mckay-5304a115/" target="_blank">https://www.linkedin.com/in/paul-mckay-5304a115/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Human Side of Cybersecurity</strong></p><p>Infosecurity Europe 2024 in London brought together some of the industry's most knowledgeable professionals. Marco Ciappelli and Sean Martin, your hosts, were joined by Madeline Van Der Hout, Paul McKay, both from Forrester, and various other experts to discuss the latest trends, challenges, and solutions within the cybersecurity landscape. This exciting episode of "On Location With Marco and Sean" dives deep into essential topics such as the significant role of the human element in cybersecurity, skill shortages, industry fragmentation, and future trends.</p><p><strong>Reimagining Cybersecurity: Back to the Future</strong></p><p>The episode begins with a nostalgic touch as Sean Martin and Marco Ciappelli discuss the iconic movie "Back to the Future". Drawing a parallel between the film's theme of time travel and the evolving cybersecurity landscape, they emphasize how the industry might benefit from lessons of the past while anticipating the future.</p><p><strong>The Reality of Cybersecurity Innovation</strong></p><p>Madeline Van Der Hout and Paul McKay shed light on the changing dynamics of cybersecurity events. Paul mentions that events like Infosecurity Europe must now compete with other regional events like CyberSec Europe in Brussels. This healthy competition fosters localized insights and innovations.</p><p>Madeline adds that cybersecurity innovation often stems from startups. She believes these events stimulate larger vendors to communicate with smaller startups, thus supporting the entire ecosystem.</p><p><strong>API Security: A Case for Consolidation</strong></p><p>Both Paul and Madeline reflect on the notable presence of API security vendors at the conference. Madeline points out the consolidation in the market driven by various approaches to API security. CISOs today expect API security to be an integral part of their infrastructure, driving the conversation towards prioritization and efficient resource management.</p><p><strong>The Human Element and Mental Health</strong></p><p>One of the crucial points discussed was the significant skill shortage in the cybersecurity industry. Madeline stresses the need for more conversations around mental health and burnout prevention among cybersecurity professionals. Paul supports this by highlighting common hiring challenges where organizations are often looking for the "purple squirrel" or the "five-legged sheep."</p><p><strong>Training and Educating Future Talent</strong></p><p>The conversation moves towards the barriers to entry for new talent in the industry. Both experts agree that focusing on certifications alone can create a class divide. Paul argues that this practice restricts access to the industry for those unable to afford costly certifications.</p><p>Madeline emphasizes the need to work closely with HR departments to create better job profiles and hiring practices. This could alleviate some of the industry's talent shortages.</p><p><strong>Cybersecurity's Future: More Than Just a Business Problem</strong></p><p>Madeline takes a broader view by asserting that cybersecurity is not just a business problem. It's a civilian issue as well, affecting everyone with a digital footprint. She encourages leveraging the power of informed voting and education to address cybersecurity at a societal level.</p><p><strong>Data-Driven Decision Making: The Key to Security's Evolution</strong></p><p>Sean Martin concludes by discussing the immense data available in the cybersecurity sector. He emphasizes the potential for the industry to drive businesses by making better, data-driven decisions. Paul agrees, pointing out the need for cybersecurity to evolve similarly to how the CIO function has over the years.</p><p><strong>Conclusion: A Call for Innovation and Humanity</strong></p><p>The episode wraps up by reinforcing the focus on the human element. Marco highlights the need to utilize existing resources effectively rather than being distracted by the latest technological gadgets. Madeline's call to talk more about humans in every cybersecurity breach serves as a profound takeaway.</p><p>As the conversation echoes through the media room at Infosecurity Europe 2024, it's clear that the journey forward in cybersecurity involves a blend of technology, human touch, and innovative thinking.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 10 Jun 2024 23:06:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Paul McKay, Madelein van der Hout)</author>
      <link>https://eventcoveragepodcast.com/episodes/jump-into-our-delorean-and-travel-back-and-forth-into-the-future-an-infosecurity-europe-2024-conversation-with-madelein-van-der-hout-and-paul-mckay-from-forrester-on-location-coverage-with-sean-martin-and-marco-ciappelli-JHIotWGP</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Madelein van der Hout</strong>, Senior Analyst Security & Risk at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madelein-van-der-hout-65452025/" target="_blank">https://www.linkedin.com/in/madelein-van-der-hout-65452025/</a></p><p>On Twitter | <a href="https://x.com/HoutMadelein" target="_blank">https://x.com/HoutMadelein</a></p><p><strong>Paul McKay</strong>, Vice President, Research Director at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/paul-mckay-5304a115/" target="_blank">https://www.linkedin.com/in/paul-mckay-5304a115/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Human Side of Cybersecurity</strong></p><p>Infosecurity Europe 2024 in London brought together some of the industry's most knowledgeable professionals. Marco Ciappelli and Sean Martin, your hosts, were joined by Madeline Van Der Hout, Paul McKay, both from Forrester, and various other experts to discuss the latest trends, challenges, and solutions within the cybersecurity landscape. This exciting episode of "On Location With Marco and Sean" dives deep into essential topics such as the significant role of the human element in cybersecurity, skill shortages, industry fragmentation, and future trends.</p><p><strong>Reimagining Cybersecurity: Back to the Future</strong></p><p>The episode begins with a nostalgic touch as Sean Martin and Marco Ciappelli discuss the iconic movie "Back to the Future". Drawing a parallel between the film's theme of time travel and the evolving cybersecurity landscape, they emphasize how the industry might benefit from lessons of the past while anticipating the future.</p><p><strong>The Reality of Cybersecurity Innovation</strong></p><p>Madeline Van Der Hout and Paul McKay shed light on the changing dynamics of cybersecurity events. Paul mentions that events like Infosecurity Europe must now compete with other regional events like CyberSec Europe in Brussels. This healthy competition fosters localized insights and innovations.</p><p>Madeline adds that cybersecurity innovation often stems from startups. She believes these events stimulate larger vendors to communicate with smaller startups, thus supporting the entire ecosystem.</p><p><strong>API Security: A Case for Consolidation</strong></p><p>Both Paul and Madeline reflect on the notable presence of API security vendors at the conference. Madeline points out the consolidation in the market driven by various approaches to API security. CISOs today expect API security to be an integral part of their infrastructure, driving the conversation towards prioritization and efficient resource management.</p><p><strong>The Human Element and Mental Health</strong></p><p>One of the crucial points discussed was the significant skill shortage in the cybersecurity industry. Madeline stresses the need for more conversations around mental health and burnout prevention among cybersecurity professionals. Paul supports this by highlighting common hiring challenges where organizations are often looking for the "purple squirrel" or the "five-legged sheep."</p><p><strong>Training and Educating Future Talent</strong></p><p>The conversation moves towards the barriers to entry for new talent in the industry. Both experts agree that focusing on certifications alone can create a class divide. Paul argues that this practice restricts access to the industry for those unable to afford costly certifications.</p><p>Madeline emphasizes the need to work closely with HR departments to create better job profiles and hiring practices. This could alleviate some of the industry's talent shortages.</p><p><strong>Cybersecurity's Future: More Than Just a Business Problem</strong></p><p>Madeline takes a broader view by asserting that cybersecurity is not just a business problem. It's a civilian issue as well, affecting everyone with a digital footprint. She encourages leveraging the power of informed voting and education to address cybersecurity at a societal level.</p><p><strong>Data-Driven Decision Making: The Key to Security's Evolution</strong></p><p>Sean Martin concludes by discussing the immense data available in the cybersecurity sector. He emphasizes the potential for the industry to drive businesses by making better, data-driven decisions. Paul agrees, pointing out the need for cybersecurity to evolve similarly to how the CIO function has over the years.</p><p><strong>Conclusion: A Call for Innovation and Humanity</strong></p><p>The episode wraps up by reinforcing the focus on the human element. Marco highlights the need to utilize existing resources effectively rather than being distracted by the latest technological gadgets. Madeline's call to talk more about humans in every cybersecurity breach serves as a profound takeaway.</p><p>As the conversation echoes through the media room at Infosecurity Europe 2024, it's clear that the journey forward in cybersecurity involves a blend of technology, human touch, and innovative thinking.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30139150" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/17f7108a-9449-49b7-8d96-9c1a2ed87cd4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=17f7108a-9449-49b7-8d96-9c1a2ed87cd4&amp;feed=2M86zCcc"/>
      <itunes:title>Jump Into Our DeLorean and Travel Back and Forth Into the Future | An Infosecurity Europe 2024 Conversation with Madelein van der Hout and Paul McKay from Forrester | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Paul McKay, Madelein van der Hout</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:31:23</itunes:duration>
      <itunes:summary>Join Marco Ciappelli and Sean Martin as they sit down with experts at Infosecurity Europe 2024 to discuss the evolution, challenges, and human aspects of the cybersecurity industry.</itunes:summary>
      <itunes:subtitle>Join Marco Ciappelli and Sean Martin as they sit down with experts at Infosecurity Europe 2024 to discuss the evolution, challenges, and human aspects of the cybersecurity industry.</itunes:subtitle>
      <itunes:keywords>paul mckay, marco ciappelli, marco ciappelli, madeline van der hout, technology events, madelein van der hout, cybersecurity market trends, human element in cybersecurity, cybersecurity burnout, sean martin, api security, cybersecurity, conference, data-driven security, cybersecurity industry trends, cybersecurity talent shortage, cybersecurity conference, cybersecurity startups, podcast, infosecurity europe 2024, cybersecurity hiring practices, ai in cybersecurity, cybersecurity innovation, skills shortage, cio evolution, cybersecurityconference, mental health in cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d4db123-7e9d-467f-8b8c-0e53c8af8e9a</guid>
      <title>Building Resilience in Healthcare Cybersecurity Following the Recent NHS Third-Party Ransomware Incident | Expert Insights from InfoSecurity Europe 2024 | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Brian Honan</strong>, Founder, <a href="https://x.com/bhconsulting" target="_blank">BH Consulting</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/brianhonan/" target="_blank">https://www.linkedin.com/in/brianhonan/</a><br />On X: <a href="https://x.com/BrianHonan" target="_blank">https://x.com/BrianHonan</a></p><p><strong>Suk Paul</strong>, Director - EMEA Services GTM, <a href="https://x.com/KudelskiSec" target="_blank">Kudelski Security</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/suk-paul-mba-99757412/" target="_blank">https://www.linkedin.com/in/suk-paul-mba-99757412/</a></p><p><strong>Heather Lowrie</strong>, Chief Information Security Officer (CISO), <a href="https://x.com/OfficialUoM" target="_blank">The University of Manchester</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/heather-lowrie/" target="_blank">https://www.linkedin.com/in/heather-lowrie/</a><br />On X: <a href="https://x.com/HeatherELowrie" target="_blank">https://x.com/HeatherELowrie</a></p><p><strong>Tim Grieveson</strong>, Senior Vice President - Global Cyber Risk Advisor, <a href="https://x.com/Bitsight" target="_blank">Bitsight</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/timgrieveson/" target="_blank">https://www.linkedin.com/in/timgrieveson/</a><br />On X: <a href="https://x.com/timgrieveson" target="_blank">https://x.com/timgrieveson</a></p><p><strong>Daniel Lattimer</strong>, Area Vice President - EMEA West, <a href="https://x.com/SemperisTech" target="_blank">Semperis</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/daniel-lattimer-37533016/" target="_blank">https://www.linkedin.com/in/daniel-lattimer-37533016/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>WATCH THE VIDEO: <a href="https://youtu.be/3VQ5VsD-DKQ" target="_blank">https://youtu.be/3VQ5VsD-DKQ</a></p><p>In recent news, the NHS has been severely impacted by a ransomware cyber attack. This once again highlights the vulnerability of critical infrastructure to cyber threats. In this episode of ITSPmagazine, Marco Ciappelli and Sean Martin dive into this alarming incident while at the InfoSecurity Europe event in London, engaging with a panel of esteemed professionals in the field of information security.</p><p>One of the significant themes that emerged from the conversation is that cybercrime is no longer the domain of rogue teenage hackers working from their basements. As Brian Honan emphasized, cybercriminals today are often part of organized crime syndicates involved in drug trafficking, arms dealing, and human trafficking. They are driven by financial gain and are willing to go to great lengths to achieve their goals.</p><p>This particular incident affected NHS pathology services, causing surgeries and blood transfusions to be canceled or postponed, directly impacting patient care. Suk Paul pointed out that this kind of attack is not isolated. Since the conflict in 2022, the UK has witnessed a rise in cyber-attacks on public infrastructure, including hospitals and universities. He stated that the human intelligence element is crucial in identifying the techniques and methods used in such attacks.</p><p>The conversation also shed light on the complexity of managing third-party supply chain risk. Heather Lowrie suggested considering cybersecurity as a business enabler and not just a technical issue. She stressed the need for robust communication and collaboration between internal teams, external partners, and even at the board level to create a resilient cybersecurity posture.</p><p>To this end, Tim Grieveson echoed the importance of having a security leader with excellent communication skills who can align security strategies with business outcomes. This alignment is particularly essential in critical sectors like healthcare, where the focus is on maintaining patient-centric care.</p><p>Furthermore, Daniel Lattimer highlighted the challenges faced by the NHS in funding cybersecurity measures. He mentioned that while the NHS has made strides in improving its cybersecurity capabilities, there is still a dilemma of prioritizing between lifesaving patient care and investing in cybersecurity. More specific guidance and a legislative approach similar to US standards could help in achieving minimum security standards.</p><p>Brian Honan described the importance of legislative measures like the EU's Digital Operations Resilience Act (DORA) and the Network and Information Security Directive (NIS2), which focus on resilience in critical infrastructure. The key is not just to prevent cyber-attacks but to ensure continuity of services during and after an attack.</p><p>During the discussion, a repeated point was the inevitability of cyber incidents and the need for preparation and response. Tim Grieveson stressed the necessity of identifying critical assets and vulnerabilities, communicating risks to the board, and developing a clear response plan. He pointed out that it is not just about the technical aspects but also about storytelling and helping the organization understand the real-world implications of cyber risks.</p><p>The significance of cross-sector collaboration was also highlighted. Heather Lowrie noted that cyber threats are a societal challenge, not limited to individual organizations or sectors. Therefore, collective preparation and response are crucial for building resilience against cyber threats. She called for more exercises within and across sectors to prepare teams for real-world events.</p><p>Lastly, the episode discussed the ethical dilemma of paying ransoms. Brian Honan strongly advocated against paying the ransom, citing the lack of guarantee that systems would be restored securely and the need to rebuild trust in affected devices. Instead, the focus should be on robust preparation and managing supply chain security. In conclusion, this episode underscored the pervasive threat of cyber-attacks on critical infrastructure and the multifaceted approach needed to tackle these challenges.</p><p>From enhancing third-party risk management to legislative support, cross-sector collaboration, and ethical considerations, the conversation provides a comprehensive overview of the current state of cybersecurity in the healthcare sector. It highlights the urgent need for continuous improvement and resilience to protect not only systems but ultimately, patients' lives.</p><p>Top Questions Addressed</p><ul><li>How can the impact of the ransomware attack on the NHS best be described?</li><li>How can organizations better manage third-party supply chain risk in cybersecurity?</li><li>What are the ethical considerations and implications of paying ransom in cyberattacks?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 7 Jun 2024 12:46:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Suk Paul, Heather Lowrie, Tim Grieveson, Daniel Lattimer, Brian Honan)</author>
      <link>https://eventcoveragepodcast.com/episodes/building-resilience-in-healthcare-cybersecurity-following-the-recent-nhs-third-party-ransomware-incident-expert-insights-from-infosecurity-europe-europe-2024-on-location-coverage-with-sean-martin-and-marco-ciappelli-O6JxMOPz</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Brian Honan</strong>, Founder, <a href="https://x.com/bhconsulting" target="_blank">BH Consulting</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/brianhonan/" target="_blank">https://www.linkedin.com/in/brianhonan/</a><br />On X: <a href="https://x.com/BrianHonan" target="_blank">https://x.com/BrianHonan</a></p><p><strong>Suk Paul</strong>, Director - EMEA Services GTM, <a href="https://x.com/KudelskiSec" target="_blank">Kudelski Security</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/suk-paul-mba-99757412/" target="_blank">https://www.linkedin.com/in/suk-paul-mba-99757412/</a></p><p><strong>Heather Lowrie</strong>, Chief Information Security Officer (CISO), <a href="https://x.com/OfficialUoM" target="_blank">The University of Manchester</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/heather-lowrie/" target="_blank">https://www.linkedin.com/in/heather-lowrie/</a><br />On X: <a href="https://x.com/HeatherELowrie" target="_blank">https://x.com/HeatherELowrie</a></p><p><strong>Tim Grieveson</strong>, Senior Vice President - Global Cyber Risk Advisor, <a href="https://x.com/Bitsight" target="_blank">Bitsight</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/timgrieveson/" target="_blank">https://www.linkedin.com/in/timgrieveson/</a><br />On X: <a href="https://x.com/timgrieveson" target="_blank">https://x.com/timgrieveson</a></p><p><strong>Daniel Lattimer</strong>, Area Vice President - EMEA West, <a href="https://x.com/SemperisTech" target="_blank">Semperis</a><br />On LinkedIn: <a href="https://www.linkedin.com/in/daniel-lattimer-37533016/" target="_blank">https://www.linkedin.com/in/daniel-lattimer-37533016/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>WATCH THE VIDEO: <a href="https://youtu.be/3VQ5VsD-DKQ" target="_blank">https://youtu.be/3VQ5VsD-DKQ</a></p><p>In recent news, the NHS has been severely impacted by a ransomware cyber attack. This once again highlights the vulnerability of critical infrastructure to cyber threats. In this episode of ITSPmagazine, Marco Ciappelli and Sean Martin dive into this alarming incident while at the InfoSecurity Europe event in London, engaging with a panel of esteemed professionals in the field of information security.</p><p>One of the significant themes that emerged from the conversation is that cybercrime is no longer the domain of rogue teenage hackers working from their basements. As Brian Honan emphasized, cybercriminals today are often part of organized crime syndicates involved in drug trafficking, arms dealing, and human trafficking. They are driven by financial gain and are willing to go to great lengths to achieve their goals.</p><p>This particular incident affected NHS pathology services, causing surgeries and blood transfusions to be canceled or postponed, directly impacting patient care. Suk Paul pointed out that this kind of attack is not isolated. Since the conflict in 2022, the UK has witnessed a rise in cyber-attacks on public infrastructure, including hospitals and universities. He stated that the human intelligence element is crucial in identifying the techniques and methods used in such attacks.</p><p>The conversation also shed light on the complexity of managing third-party supply chain risk. Heather Lowrie suggested considering cybersecurity as a business enabler and not just a technical issue. She stressed the need for robust communication and collaboration between internal teams, external partners, and even at the board level to create a resilient cybersecurity posture.</p><p>To this end, Tim Grieveson echoed the importance of having a security leader with excellent communication skills who can align security strategies with business outcomes. This alignment is particularly essential in critical sectors like healthcare, where the focus is on maintaining patient-centric care.</p><p>Furthermore, Daniel Lattimer highlighted the challenges faced by the NHS in funding cybersecurity measures. He mentioned that while the NHS has made strides in improving its cybersecurity capabilities, there is still a dilemma of prioritizing between lifesaving patient care and investing in cybersecurity. More specific guidance and a legislative approach similar to US standards could help in achieving minimum security standards.</p><p>Brian Honan described the importance of legislative measures like the EU's Digital Operations Resilience Act (DORA) and the Network and Information Security Directive (NIS2), which focus on resilience in critical infrastructure. The key is not just to prevent cyber-attacks but to ensure continuity of services during and after an attack.</p><p>During the discussion, a repeated point was the inevitability of cyber incidents and the need for preparation and response. Tim Grieveson stressed the necessity of identifying critical assets and vulnerabilities, communicating risks to the board, and developing a clear response plan. He pointed out that it is not just about the technical aspects but also about storytelling and helping the organization understand the real-world implications of cyber risks.</p><p>The significance of cross-sector collaboration was also highlighted. Heather Lowrie noted that cyber threats are a societal challenge, not limited to individual organizations or sectors. Therefore, collective preparation and response are crucial for building resilience against cyber threats. She called for more exercises within and across sectors to prepare teams for real-world events.</p><p>Lastly, the episode discussed the ethical dilemma of paying ransoms. Brian Honan strongly advocated against paying the ransom, citing the lack of guarantee that systems would be restored securely and the need to rebuild trust in affected devices. Instead, the focus should be on robust preparation and managing supply chain security. In conclusion, this episode underscored the pervasive threat of cyber-attacks on critical infrastructure and the multifaceted approach needed to tackle these challenges.</p><p>From enhancing third-party risk management to legislative support, cross-sector collaboration, and ethical considerations, the conversation provides a comprehensive overview of the current state of cybersecurity in the healthcare sector. It highlights the urgent need for continuous improvement and resilience to protect not only systems but ultimately, patients' lives.</p><p>Top Questions Addressed</p><ul><li>How can the impact of the ransomware attack on the NHS best be described?</li><li>How can organizations better manage third-party supply chain risk in cybersecurity?</li><li>What are the ethical considerations and implications of paying ransom in cyberattacks?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17445702" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/259f321d-5000-4008-92ed-eb4bd5fb9ade/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=259f321d-5000-4008-92ed-eb4bd5fb9ade&amp;feed=2M86zCcc"/>
      <itunes:title>Building Resilience in Healthcare Cybersecurity Following the Recent NHS Third-Party Ransomware Incident | Expert Insights from InfoSecurity Europe 2024 | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Suk Paul, Heather Lowrie, Tim Grieveson, Daniel Lattimer, Brian Honan</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:10</itunes:duration>
      <itunes:summary>In this special On Location episode, Marco Ciappelli and Sean Martin engage with industry leaders at InfoSecurity Europe in London to discuss a recent ransomware attack impacting the NHS, highlighting the far-reaching impacts on patient care and the essential strategies for managing cybersecurity in critical infrastructure. Tune in to understand how collective preparation, robust communication, and legislative measures are crucial in building resilience against such pervasive cyber threats.</itunes:summary>
      <itunes:subtitle>In this special On Location episode, Marco Ciappelli and Sean Martin engage with industry leaders at InfoSecurity Europe in London to discuss a recent ransomware attack impacting the NHS, highlighting the far-reaching impacts on patient care and the essential strategies for managing cybersecurity in critical infrastructure. Tune in to understand how collective preparation, robust communication, and legislative measures are crucial in building resilience against such pervasive cyber threats.</itunes:subtitle>
      <itunes:keywords>patient care, brian honan, heather lowrie, marco ciappelli, nhs, tim grieveson, pathology, sean martin, supply chain, response, cybersecurity, conference, legislation, resilience, cyber attack, suk paul, ransomware, podcast, emergency planning, daniel lattimer, cybersecurityconference, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f43da574-cc03-4878-b6e5-a5dee9b2af3a</guid>
      <title>Directly From The CORO Security Modular Booth: Expansion Into The European Market | A Brand Story Conversation From InfoSecurity Europe 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market.</p><p><strong>Day Three: Nonstop Conversations and Presentations</strong></p><p>From the get-go, Dror shares his enthusiasm about being part of this prestigious event for the first time. With a primary presence in the U.S., CORO is now aggressively moving into EMEA, starting right here in London. This move is in response to increasing demand from small to medium-sized enterprises (SMEs) in Europe who need robust cybersecurity solutions.</p><p><strong>Addressing the Security Needs of SMEs</strong></p><p>Sean recalls the comprehensive capabilities of CORO discussed in previous episodes. CORO provides multiple layers of security tailored to an organization’s specific needs, such as regulatory requirements, budget, and staffing capabilities. Sean encourages everyone to revisit those insightful seven-minute chats from RSA Conference to get an in-depth view.</p><p>Dror emphasizes that CORO is unique in targeting the mid-market from the ground up, unlike other companies that retrofit enterprise solutions to fit smaller businesses. With a focus on simplicity and powerful protection, CORO ensures that its solutions are manageable even for lean IT teams.</p><p><strong>Navigating the Complexities of Europe</strong></p><p>One of the significant discussions revolves around the differences between the U.S. and European markets. While Sean and Dror acknowledge the similar types of cyber threats faced globally, operational nuances like data residency and privacy regulations differ widely across Europe. CORO has established a data center in Germany to comply with local data residency requirements, ensuring that email and file inspections stay within the EU boundaries.</p><p><strong>Real-World Applications and Challenges</strong></p><p>Sean drives the conversation into the specific challenges CORO has faced and the different attack scenarios in Europe compared to the U.S. Dror mentions that while SME awareness of being targets has been prevalent in the U.S. for a while, European SMEs are just beginning to realize the same. As a result, CORO is educating this market about the imminent threats and how to efficiently protect against them without becoming overwhelmed.</p><p><strong>The Importance of Affordability</strong></p><p>Dror and Sean discuss the financial challenges faced by SMEs, such as difficult decisions on whether to invest in cybersecurity or other critical needs like educational resources. Dror emphasizes that CORO has priced its suite of security solutions to remove this barrier, making comprehensive coverage affordable for even the smallest enterprises.</p><p><strong>Team and Technology: The Backbone of CORO</strong></p><p>The conversation takes a moment to appreciate CORO’s dedicated team. Sean praises the high energy and mutual support visible at CORO’s booth. Dror points out that customer reviews often highlight how easy it is to work with CORO—a testimony to the company’s dedication to protecting overlooked small and mid-sized businesses.</p><p><strong>The Future of SME Cybersecurity</strong></p><p>CORO aims to remove the guesswork ("threat roulette”) for SMEs by providing an all-encompassing platform that is accessible and easy to manage. This approach ensures that small businesses can protect themselves comprehensively without the need to prioritize between different threat vectors due to budget constraints.</p><p><strong>CORO’s Mission</strong></p><p>As the conversation winds down, Dror reiterates CORO's mission to protect SMEs globally and make cybersecurity as effortless as possible. Sean encourages attendees of Infosecurity Europe to visit CORO's dynamic and innovative booth, and for those who cannot make it, to check out CORO online. For more information, visit CORO's website at Coro.net</p><p>Thanks to everyone for joining us. Expect more exciting updates from CORO, possibly next time from Las Vegas!</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 7 Jun 2024 02:04:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://eventcoveragepodcast.com/episodes/directly-from-the-coro-security-modular-booth-expansion-into-the-european-market-a-brand-story-conversation-from-infosecurity-europe-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-tpCZ5knL</link>
      <content:encoded><![CDATA[<p>Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market.</p><p><strong>Day Three: Nonstop Conversations and Presentations</strong></p><p>From the get-go, Dror shares his enthusiasm about being part of this prestigious event for the first time. With a primary presence in the U.S., CORO is now aggressively moving into EMEA, starting right here in London. This move is in response to increasing demand from small to medium-sized enterprises (SMEs) in Europe who need robust cybersecurity solutions.</p><p><strong>Addressing the Security Needs of SMEs</strong></p><p>Sean recalls the comprehensive capabilities of CORO discussed in previous episodes. CORO provides multiple layers of security tailored to an organization’s specific needs, such as regulatory requirements, budget, and staffing capabilities. Sean encourages everyone to revisit those insightful seven-minute chats from RSA Conference to get an in-depth view.</p><p>Dror emphasizes that CORO is unique in targeting the mid-market from the ground up, unlike other companies that retrofit enterprise solutions to fit smaller businesses. With a focus on simplicity and powerful protection, CORO ensures that its solutions are manageable even for lean IT teams.</p><p><strong>Navigating the Complexities of Europe</strong></p><p>One of the significant discussions revolves around the differences between the U.S. and European markets. While Sean and Dror acknowledge the similar types of cyber threats faced globally, operational nuances like data residency and privacy regulations differ widely across Europe. CORO has established a data center in Germany to comply with local data residency requirements, ensuring that email and file inspections stay within the EU boundaries.</p><p><strong>Real-World Applications and Challenges</strong></p><p>Sean drives the conversation into the specific challenges CORO has faced and the different attack scenarios in Europe compared to the U.S. Dror mentions that while SME awareness of being targets has been prevalent in the U.S. for a while, European SMEs are just beginning to realize the same. As a result, CORO is educating this market about the imminent threats and how to efficiently protect against them without becoming overwhelmed.</p><p><strong>The Importance of Affordability</strong></p><p>Dror and Sean discuss the financial challenges faced by SMEs, such as difficult decisions on whether to invest in cybersecurity or other critical needs like educational resources. Dror emphasizes that CORO has priced its suite of security solutions to remove this barrier, making comprehensive coverage affordable for even the smallest enterprises.</p><p><strong>Team and Technology: The Backbone of CORO</strong></p><p>The conversation takes a moment to appreciate CORO’s dedicated team. Sean praises the high energy and mutual support visible at CORO’s booth. Dror points out that customer reviews often highlight how easy it is to work with CORO—a testimony to the company’s dedication to protecting overlooked small and mid-sized businesses.</p><p><strong>The Future of SME Cybersecurity</strong></p><p>CORO aims to remove the guesswork ("threat roulette”) for SMEs by providing an all-encompassing platform that is accessible and easy to manage. This approach ensures that small businesses can protect themselves comprehensively without the need to prioritize between different threat vectors due to budget constraints.</p><p><strong>CORO’s Mission</strong></p><p>As the conversation winds down, Dror reiterates CORO's mission to protect SMEs globally and make cybersecurity as effortless as possible. Sean encourages attendees of Infosecurity Europe to visit CORO's dynamic and innovative booth, and for those who cannot make it, to check out CORO online. For more information, visit CORO's website at Coro.net</p><p>Thanks to everyone for joining us. Expect more exciting updates from CORO, possibly next time from Las Vegas!</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19983234" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d96a655b-1586-434a-a005-f4306688f2aa/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d96a655b-1586-434a-a005-f4306688f2aa&amp;feed=2M86zCcc"/>
      <itunes:title>Directly From The CORO Security Modular Booth: Expansion Into The European Market | A Brand Story Conversation From InfoSecurity Europe 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:48</itunes:duration>
      <itunes:summary>Join us as Sean Martin hosts CORO Security’s Dror Liwer live from the show floor at Infosecurity Europe 2024 in London, where they discuss CORO&apos;s mission to protect SMEs across the globe.</itunes:summary>
      <itunes:subtitle>Join us as Sean Martin hosts CORO Security’s Dror Liwer live from the show floor at Infosecurity Europe 2024 in London, where they discuss CORO&apos;s mission to protect SMEs across the globe.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, small business protection, threat landscape, sean martin, secure enterprise solutions, cybersecurity, data residency, itsp magazine, coro security, automated security, endpoint security, cybersecurity sme, cybersecurity platform, cybersecurity education, dror liwer, phishing protection, mid-market protection, cloud security, privacy regulations, infosecurity europe 2024, brand story, coro, ransomware protection, emea market</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8b94cd4d-03f9-4ee4-ba75-bbf005c6887f</guid>
      <title>Meet Phoenix Security | A Brand Story Conversation From Infosecurity Europe 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix Security, to discuss the company’s journey, achievements, and unique value propositions, highlighting their significant impact within the cybersecurity community.</p><p><strong>Setting the Stage</strong></p><p>The bustling environment of Infosecurity Europe 2024 serves as the backdrop for an engaging conversation about the latest cybersecurity trends. Martin and Cipollone delve into Phoenix Security’s origins as an internal project at HSBC, aimed at addressing engineer burnout by improving communication and prioritization in vulnerability management.</p><p><strong>Phoenix Security’s Journey and Vision</strong></p><p>Cipollone explains how Phoenix Security was created to help engineers avoid burnout, originally focusing on solving communication and prioritization challenges in vulnerability management. This initiative quickly evolved into a comprehensive solution that bridges the gap between security and engineering teams by providing actionable risk assessments and automating decision-making processes.</p><p><strong>Innovative Solutions for Modern Cybersecurity Challenges</strong></p><p>Phoenix Security stands out by offering powerful tools that streamline vulnerability management across enterprise systems. Their platform allows for better scheduling of workloads and prioritization of tasks, significantly reducing the time it takes to address vulnerabilities from hours to just minutes. This efficiency not only prevents engineer burnout but also ensures that security measures are implemented effectively.</p><p><strong>Success Stories and Client Feedback</strong></p><p>Cipollone shares success stories from clients like ClearBank, who have benefited from real-time, up-to-date asset inventory and operational insights. By using Phoenix Security, these organizations can engage in informed risk-based decision-making, enabling security teams to focus on high-impact vulnerabilities and maximize risk reduction.</p><p><strong>Expanding Reach Through Strategic Partnerships</strong></p><p>Highlighting the importance of collaboration, Cipollone mentions Phoenix Security’s recent partnership with Booncheck. This partnership integrates advanced threat intelligence into the Phoenix platform, offering clients access to a wealth of vulnerability data and enabling more effective risk management strategies.</p><p><strong>Conclusion</strong></p><p>The conversation concludes with insights into future security trends and Phoenix Security’s commitment to innovation and community-driven solutions. Cipollone emphasizes that Phoenix Security aims to simplify decision-making processes, giving engineers and security professionals more time to focus on what truly matters.</p><p>We encourage all ITSPmagazine viewers and listeners to connect with the Phoenix team, download their new book, and stay tuned for more updates from Infosecurity Europe 2024.</p><p>Learn more about Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 6 Jun 2024 21:01:21 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone)</author>
      <link>https://eventcoveragepodcast.com/episodes/meet-phoenix-security-a-brand-story-conversation-from-infosecurity-europe-2024-a-phoenix-security-story-with-francesco-cipollone-on-location-coverage-with-sean-martin-and-marco-ciappelli-nb3Y9Mxg</link>
      <content:encoded><![CDATA[<p>In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix Security, to discuss the company’s journey, achievements, and unique value propositions, highlighting their significant impact within the cybersecurity community.</p><p><strong>Setting the Stage</strong></p><p>The bustling environment of Infosecurity Europe 2024 serves as the backdrop for an engaging conversation about the latest cybersecurity trends. Martin and Cipollone delve into Phoenix Security’s origins as an internal project at HSBC, aimed at addressing engineer burnout by improving communication and prioritization in vulnerability management.</p><p><strong>Phoenix Security’s Journey and Vision</strong></p><p>Cipollone explains how Phoenix Security was created to help engineers avoid burnout, originally focusing on solving communication and prioritization challenges in vulnerability management. This initiative quickly evolved into a comprehensive solution that bridges the gap between security and engineering teams by providing actionable risk assessments and automating decision-making processes.</p><p><strong>Innovative Solutions for Modern Cybersecurity Challenges</strong></p><p>Phoenix Security stands out by offering powerful tools that streamline vulnerability management across enterprise systems. Their platform allows for better scheduling of workloads and prioritization of tasks, significantly reducing the time it takes to address vulnerabilities from hours to just minutes. This efficiency not only prevents engineer burnout but also ensures that security measures are implemented effectively.</p><p><strong>Success Stories and Client Feedback</strong></p><p>Cipollone shares success stories from clients like ClearBank, who have benefited from real-time, up-to-date asset inventory and operational insights. By using Phoenix Security, these organizations can engage in informed risk-based decision-making, enabling security teams to focus on high-impact vulnerabilities and maximize risk reduction.</p><p><strong>Expanding Reach Through Strategic Partnerships</strong></p><p>Highlighting the importance of collaboration, Cipollone mentions Phoenix Security’s recent partnership with Booncheck. This partnership integrates advanced threat intelligence into the Phoenix platform, offering clients access to a wealth of vulnerability data and enabling more effective risk management strategies.</p><p><strong>Conclusion</strong></p><p>The conversation concludes with insights into future security trends and Phoenix Security’s commitment to innovation and community-driven solutions. Cipollone emphasizes that Phoenix Security aims to simplify decision-making processes, giving engineers and security professionals more time to focus on what truly matters.</p><p>We encourage all ITSPmagazine viewers and listeners to connect with the Phoenix team, download their new book, and stay tuned for more updates from Infosecurity Europe 2024.</p><p>Learn more about Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20156617" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f3c24b08-79e5-4858-ae1a-b5e6b6ca1a9e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f3c24b08-79e5-4858-ae1a-b5e6b6ca1a9e&amp;feed=2M86zCcc"/>
      <itunes:title>Meet Phoenix Security | A Brand Story Conversation From Infosecurity Europe 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:59</itunes:duration>
      <itunes:summary>Join Sean Martin and Francesco Cipollone for an insightful discussion on Phoenix Security, live from Infosecurity Europe 2024 in London.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Francesco Cipollone for an insightful discussion on Phoenix Security, live from Infosecurity Europe 2024 in London.</itunes:subtitle>
      <itunes:keywords>booncheck partnership, enterprise security solutions, cyber threat intelligence, marco ciappelli, asset inventory, sean martin, engineering prioritization, cybersecurity, cybersecurity innovations, application security, clearbank case study, risk management, engineering burnout, francesco cipollone, risk reduction, infosecurity europe 2024, community-driven security, vulnerability management, brand story, infrastructure security, automated risk formula, phoenix security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">40b3c2b6-070c-49a3-b8f0-92aa2bfd2440</guid>
      <title>Randomly Rambling About Random Things, Including the Randomness of Randomware (Ransomware) | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this recap episode, Sean Martin and Marco Ciappelli think back on their experience thus far during their time at InfoSecurity in London. The conversation touches on several key areas including physical versus digital security, the allocation of budgets for cybersecurity measures, and broader societal implications of technology. Let's break down the significant points discussed by these industry professionals.</p><p>Sean Martin, starting the discussion, emphasizes the innovative ways the city of London integrates physical security with digital tools. He observes hidden security features, such as street lamps converted into cameras, showcasing a blend of centuries-old infrastructure with modern technology. This seamless integration represents a significant investment aimed at enhancing urban security while maintaining the city's historical aesthetic.</p><p>The discussion soon transitions into the critical topic of cybersecurity budgeting. Marco Ciappelli points out the complexities organizations face when deciding where and how much to invest in cybersecurity. John Davies’ keynote panel discussion he had with Sean and Marco on ransomware raised many ethical questions. Should one pay a ransom when lives are at stake? This sparks a nuanced debate among the participants.</p><p>Sean Martin recaps some sobering conversations about the NHS breach, which highlights the real-world consequences of insufficient cybersecurity investments. He ponders whether current spending is enough and asks how organizations can effectively allocate resources to mitigate risks. Another significant part of the conversation revolves around the societal impact of technology. Brian Honan's insights underscore the dual nature of technology as a tool that can be used for both good and bad purposes. This dichotomy is a recurrent theme that questions the ethical implications of technological advances in our society.</p><p>While cybersecurity aims to protect, there are those who exploit it for nefarious purposes. Throughout the episode, both hosts reflect on the global perspectives of these issues. They note a cultural contrast in how different countries perceive and react to cybersecurity threats.</p><p>The conversation also highlights the growing importance of cybersecurity awareness and collaboration on an international scale to effectively address these global challenges.</p><p>Concluding their dialogue, Martin and Ciappelli muse on the future of the industry. The dialogue serves not just as a recap of the information shared at the conference, but as a call to action for organizations to reassess their cybersecurity strategies. As Sean Martin aptly puts it, the industry must continually evolve to ensure that the investments in cybersecurity bring about the intended protective outcomes, thus safeguarding both data and lives in this interconnected world.</p><p>WATCH THE VIDEO: <a href="https://youtu.be/ccKG5KUdEII" target="_blank">https://youtu.be/ccKG5KUdEII</a></p><p><strong>____________________________</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 5 Jun 2024 22:35:06 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli)</author>
      <link>https://eventcoveragepodcast.com/episodes/randomly-rambling-about-random-things-including-the-randomness-of-randomware-ransomware-an-infosecurity-europe-2024-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-ky9qglG0</link>
      <content:encoded><![CDATA[<p>In this recap episode, Sean Martin and Marco Ciappelli think back on their experience thus far during their time at InfoSecurity in London. The conversation touches on several key areas including physical versus digital security, the allocation of budgets for cybersecurity measures, and broader societal implications of technology. Let's break down the significant points discussed by these industry professionals.</p><p>Sean Martin, starting the discussion, emphasizes the innovative ways the city of London integrates physical security with digital tools. He observes hidden security features, such as street lamps converted into cameras, showcasing a blend of centuries-old infrastructure with modern technology. This seamless integration represents a significant investment aimed at enhancing urban security while maintaining the city's historical aesthetic.</p><p>The discussion soon transitions into the critical topic of cybersecurity budgeting. Marco Ciappelli points out the complexities organizations face when deciding where and how much to invest in cybersecurity. John Davies’ keynote panel discussion he had with Sean and Marco on ransomware raised many ethical questions. Should one pay a ransom when lives are at stake? This sparks a nuanced debate among the participants.</p><p>Sean Martin recaps some sobering conversations about the NHS breach, which highlights the real-world consequences of insufficient cybersecurity investments. He ponders whether current spending is enough and asks how organizations can effectively allocate resources to mitigate risks. Another significant part of the conversation revolves around the societal impact of technology. Brian Honan's insights underscore the dual nature of technology as a tool that can be used for both good and bad purposes. This dichotomy is a recurrent theme that questions the ethical implications of technological advances in our society.</p><p>While cybersecurity aims to protect, there are those who exploit it for nefarious purposes. Throughout the episode, both hosts reflect on the global perspectives of these issues. They note a cultural contrast in how different countries perceive and react to cybersecurity threats.</p><p>The conversation also highlights the growing importance of cybersecurity awareness and collaboration on an international scale to effectively address these global challenges.</p><p>Concluding their dialogue, Martin and Ciappelli muse on the future of the industry. The dialogue serves not just as a recap of the information shared at the conference, but as a call to action for organizations to reassess their cybersecurity strategies. As Sean Martin aptly puts it, the industry must continually evolve to ensure that the investments in cybersecurity bring about the intended protective outcomes, thus safeguarding both data and lives in this interconnected world.</p><p>WATCH THE VIDEO: <a href="https://youtu.be/ccKG5KUdEII" target="_blank">https://youtu.be/ccKG5KUdEII</a></p><p><strong>____________________________</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="13057558" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ec9123b0-baed-493c-a9a8-b53e311702fc/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ec9123b0-baed-493c-a9a8-b53e311702fc&amp;feed=2M86zCcc"/>
      <itunes:title>Randomly Rambling About Random Things, Including the Randomness of Randomware (Ransomware) | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:36</itunes:duration>
      <itunes:summary>Randomly Rambling About Random Things, Including the Randomness of Randomware | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:summary>
      <itunes:subtitle>Randomly Rambling About Random Things, Including the Randomness of Randomware | An Infosecurity Europe 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sean martin, cybersecurity, conference, podcast, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fb7a8dc9-ff17-4493-a049-10432a1bdeab</guid>
      <title>Maximising Your Budget Effectively in Turbulent Times – An SME Focus | An Infosecurity Europe 2024 Conversation with Don Gibson and Emma Philpott | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Don Gibson</strong>, CISO, Kinly</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/don-gibson-cyber/" target="_blank">https://www.linkedin.com/in/don-gibson-cyber/</a></p><p><strong>Emma Philpott</strong>, CEO, IASME Consortium</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/emphilpott/" target="_blank">https://www.linkedin.com/in/emphilpott/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli explore the intricacies of cybersecurity budget management and expenditure prioritization at the Infosecurity Europe event in London. The conversation kicks off with Sean and Marco discussing the challenges of balancing a minimalist approach with the need for robust security programs. The discussion swiftly transitions into budgeting strategies where the hosts are joined by guests Emma Philpott, CEO of IASME, and Don Gibson, Chief Information Security Officer (CISO) of Kinley. Emma provides insights into her role at IASME, highlighting their work on the Cyber Essentials program aimed at ensuring basic technical security controls. Don shares his experiences at Kinley, dealing with audiovisual technologies and their importance in security. The dialogue explores the difficulties organizations face, particularly around budget constraints, legacy technology, and the need for consistent investment in security measures.</p><p>A significant portion of the episode is dedicated to the challenges faced by various-sized companies, from micro-businesses to large corporations, in implementing effective cybersecurity measures. Emma stresses the importance of making security accessible to smaller entities and the efforts IASME is making to provide free guidance and support. Don emphasizes the importance of clear communication and leadership at the board level to properly budget for cybersecurity, balance between technology, and staff investment, and avoid the pitfalls of over-reliance on either.</p><p>The conversation also touches on the role of community and support networks within the cybersecurity realm. Both Don and Emma highlight the value of having trusted groups where professionals can share experiences, seek advice, and offer mental health support. They underscore how such communities foster a culture of openness and mutual assistance, which is crucial in an industry often grappling with high-pressure incidents and rapid technological changes.</p><p>The episode wraps up with a discussion on the dynamics of cybersecurity as a competitive advantage and the evolving nature of security leadership. Emma and Don explain how achieving certifications like Cyber Essentials can provide business benefits beyond compliance, such as improved insurance outcomes and differentiation in the marketplace. Don challenges CISOs to think creatively about how cybersecurity can become a revenue-generating aspect of the business, reinforcing the need for innovative and dynamic leadership in the field.</p><p>Tune in to learn more about budgeting, community support, and forward-thinking leadership in cybersecurity from the vibrant InfoSecurity Europe event.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Maximising Your Budget Effectively in Turbulent Times – An SME Focus: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219365.maximising-your-budget-effectively-in-turbulent-times-%E2%80%93-an-sme-focus.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219365.maximising-your-budget-effectively-in-turbulent-times-%E2%80%93-an-sme-focus.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 5 Jun 2024 20:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Don Gibson, Emma Philpott)</author>
      <link>https://eventcoveragepodcast.com/episodes/maximising-your-budget-effectively-in-turbulent-times-an-sme-focus-an-infosecurity-europe-2024-conversation-with-don-gibson-and-emma-philpott-on-location-coverage-with-sean-martin-and-marco-ciappelli-WGwshhhd</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Don Gibson</strong>, CISO, Kinly</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/don-gibson-cyber/" target="_blank">https://www.linkedin.com/in/don-gibson-cyber/</a></p><p><strong>Emma Philpott</strong>, CEO, IASME Consortium</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/emphilpott/" target="_blank">https://www.linkedin.com/in/emphilpott/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli explore the intricacies of cybersecurity budget management and expenditure prioritization at the Infosecurity Europe event in London. The conversation kicks off with Sean and Marco discussing the challenges of balancing a minimalist approach with the need for robust security programs. The discussion swiftly transitions into budgeting strategies where the hosts are joined by guests Emma Philpott, CEO of IASME, and Don Gibson, Chief Information Security Officer (CISO) of Kinley. Emma provides insights into her role at IASME, highlighting their work on the Cyber Essentials program aimed at ensuring basic technical security controls. Don shares his experiences at Kinley, dealing with audiovisual technologies and their importance in security. The dialogue explores the difficulties organizations face, particularly around budget constraints, legacy technology, and the need for consistent investment in security measures.</p><p>A significant portion of the episode is dedicated to the challenges faced by various-sized companies, from micro-businesses to large corporations, in implementing effective cybersecurity measures. Emma stresses the importance of making security accessible to smaller entities and the efforts IASME is making to provide free guidance and support. Don emphasizes the importance of clear communication and leadership at the board level to properly budget for cybersecurity, balance between technology, and staff investment, and avoid the pitfalls of over-reliance on either.</p><p>The conversation also touches on the role of community and support networks within the cybersecurity realm. Both Don and Emma highlight the value of having trusted groups where professionals can share experiences, seek advice, and offer mental health support. They underscore how such communities foster a culture of openness and mutual assistance, which is crucial in an industry often grappling with high-pressure incidents and rapid technological changes.</p><p>The episode wraps up with a discussion on the dynamics of cybersecurity as a competitive advantage and the evolving nature of security leadership. Emma and Don explain how achieving certifications like Cyber Essentials can provide business benefits beyond compliance, such as improved insurance outcomes and differentiation in the marketplace. Don challenges CISOs to think creatively about how cybersecurity can become a revenue-generating aspect of the business, reinforcing the need for innovative and dynamic leadership in the field.</p><p>Tune in to learn more about budgeting, community support, and forward-thinking leadership in cybersecurity from the vibrant InfoSecurity Europe event.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Maximising Your Budget Effectively in Turbulent Times – An SME Focus: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219365.maximising-your-budget-effectively-in-turbulent-times-%E2%80%93-an-sme-focus.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219365.maximising-your-budget-effectively-in-turbulent-times-%E2%80%93-an-sme-focus.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29380990" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a47ec477-b20c-456f-b84f-c2e13682fd25/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a47ec477-b20c-456f-b84f-c2e13682fd25&amp;feed=2M86zCcc"/>
      <itunes:title>Maximising Your Budget Effectively in Turbulent Times – An SME Focus | An Infosecurity Europe 2024 Conversation with Don Gibson and Emma Philpott | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Don Gibson, Emma Philpott</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:36</itunes:duration>
      <itunes:summary>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli, along with guests Emma Philpott and Don Gibson, dive into the complexities of cybersecurity budgeting, prioritization, and the importance of community support. Tune in to discover how security leaders navigate financial constraints, legacy technologies, and innovative strategies to make cybersecurity a competitive advantage designed to drive business outcomes.</itunes:summary>
      <itunes:subtitle>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli, along with guests Emma Philpott and Don Gibson, dive into the complexities of cybersecurity budgeting, prioritization, and the importance of community support. Tune in to discover how security leaders navigate financial constraints, legacy technologies, and innovative strategies to make cybersecurity a competitive advantage designed to drive business outcomes.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, budget, leadership, emma philpott, don gibson, legacy, mental health, insurance, sean martin, program, infosecurity, cybersecurity, communication, conference, innovation, podcast, certifications, investment, strategy, community, support, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fd524f1e-6cc0-4b24-a276-816e626a83d1</guid>
      <title>AI&apos;s Role in Cybersecurity and Society | An Infosecurity Europe 2024 Conversation with Ian Hill | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Ian Hill</strong>, Director of Information and Cyber Security at Upp Corporation [<a href="https://twitter.com/getonupp">@getonupp</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-hill-95123897/" target="_blank">https://www.linkedin.com/in/ian-hill-95123897/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At Infosecurity Europe 2024, conversations were electric, diving deep into the intersection of AI and cybersecurity and its profound impact on society. Industry experts Marco Ciappelli, Sean Martin, and Ian Hill explored these pivotal changes, offering sharp insights into the digital revolution.</p><p><strong>A Casual Start</strong></p><p>The event kicked off light-heartedly with Marco Ciappelli and Sean Martin, setting a relaxed, talk-show-like atmosphere. Despite minor technical hiccups, this informal start paved the way for an engaging discussion.</p><p>“We’re messing with physical technology and digital technology,” remarked Sean Martin, perfectly capturing the complex interplay between human users and their increasingly advanced tools.</p><p><strong>From Keynotes to Key Concerns</strong></p><p>Ian Hill shared his journey from Director of Information and Cybersecurity at UP Corporation, now part of Virgin Media O2, to his current advisory role. He emphasized the freedom and reduced stress of stepping back from frontline cybersecurity.</p><p>Hill’s keynote at the event centered on AI’s implications for the future of work and society, countering the exaggerated narratives often associated with AI.</p><p><strong>The Mislabeling Issue: AI vs. Automation</strong></p><p>Marco Ciappelli voiced a common frustration: the overuse of “AI” to describe mere automation. Hill stressed the need to differentiate true AI from sophisticated automation systems that lack adaptive learning capabilities.</p><p>“We need to distinguish between what is automation and what is AI. There’s a lot of automation going on at the moment,” Hill noted.</p><p><strong>Western Society’s Dependency</strong></p><p>Hill warned of AI’s subtle yet significant impact on Western societies, likening it to the industrial and agricultural revolutions but with a more profound effect due to AI’s ability to replace cognitive tasks.</p><p>“AI is different because AI is actually replacing our thinking, our creativity,” Hill cautioned, highlighting the potential for job displacement and challenges to human creativity and learning.</p><p><strong>The Drive for Profit</strong></p><p>A recurring theme was the economic drivers behind AI advancements. Hill critiqued the relentless pursuit of profit and efficiency, which risks lowering the quality of services and products in favor of mass production.</p><p>“The nature with all these technological developments, the primary driver is profit and money,” Hill asserted, reflecting on the commercialization of AI.</p><p><strong>The AI Arms Race in Cybersecurity</strong></p><p>Hill and Martin discussed the escalating AI-driven war between cybersecurity defenses and attacks. They emphasized the need for rapid, machine-learning-based responses to evolving cyber threats, as traditional human-led security operations struggle to keep up.</p><p>“You need machine learning, lightning-fast machine learning, to predict and react to events before the human even knows about it,” Hill stated, hinting at a future where automated systems dominate the cyber battlefield.</p><p><strong>The Trust Dilemma</strong></p><p>The conversation turned philosophical as the speakers pondered the reliability of AI-generated content and the impact of deep fakes and misinformation. Hill addressed the issue of AI “hallucinations”—erroneous outputs—and the dangers of blindly trusting AI.</p><p>“We’re losing a sort of grip on reality… because it’s becoming harder to distinguish between what’s real and what isn’t real,” Hill commented, expressing concerns about a future rife with misinformation.</p><p><strong>Concluding Thoughts</strong></p><p>Infosecurity Europe 2024 highlighted AI’s dual nature: its potential to revolutionize industries like healthcare and cybersecurity contrasted with its capacity to disrupt societal norms and personal authenticity.</p><p>As Hill succinctly put it, “Those that own the AI, you know, OpenAI and all their sponsors, and what influence could be exerted on AI, political or otherwise, to bias… dangerous.”</p><p>The dialogue underscored the need for evolving our understanding and ethical governance of AI to ensure these powerful tools enhance rather than undermine our societal fabric.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 5 Jun 2024 18:41:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ian Hill)</author>
      <link>https://eventcoveragepodcast.com/episodes/ais-role-in-cybersecurity-and-society-an-infosecurity-europe-2024-conversation-with-ian-hill-on-location-coverage-with-sean-martin-and-marco-ciappelli-kkzlKLMh</link>
      <content:encoded><![CDATA[<p><strong>Guest: Ian Hill</strong>, Director of Information and Cyber Security at Upp Corporation [<a href="https://twitter.com/getonupp">@getonupp</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-hill-95123897/" target="_blank">https://www.linkedin.com/in/ian-hill-95123897/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At Infosecurity Europe 2024, conversations were electric, diving deep into the intersection of AI and cybersecurity and its profound impact on society. Industry experts Marco Ciappelli, Sean Martin, and Ian Hill explored these pivotal changes, offering sharp insights into the digital revolution.</p><p><strong>A Casual Start</strong></p><p>The event kicked off light-heartedly with Marco Ciappelli and Sean Martin, setting a relaxed, talk-show-like atmosphere. Despite minor technical hiccups, this informal start paved the way for an engaging discussion.</p><p>“We’re messing with physical technology and digital technology,” remarked Sean Martin, perfectly capturing the complex interplay between human users and their increasingly advanced tools.</p><p><strong>From Keynotes to Key Concerns</strong></p><p>Ian Hill shared his journey from Director of Information and Cybersecurity at UP Corporation, now part of Virgin Media O2, to his current advisory role. He emphasized the freedom and reduced stress of stepping back from frontline cybersecurity.</p><p>Hill’s keynote at the event centered on AI’s implications for the future of work and society, countering the exaggerated narratives often associated with AI.</p><p><strong>The Mislabeling Issue: AI vs. Automation</strong></p><p>Marco Ciappelli voiced a common frustration: the overuse of “AI” to describe mere automation. Hill stressed the need to differentiate true AI from sophisticated automation systems that lack adaptive learning capabilities.</p><p>“We need to distinguish between what is automation and what is AI. There’s a lot of automation going on at the moment,” Hill noted.</p><p><strong>Western Society’s Dependency</strong></p><p>Hill warned of AI’s subtle yet significant impact on Western societies, likening it to the industrial and agricultural revolutions but with a more profound effect due to AI’s ability to replace cognitive tasks.</p><p>“AI is different because AI is actually replacing our thinking, our creativity,” Hill cautioned, highlighting the potential for job displacement and challenges to human creativity and learning.</p><p><strong>The Drive for Profit</strong></p><p>A recurring theme was the economic drivers behind AI advancements. Hill critiqued the relentless pursuit of profit and efficiency, which risks lowering the quality of services and products in favor of mass production.</p><p>“The nature with all these technological developments, the primary driver is profit and money,” Hill asserted, reflecting on the commercialization of AI.</p><p><strong>The AI Arms Race in Cybersecurity</strong></p><p>Hill and Martin discussed the escalating AI-driven war between cybersecurity defenses and attacks. They emphasized the need for rapid, machine-learning-based responses to evolving cyber threats, as traditional human-led security operations struggle to keep up.</p><p>“You need machine learning, lightning-fast machine learning, to predict and react to events before the human even knows about it,” Hill stated, hinting at a future where automated systems dominate the cyber battlefield.</p><p><strong>The Trust Dilemma</strong></p><p>The conversation turned philosophical as the speakers pondered the reliability of AI-generated content and the impact of deep fakes and misinformation. Hill addressed the issue of AI “hallucinations”—erroneous outputs—and the dangers of blindly trusting AI.</p><p>“We’re losing a sort of grip on reality… because it’s becoming harder to distinguish between what’s real and what isn’t real,” Hill commented, expressing concerns about a future rife with misinformation.</p><p><strong>Concluding Thoughts</strong></p><p>Infosecurity Europe 2024 highlighted AI’s dual nature: its potential to revolutionize industries like healthcare and cybersecurity contrasted with its capacity to disrupt societal norms and personal authenticity.</p><p>As Hill succinctly put it, “Those that own the AI, you know, OpenAI and all their sponsors, and what influence could be exerted on AI, political or otherwise, to bias… dangerous.”</p><p>The dialogue underscored the need for evolving our understanding and ethical governance of AI to ensure these powerful tools enhance rather than undermine our societal fabric.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30850141" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f80fd943-d786-41cd-9399-2b6601478471/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f80fd943-d786-41cd-9399-2b6601478471&amp;feed=2M86zCcc"/>
      <itunes:title>AI&apos;s Role in Cybersecurity and Society | An Infosecurity Europe 2024 Conversation with Ian Hill | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ian Hill</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:08</itunes:duration>
      <itunes:summary>Explore the transformative impact of AI on cybersecurity and society through an in-depth conversation with Ian Hill at Infosecurity Europe 2024. </itunes:summary>
      <itunes:subtitle>Explore the transformative impact of AI on cybersecurity and society through an in-depth conversation with Ian Hill at Infosecurity Europe 2024. </itunes:subtitle>
      <itunes:keywords>misinformation, marco ciappelli, artificial intelligence, sean martin, ai advancements, cybersecurity, conference, data security, cyber insurance, technology conference, ian hill, automation vs ai, future of ai, deep fakes, ransomware, podcast, ai ethics, infosecurity europe 2024, cyber security, machine learning, ai in cybersecurity, ai in agriculture, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">41b056bc-10ff-4122-912a-175b316be768</guid>
      <title>The Latest Insights in Cybersecurity Resilience and The Ongoing Battle Against DDoS Attacks | A Brand Story Conversation From Infosecurity Europe 2024 | An Akamai Story with Richard Meeus | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distributed denial of service (DDoS) attacks.</p><p><strong>The High Energy at Infosecurity Europe 2024</strong></p><p>Sean Martin kicks off the conversation by highlighting the vibrant atmosphere at Infosecurity Europe. With a bustling crowd and high energy, it's the perfect setting to look and discuss pressing cybersecurity topics. Richard Meeus appreciates the opportunity to be part of this lively event and shares his excitement for the discussions ahead.</p><p><strong>The Importance of Resilience</strong></p><p>In recent months, Sean has noticed a growing emphasis on the concept of resilience in cybersecurity conversations. Notably, both Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) are prioritizing resilience to safeguard their organizations. Richard shares his perspective, emphasizing the critical importance of resilience, especially in Europe. He points out that new legislations like NIST 2 and DORA are driving organizations to focus on maintaining the availability of their systems.</p><p><strong>The Rise in DDoS Attacks</strong></p><p>Transitioning to the main topic, Sean and Richard discuss the alarming increase in DDoS attacks observed in EMEA (Europe, the Middle East, and Africa). Over the past few years, there has been a significant surge in such attacks, with notable activity driven by hacktivists rather than traditional criminal actors. Richard explains that hacktivists use DDoS attacks to make a statement, often targeting high-profile organizations to maximize their impact.</p><p><strong>The Role of Akamai in Protecting Against DDoS</strong></p><p>Richard explains Akamai's pivotal role in defending against DDoS attacks. He highlights Akamai's extensive cloud protection service, boasting a global network with 2,400 points of presence (PoPs). This vast infrastructure allows Akamai to protect some of the world's largest and most prominent brands.</p><p>Richard explains the importance of shifting the burden of DDoS defense to the cloud to handle the massive attack traffic. Akamai's scrubbing centers, strategically located worldwide, meticulously clean the incoming traffic, ensuring only legitimate requests reach the client's systems.</p><p><strong>Evolution of DDoS Attacks</strong></p><p>Sean invites Richard to provide an overview of how DDoS attacks have evolved over the years. While some traditional tactics like sin floods remain prevalent, there has been a resurgence of older techniques like water torture attacks targeting DNS. Richard emphasizes that organizations must protect their entire infrastructure, including APIs, which are increasingly becoming the target of such attacks.</p><p><strong>The Financial Sector: A Prime Target</strong></p><p>The financial sector is frequently targeted by DDoS attacks, according to Richard. He stresses that the trust customers place in financial institutions is heavily reliant on the availability of their digital services. Any disruption can erode this trust and have a significant material impact on the organization's reputation and customer confidence.</p><p><strong>Comprehensive Protection Strategy</strong></p><p>Richard underscores the importance of a comprehensive protection strategy for organizations facing the threat of DDoS attacks. By leveraging Akamai's global network and sophisticated scrubbing techniques, organizations can effectively mitigate the impact of these attacks. The combination of automated defenses and skilled SOC teams ensures real-time protection and rapid response to evolving threats.</p><p>In this conversation, Sean and Richard reiterate the significance of maintaining trust and resilience in the face of growing cyber threats. With the right strategies, partnerships, and technologies, organizations can safeguard their digital presence and continue to deliver reliable services to their customers.</p><p>For more in-depth insights, be sure to check out Akamai's latest report and explore their extensive back catalog of valuable cybersecurity resources</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Richard Meeus</strong>, Director, Security Technology and Strategy, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/richard-meeus/">https://www.linkedin.com/in/richard-meeus/</a></p><p><strong>Resources</strong></p><p>Fighting the Heat: EMEA’s Rising DDoS Threats: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Jun 2024 22:32:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Richard Meeus)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-latest-insights-in-cybersecurity-resilience-and-the-ongoing-battle-against-ddos-attacks-a-brand-story-conversation-from-infosecurity-europe-2024-an-akamai-story-with-richard-meeus-on-location-coverage-with-sean-martin-and-marco-ciappelli-9KA7ocuy</link>
      <content:encoded><![CDATA[<p>Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distributed denial of service (DDoS) attacks.</p><p><strong>The High Energy at Infosecurity Europe 2024</strong></p><p>Sean Martin kicks off the conversation by highlighting the vibrant atmosphere at Infosecurity Europe. With a bustling crowd and high energy, it's the perfect setting to look and discuss pressing cybersecurity topics. Richard Meeus appreciates the opportunity to be part of this lively event and shares his excitement for the discussions ahead.</p><p><strong>The Importance of Resilience</strong></p><p>In recent months, Sean has noticed a growing emphasis on the concept of resilience in cybersecurity conversations. Notably, both Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) are prioritizing resilience to safeguard their organizations. Richard shares his perspective, emphasizing the critical importance of resilience, especially in Europe. He points out that new legislations like NIST 2 and DORA are driving organizations to focus on maintaining the availability of their systems.</p><p><strong>The Rise in DDoS Attacks</strong></p><p>Transitioning to the main topic, Sean and Richard discuss the alarming increase in DDoS attacks observed in EMEA (Europe, the Middle East, and Africa). Over the past few years, there has been a significant surge in such attacks, with notable activity driven by hacktivists rather than traditional criminal actors. Richard explains that hacktivists use DDoS attacks to make a statement, often targeting high-profile organizations to maximize their impact.</p><p><strong>The Role of Akamai in Protecting Against DDoS</strong></p><p>Richard explains Akamai's pivotal role in defending against DDoS attacks. He highlights Akamai's extensive cloud protection service, boasting a global network with 2,400 points of presence (PoPs). This vast infrastructure allows Akamai to protect some of the world's largest and most prominent brands.</p><p>Richard explains the importance of shifting the burden of DDoS defense to the cloud to handle the massive attack traffic. Akamai's scrubbing centers, strategically located worldwide, meticulously clean the incoming traffic, ensuring only legitimate requests reach the client's systems.</p><p><strong>Evolution of DDoS Attacks</strong></p><p>Sean invites Richard to provide an overview of how DDoS attacks have evolved over the years. While some traditional tactics like sin floods remain prevalent, there has been a resurgence of older techniques like water torture attacks targeting DNS. Richard emphasizes that organizations must protect their entire infrastructure, including APIs, which are increasingly becoming the target of such attacks.</p><p><strong>The Financial Sector: A Prime Target</strong></p><p>The financial sector is frequently targeted by DDoS attacks, according to Richard. He stresses that the trust customers place in financial institutions is heavily reliant on the availability of their digital services. Any disruption can erode this trust and have a significant material impact on the organization's reputation and customer confidence.</p><p><strong>Comprehensive Protection Strategy</strong></p><p>Richard underscores the importance of a comprehensive protection strategy for organizations facing the threat of DDoS attacks. By leveraging Akamai's global network and sophisticated scrubbing techniques, organizations can effectively mitigate the impact of these attacks. The combination of automated defenses and skilled SOC teams ensures real-time protection and rapid response to evolving threats.</p><p>In this conversation, Sean and Richard reiterate the significance of maintaining trust and resilience in the face of growing cyber threats. With the right strategies, partnerships, and technologies, organizations can safeguard their digital presence and continue to deliver reliable services to their customers.</p><p>For more in-depth insights, be sure to check out Akamai's latest report and explore their extensive back catalog of valuable cybersecurity resources</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Richard Meeus</strong>, Director, Security Technology and Strategy, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/richard-meeus/">https://www.linkedin.com/in/richard-meeus/</a></p><p><strong>Resources</strong></p><p>Fighting the Heat: EMEA’s Rising DDoS Threats: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23967567" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1ea14dba-22d7-47a4-82e6-e1722b4a230d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1ea14dba-22d7-47a4-82e6-e1722b4a230d&amp;feed=2M86zCcc"/>
      <itunes:title>The Latest Insights in Cybersecurity Resilience and The Ongoing Battle Against DDoS Attacks | A Brand Story Conversation From Infosecurity Europe 2024 | An Akamai Story with Richard Meeus | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Richard Meeus</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:57</itunes:duration>
      <itunes:summary>Join Sean Martin as he chats with Richard Meeus from Akamai at Infosecurity Europe in London, exploring the latest insights in cybersecurity resilience and the ongoing battle against DDoS attacks.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he chats with Richard Meeus from Akamai at Infosecurity Europe in London, exploring the latest insights in cybersecurity resilience and the ongoing battle against DDoS attacks.</itunes:subtitle>
      <itunes:keywords>hacktivists, evolving cyber threats, marco ciappelli, marco ciappelli, infosecurity europe, dns security, sean martin, sean martin, distributed denial of service, real-time threat detection, api security, akamai, cybersecurity, dora legislation, nist 2, financial sector cybersecurity, cloud protection, akamai scrubbing centers, cyber resilience, resilience in cybersecurity, ddos attacks, trust in digital services, richard meeus, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">902b0c1f-6506-4d47-8272-5dc935e002ad</guid>
      <title>The Evolution of the CISO in Digital Enterprise | An Infosecurity Europe 2024 Conversation with Mun Valiji | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Mun Valiji</strong>, CISO, Trainline</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/munawar-v-b636802/">https://www.linkedin.com/in/munawar-v-b636802/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this engaging episode of the "On Location with Sean and Marco Podcast," Sean Martin flies solo to dive into the upcoming Infosecurity London event, focusing on a series of critical topics in the cybersecurity landscape. While Marco is notably absent, Sean hosts an insightful conversation with Mun Valiji, the outgoing CISO at Trainline.</p><p>The episode opens with Sean introducing the main topics of the discussion, which include the evolution of the Chief Information Security Officer (CISO) role, as well as the current state and future of Managed Security Service Providers (MSSPs). Mun contributes a detailed overview of his role at Trainline, highlighting his extensive experience spanning over 20 years and emphasizing the importance of blending human and technical elements in cybersecurity.</p><p>Sean and Mun discuss the main objective of Mun’s keynote session, "The Evolution of the CISO and the Digital Enterprise," scheduled for Thursday, June 6th. Mun passionately describes the challenges CISOs face today, including regulatory requirements, commercial agility, and the necessity of embedding security by design. He underscores the evolving responsibilities CISOs hold, particularly in fostering a security-conscious culture within fast-paced, high-growth organizations.</p><p>The conversation then transitions to the MSSP landscape, where Mun highlights the hybrid model's role in modern security strategies. Scheduled for Tuesday, June 4th, Mun’s panel session on MSSP competitiveness explores how organizations can effectively leverage MSSPs to handle routine security tasks, allowing internal teams to focus on strategic aspects such as secure-by-design principles.</p><p>Mun stresses the importance of community and collaboration, shedding light on how peer-to-peer and cross-industry interactions enhance security practices. He also touches on the impact of advanced technologies like AI and natural language processing in shaping future security frameworks. Listeners are encouraged to join Mun and other industry leaders at InfoSecurity London, where they will share deeper insights and practical strategies. The episode wraps up with Sean expressing enthusiasm for the event and looking forward to further discussions and engagements.</p><p>This episode compellingly explores strategic innovations and practical challenges in cybersecurity, making it a must-listen for professionals eager to stay ahead in the ever-evolving digital security landscape.</p><p>Top Questions Addressed</p><ul><li>How can organizations leverage MSSPs to stay competitive in an evolving cybersecurity landscape?</li><li>What role does community and collaboration play in addressing the evolving challenges in cybersecurity?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Evolution of the CISO in Digital Enterprise: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219371.the-evolution-of-the-ciso-in-digital-enterprise.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219371.the-evolution-of-the-ciso-in-digital-enterprise.html</a></p><p>Staying Competitive as an MSSPs In an Evolving Cybersecurity Landscape: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219851.staying-competitive-as-an-mssps-in-an-evolving-cybersecurity-landscape.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219851.staying-competitive-as-an-mssps-in-an-evolving-cybersecurity-landscape.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 31 May 2024 00:39:27 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mun Valiji)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-evolution-of-the-ciso-in-digital-enterprise-an-infosecurity-europe-2024-conversation-with-mun-valiji-on-location-coverage-with-sean-martin-and-marco-ciappelli-luSzpdTm</link>
      <content:encoded><![CDATA[<p><strong>Guest: Mun Valiji</strong>, CISO, Trainline</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/munawar-v-b636802/">https://www.linkedin.com/in/munawar-v-b636802/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this engaging episode of the "On Location with Sean and Marco Podcast," Sean Martin flies solo to dive into the upcoming Infosecurity London event, focusing on a series of critical topics in the cybersecurity landscape. While Marco is notably absent, Sean hosts an insightful conversation with Mun Valiji, the outgoing CISO at Trainline.</p><p>The episode opens with Sean introducing the main topics of the discussion, which include the evolution of the Chief Information Security Officer (CISO) role, as well as the current state and future of Managed Security Service Providers (MSSPs). Mun contributes a detailed overview of his role at Trainline, highlighting his extensive experience spanning over 20 years and emphasizing the importance of blending human and technical elements in cybersecurity.</p><p>Sean and Mun discuss the main objective of Mun’s keynote session, "The Evolution of the CISO and the Digital Enterprise," scheduled for Thursday, June 6th. Mun passionately describes the challenges CISOs face today, including regulatory requirements, commercial agility, and the necessity of embedding security by design. He underscores the evolving responsibilities CISOs hold, particularly in fostering a security-conscious culture within fast-paced, high-growth organizations.</p><p>The conversation then transitions to the MSSP landscape, where Mun highlights the hybrid model's role in modern security strategies. Scheduled for Tuesday, June 4th, Mun’s panel session on MSSP competitiveness explores how organizations can effectively leverage MSSPs to handle routine security tasks, allowing internal teams to focus on strategic aspects such as secure-by-design principles.</p><p>Mun stresses the importance of community and collaboration, shedding light on how peer-to-peer and cross-industry interactions enhance security practices. He also touches on the impact of advanced technologies like AI and natural language processing in shaping future security frameworks. Listeners are encouraged to join Mun and other industry leaders at InfoSecurity London, where they will share deeper insights and practical strategies. The episode wraps up with Sean expressing enthusiasm for the event and looking forward to further discussions and engagements.</p><p>This episode compellingly explores strategic innovations and practical challenges in cybersecurity, making it a must-listen for professionals eager to stay ahead in the ever-evolving digital security landscape.</p><p>Top Questions Addressed</p><ul><li>How can organizations leverage MSSPs to stay competitive in an evolving cybersecurity landscape?</li><li>What role does community and collaboration play in addressing the evolving challenges in cybersecurity?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Evolution of the CISO in Digital Enterprise: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219371.the-evolution-of-the-ciso-in-digital-enterprise.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219371.the-evolution-of-the-ciso-in-digital-enterprise.html</a></p><p>Staying Competitive as an MSSPs In an Evolving Cybersecurity Landscape: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219851.staying-competitive-as-an-mssps-in-an-evolving-cybersecurity-landscape.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219851.staying-competitive-as-an-mssps-in-an-evolving-cybersecurity-landscape.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25282462" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/a32fb4ec-2384-47c7-8166-0166bc0cac1e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=a32fb4ec-2384-47c7-8166-0166bc0cac1e&amp;feed=2M86zCcc"/>
      <itunes:title>The Evolution of the CISO in Digital Enterprise | An Infosecurity Europe 2024 Conversation with Mun Valiji | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mun Valiji</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:20</itunes:duration>
      <itunes:summary>Join Sean Martin and guest Mun Valiji, CISO at Trainline, as they explore the evolving role of CISOs and the innovative future of Managed Security Service Providers ahead of Infosecurity London. Discover how cybersecurity leaders are embedding security by design and fostering community collaboration to meet today&apos;s fast-paced digital challenges.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and guest Mun Valiji, CISO at Trainline, as they explore the evolving role of CISOs and the innovative future of Managed Security Service Providers ahead of Infosecurity London. Discover how cybersecurity leaders are embedding security by design and fostering community collaboration to meet today&apos;s fast-paced digital challenges.</itunes:subtitle>
      <itunes:keywords>digital, collaboration, technology, marco ciappelli, ciso, sean martin, trainline, infosecurity, cybersecurity, conference, enterprise, mun valiji, mun valiji, london, podcast, regulation, ai, community, cybersecurityconference, keynote, mssp</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">52f8de07-b18a-49ae-a405-7dcf2fb7fef2</guid>
      <title>Ransomware - Time to Decide - Will You or Won&apos;t You Pay? | An Infosecurity Europe 2024 Conversation with Jon Davies | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jon Davies</strong>, Senior Director - Cyber Defence, News Corp</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drjondavies/" target="_blank">https://www.linkedin.com/in/drjondavies/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this engaging episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli dive into the imminent Infosecurity Europe event with special guest Jon Davies, a Senior Director at NewsCorp. The conversation opens with Sean and Marco expressing their excitement about the event, especially focusing on Jon Davies' upcoming panel discussion on the controversial topic of ransomware payments.</p><p>Jon highlights the diverse perspectives that will be represented on his panel, including law enforcement, insurance sectors, and end consumers. This diversity aims to illuminate the complex landscape of ransomware and the regulations surrounding it. Jon explains how recent guidance from UK government bodies is prompting debate about whether ransomware payments should be made illegal, and the implications this could have on businesses and society at large.</p><p>The dialogue shifts towards the impact of ransomware on different sectors, particularly critical infrastructure and healthcare. Sean raises the ethical dilemma of whether companies responsible for essential services should pay ransoms to ensure continuity and safety, also touching on the broader societal implications and fiduciary responsibilities of publicly traded companies.</p><p>Jon shares an interesting anecdote about a unique ransomware tabletop activity where he collaborated with hostage negotiators to better understand how to navigate ransomware demands. This leads to an intriguing discussion about the human element in cyber negotiations and the potential benefits of leveraging negotiation tactics traditionally used in hostage situations.</p><p>Marco and Sean further explore the necessity of having a strategic response plan in place for ransomware attacks, emphasizing the stark contrast between the resources available to large corporations versus small businesses. Jon underscores the importance of having a playbook and a coordinated effort to report and manage cyber incidents effectively.</p><p>The conversation also touches on the role of insurance policies in cyber warfare, potential regulatory changes, and the need for a collective effort to combat ransomware. Jon argues for a balanced approach that includes technological investment, regulatory measures, and smart strategic planning.</p><p>As the episode wraps up, Sean and Marco express their eagerness to attend the panel and encourage listeners to stay tuned for further coverage of Infosecurity Europe. This episode offers a comprehensive look at the multifaceted issue of ransomware, providing valuable insights for businesses of all sizes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 29 May 2024 16:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Davies)</author>
      <link>https://eventcoveragepodcast.com/episodes/ransomware-time-to-decide-will-you-or-wont-you-pay-an-infosecurity-europe-2024-conversation-with-jon-davies-on-location-coverage-with-sean-martin-and-marco-ciappelli-hiEicPOb</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jon Davies</strong>, Senior Director - Cyber Defence, News Corp</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drjondavies/" target="_blank">https://www.linkedin.com/in/drjondavies/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this engaging episode of the On Location with Sean and Marco Podcast, hosts Sean Martin and Marco Ciappelli dive into the imminent Infosecurity Europe event with special guest Jon Davies, a Senior Director at NewsCorp. The conversation opens with Sean and Marco expressing their excitement about the event, especially focusing on Jon Davies' upcoming panel discussion on the controversial topic of ransomware payments.</p><p>Jon highlights the diverse perspectives that will be represented on his panel, including law enforcement, insurance sectors, and end consumers. This diversity aims to illuminate the complex landscape of ransomware and the regulations surrounding it. Jon explains how recent guidance from UK government bodies is prompting debate about whether ransomware payments should be made illegal, and the implications this could have on businesses and society at large.</p><p>The dialogue shifts towards the impact of ransomware on different sectors, particularly critical infrastructure and healthcare. Sean raises the ethical dilemma of whether companies responsible for essential services should pay ransoms to ensure continuity and safety, also touching on the broader societal implications and fiduciary responsibilities of publicly traded companies.</p><p>Jon shares an interesting anecdote about a unique ransomware tabletop activity where he collaborated with hostage negotiators to better understand how to navigate ransomware demands. This leads to an intriguing discussion about the human element in cyber negotiations and the potential benefits of leveraging negotiation tactics traditionally used in hostage situations.</p><p>Marco and Sean further explore the necessity of having a strategic response plan in place for ransomware attacks, emphasizing the stark contrast between the resources available to large corporations versus small businesses. Jon underscores the importance of having a playbook and a coordinated effort to report and manage cyber incidents effectively.</p><p>The conversation also touches on the role of insurance policies in cyber warfare, potential regulatory changes, and the need for a collective effort to combat ransomware. Jon argues for a balanced approach that includes technological investment, regulatory measures, and smart strategic planning.</p><p>As the episode wraps up, Sean and Marco express their eagerness to attend the panel and encourage listeners to stay tuned for further coverage of Infosecurity Europe. This episode offers a comprehensive look at the multifaceted issue of ransomware, providing valuable insights for businesses of all sizes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25646927" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ed111834-9c0b-44f9-88e2-6a6b915e0814/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ed111834-9c0b-44f9-88e2-6a6b915e0814&amp;feed=2M86zCcc"/>
      <itunes:title>Ransomware - Time to Decide - Will You or Won&apos;t You Pay? | An Infosecurity Europe 2024 Conversation with Jon Davies | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Davies</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:42</itunes:duration>
      <itunes:summary>Join hosts Sean Martin and Marco Ciappelli as they discuss the complexities of ransomware and their related payments with Jon Davies, Senior Director at NewsCorp, ahead of Infosecurity Europe. Explore riveting discussions on the ethical dilemmas, regulatory challenges, and strategic responses businesses must navigate to combat this ever-evolving threat.</itunes:summary>
      <itunes:subtitle>Join hosts Sean Martin and Marco Ciappelli as they discuss the complexities of ransomware and their related payments with Jon Davies, Senior Director at NewsCorp, ahead of Infosecurity Europe. Explore riveting discussions on the ethical dilemmas, regulatory challenges, and strategic responses businesses must navigate to combat this ever-evolving threat.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, ciappelli, payments, marco, insurance, sean martin, infosecurity, cybersecurity, planning, cyber, conference, vulnerabilities, organizations, critical, jon davies, sean, resilience, jon, negotiations, davies, martin, ransomware, podcast, security, regulation, government, infrastructure, cybersecurityconference, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1a1832f8-36d6-4cdc-a432-889155590ae2</guid>
      <title>Crisis Management – Responding to the Unimaginable | An Infosecurity Europe 2024 Conversation with Stuart Seymour | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Stuart Seymour</strong>, Group CISO and Chief Security Officer, Virgin Media O2</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stuart-seymour-a4b7522/" target="_blank">https://www.linkedin.com/in/stuart-seymour-a4b7522/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco, Sean Martin hosts a captivating discussion with Stuart Seymour, the Director of Security at Virgin Media 02. The episode dives into the realm of crisis management, unpacking the complexities and challenges faced by organizations in responding to unforeseen events.</p><p>Stuart Seymour shares insights into the significance of crisis management, emphasizing the need for robust planning and coordination across different functions within an organization. He dives into the essence of crises as events that significantly impact business operations and require unified strategies for effective management.</p><p>The conversation touches on the concept of resilience, highlighting the broader spectrum that encompasses business resilience, operational resilience, IT resilience, and cyber resilience. Stuart stresses the importance of viewing cybersecurity within the context of overall business resilience and the interplay between various facets of an organization.</p><p>The episode also explores the dynamics of crisis escalation, detailing the role of crisis committees in navigating challenging situations. Stuart emphasizes the principle of "prudent overreaction" in crisis management, advocating for proactive measures and coordinated responses to mitigate risks effectively.</p><p>Furthermore, the episode touches on the diversity of perspectives in crisis management, as showcased by the upcoming panel discussion featuring stakeholders from varied industries. The panel aims to provide a comprehensive understanding of crisis scenarios and valuable insights for the audience.</p><p>Overall, this episode offers a deep dive into the intricacies of crisis management, emphasizing the necessity of proactive planning, collaboration, and adaptability in navigating unforeseen challenges. The engaging dialogue between Sean Martin and Stuart Seymour sheds light on the critical role of resilience in building and sustaining organizational preparedness in the face of crises.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 27 May 2024 22:23:20 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Stuart Seymour)</author>
      <link>https://eventcoveragepodcast.com/episodes/crisis-management-responding-to-the-unimaginable-an-infosecurity-europe-2024-conversation-with-stuart-seymour-on-location-coverage-with-sean-martin-and-marco-ciappelli-IU70aY7M</link>
      <content:encoded><![CDATA[<p><strong>Guest: Stuart Seymour</strong>, Group CISO and Chief Security Officer, Virgin Media O2</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stuart-seymour-a4b7522/" target="_blank">https://www.linkedin.com/in/stuart-seymour-a4b7522/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the On Location with Sean and Marco, Sean Martin hosts a captivating discussion with Stuart Seymour, the Director of Security at Virgin Media 02. The episode dives into the realm of crisis management, unpacking the complexities and challenges faced by organizations in responding to unforeseen events.</p><p>Stuart Seymour shares insights into the significance of crisis management, emphasizing the need for robust planning and coordination across different functions within an organization. He dives into the essence of crises as events that significantly impact business operations and require unified strategies for effective management.</p><p>The conversation touches on the concept of resilience, highlighting the broader spectrum that encompasses business resilience, operational resilience, IT resilience, and cyber resilience. Stuart stresses the importance of viewing cybersecurity within the context of overall business resilience and the interplay between various facets of an organization.</p><p>The episode also explores the dynamics of crisis escalation, detailing the role of crisis committees in navigating challenging situations. Stuart emphasizes the principle of "prudent overreaction" in crisis management, advocating for proactive measures and coordinated responses to mitigate risks effectively.</p><p>Furthermore, the episode touches on the diversity of perspectives in crisis management, as showcased by the upcoming panel discussion featuring stakeholders from varied industries. The panel aims to provide a comprehensive understanding of crisis scenarios and valuable insights for the audience.</p><p>Overall, this episode offers a deep dive into the intricacies of crisis management, emphasizing the necessity of proactive planning, collaboration, and adaptability in navigating unforeseen challenges. The engaging dialogue between Sean Martin and Stuart Seymour sheds light on the critical role of resilience in building and sustaining organizational preparedness in the face of crises.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27528573" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/01d99d3e-b318-4ec7-bd77-a75766820f11/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=01d99d3e-b318-4ec7-bd77-a75766820f11&amp;feed=2M86zCcc"/>
      <itunes:title>Crisis Management – Responding to the Unimaginable | An Infosecurity Europe 2024 Conversation with Stuart Seymour | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Stuart Seymour</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:40</itunes:duration>
      <itunes:summary>Dive into the world of crisis management with Stuart Seymour, Director of Security at Virgin Media 02, as he shares invaluable insights on proactive planning and unified strategies. Join host Sean Martin in a dynamic discussion that explores the essence of resilience and the diverse perspectives shaping effective crisis response strategies.</itunes:summary>
      <itunes:subtitle>Dive into the world of crisis management with Stuart Seymour, Director of Security at Virgin Media 02, as he shares invaluable insights on proactive planning and unified strategies. Join host Sean Martin in a dynamic discussion that explores the essence of resilience and the diverse perspectives shaping effective crisis response strategies.</itunes:subtitle>
      <itunes:keywords>collaboration, panel discussion, marco ciappelli, diverse perspectives, crisis management, sean martin, unified strategies, risk mitigation, cybersecurity, organizational preparedness, conference, business resilience, proactive planning, on location, resilience, director of security, adaptability, podcast, challenges, virgin media 02, cybersecurityconference, stuart seymour, stuart seymour</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5d0cd365-2a34-4727-8c01-1531e1c7ba91</guid>
      <title>MFA, 2FA, and Passwordless Authentication — Rising to the Next Level of Protection | An Infosecurity Europe 2024 Conversation with Parul Khedwal | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Parul Khedwal</strong>, Security Operations Lead, Trainline [<a href="https://x.com/thetrainline">@thetrainline</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/parul-khedwal-51612aba/">https://www.linkedin.com/in/parul-khedwal-51612aba/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli dive into the realm of authentication methods, focusing on Multi-Factor Authentication (MFA), Two-Factor Authentication (2FA), and the emerging trend of Passwordless Authentication. The dialogue with Parul Khedwal navigates through the evolution of these security measures, emphasizing the critical shift towards passwordless solutions for heightened security in the digital landscape. By exploring the intricacies of these authentication mechanisms, the conversation sheds light on the challenges and advantages of each approach, offering valuable insights for enhancing cybersecurity strategies.</p><p>The episode serves as a platform for discussing the future of authentication technologies, highlighting the importance of robust security measures in safeguarding sensitive information from cyber threats. Through engaging conversations and nuanced perspectives, the trio unravel the complexities of modern authentication solutions, paving the way for a more secure digital environment. Join Parul on location in London to continue exploring the evolving landscape of authentication methods and learn how organizations can adapt to the changing cybersecurity landscape for optimal protection against online risks.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> MFA, 2FA, and Passwordless Authentication – Rising to the Next Level of Protection: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219373.mfa-2fa-and-passwordless-authentication-%E2%80%93-rising-to-the-next-level-of-protection.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219373.mfa-2fa-and-passwordless-authentication-%E2%80%93-rising-to-the-next-level-of-protection.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 24 May 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Parul Khedwal)</author>
      <link>https://eventcoveragepodcast.com/episodes/mfa-2fa-and-passwordless-authentication-rising-to-the-next-level-of-protection-an-infosecurity-europe-2024-conversation-with-parul-khedwal-on-location-coverage-with-sean-martin-and-marco-ciappelli-itqJrtz_</link>
      <content:encoded><![CDATA[<p><strong>Guest: Parul Khedwal</strong>, Security Operations Lead, Trainline [<a href="https://x.com/thetrainline">@thetrainline</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/parul-khedwal-51612aba/">https://www.linkedin.com/in/parul-khedwal-51612aba/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli dive into the realm of authentication methods, focusing on Multi-Factor Authentication (MFA), Two-Factor Authentication (2FA), and the emerging trend of Passwordless Authentication. The dialogue with Parul Khedwal navigates through the evolution of these security measures, emphasizing the critical shift towards passwordless solutions for heightened security in the digital landscape. By exploring the intricacies of these authentication mechanisms, the conversation sheds light on the challenges and advantages of each approach, offering valuable insights for enhancing cybersecurity strategies.</p><p>The episode serves as a platform for discussing the future of authentication technologies, highlighting the importance of robust security measures in safeguarding sensitive information from cyber threats. Through engaging conversations and nuanced perspectives, the trio unravel the complexities of modern authentication solutions, paving the way for a more secure digital environment. Join Parul on location in London to continue exploring the evolving landscape of authentication methods and learn how organizations can adapt to the changing cybersecurity landscape for optimal protection against online risks.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> MFA, 2FA, and Passwordless Authentication – Rising to the Next Level of Protection: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219373.mfa-2fa-and-passwordless-authentication-%E2%80%93-rising-to-the-next-level-of-protection.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219373.mfa-2fa-and-passwordless-authentication-%E2%80%93-rising-to-the-next-level-of-protection.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19875806" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/807e4ee8-27c9-4e55-9bd2-5233f386a486/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=807e4ee8-27c9-4e55-9bd2-5233f386a486&amp;feed=2M86zCcc"/>
      <itunes:title>MFA, 2FA, and Passwordless Authentication — Rising to the Next Level of Protection | An Infosecurity Europe 2024 Conversation with Parul Khedwal | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Parul Khedwal</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:42</itunes:duration>
      <itunes:summary>Join Sean and Marco as they connect with Parul Khedal to unravel the future of authentication with a focus on MFA, 2FA, and Passwordless solutions, offering unparalleled insights into cybersecurity strategies.</itunes:summary>
      <itunes:subtitle>Join Sean and Marco as they connect with Parul Khedal to unravel the future of authentication with a focus on MFA, 2FA, and Passwordless solutions, offering unparalleled insights into cybersecurity strategies.</itunes:subtitle>
      <itunes:keywords>mfa, digital, technology, marco ciappelli, parul khedwal, landscape, sean martin, 2fa, guests, cybersecurity, authentication, conference, on location, hosts, online, future, passwordless, episode, podcast, security, insights, strategies, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">80bb9925-3cd8-46de-b3a2-1295365b5f7e</guid>
      <title>Where are We Going and What are You Doing? Navigating Europe&apos;s Evolving Threat Ecosystem While Wading through AI Overload | An Infosecurity Europe 2024 Conversation with Topé Olufon and Madelein van der Hout | On Location Coverage</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Topé Olufon</strong>, Senior Analyst at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/topeolufon/" target="_blank">https://www.linkedin.com/in/topeolufon/</a></p><p><strong>Madelein van der Hout</strong>, Senior Analyst Security & Risk at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madelein-van-der-hout-65452025/" target="_blank">https://www.linkedin.com/in/madelein-van-der-hout-65452025/</a></p><p>On Twitter | <a href="https://x.com/HoutMadelein" target="_blank">https://x.com/HoutMadelein</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of 'On Location with Sean and Marco' features insightful discussions with host Sean Martin, Madelein van der Hout, and Topé Olufon from Forrester. The conversation covers a wide array of topics in the cybersecurity realm, ranging from predictions and future trends to the impact of AI-generated code on data breaches.</p><p>Madelein van der Hout, a senior analyst at Forrester, shares her expertise on API security, cyber consulting services, the threat landscape, and cybersecurity trends. Topé Olufon, also a senior analyst at Forrester, provides valuable insights on Zero Trust, Monitoring, Detection and Response, Digital Identity, and eSignatures, emphasizing the importance of collaboration in the digital trust domains.</p><p>Overall, the dialogue emphasizes the significance of the human element in cybersecurity, highlighting the need for behavior training and awareness to combat social engineering attacks. The pair also discuss resilience policies, aligning security strategies with business goals, and the evolving threat landscape in Europe. They also shed light on practical applications of AI in cybersecurity, emphasizing the importance of cutting through the noise to derive tangible benefits.</p><p>The episode invites listeners to engage in the evolving conversations surrounding cybersecurity in their myriad of sessions during Infosecurity Europe in London, promising a thought-provoking and informative experience for all attendees.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Wading through AI Overload – Where are We Going and What are You Doing?: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219350.wading-through-ai-overload-%E2%80%93-where-are-we-going-and-what-are-you-doing.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219350.wading-through-ai-overload-%E2%80%93-where-are-we-going-and-what-are-you-doing.html</a></p><p>Madelein's post about the session: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7194686743848124416/" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7194686743848124416/</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 23 May 2024 20:29:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Topé Olufon, Madelein van der Hout)</author>
      <link>https://eventcoveragepodcast.com/episodes/where-are-we-going-and-what-are-you-doing-navigating-europes-evolving-threat-ecosystem-while-wading-through-ai-overload-an-infosecurity-europe-2024-conversation-with-tope-olufon-and-madelein-van-der-hout-on-location-coverage-GUYnRG_0</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Topé Olufon</strong>, Senior Analyst at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/topeolufon/" target="_blank">https://www.linkedin.com/in/topeolufon/</a></p><p><strong>Madelein van der Hout</strong>, Senior Analyst Security & Risk at Forrester [<a href="https://x.com/forrester?utm_source=linkedin&utm_medium=social">@forrester</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madelein-van-der-hout-65452025/" target="_blank">https://www.linkedin.com/in/madelein-van-der-hout-65452025/</a></p><p>On Twitter | <a href="https://x.com/HoutMadelein" target="_blank">https://x.com/HoutMadelein</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of 'On Location with Sean and Marco' features insightful discussions with host Sean Martin, Madelein van der Hout, and Topé Olufon from Forrester. The conversation covers a wide array of topics in the cybersecurity realm, ranging from predictions and future trends to the impact of AI-generated code on data breaches.</p><p>Madelein van der Hout, a senior analyst at Forrester, shares her expertise on API security, cyber consulting services, the threat landscape, and cybersecurity trends. Topé Olufon, also a senior analyst at Forrester, provides valuable insights on Zero Trust, Monitoring, Detection and Response, Digital Identity, and eSignatures, emphasizing the importance of collaboration in the digital trust domains.</p><p>Overall, the dialogue emphasizes the significance of the human element in cybersecurity, highlighting the need for behavior training and awareness to combat social engineering attacks. The pair also discuss resilience policies, aligning security strategies with business goals, and the evolving threat landscape in Europe. They also shed light on practical applications of AI in cybersecurity, emphasizing the importance of cutting through the noise to derive tangible benefits.</p><p>The episode invites listeners to engage in the evolving conversations surrounding cybersecurity in their myriad of sessions during Infosecurity Europe in London, promising a thought-provoking and informative experience for all attendees.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Wading through AI Overload – Where are We Going and What are You Doing?: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219350.wading-through-ai-overload-%E2%80%93-where-are-we-going-and-what-are-you-doing.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219350.wading-through-ai-overload-%E2%80%93-where-are-we-going-and-what-are-you-doing.html</a></p><p>Madelein's post about the session: <a href="https://www.linkedin.com/feed/update/urn:li:activity:7194686743848124416/" target="_blank">https://www.linkedin.com/feed/update/urn:li:activity:7194686743848124416/</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26838519" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/47441cbb-e6c5-46fb-a036-d059a803e6c1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=47441cbb-e6c5-46fb-a036-d059a803e6c1&amp;feed=2M86zCcc"/>
      <itunes:title>Where are We Going and What are You Doing? Navigating Europe&apos;s Evolving Threat Ecosystem While Wading through AI Overload | An Infosecurity Europe 2024 Conversation with Topé Olufon and Madelein van der Hout | On Location Coverage</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Topé Olufon, Madelein van der Hout</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:57</itunes:duration>
      <itunes:summary>This episode of &apos;On Location with Sean and Marco&apos; features discussions with host Sean Martin along with Forrester analysts, Madelein van der Hout and Topé Olufon. The topics range from predictions and future trends in cybersecurity to the impact of AI-generated code on data breaches. The conversation explores the importance of human elements in cybersecurity, resilience policies, and aligning security strategies with business goals.</itunes:summary>
      <itunes:subtitle>This episode of &apos;On Location with Sean and Marco&apos; features discussions with host Sean Martin along with Forrester analysts, Madelein van der Hout and Topé Olufon. The topics range from predictions and future trends in cybersecurity to the impact of AI-generated code on data breaches. The conversation explores the importance of human elements in cybersecurity, resilience policies, and aligning security strategies with business goals.</itunes:subtitle>
      <itunes:keywords>practical applications, forrester, marco ciappelli, topé loufon, madelein van der hout, trends, human elements, business goals, evolving threats, threat landscape, data breaches, sean martin, guests, ai applications, cybersecurity, conference, predictions, topé olufon, podcast, security strategies, host, ai, resilience policies, cybersecurityconference, europe</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2765bfa1-459e-4000-b32d-e4300fdbe5c6</guid>
      <title>From Secure Foundations to Resilient Futures: The UK&apos;s Digital Security by Design Initiative | An Infosecurity Europe 2024 Conversation with Professor John Goodacre | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Professor John Goodacre</strong>, Director Digital Security by Design, University of Manchester, UKRI [<a href="https://x.com/UKRI_News">@UKRI_News</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/john-goodacre-722b59/">https://www.linkedin.com/in/john-goodacre-722b59/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the "On Location with Sean and Marco" podcast, host Sean Martin flies solo to engage in a riveting conversation with Professor John Goodacre, Director of a UK government program and a renowned figure in the tech industry. Professor Goodacre sheds light on his diverse career journey, spanning from telecoms to supercomputers, with a key focus on cyber resilience and system integrity.</p><p>Emphasizing the need for a holistic approach beyond patching vulnerabilities, Professor Goodacre discusses the inception of the digital security by design program in 2019. He delves into the program's aim to revolutionize technology foundations, collaborating with industry giants like Microsoft and Google to enhance digital infrastructures globally.</p><p>The conversation explores the significance of memory safety in software, highlighting the ongoing battle against cyber threats and the necessity for robust security measures at the hardware and software levels. Professor Goodacre's insights underscore the imperative shift towards secure by design and default practices to combat evolving cybersecurity challenges effectively.</p><p>Furthermore, the episode touches upon the collaboration between academia, businesses, and governments to implement secure frameworks and educate stakeholders on the importance of cybersecurity. Professor Goodacre advocates for a proactive approach, stressing the economic benefits and risk mitigation associated with investing in secure technologies and practices.</p><p>Listeners are left with a deepened understanding of the crucial role memory safety, compartmentalization, and secure design play in fortifying digital ecosystems against cyber threats. Professor Goodacre's illuminating discussion paves the way for a paradigm shift in cybersecurity strategies, fostering resilience and integrity in the digital landscape.</p><p>Top Questions Addressed</p><ul><li>How does the digital security by design program aim to enhance technology foundations?</li><li>Why is memory safety in software crucial for combating cyber threats effectively?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p> Smashing the Stack; All Good Things | Exploring Software Lifecycles from Secure By Design to End of Life | An RSA Conference 2024 Conversation with Allan Friedman and Bob Lord | On Location Coverage with Sean Martin and Marco Ciappelli: <a href="https://redefining-cybersecurity.simplecast.com/episodes/smashing-the-stack-all-good-things-exploring-software-lifecycles-from-secure-by-design-to-end-of-life-an-rsa-conference-2024-conversation-with-allan-friedman-and-bob-lord-on-location-coverage-with-sean-martin-and-marco-ciappelli" target="_blank">https://redefining-cybersecurity.simplecast.com/episodes/smashing-the-stack-all-good-things-exploring-software-lifecycles-from-secure-by-design-to-end-of-life-an-rsa-conference-2024-conversation-with-allan-friedman-and-bob-lord-on-location-coverage-with-sean-martin-and-marco-ciappelli</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Progress for the DSbD Initiative and CHERI Capability Hardware: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219352.progress-for-the-dsbd-initiative-and-cheri-capability-hardware.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219352.progress-for-the-dsbd-initiative-and-cheri-capability-hardware.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 23 May 2024 02:36:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Professor John Goodacre)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-secure-foundations-to-resilient-futures-the-uks-digital-security-by-design-initiative-an-infosecurity-europe-2024-conversation-with-professor-john-goodacre-on-location-coverage-with-sean-martin-and-marco-ciappelli-Tb_6f9pc</link>
      <content:encoded><![CDATA[<p><strong>Guest: Professor John Goodacre</strong>, Director Digital Security by Design, University of Manchester, UKRI [<a href="https://x.com/UKRI_News">@UKRI_News</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/john-goodacre-722b59/">https://www.linkedin.com/in/john-goodacre-722b59/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of the "On Location with Sean and Marco" podcast, host Sean Martin flies solo to engage in a riveting conversation with Professor John Goodacre, Director of a UK government program and a renowned figure in the tech industry. Professor Goodacre sheds light on his diverse career journey, spanning from telecoms to supercomputers, with a key focus on cyber resilience and system integrity.</p><p>Emphasizing the need for a holistic approach beyond patching vulnerabilities, Professor Goodacre discusses the inception of the digital security by design program in 2019. He delves into the program's aim to revolutionize technology foundations, collaborating with industry giants like Microsoft and Google to enhance digital infrastructures globally.</p><p>The conversation explores the significance of memory safety in software, highlighting the ongoing battle against cyber threats and the necessity for robust security measures at the hardware and software levels. Professor Goodacre's insights underscore the imperative shift towards secure by design and default practices to combat evolving cybersecurity challenges effectively.</p><p>Furthermore, the episode touches upon the collaboration between academia, businesses, and governments to implement secure frameworks and educate stakeholders on the importance of cybersecurity. Professor Goodacre advocates for a proactive approach, stressing the economic benefits and risk mitigation associated with investing in secure technologies and practices.</p><p>Listeners are left with a deepened understanding of the crucial role memory safety, compartmentalization, and secure design play in fortifying digital ecosystems against cyber threats. Professor Goodacre's illuminating discussion paves the way for a paradigm shift in cybersecurity strategies, fostering resilience and integrity in the digital landscape.</p><p>Top Questions Addressed</p><ul><li>How does the digital security by design program aim to enhance technology foundations?</li><li>Why is memory safety in software crucial for combating cyber threats effectively?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p> Smashing the Stack; All Good Things | Exploring Software Lifecycles from Secure By Design to End of Life | An RSA Conference 2024 Conversation with Allan Friedman and Bob Lord | On Location Coverage with Sean Martin and Marco Ciappelli: <a href="https://redefining-cybersecurity.simplecast.com/episodes/smashing-the-stack-all-good-things-exploring-software-lifecycles-from-secure-by-design-to-end-of-life-an-rsa-conference-2024-conversation-with-allan-friedman-and-bob-lord-on-location-coverage-with-sean-martin-and-marco-ciappelli" target="_blank">https://redefining-cybersecurity.simplecast.com/episodes/smashing-the-stack-all-good-things-exploring-software-lifecycles-from-secure-by-design-to-end-of-life-an-rsa-conference-2024-conversation-with-allan-friedman-and-bob-lord-on-location-coverage-with-sean-martin-and-marco-ciappelli</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Progress for the DSbD Initiative and CHERI Capability Hardware: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219352.progress-for-the-dsbd-initiative-and-cheri-capability-hardware.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219352.progress-for-the-dsbd-initiative-and-cheri-capability-hardware.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29322050" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3fa02208-ee38-4b20-a28c-563833548b27/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3fa02208-ee38-4b20-a28c-563833548b27&amp;feed=2M86zCcc"/>
      <itunes:title>From Secure Foundations to Resilient Futures: The UK&apos;s Digital Security by Design Initiative | An Infosecurity Europe 2024 Conversation with Professor John Goodacre | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Professor John Goodacre</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:32</itunes:duration>
      <itunes:summary>In this On Location podcast, Sean Martin engages in a thought-provoking conversation with Professor John Goodacre, a tech innovator and government program director. Explore the transformative journey towards secure-by-design technology, as Professor Goodacre navigates the complex realm of cyber resilience and unveils groundbreaking strategies to fortify digital infrastructures against ever-evolving threats.</itunes:summary>
      <itunes:subtitle>In this On Location podcast, Sean Martin engages in a thought-provoking conversation with Professor John Goodacre, a tech innovator and government program director. Explore the transformative journey towards secure-by-design technology, as Professor Goodacre navigates the complex realm of cyber resilience and unveils groundbreaking strategies to fortify digital infrastructures against ever-evolving threats.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, hardware, sean martin, tech, cybersecurity, software, innovator, business policy, conference, on location, memory safety, podcast, cyber resilience, digital infrastructures, supercomputers, professor john goodacre, industry, secure-by-design, government, privacy, cybersecurityconference, john goodacre</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8135cc8b-ced3-4106-843f-ccd3b0c8e92b</guid>
      <title>Unveiling Innovation at SquareX Booth during RSA Conference 2024: A Deep Dive Into SquareX&apos;s Vision | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A SquareX Story with Dakshitaa Babu and Shourya Pratap Singh</title>
      <description><![CDATA[<p><strong>Innovation Unveiled: SquareX's Vision at RSA Conference 2024</strong></p><p>During RSA Conference 2024, SquareX emerged as a source of fresh innovation, revolutionizing the cybersecurity landscape with their cutting-edge solutions. Hosted by Sean Martin, this episode of "On Location" takes you on a journey through the insights and revelations brought to light by key figures at SquareX.</p><p><strong>Introducing SquareX: Meet the Visionaries</strong></p><p>The episode turn on the microphones at the Square X booth, where Sean Martin introduces the audience to Dakshitaa Babu and Shourya Pratap Singh, pivotal figures driving innovation at SquareX. Dakshitaa, the product evangelist, and Shourya, the principal software engineer, shed light on their roles and the impact of SquareX's work on the industry.</p><p><strong>The Passion Behind the Innovation</strong></p><p>Dakshitaa shares her perspective on the privilege of contributing to a company that drives meaningful change in the industry, emphasizing SquareX's commitment to innovation. Shourya echoes this sentiment, highlighting the satisfaction of solving complex problems and witnessing their solutions making a tangible impact on customers.</p><p><strong>Pushing the Boundaries: A Glimpse Into SquareX's Technology</strong></p><p>Sean Martin delves into the intricacies of SquareX's technology, discussing AI-generated images and reverse engineering techniques employed to uncover hidden threats within images. Shourya elaborates on the challenges posed by malicious files and the innovative approaches adopted by SquareX to enhance cybersecurity.</p><p><strong>Addressing Customer Concerns: SquareX's Value Proposition</strong></p><p>Sean Martin probes Dakshitaa and Shourya on the key concerns voiced by prospects and customers at the conference. They shed light on how SquareX addresses the gap in endpoint security solutions, providing customers with insightful data and a comprehensive understanding of cyber threats.</p><p><strong>Empowering Organizations: The SquareX Difference</strong></p><p>The episode concludes with Sean Martin underscoring the significance of visibility at the web browser level and commending SquareX for empowering organizations to proactively tackle cybersecurity challenges. Dakshitaa extends her gratitude to visitors at the booth, emphasizing the value of SquareX's solutions for a secure digital environment.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Dakshitaa Babu</strong>, Security Researcher, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dakshitaababu/">https://www.linkedin.com/in/dakshitaababu/</a></p><p><strong>Shourya Pratap Singh</strong>, Principal Software Engineer, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shouryaps/">https://www.linkedin.com/in/shouryaps/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 22 May 2024 06:58:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dakshitaa Babu, Shourya Pratap Singh)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-innovation-at-squarex-booth-during-rsa-conference-2024-a-deep-dive-into-squarexs-vision-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-squarex-story-with-dakshitaa-babu-and-shourya-pratap-singh-XUgPpZgA</link>
      <content:encoded><![CDATA[<p><strong>Innovation Unveiled: SquareX's Vision at RSA Conference 2024</strong></p><p>During RSA Conference 2024, SquareX emerged as a source of fresh innovation, revolutionizing the cybersecurity landscape with their cutting-edge solutions. Hosted by Sean Martin, this episode of "On Location" takes you on a journey through the insights and revelations brought to light by key figures at SquareX.</p><p><strong>Introducing SquareX: Meet the Visionaries</strong></p><p>The episode turn on the microphones at the Square X booth, where Sean Martin introduces the audience to Dakshitaa Babu and Shourya Pratap Singh, pivotal figures driving innovation at SquareX. Dakshitaa, the product evangelist, and Shourya, the principal software engineer, shed light on their roles and the impact of SquareX's work on the industry.</p><p><strong>The Passion Behind the Innovation</strong></p><p>Dakshitaa shares her perspective on the privilege of contributing to a company that drives meaningful change in the industry, emphasizing SquareX's commitment to innovation. Shourya echoes this sentiment, highlighting the satisfaction of solving complex problems and witnessing their solutions making a tangible impact on customers.</p><p><strong>Pushing the Boundaries: A Glimpse Into SquareX's Technology</strong></p><p>Sean Martin delves into the intricacies of SquareX's technology, discussing AI-generated images and reverse engineering techniques employed to uncover hidden threats within images. Shourya elaborates on the challenges posed by malicious files and the innovative approaches adopted by SquareX to enhance cybersecurity.</p><p><strong>Addressing Customer Concerns: SquareX's Value Proposition</strong></p><p>Sean Martin probes Dakshitaa and Shourya on the key concerns voiced by prospects and customers at the conference. They shed light on how SquareX addresses the gap in endpoint security solutions, providing customers with insightful data and a comprehensive understanding of cyber threats.</p><p><strong>Empowering Organizations: The SquareX Difference</strong></p><p>The episode concludes with Sean Martin underscoring the significance of visibility at the web browser level and commending SquareX for empowering organizations to proactively tackle cybersecurity challenges. Dakshitaa extends her gratitude to visitors at the booth, emphasizing the value of SquareX's solutions for a secure digital environment.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Dakshitaa Babu</strong>, Security Researcher, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dakshitaababu/">https://www.linkedin.com/in/dakshitaababu/</a></p><p><strong>Shourya Pratap Singh</strong>, Principal Software Engineer, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shouryaps/">https://www.linkedin.com/in/shouryaps/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5524738" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e8d85726-968b-4957-a249-9d84a191cb18/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e8d85726-968b-4957-a249-9d84a191cb18&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling Innovation at SquareX Booth during RSA Conference 2024: A Deep Dive Into SquareX&apos;s Vision | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A SquareX Story with Dakshitaa Babu and Shourya Pratap Singh</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dakshitaa Babu, Shourya Pratap Singh</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:45</itunes:duration>
      <itunes:summary>Join Sean Martin in this exclusive coverage of RSA Conference 2024, where he dives into the groundbreaking technology and vision showcased by SquareX.</itunes:summary>
      <itunes:subtitle>Join Sean Martin in this exclusive coverage of RSA Conference 2024, where he dives into the groundbreaking technology and vision showcased by SquareX.</itunes:subtitle>
      <itunes:keywords>cyber defense strategies, cybersecurity solutions, marco ciappelli, rsa conference, shourya pratap singh, sean martin, endpoint security solutions, ai generated images, web application security, web browser security, cyber threat detection, dakshitaa babu, tech conference coverage, seven minutes podcast, reverse engineering techniques, squarex vision, squarex booth, cybersecurity trends 2024, digital security solutions, threat intelligence, data privacy, rsa conference 2024, innovation in cybersecurity, cybersecurity innovation, customer data protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ef05460d-0b27-4322-8533-ea4fd04781e3</guid>
      <title>Find Your Tribe and Be Part Of The Most Passionate Innovators In The World Of Technology | Unveiling Innovation at the Europe&apos;s Biggest Startup and Tech Event | An On Location VIVA TECH Conference 2024 Coverage Conversation with François Bitouzet</title>
      <description><![CDATA[<p><strong>Guest: François Bitouzet</strong>, Managing Director at Viva Technology [<a href="https://twitter.com/VivaTech">@VivaTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/">https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Celebration of Technology and Innovation</strong></p><p>The VIVA TECH Conference 2024 in Paris proved to be a rendezvous of the brightest minds and innovators in the tech realm. With a blend of key speakers, groundbreaking sessions, and vibrant discussions, the event will be a melting pot of ideas, creativity, and collaboration.</p><p><strong>In Conversation with Visionaries</strong></p><p>Marco Ciappelli, along with his guest François Bitouzet, the managing director of VIVA TECH, engaged in insightful dialogues touching upon varied aspects of technology's impact on society. From the language of tech to the importance of collaboration and the role of diversity in innovation, the conversations were both enlightening and thought-provoking.</p><p><strong>Spotlight on Key Themes</strong></p><p>The event will spotlight key themes such as AI, sustainability, Internet and democracy, and the creators' economy, amongst other. The intersection of technology with democracy sparked crucial discussions on safeguarding democratic processes in the digital age.</p><p><strong>Business with a Twist</strong></p><p>Amidst the flurry of innovation, VIVA TECH aims to provide a unique platform for startups to connect with potential investors and clients. The business-focused approach of the event adds a touch of creativity, epitomized by the 'bar-hopping' networking concept on Rue Montorgueil.</p><p><strong>Building Connections and Finding Your Tribe</strong></p><p>At the core of VIVA TECH 2024 there is the core mission of building connections and fostering collaboration. The event focuses on bringing together individuals from diverse backgrounds to find common ground, empower each other, and unlock new possibilities in the tech landscape.</p><p><strong>An Echo of Excitement</strong></p><p>As VIVA TECH 2024 is about to start in Paris, it echoes with the buzz of excitement and anticipation. The convergence of ideas, the clash of perspectives, and the melding of creativity set the stage for a transformative experience for all attendees.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about VIVA TECH 2024: <a href="https://vivatechnology.com/">https://vivatechnology.com/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 20 May 2024 19:57:18 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine On Location, François Bitouzet)</author>
      <link>https://eventcoveragepodcast.com/episodes/find-your-tribe-and-be-part-of-the-most-passionate-innovators-in-the-world-of-technology-unveiling-innovation-at-the-europes-biggest-startup-and-tech-event-an-on-location-viva-tech-conference-2024-coverage-conversation-with-francois-bitouzet-9zbr9qFm</link>
      <content:encoded><![CDATA[<p><strong>Guest: François Bitouzet</strong>, Managing Director at Viva Technology [<a href="https://twitter.com/VivaTech">@VivaTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/">https://www.linkedin.com/in/fran%C3%A7ois-bitouzet-180a89/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Celebration of Technology and Innovation</strong></p><p>The VIVA TECH Conference 2024 in Paris proved to be a rendezvous of the brightest minds and innovators in the tech realm. With a blend of key speakers, groundbreaking sessions, and vibrant discussions, the event will be a melting pot of ideas, creativity, and collaboration.</p><p><strong>In Conversation with Visionaries</strong></p><p>Marco Ciappelli, along with his guest François Bitouzet, the managing director of VIVA TECH, engaged in insightful dialogues touching upon varied aspects of technology's impact on society. From the language of tech to the importance of collaboration and the role of diversity in innovation, the conversations were both enlightening and thought-provoking.</p><p><strong>Spotlight on Key Themes</strong></p><p>The event will spotlight key themes such as AI, sustainability, Internet and democracy, and the creators' economy, amongst other. The intersection of technology with democracy sparked crucial discussions on safeguarding democratic processes in the digital age.</p><p><strong>Business with a Twist</strong></p><p>Amidst the flurry of innovation, VIVA TECH aims to provide a unique platform for startups to connect with potential investors and clients. The business-focused approach of the event adds a touch of creativity, epitomized by the 'bar-hopping' networking concept on Rue Montorgueil.</p><p><strong>Building Connections and Finding Your Tribe</strong></p><p>At the core of VIVA TECH 2024 there is the core mission of building connections and fostering collaboration. The event focuses on bringing together individuals from diverse backgrounds to find common ground, empower each other, and unlock new possibilities in the tech landscape.</p><p><strong>An Echo of Excitement</strong></p><p>As VIVA TECH 2024 is about to start in Paris, it echoes with the buzz of excitement and anticipation. The convergence of ideas, the clash of perspectives, and the melding of creativity set the stage for a transformative experience for all attendees.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about VIVA TECH 2024: <a href="https://vivatechnology.com/">https://vivatechnology.com/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26540097" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/f8e8dfc8-29f8-471b-921b-9566097c9090/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=f8e8dfc8-29f8-471b-921b-9566097c9090&amp;feed=2M86zCcc"/>
      <itunes:title>Find Your Tribe and Be Part Of The Most Passionate Innovators In The World Of Technology | Unveiling Innovation at the Europe&apos;s Biggest Startup and Tech Event | An On Location VIVA TECH Conference 2024 Coverage Conversation with François Bitouzet</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine On Location, François Bitouzet</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/3df2b73a-743d-4c71-8f10-91fa019f5981/3000x3000/viva-tech-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:27:38</itunes:duration>
      <itunes:summary>Welcome to a glimpse of the electrifying coverage by Marco Ciappelli on the latest episode of On Location, diving into the brain and heart of the VIVA TECH Conference 2024 in Paris. </itunes:summary>
      <itunes:subtitle>Welcome to a glimpse of the electrifying coverage by Marco Ciappelli on the latest episode of On Location, diving into the brain and heart of the VIVA TECH Conference 2024 in Paris. </itunes:subtitle>
      <itunes:keywords>paris tech event, diversity in technology, tech collaboration models, viva tech recap, tech event highlights, innovation conference, creative business platforms, business networking, viva tech speakers, innovation ecosystem, internet democracy debate, startup networking, podcast episode, sustainability discussions, technology and society, event coverage, technology collaboration, viva tech conference, ai in tech, françois bitouzet, tech industry insights, viva tech 2024, digital democracy challenges, future of tech events</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">58b40d96-a0e8-4e0e-9f38-018e211b3e7c</guid>
      <title>AI-Fitness and AI-Wellness and Deploying an Effective DevSecOps Team – What’s the Recipe for Success? | An Infosecurity Europe 2024 Conversation with Kevin Fielder | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Kevin Fielder</strong>, CISO, NatWest Boxed & Mettle</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kevinfielder/">https://www.linkedin.com/in/kevinfielder/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli engage in an insightful discussion on the intersection of artificial intelligence (AI) and software development, specifically in the realm of information security. The conversation features Kevin Fielder, CSO for NatWest Boxed and Metal, sharing his expert insights and experiences. The trio dives into the potential risks and rewards of integrating AI with software development, touching upon the inherent challenges and opportunities this fusion presents for the future of technology and security.</p><p>The episode opens with a dynamic exchange on what it means to combine AI and software development, sparking a debate on the potential of AI to improve or complicate software development processes. Marco Ciappelli humorously inquires about the concept of a 'black box' in AI, prompting a profound exploration of the reliability and transparency of AI systems.</p><p>Kevin Fielder provides a comprehensive overview of his current role and the innovative projects under his stewardship at NatWest boxed and metal. He eloquently describes the endeavors to leverage cloud-based banking and AI to deliver enhanced banking services to small businesses and non-banking businesses alike. Fielder's insights into 'banking as a service' and the ethical considerations surrounding AI deployment in the financial sector stand out as key discussion points.</p><p>A significant portion of the conversation centers around the ethical dilemmas and technical challenges posed by AI, including data integrity, the potential for AI-powered systems to exhibit biases, and the importance of designing AI with security in mind from the outset. Fielder articulates concerns about the rapid advancement of AI technologies outpacing the development of ethical guidelines and security measures, highlighting the critical need for a balanced approach to innovation.</p><p>The hosts and Fielder ponder the future of AI, reflecting on scenarios ranging from utopian visions where AI alleviates human toil to dystopian outcomes where AI autonomy leads to unforeseen consequences. This speculative dialogue sheds light on the philosophical and practical implications of AI's role in society and the importance of responsible AI development and deployment.</p><p>As the discussion winds down, the episode shifts focus to Fielder's upcoming presentations at the Infosecurity Europe conference in London. He shares his anticipation for engaging with the conference attendees and emphasizes the value of open dialogues about AI, security, and the future of technology. This episode not only provides a platform for thought-provoking discussion on AI and information security but also underscores the importance of community engagement and knowledge sharing in navigating the complexities of modern technology landscapes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> Deploying an Effective DevSecOps Team – What’s the Recipe for Success?: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219354.deploying-an-effective-devsecops-team-%E2%80%93-what%E2%80%99s-the-recipe-for-success.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219354.deploying-an-effective-devsecops-team-%E2%80%93-what%E2%80%99s-the-recipe-for-success.html</a></p><p>AI-Fitness and AI-Wellness: NatWest Boxed and Mettle CISO's Thoughts on Safe AI Use: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219536.ai_fitness-and-ai_wellness-natwest-boxed-and-mettle-cisos-thoughts-on-safe-ai-use.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219536.ai_fitness-and-ai_wellness-natwest-boxed-and-mettle-cisos-thoughts-on-safe-ai-use.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 16 May 2024 03:06:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Kevin Fielder)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-fitness-and-ai-wellness-and-deploying-an-effective-devsecops-team-whats-the-recipe-for-success-an-infosecurity-europe-2024-conversation-with-kevin-fielder-on-location-coverage-with-sean-martin-and-marco-ciappelli-skcbeICq</link>
      <content:encoded><![CDATA[<p><strong>Guest: Kevin Fielder</strong>, CISO, NatWest Boxed & Mettle</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kevinfielder/">https://www.linkedin.com/in/kevinfielder/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli engage in an insightful discussion on the intersection of artificial intelligence (AI) and software development, specifically in the realm of information security. The conversation features Kevin Fielder, CSO for NatWest Boxed and Metal, sharing his expert insights and experiences. The trio dives into the potential risks and rewards of integrating AI with software development, touching upon the inherent challenges and opportunities this fusion presents for the future of technology and security.</p><p>The episode opens with a dynamic exchange on what it means to combine AI and software development, sparking a debate on the potential of AI to improve or complicate software development processes. Marco Ciappelli humorously inquires about the concept of a 'black box' in AI, prompting a profound exploration of the reliability and transparency of AI systems.</p><p>Kevin Fielder provides a comprehensive overview of his current role and the innovative projects under his stewardship at NatWest boxed and metal. He eloquently describes the endeavors to leverage cloud-based banking and AI to deliver enhanced banking services to small businesses and non-banking businesses alike. Fielder's insights into 'banking as a service' and the ethical considerations surrounding AI deployment in the financial sector stand out as key discussion points.</p><p>A significant portion of the conversation centers around the ethical dilemmas and technical challenges posed by AI, including data integrity, the potential for AI-powered systems to exhibit biases, and the importance of designing AI with security in mind from the outset. Fielder articulates concerns about the rapid advancement of AI technologies outpacing the development of ethical guidelines and security measures, highlighting the critical need for a balanced approach to innovation.</p><p>The hosts and Fielder ponder the future of AI, reflecting on scenarios ranging from utopian visions where AI alleviates human toil to dystopian outcomes where AI autonomy leads to unforeseen consequences. This speculative dialogue sheds light on the philosophical and practical implications of AI's role in society and the importance of responsible AI development and deployment.</p><p>As the discussion winds down, the episode shifts focus to Fielder's upcoming presentations at the Infosecurity Europe conference in London. He shares his anticipation for engaging with the conference attendees and emphasizes the value of open dialogues about AI, security, and the future of technology. This episode not only provides a platform for thought-provoking discussion on AI and information security but also underscores the importance of community engagement and knowledge sharing in navigating the complexities of modern technology landscapes.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p> Deploying an Effective DevSecOps Team – What’s the Recipe for Success?: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219354.deploying-an-effective-devsecops-team-%E2%80%93-what%E2%80%99s-the-recipe-for-success.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219354.deploying-an-effective-devsecops-team-%E2%80%93-what%E2%80%99s-the-recipe-for-success.html</a></p><p>AI-Fitness and AI-Wellness: NatWest Boxed and Mettle CISO's Thoughts on Safe AI Use: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219536.ai_fitness-and-ai_wellness-natwest-boxed-and-mettle-cisos-thoughts-on-safe-ai-use.html" target="_blank">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219536.ai_fitness-and-ai_wellness-natwest-boxed-and-mettle-cisos-thoughts-on-safe-ai-use.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29264655" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5c1d86c1-ba40-4183-b20e-86d538f22b28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5c1d86c1-ba40-4183-b20e-86d538f22b28&amp;feed=2M86zCcc"/>
      <itunes:title>AI-Fitness and AI-Wellness and Deploying an Effective DevSecOps Team – What’s the Recipe for Success? | An Infosecurity Europe 2024 Conversation with Kevin Fielder | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Kevin Fielder</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/5360a6c3-324a-436b-ad2d-12a8ddac0e1c/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:27</itunes:duration>
      <itunes:summary>Dive into a riveting discussion on the fusion of AI and software development with Kevin Fielder, CSO for NatWest Boxed and Metal, alongside hosts Sean Martin and Marco Ciappelli. Explore the ethical, technical, and futuristic implications of AI in the realm of information security and beyond, unveiling the delicate balance between innovation and responsibility.</itunes:summary>
      <itunes:subtitle>Dive into a riveting discussion on the fusion of AI and software development with Kevin Fielder, CSO for NatWest Boxed and Metal, alongside hosts Sean Martin and Marco Ciappelli. Explore the ethical, technical, and futuristic implications of AI in the realm of information security and beyond, unveiling the delicate balance between innovation and responsibility.</itunes:subtitle>
      <itunes:keywords>software development, technology, marco ciappelli, infosecurity europe, sean martin, automation, kevin fielder, cybersecurity, ethical ai, cloud banking, conference, natwest, data integrity, banking as a service, innovation, financial services, future, london, podcast, security, ethics, ai, devsecops, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b30ef03d-1db6-40bb-ae24-59bb68a0b63f</guid>
      <title>Celebrating 15 Years of Leadership in Cloud Security: Preview of CSA AI Summit at RSA 2024 with Jim Reavis and Illena Armstrong | An RSA Conference 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Jim Reavis</strong>, CEO at Cloud Security Alliance [<a href="https://twitter.com/cloudsa">@cloudsa</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jimreavis/">https://www.linkedin.com/in/jimreavis/</a></p><p><strong>Illena Armstrong</strong>, President at at Cloud Security Alliance [<a href="https://twitter.com/cloudsa">@cloudsa</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/illenaarmstrong/">https://www.linkedin.com/in/illenaarmstrong/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join Sean Martin as he hosts an in-depth discussion with Illena Armstrong, President of Cloud Security Alliance, and Jim Reavis, CEO and Founder. Illena shares her excitement for celebrating the 15th anniversary of the organization while highlighting the industry's shift towards cloud adoption and AI technology. She emphasizes the importance of maintaining security controls, especially in the context of regulatory compliance and cloud provider obligations. The conversation also touches on the rising trend of zero trust security frameworks and the global perspective on AI integration in cybersecurity practices.</p><p>Jim Reavis adds valuable insights into the intersection of AI and cloud security, highlighting the need for a holistic approach that combines human intelligence with AI capabilities. He emphasizes the role of security as a catalyst for innovation and business transformation, citing examples of innovative approaches taken by European banks. The discussion also covers thesignificance of shared responsibility in cybersecurity and the collaborative efforts required to address evolving threats.</p><p>The CSA AI Summit promises an engaging lineup of speakers, including industry leaders from Google, Microsoft, and Zscaler, who will shed light on key topics such as incident response, secure development, and business transformation. The full-day event, which kicks off the week at RSA Conference, aims to bring together a diverse audience, ranging from C-suite executives to developers and compliance professionals, fostering meaningful discussions and knowledge sharing. Attendees can expect thought-provoking sessions that explore the intersection of AI and cybersecurity, providing valuable insights for enhancing security practices in the digital age.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>CSA AI Summit at RSAC: <a href="https://www.rsaconference.com/library/presentation/usa/2024/csa%20ai%20summit%20at%20rsac">https://www.rsaconference.com/library/presentation/usa/2024/csa%20ai%20summit%20at%20rsac</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 16 May 2024 00:09:18 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Reavis, Illena Armstrong)</author>
      <link>https://eventcoveragepodcast.com/episodes/celebrating-15-years-of-leadership-in-cloud-security-preview-of-csa-ai-summit-at-rsa-2024-with-jim-reavis-and-illena-armstrong-an-rsa-conference-2024-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-V3fG2qsU</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Jim Reavis</strong>, CEO at Cloud Security Alliance [<a href="https://twitter.com/cloudsa">@cloudsa</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jimreavis/">https://www.linkedin.com/in/jimreavis/</a></p><p><strong>Illena Armstrong</strong>, President at at Cloud Security Alliance [<a href="https://twitter.com/cloudsa">@cloudsa</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/illenaarmstrong/">https://www.linkedin.com/in/illenaarmstrong/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join Sean Martin as he hosts an in-depth discussion with Illena Armstrong, President of Cloud Security Alliance, and Jim Reavis, CEO and Founder. Illena shares her excitement for celebrating the 15th anniversary of the organization while highlighting the industry's shift towards cloud adoption and AI technology. She emphasizes the importance of maintaining security controls, especially in the context of regulatory compliance and cloud provider obligations. The conversation also touches on the rising trend of zero trust security frameworks and the global perspective on AI integration in cybersecurity practices.</p><p>Jim Reavis adds valuable insights into the intersection of AI and cloud security, highlighting the need for a holistic approach that combines human intelligence with AI capabilities. He emphasizes the role of security as a catalyst for innovation and business transformation, citing examples of innovative approaches taken by European banks. The discussion also covers thesignificance of shared responsibility in cybersecurity and the collaborative efforts required to address evolving threats.</p><p>The CSA AI Summit promises an engaging lineup of speakers, including industry leaders from Google, Microsoft, and Zscaler, who will shed light on key topics such as incident response, secure development, and business transformation. The full-day event, which kicks off the week at RSA Conference, aims to bring together a diverse audience, ranging from C-suite executives to developers and compliance professionals, fostering meaningful discussions and knowledge sharing. Attendees can expect thought-provoking sessions that explore the intersection of AI and cybersecurity, providing valuable insights for enhancing security practices in the digital age.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>CSA AI Summit at RSAC: <a href="https://www.rsaconference.com/library/presentation/usa/2024/csa%20ai%20summit%20at%20rsac">https://www.rsaconference.com/library/presentation/usa/2024/csa%20ai%20summit%20at%20rsac</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22976876" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/233295e7-892b-47a1-8e8c-07f96a996432/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=233295e7-892b-47a1-8e8c-07f96a996432&amp;feed=2M86zCcc"/>
      <itunes:title>Celebrating 15 Years of Leadership in Cloud Security: Preview of CSA AI Summit at RSA 2024 with Jim Reavis and Illena Armstrong | An RSA Conference 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Reavis, Illena Armstrong</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:54</itunes:duration>
      <itunes:summary>Join Sean Martin as he hosts an engaging discussion with industry experts Illena Armstrong and Jim Reavis to learn more about the upcoming AI Summit, where they delve into the evolving landscape of cloud security, generative AI technology, and the importance of shared responsibility in cybersecurity. Get ready to gain valuable insights and perspectives from leading voices in the field at the RSA Conference&apos;s AI Summit.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he hosts an engaging discussion with industry experts Illena Armstrong and Jim Reavis to learn more about the upcoming AI Summit, where they delve into the evolving landscape of cloud security, generative AI technology, and the importance of shared responsibility in cybersecurity. Get ready to gain valuable insights and perspectives from leading voices in the field at the RSA Conference&apos;s AI Summit.</itunes:subtitle>
      <itunes:keywords>business transformation, ai summit, marco ciappelli, jim reavis, shared responsibility, rsa conference, security controls, evolving landscape, sean martin, rsa, c-suite executives, regulatory compliance, cybersecurity, digital age, conference, technology integration, industry experts, generative ai, innovation, rsa conference coverage, rsac, cloud security, rsa conference 2024, podcast, rsaconference, illena armstrong, thought-provoking sessions, cybersecurityconference, developer collaboration</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">53448eab-e585-42e1-a3e7-0968134cb374</guid>
      <title>Empowering Women in Cyber Security and The Spiritual Aspect Of Cybersecurity | An RSA Conference 2024 Conversation with Jessica A. Robinson and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Jessica A. Robinson</strong>, Chair Emeritus, World Pulse [<a href="https://twitter.com/WorldPulse">@WorldPulse</a>]</p><img src="https://media.licdn.com/dms/image/D4E0BAQFEfy5R1U6d7w/company-logo_100_100/0/1664814455382/worldpulse_logo?e=1723680000&v=beta&t=XxJcreQCVhgH8ywWOcohNFfrc5JezxQjJaFx_62n0ZY" alt="World Pulse logo" /><p>On LinkedIn | <a href="https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/">https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Vision and Inception of PurePoint International</strong></p><p>Jessica A. Robinson shared the inspiring story of how PurePoint International came to be - born out of a dream during a pilgrimage in India and Nepal. Her vision encompassed not only traditional cyber security but also holistic security, integrating psychological, emotional, and spiritual well-being into the security framework.</p><p><strong>The Feminine Approach to Security</strong></p><p>Central to PurePoint International's ethos is the feminine approach to security, focusing on collaboration, empathy, and inclusivity. Jessica emphasized the importance of balancing masculine and feminine values in the security space, acknowledging the unique perspectives and solutions that women bring to the table.</p><p><strong>Spirituality and Ritual in Cyber Security</strong></p><p>The conversation also focuses into the role of spirituality and ritual in cybersecurity. Jessica highlighted the significance of viewing work as a spiritual practice, incorporating rituals like meditation, intention setting, and energy release to maintain balance and well-being in high-stress environments.</p><p><strong>Overcoming Burnout and Leading with Purpose</strong></p><p>Burnout has become a prevalent issue in the cybersecurity industry, with professionals facing increasing pressure and expectations. Jessica emphasized the importance of self-care and leading with purpose, urging CISOs to prioritize their well-being to effectively lead their teams and organizations.</p><p><strong>The Evolution of the CISO Role</strong></p><p>The discussion also touched upon the evolving role of Chief Information Security Officers (CISOs) and the challenges they face in balancing technical expertise with strategic leadership. Jessica emphasized the need for broader organizational support and a shift in mindset to recognize the CISO as a critical business leader.</p><p><strong>Looking Ahead: Empowering Women in Cyber Security</strong></p><p>As more women enter the cybersecurity industry, there is a growing opportunity to bring diverse perspectives and solutions to the forefront. Jessica highlighted the importance of women stepping into leadership roles and driving change in the industry, emphasizing the need for support and recognition at all levels of the organization.</p><p>Jessica A. Robinson's insights shed light on the transformative power of a feminine approach to cybersecurity, the role of spirituality in well-being, and the challenges and opportunities facing CISOs in today's security landscape. As the industry continues to evolve, empowering women in cybersecurity is not just a necessity but a strategic advantage in creating a safer and more inclusive digital world.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 13 May 2024 02:17:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes, Jessica A. Robinson)</author>
      <link>https://eventcoveragepodcast.com/episodes/empowering-women-in-cyber-security-and-the-spiritual-aspect-of-cybersecurity-an-rsa-conference-2024-conversation-with-jessica-a-robinson-and-christina-stokes-on-location-coverage-with-sean-martin-and-marco-ciappelli-nJbw37jd</link>
      <content:encoded><![CDATA[<p><strong>Guest: Jessica A. Robinson</strong>, Chair Emeritus, World Pulse [<a href="https://twitter.com/WorldPulse">@WorldPulse</a>]</p><img src="https://media.licdn.com/dms/image/D4E0BAQFEfy5R1U6d7w/company-logo_100_100/0/1664814455382/worldpulse_logo?e=1723680000&v=beta&t=XxJcreQCVhgH8ywWOcohNFfrc5JezxQjJaFx_62n0ZY" alt="World Pulse logo" /><p>On LinkedIn | <a href="https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/">https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Vision and Inception of PurePoint International</strong></p><p>Jessica A. Robinson shared the inspiring story of how PurePoint International came to be - born out of a dream during a pilgrimage in India and Nepal. Her vision encompassed not only traditional cyber security but also holistic security, integrating psychological, emotional, and spiritual well-being into the security framework.</p><p><strong>The Feminine Approach to Security</strong></p><p>Central to PurePoint International's ethos is the feminine approach to security, focusing on collaboration, empathy, and inclusivity. Jessica emphasized the importance of balancing masculine and feminine values in the security space, acknowledging the unique perspectives and solutions that women bring to the table.</p><p><strong>Spirituality and Ritual in Cyber Security</strong></p><p>The conversation also focuses into the role of spirituality and ritual in cybersecurity. Jessica highlighted the significance of viewing work as a spiritual practice, incorporating rituals like meditation, intention setting, and energy release to maintain balance and well-being in high-stress environments.</p><p><strong>Overcoming Burnout and Leading with Purpose</strong></p><p>Burnout has become a prevalent issue in the cybersecurity industry, with professionals facing increasing pressure and expectations. Jessica emphasized the importance of self-care and leading with purpose, urging CISOs to prioritize their well-being to effectively lead their teams and organizations.</p><p><strong>The Evolution of the CISO Role</strong></p><p>The discussion also touched upon the evolving role of Chief Information Security Officers (CISOs) and the challenges they face in balancing technical expertise with strategic leadership. Jessica emphasized the need for broader organizational support and a shift in mindset to recognize the CISO as a critical business leader.</p><p><strong>Looking Ahead: Empowering Women in Cyber Security</strong></p><p>As more women enter the cybersecurity industry, there is a growing opportunity to bring diverse perspectives and solutions to the forefront. Jessica highlighted the importance of women stepping into leadership roles and driving change in the industry, emphasizing the need for support and recognition at all levels of the organization.</p><p>Jessica A. Robinson's insights shed light on the transformative power of a feminine approach to cybersecurity, the role of spirituality in well-being, and the challenges and opportunities facing CISOs in today's security landscape. As the industry continues to evolve, empowering women in cybersecurity is not just a necessity but a strategic advantage in creating a safer and more inclusive digital world.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20565805" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e355f0b0-4352-4568-8ff1-be3852aed020/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e355f0b0-4352-4568-8ff1-be3852aed020&amp;feed=2M86zCcc"/>
      <itunes:title>Empowering Women in Cyber Security and The Spiritual Aspect Of Cybersecurity | An RSA Conference 2024 Conversation with Jessica A. Robinson and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes, Jessica A. Robinson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:23</itunes:duration>
      <itunes:summary>In a world where cybersecurity is becoming increasingly crucial, the voices and perspectives of women are essential in shaping the industry&apos;s future. At the recent RSA conference in 2024, Christina Stokes from ITSP Magazine sat down with Jessica A. Robinson, the founder of PurePoint International, to learn about her journey, the spiritual aspect of cybersecurity, and the challenges faced by CISOs in the ever-evolving landscape of security.</itunes:summary>
      <itunes:subtitle>In a world where cybersecurity is becoming increasingly crucial, the voices and perspectives of women are essential in shaping the industry&apos;s future. At the recent RSA conference in 2024, Christina Stokes from ITSP Magazine sat down with Jessica A. Robinson, the founder of PurePoint International, to learn about her journey, the spiritual aspect of cybersecurity, and the challenges faced by CISOs in the ever-evolving landscape of security.</itunes:subtitle>
      <itunes:keywords>burnout, feminine approach, marco ciappelli, strategic leadership, empowerment, industry transformation, leadership, rsa conference, sean martin, meditation, rsa, ciso challenges, holistic security, cybersecurity, conference, jessica a. robinson, inclusivity, diversity, organizational support, rsa conference coverage, rsac, rsa conference 2024, podcast, rsaconference, evolving roles, women in tech, well-being, christina stokes, ritual, spirituality, cybersecurityconference, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ddb88e5c-2790-46de-897f-bfeb9439255f</guid>
      <title>Exploring the Future of Software Supply Chain Security | An RSA Conference 2024 Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Cassie Crossley</strong>, VP, Supply Chain Security, Schneider Electric [<a href="https://twitter.com/SchneiderElec">@SchneiderElec</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cassiecrossley/" target="_blank">https://www.linkedin.com/in/cassiecrossley/</a></p><p>On Twitter | <a href="https://twitter.com/Cassie_Crossley" target="_blank">https://twitter.com/Cassie_Crossley</a></p><p>On Mastodon | <a href="https://mastodon.social/@Cassie_Crossley" target="_blank">https://mastodon.social/@Cassie_Crossley</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This discussion shed light on various aspects of cybersecurity, technology, and the evolving role of IT professionals in addressing the challenges of the digital age.</p><p>The conversation kicked off with Sean Martin providing a warm welcome to the audience as he introduced the topic of software supply chain security. Cassie Crossley shared insights from her extensive experience in cybersecurity at Schneider Electric, emphasizing the critical importance of safeguarding product security and supply chain integrity.</p><p><strong>Embracing Innovation and Resilience in Cybersecurity</strong></p><p>The discussion dive into the concept of resilience in cybersecurity and the need for proactive risk management strategies. Both speakers emphasized the importance of leveraging AI-driven decision-making processes to enhance efficiency and reduce false positives in security operations. They also highlighted the role of machine learning and behavior analytics in strengthening cybersecurity posture.</p><p><strong>Bridging the Gap between IT and Business Objectives</strong></p><p>Crossley and Martin discussed the evolving role of IT professionals in bridging the gap between technical cybersecurity measures and broader business objectives. They stressed the significance of aligning cybersecurity initiatives with the overall strategic goals of the organization and fostering communication between C-suite executives and security professionals.</p><p><strong>Navigating the Complexities of Hardware Development and Cybersecurity</strong></p><p>The conversation also touched upon the complexities of hardware development and the unique challenges faced in securing chipboards and other hardware components. Crossley highlighted the nuances of cybersecurity in defending against a myriad of potential threats and underscored the need for robust verification processes in hardware security.</p><p><strong>Empowering Businesses with GRC Controls and Cybersecurity Best Practices</strong></p><p>As the discussion progressed, Crossley shared practical insights from her book on software supply chain security, emphasizing the essential GRC controls and cybersecurity best practices that organizations can implement to enhance their security posture. She highlighted the need for startups and companies to prioritize cybersecurity measures despite budget constraints.</p><p><strong>Concluding Thoughts and Looking Towards the Future</strong></p><p>In wrapping up the conversation, both speakers expressed optimism about the future of software supply chain security and the potential for innovation in AI-driven cybersecurity technologies. They encouraged businesses to prioritize cybersecurity education, resilience planning, and proactive risk management to stay ahead of emerging threats.</p><p>The engaging discussion between Cassie Crossley and Sean Martin at RSA Conference 2024 provided valuable insights into the evolving landscape of software supply chain security and the key challenges facing cybersecurity professionals. As organizations navigate the complexities of the digital age, proactive cybersecurity measures and a strategic alignment with business objectives are essential for safeguarding critical assets and maintaining a strong security posture.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 12 May 2024 15:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Cassie Crossley)</author>
      <link>https://eventcoveragepodcast.com/episodes/exploring-the-future-of-software-supply-chain-security-an-rsa-conference-2024-conversation-with-cassie-crossley-on-location-coverage-with-sean-martin-and-marco-ciappelli-f6XOWl_j</link>
      <content:encoded><![CDATA[<p><strong>Guest: Cassie Crossley</strong>, VP, Supply Chain Security, Schneider Electric [<a href="https://twitter.com/SchneiderElec">@SchneiderElec</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cassiecrossley/" target="_blank">https://www.linkedin.com/in/cassiecrossley/</a></p><p>On Twitter | <a href="https://twitter.com/Cassie_Crossley" target="_blank">https://twitter.com/Cassie_Crossley</a></p><p>On Mastodon | <a href="https://mastodon.social/@Cassie_Crossley" target="_blank">https://mastodon.social/@Cassie_Crossley</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This discussion shed light on various aspects of cybersecurity, technology, and the evolving role of IT professionals in addressing the challenges of the digital age.</p><p>The conversation kicked off with Sean Martin providing a warm welcome to the audience as he introduced the topic of software supply chain security. Cassie Crossley shared insights from her extensive experience in cybersecurity at Schneider Electric, emphasizing the critical importance of safeguarding product security and supply chain integrity.</p><p><strong>Embracing Innovation and Resilience in Cybersecurity</strong></p><p>The discussion dive into the concept of resilience in cybersecurity and the need for proactive risk management strategies. Both speakers emphasized the importance of leveraging AI-driven decision-making processes to enhance efficiency and reduce false positives in security operations. They also highlighted the role of machine learning and behavior analytics in strengthening cybersecurity posture.</p><p><strong>Bridging the Gap between IT and Business Objectives</strong></p><p>Crossley and Martin discussed the evolving role of IT professionals in bridging the gap between technical cybersecurity measures and broader business objectives. They stressed the significance of aligning cybersecurity initiatives with the overall strategic goals of the organization and fostering communication between C-suite executives and security professionals.</p><p><strong>Navigating the Complexities of Hardware Development and Cybersecurity</strong></p><p>The conversation also touched upon the complexities of hardware development and the unique challenges faced in securing chipboards and other hardware components. Crossley highlighted the nuances of cybersecurity in defending against a myriad of potential threats and underscored the need for robust verification processes in hardware security.</p><p><strong>Empowering Businesses with GRC Controls and Cybersecurity Best Practices</strong></p><p>As the discussion progressed, Crossley shared practical insights from her book on software supply chain security, emphasizing the essential GRC controls and cybersecurity best practices that organizations can implement to enhance their security posture. She highlighted the need for startups and companies to prioritize cybersecurity measures despite budget constraints.</p><p><strong>Concluding Thoughts and Looking Towards the Future</strong></p><p>In wrapping up the conversation, both speakers expressed optimism about the future of software supply chain security and the potential for innovation in AI-driven cybersecurity technologies. They encouraged businesses to prioritize cybersecurity education, resilience planning, and proactive risk management to stay ahead of emerging threats.</p><p>The engaging discussion between Cassie Crossley and Sean Martin at RSA Conference 2024 provided valuable insights into the evolving landscape of software supply chain security and the key challenges facing cybersecurity professionals. As organizations navigate the complexities of the digital age, proactive cybersecurity measures and a strategic alignment with business objectives are essential for safeguarding critical assets and maintaining a strong security posture.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21368691" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/356b1899-0399-4602-9444-49cbfaa63461/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=356b1899-0399-4602-9444-49cbfaa63461&amp;feed=2M86zCcc"/>
      <itunes:title>Exploring the Future of Software Supply Chain Security | An RSA Conference 2024 Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Cassie Crossley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:14</itunes:duration>
      <itunes:summary>At the recent RSA Conference 2024 in San Francisco, IT security experts Cassie Crossley and Sean Martin engaged in a deep and enlightening conversation about the current landscape of software supply chain security. </itunes:summary>
      <itunes:subtitle>At the recent RSA Conference 2024 in San Francisco, IT security experts Cassie Crossley and Sean Martin engaged in a deep and enlightening conversation about the current landscape of software supply chain security. </itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, open source software, sean martin, rsa, supply chain, cybersecurity, conference, ai-driven decision making, software vulnerabilities, hardware development, rsa conference coverage, cybersecurity education, technology conference, resilience, rsac, software supply chain security, rsa conference 2024, third-party risk, grc controls, podcast, corporate security, rsaconference, machine learning, ai technology, cassie crossley, business continuity, digital transformation, cybersecurity risks, cybersecurityconference, chipboards</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9624d7ae-31b0-40dc-9174-7d5402cd8bd3</guid>
      <title>AI BOMs, and other insights into the future of Cybersecurity and AI | An RSA Conference 2024 Conversation with Helen Oakley and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Helen Oakley</strong>, Director of Secure Software Supply Chain and Secure Development, SAP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/helen-oakley/">https://www.linkedin.com/in/helen-oakley/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This year many conversation at RSA conference rotate around artificial intelligence. Yes, AI is becoming more prevalent and essential, even in cybersecurity. At ITSP Magazine's RSA 2024 coverage, Helen Oakley and Christina Stokes shed light on the critical role of AI BOMs in safeguarding our digital ecosystems.</p><p><strong>The Introduction of Helen Oakley with SAP</strong></p><p>Christina Stokes sits down with Helen Oakley, director of software supply chain security and secure development at SAP, to learn about her journey from software development to cybersecurity. Helen discusses the importance of securing software supply chains in a global context where attacks can have far-reaching implications.</p><p><strong>Unpacking the Significance of Supply Chain Security</strong></p><p>Helen elaborates on the evolving landscape of cybersecurity, emphasizing the increasing focus on supply chain security as a prime target for attackers. She highlights the vulnerabilities present in open source components and the imperative to instill transparency and automation in securing software development processes.</p><p><strong>The Intersection of AI and Security</strong></p><p>As the conversation steers towards AI being used as a weapon in supply chain attacks, Christina and Helen explore the concept of weaponizing tools and the proactive measures needed to mitigate AI-related security risks. They underscore the need for vigilance in understanding AI systems and guarding against malicious manipulation.</p><p><strong>The Role of AI BOMs in Cybersecurity</strong></p><p>Helen connects the dots between the workshop's focus on AI BOMs and the imperative for comprehensive transparency in AI systems. She elucidates how AI Bill of Materials (BOM) acts as a framework for understanding AI models, their development processes, and potential risks, allowing for effective risk assessment and response strategies.</p><p><strong>The Evolution of AI and Its Industry Impact</strong></p><p>Christina reflects on the rapid evolution of AI in shaping industries and the need for professionals to adapt to AI technologies. She envisions AI as a collaborative ally in enhancing security measures, emphasizing the pivotal role of humans in monitoring and optimizing AI systems for accuracy and reliability.</p><p><strong>Exploring Hypothetical Scenarios of AI Apocalypse</strong></p><p>In a thought-provoking discussion, Helen and Christina speculate on hypothetical scenarios where AI could potentially pose existential threats. They stress the importance of training AI models with precision to align with human values and prevent catastrophic consequences.</p><p><strong>Resources and Community Engagement in AI Security</strong></p><p>Helen encourages following her on LinkedIn for educational content and highlights the upcoming AIBOM forum by CISA government, inviting industry experts and enthusiasts to contribute to the dialogue.</p><p>As we navigate the complexities of cybersecurity and artificial intelligence, the insights shared by Helen Oakley and Christina Stokes illuminate the path towards a more secure and transparent digital future. From supply chain intricacies to the transformative potential of AI, the discourse echoes the need for collaboration and innovation in safeguarding our digital ecosystems.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 12 May 2024 02:59:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes, Helen Oakley)</author>
      <link>https://eventcoveragepodcast.com/episodes/ai-bombs-and-other-insights-into-the-future-of-cybersecurity-and-ai-an-rsa-conference-2024-conversation-with-helen-oakley-and-christina-stokes-on-location-coverage-with-sean-martin-and-marco-ciappelli-c3tqBcPX</link>
      <content:encoded><![CDATA[<p><strong>Guest: Helen Oakley</strong>, Director of Secure Software Supply Chain and Secure Development, SAP</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/helen-oakley/">https://www.linkedin.com/in/helen-oakley/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This year many conversation at RSA conference rotate around artificial intelligence. Yes, AI is becoming more prevalent and essential, even in cybersecurity. At ITSP Magazine's RSA 2024 coverage, Helen Oakley and Christina Stokes shed light on the critical role of AI BOMs in safeguarding our digital ecosystems.</p><p><strong>The Introduction of Helen Oakley with SAP</strong></p><p>Christina Stokes sits down with Helen Oakley, director of software supply chain security and secure development at SAP, to learn about her journey from software development to cybersecurity. Helen discusses the importance of securing software supply chains in a global context where attacks can have far-reaching implications.</p><p><strong>Unpacking the Significance of Supply Chain Security</strong></p><p>Helen elaborates on the evolving landscape of cybersecurity, emphasizing the increasing focus on supply chain security as a prime target for attackers. She highlights the vulnerabilities present in open source components and the imperative to instill transparency and automation in securing software development processes.</p><p><strong>The Intersection of AI and Security</strong></p><p>As the conversation steers towards AI being used as a weapon in supply chain attacks, Christina and Helen explore the concept of weaponizing tools and the proactive measures needed to mitigate AI-related security risks. They underscore the need for vigilance in understanding AI systems and guarding against malicious manipulation.</p><p><strong>The Role of AI BOMs in Cybersecurity</strong></p><p>Helen connects the dots between the workshop's focus on AI BOMs and the imperative for comprehensive transparency in AI systems. She elucidates how AI Bill of Materials (BOM) acts as a framework for understanding AI models, their development processes, and potential risks, allowing for effective risk assessment and response strategies.</p><p><strong>The Evolution of AI and Its Industry Impact</strong></p><p>Christina reflects on the rapid evolution of AI in shaping industries and the need for professionals to adapt to AI technologies. She envisions AI as a collaborative ally in enhancing security measures, emphasizing the pivotal role of humans in monitoring and optimizing AI systems for accuracy and reliability.</p><p><strong>Exploring Hypothetical Scenarios of AI Apocalypse</strong></p><p>In a thought-provoking discussion, Helen and Christina speculate on hypothetical scenarios where AI could potentially pose existential threats. They stress the importance of training AI models with precision to align with human values and prevent catastrophic consequences.</p><p><strong>Resources and Community Engagement in AI Security</strong></p><p>Helen encourages following her on LinkedIn for educational content and highlights the upcoming AIBOM forum by CISA government, inviting industry experts and enthusiasts to contribute to the dialogue.</p><p>As we navigate the complexities of cybersecurity and artificial intelligence, the insights shared by Helen Oakley and Christina Stokes illuminate the path towards a more secure and transparent digital future. From supply chain intricacies to the transformative potential of AI, the discourse echoes the need for collaboration and innovation in safeguarding our digital ecosystems.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14707656" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/10ee819c-ceba-4426-9be9-15065697cb66/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=10ee819c-ceba-4426-9be9-15065697cb66&amp;feed=2M86zCcc"/>
      <itunes:title>AI BOMs, and other insights into the future of Cybersecurity and AI | An RSA Conference 2024 Conversation with Helen Oakley and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes, Helen Oakley</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:15:18</itunes:duration>
      <itunes:summary>This year many conversation at RSA conference rotate around artificial intelligence. Yes, AI is becoming more prevalent and essential, even in cybersecurity.</itunes:summary>
      <itunes:subtitle>This year many conversation at RSA conference rotate around artificial intelligence. Yes, AI is becoming more prevalent and essential, even in cybersecurity.</itunes:subtitle>
      <itunes:keywords>software development, transparency, technology, marco ciappelli, rsa conference, sean martin, rsa, supply chain security, cybersecurity, conference, risk assessment, industry impact, data centers, ai evolution, rsa conference coverage, data exfiltration, rsac, cisa government, linkedin, helen oakley, rsa conference 2024, ransomware, podcast, rsaconference, rsa 2024, machine learning, ai, sap, ai apocalypse, community input, ai boms</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5bf64457-012f-4f13-bca9-dee638d7540b</guid>
      <title>Bye Bye RSA Conference 2024: ITSPmagazine’s Goodbye to RSA Conference 2024 and Learn What Comes Next | An RSA Conference 2024 Conversation with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The recent RSA Conference 2024 held in San Francisco was not just an event; it was an immersive experience filled with insightful conversations, meaningful connections, and a deep dive into the ever-evolving landscape of cybersecurity. As the team from ITSPmagazine, including Marco Ciappelli, Christina Stokes, and Sean Martin, embarked on this enriching journey, they brought back a wealth of knowledge and stories to share.</p><p><strong>Networking Highlights</strong></p><p>The RSA Conference provided a platform for the ITSPmagazine team to engage with industry experts and thought leaders. Conversations ranged from AI ethics to cyber peace initiatives, highlighting the diverse perspectives shaping the cybersecurity domain. Key discussions with Justin Hutchins, Helen Oakley, and Adrian Ogee delved into crucial topics like the weaponization of AI and the importance of cybersecurity in non-profit organizations.</p><p><strong>Broadcast Alley</strong></p><p>One of the focal points of the conference was the vibrant atmosphere of Broadcast Alley, where innovative organizations showcased their groundbreaking work. ITSPmagazine's conversations with Level Blue, former AT&T Cyber Security, Coro, and SquareX shed light on the latest advancements in the field and emphasized the collaborative efforts driving cybersecurity solutions, amongst many other companies that shared their news with ITSPmagazine’s global audience.</p><p><strong>Embracing Humanity in Technology</strong></p><p>At the core of ITSPmagazine's mission lies a commitment to humanizing technology and fostering meaningful dialogues. The team's interactions with Larry Whiteside, Geoff White, and Steve Lucinski and many others in the industry underscored the significance of infusing humanity into the world of cybersecurity. These heartfelt exchanges transcended mere technicalities, moving into the ethical dimensions of technology and its impact on society.</p><p><strong>Looking Ahead</strong></p><p>As the RSA Conference drew to a close, the ITSPmagazine team reflected on the eventful week and expressed gratitude for the engaging discussions and camaraderie shared. With upcoming events like Infosecurity Europe and Black Hat USA on the horizon, there is a sense of anticipation for continued collaborations and insightful dialogues in the cybersecurity community.</p><p>The RSA Conference 2024 served as a catalyst for invigorating conversations, innovative ideas, and lasting connections within the cybersecurity sphere. ITSPmagazine's presence not only captured the essence of the event but also epitomized the spirit of meaningful engagement and thought leadership. <br /><br />As we bid farewell to San Francisco and RSA Conference 2024, we eagerly await the next chapter of exploration, discovery, and humanity.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 12 May 2024 02:18:18 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes)</author>
      <link>https://eventcoveragepodcast.com/episodes/bye-bye-rsa-conference-2024-itspmagazines-goodbye-to-rsa-conference-2024-and-learn-what-comes-next-an-rsa-conference-2024-conversation-with-christina-stokes-on-location-coverage-with-sean-martin-and-marco-ciappelli-_SJiHbEM</link>
      <content:encoded><![CDATA[<p><strong>Guest: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The recent RSA Conference 2024 held in San Francisco was not just an event; it was an immersive experience filled with insightful conversations, meaningful connections, and a deep dive into the ever-evolving landscape of cybersecurity. As the team from ITSPmagazine, including Marco Ciappelli, Christina Stokes, and Sean Martin, embarked on this enriching journey, they brought back a wealth of knowledge and stories to share.</p><p><strong>Networking Highlights</strong></p><p>The RSA Conference provided a platform for the ITSPmagazine team to engage with industry experts and thought leaders. Conversations ranged from AI ethics to cyber peace initiatives, highlighting the diverse perspectives shaping the cybersecurity domain. Key discussions with Justin Hutchins, Helen Oakley, and Adrian Ogee delved into crucial topics like the weaponization of AI and the importance of cybersecurity in non-profit organizations.</p><p><strong>Broadcast Alley</strong></p><p>One of the focal points of the conference was the vibrant atmosphere of Broadcast Alley, where innovative organizations showcased their groundbreaking work. ITSPmagazine's conversations with Level Blue, former AT&T Cyber Security, Coro, and SquareX shed light on the latest advancements in the field and emphasized the collaborative efforts driving cybersecurity solutions, amongst many other companies that shared their news with ITSPmagazine’s global audience.</p><p><strong>Embracing Humanity in Technology</strong></p><p>At the core of ITSPmagazine's mission lies a commitment to humanizing technology and fostering meaningful dialogues. The team's interactions with Larry Whiteside, Geoff White, and Steve Lucinski and many others in the industry underscored the significance of infusing humanity into the world of cybersecurity. These heartfelt exchanges transcended mere technicalities, moving into the ethical dimensions of technology and its impact on society.</p><p><strong>Looking Ahead</strong></p><p>As the RSA Conference drew to a close, the ITSPmagazine team reflected on the eventful week and expressed gratitude for the engaging discussions and camaraderie shared. With upcoming events like Infosecurity Europe and Black Hat USA on the horizon, there is a sense of anticipation for continued collaborations and insightful dialogues in the cybersecurity community.</p><p>The RSA Conference 2024 served as a catalyst for invigorating conversations, innovative ideas, and lasting connections within the cybersecurity sphere. ITSPmagazine's presence not only captured the essence of the event but also epitomized the spirit of meaningful engagement and thought leadership. <br /><br />As we bid farewell to San Francisco and RSA Conference 2024, we eagerly await the next chapter of exploration, discovery, and humanity.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="9574293" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1f18e3ff-7a63-46fb-bf84-e660c16e6a8e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1f18e3ff-7a63-46fb-bf84-e660c16e6a8e&amp;feed=2M86zCcc"/>
      <itunes:title>Bye Bye RSA Conference 2024: ITSPmagazine’s Goodbye to RSA Conference 2024 and Learn What Comes Next | An RSA Conference 2024 Conversation with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:09:57</itunes:duration>
      <itunes:summary>The recent RSA Conference 2024 held in San Francisco was not just an event; it was an immersive experience filled with insightful conversations, meaningful connections, and a deep dive into the ever-evolving landscape of cybersecurity. </itunes:summary>
      <itunes:subtitle>The recent RSA Conference 2024 held in San Francisco was not just an event; it was an immersive experience filled with insightful conversations, meaningful connections, and a deep dive into the ever-evolving landscape of cybersecurity. </itunes:subtitle>
      <itunes:keywords>collaboration, thought leadership, technology, marco ciappelli, humanity, infosecurity europe, rsa conference, exploration, sean martin, rsa, cybersecurity, hacker summer camp, conference, industry experts, innovation, rsa conference coverage, rsac, connections, dialogue, rsa conference 2024, podcast, ai ethics, rsaconference, christina stokes, ethical dimensions, cyber peace, itspmagazine, society, cybersecurityconference, san francisco, broadcast alley</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">49900144-e129-42de-9a26-9c6ea50aa930</guid>
      <title>Unveiling the Future of Cybersecurity: A Deep Dive into the LevelBlue Futures Report | A Brand Story Conversation From RSA Conference 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it's a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report, a comprehensive annual thought leadership report that offers a glimpse into the future of cybersecurity and resilience. Join us as we unravel the key takeaways and implications of this groundbreaking report.</p><p><strong>Exploring the Landscape</strong></p><p>The LevelBlue Futures Report covers the core challenges and opportunities faced by organizations when it comes to cybersecurity and resilience. In a candid conversation between Theresa Lanowitz, Chief Evangelist of ATT Cybersecurity and Agent of LevelBlue, and Sean Martin, the stage is set for an enlightening discussion on the pressing issues at hand.</p><p><strong>Key Insights and Findings: A Closer Look</strong></p><p>As the conversation unfolds, we are introduced to critical findings from the report. From the changing role of the economic buyer to the imperative of aligning cybersecurity with business objectives, each insight sheds light on the evolving dynamics of the cybersecurity landscape.</p><p><strong>Challenges and Barriers: Addressing the Reality</strong></p><p>One of the stark revelations from the report is the prevailing challenges and barriers that hinder organizations from achieving cyber resilience. From the lack of a formalized incident response plan to the reactive nature of cybersecurity practices, the report highlights the urgent need for proactive and intentional cybersecurity measures.</p><p><strong>Looking Toward the Future: A Call to Action</strong></p><p>Despite the hurdles and complexities inherent in cybersecurity, the LevelBlue Futures Report serves as a guidance for organizations seeking to bolster their cybersecurity posture. By leveraging the insights and recommendations laid out in the report, organizations can embark on a journey towards enhanced cyber resilience and strategic alignment with business goals.</p><p><strong>Empowering Change: The Role of Strategic Planning and Collaboration</strong></p><p>A key theme that emerges from the report is the pivotal role of strategic planning and collaboration in driving cybersecurity innovation and resilience. By engaging third-party advisors, fostering cross-functional communication, and realigning cybersecurity investments with business objectives, organizations can pave the way for transformative change in their cybersecurity practices.</p><p>With the LevelBlue Futures Report one thing becomes abundantly clear: the future of cybersecurity lies in proactive, business-aligned strategies that prioritize resilience and innovation. By heeding the insights and recommendations put forth in the report, organizations can chart a course towards a more secure and resilient future.</p><p>In an era where cybersecurity threats loom large and innovations abound, armed with knowledge, foresight, and a commitment to change, organizations can forge a path towards a brighter, more secure tomorrow.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>LevelBlue Futures Report: <a href="https://itspm.ag/att-cy8awv" target="_blank">https://itspm.ag/att-cy8awv</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 03:53:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-future-of-cybersecurity-a-deep-dive-into-the-levelblue-futures-report-a-brand-story-conversation-from-rsa-conference-2024-a-levelblue-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-2esH_4pQ</link>
      <content:encoded><![CDATA[<p>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it's a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report, a comprehensive annual thought leadership report that offers a glimpse into the future of cybersecurity and resilience. Join us as we unravel the key takeaways and implications of this groundbreaking report.</p><p><strong>Exploring the Landscape</strong></p><p>The LevelBlue Futures Report covers the core challenges and opportunities faced by organizations when it comes to cybersecurity and resilience. In a candid conversation between Theresa Lanowitz, Chief Evangelist of ATT Cybersecurity and Agent of LevelBlue, and Sean Martin, the stage is set for an enlightening discussion on the pressing issues at hand.</p><p><strong>Key Insights and Findings: A Closer Look</strong></p><p>As the conversation unfolds, we are introduced to critical findings from the report. From the changing role of the economic buyer to the imperative of aligning cybersecurity with business objectives, each insight sheds light on the evolving dynamics of the cybersecurity landscape.</p><p><strong>Challenges and Barriers: Addressing the Reality</strong></p><p>One of the stark revelations from the report is the prevailing challenges and barriers that hinder organizations from achieving cyber resilience. From the lack of a formalized incident response plan to the reactive nature of cybersecurity practices, the report highlights the urgent need for proactive and intentional cybersecurity measures.</p><p><strong>Looking Toward the Future: A Call to Action</strong></p><p>Despite the hurdles and complexities inherent in cybersecurity, the LevelBlue Futures Report serves as a guidance for organizations seeking to bolster their cybersecurity posture. By leveraging the insights and recommendations laid out in the report, organizations can embark on a journey towards enhanced cyber resilience and strategic alignment with business goals.</p><p><strong>Empowering Change: The Role of Strategic Planning and Collaboration</strong></p><p>A key theme that emerges from the report is the pivotal role of strategic planning and collaboration in driving cybersecurity innovation and resilience. By engaging third-party advisors, fostering cross-functional communication, and realigning cybersecurity investments with business objectives, organizations can pave the way for transformative change in their cybersecurity practices.</p><p>With the LevelBlue Futures Report one thing becomes abundantly clear: the future of cybersecurity lies in proactive, business-aligned strategies that prioritize resilience and innovation. By heeding the insights and recommendations put forth in the report, organizations can chart a course towards a more secure and resilient future.</p><p>In an era where cybersecurity threats loom large and innovations abound, armed with knowledge, foresight, and a commitment to change, organizations can forge a path towards a brighter, more secure tomorrow.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/attcybersecurity-3jdk3">https://itspm.ag/attcybersecurity-3jdk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>LevelBlue Futures Report: <a href="https://itspm.ag/att-cy8awv" target="_blank">https://itspm.ag/att-cy8awv</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19392255" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/05f0e3c7-80db-4e88-a186-b054994b8e49/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=05f0e3c7-80db-4e88-a186-b054994b8e49&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the Future of Cybersecurity: A Deep Dive into the LevelBlue Futures Report | A Brand Story Conversation From RSA Conference 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:10</itunes:duration>
      <itunes:summary>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it&apos;s a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report.</itunes:summary>
      <itunes:subtitle>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it&apos;s a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report.</itunes:subtitle>
      <itunes:keywords>collaboration, marco ciappelli, rsa conference, sean martin, strategic planning, cybersecurity, proactive, innovation, transformation, future, resilience, barriers, level blue, alignment, business objectives, security, cyber resilience, guidance, insights, theresa lanowitz, knowledge, recommendations, challenges, brand story, report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">afbc3f14-929f-4cca-913d-a75327b5889c</guid>
      <title>Digital Dawn: Cyber Security Policy in the Wake of Political Change | A Brand Story Conversation From RSA Conference 2024 | A NCC Group Story with Siân John | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>This Brand Story Podcast comes to you from the RSA Conference Broadcast Alley and features an insightful discussion between Sean Martin, the host, and Siân John, the Chief Technology Officer at NCC Group. The conversation dives deep into the complex world of cybersecurity, shedding light on critical issues and trends impacting organizations globally. Siân John, in her role as the Chief Technology Officer at NCC Group, brings a wealth of experience and knowledge to the table. She discusses the challenges faced by organizations in the rapidly evolving cybersecurity landscape.</p><p>From insights to innovation, threat intelligence to research, her role encompasses a wide range of responsibilities aimed at enhancing cybersecurity capabilities. One of the key highlights of the episode is the discussion around the shift in regulatory dynamics driven by citizen advocacy. Siân John emphasizes how the push for regulations, especially in areas like online safety and data privacy, is now coming from the citizens themselves. This shift signifies a growing awareness and concern among the general public regarding cybersecurity issues.</p><p>The conversation also touches upon the importance of bridging the gap between business and cybersecurity. Sean Martin and Siân John discuss how organizations need to align their security strategies with business objectives to effectively manage cyber risks. By emphasizing the need for a business-driven approach to cybersecurity, they underscore the significance of integrating security into the fabric of the organization. Furthermore, the episode explores emerging technology trends that are reshaping the cybersecurity landscape. Siân John highlights the importance of consolidation, simplification, and automation in security operations.</p><p>The discussion underscores the need for organizations to adapt to new technologies while ensuring a streamlined and resilient cybersecurity posture. As the conversation unfolds, Sean Martin and Siân John stress the importance of strategic planning and gradual implementation in cybersecurity initiatives. They caution against hasty decisions driven by urgency, advocating for a methodical approach to security transformation. By drawing parallels with failed IT projects, they emphasize the need for careful planning and execution in cybersecurity endeavors.</p><p>Ultimately, the episode offers valuable insights into the evolving cybersecurity landscape and the role of key stakeholders in driving security transformation. Sean Martin and Siân John bring a wealth of knowledge and expertise to the table, offering practical advice and strategic guidance for organizations navigating the complex cybersecurity terrain.</p><p>To learn more about the latest cybersecurity trends and best practices, connect with Sean John and the team at NCC Group and explore the cutting-edge solutions they offer to enhance cybersecurity resilience and protect against evolving threats.</p><p>Learn more about NCC Group: <a href="https://itspm.ag/ncc-gr1ajh" target="_blank">https://itspm.ag/ncc-gr1ajh</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Siân John</strong>, Chief Technology Officer,  NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from NCC Group: <a href="https://www.itspmagazine.com/directory/ncc-group" target="_blank">https://www.itspmagazine.com/directory/ncc-group</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 01:39:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Siân John)</author>
      <link>https://eventcoveragepodcast.com/episodes/digital-dawn-cyber-security-policy-in-the-wake-of-political-change-a-brand-story-conversation-from-rsa-conference-2024-a-ncc-group-story-with-sian-john-on-location-coverage-with-sean-martin-and-marco-ciappelli-a3WBBIPa</link>
      <content:encoded><![CDATA[<p>This Brand Story Podcast comes to you from the RSA Conference Broadcast Alley and features an insightful discussion between Sean Martin, the host, and Siân John, the Chief Technology Officer at NCC Group. The conversation dives deep into the complex world of cybersecurity, shedding light on critical issues and trends impacting organizations globally. Siân John, in her role as the Chief Technology Officer at NCC Group, brings a wealth of experience and knowledge to the table. She discusses the challenges faced by organizations in the rapidly evolving cybersecurity landscape.</p><p>From insights to innovation, threat intelligence to research, her role encompasses a wide range of responsibilities aimed at enhancing cybersecurity capabilities. One of the key highlights of the episode is the discussion around the shift in regulatory dynamics driven by citizen advocacy. Siân John emphasizes how the push for regulations, especially in areas like online safety and data privacy, is now coming from the citizens themselves. This shift signifies a growing awareness and concern among the general public regarding cybersecurity issues.</p><p>The conversation also touches upon the importance of bridging the gap between business and cybersecurity. Sean Martin and Siân John discuss how organizations need to align their security strategies with business objectives to effectively manage cyber risks. By emphasizing the need for a business-driven approach to cybersecurity, they underscore the significance of integrating security into the fabric of the organization. Furthermore, the episode explores emerging technology trends that are reshaping the cybersecurity landscape. Siân John highlights the importance of consolidation, simplification, and automation in security operations.</p><p>The discussion underscores the need for organizations to adapt to new technologies while ensuring a streamlined and resilient cybersecurity posture. As the conversation unfolds, Sean Martin and Siân John stress the importance of strategic planning and gradual implementation in cybersecurity initiatives. They caution against hasty decisions driven by urgency, advocating for a methodical approach to security transformation. By drawing parallels with failed IT projects, they emphasize the need for careful planning and execution in cybersecurity endeavors.</p><p>Ultimately, the episode offers valuable insights into the evolving cybersecurity landscape and the role of key stakeholders in driving security transformation. Sean Martin and Siân John bring a wealth of knowledge and expertise to the table, offering practical advice and strategic guidance for organizations navigating the complex cybersecurity terrain.</p><p>To learn more about the latest cybersecurity trends and best practices, connect with Sean John and the team at NCC Group and explore the cutting-edge solutions they offer to enhance cybersecurity resilience and protect against evolving threats.</p><p>Learn more about NCC Group: <a href="https://itspm.ag/ncc-gr1ajh" target="_blank">https://itspm.ag/ncc-gr1ajh</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Siân John</strong>, Chief Technology Officer,  NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from NCC Group: <a href="https://www.itspmagazine.com/directory/ncc-group" target="_blank">https://www.itspmagazine.com/directory/ncc-group</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21205446" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d944e408-d0a1-4098-acc6-aba5d10ae3ae/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d944e408-d0a1-4098-acc6-aba5d10ae3ae&amp;feed=2M86zCcc"/>
      <itunes:title>Digital Dawn: Cyber Security Policy in the Wake of Political Change | A Brand Story Conversation From RSA Conference 2024 | A NCC Group Story with Siân John | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Siân John</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:03</itunes:duration>
      <itunes:summary>Join Sean Martin, host of Redefining Cyber Security Podcast, and Siân John, Chief Technology Officer at NCC Group, in an engaging discussion on the evolving cybersecurity landscape. Explore key insights on citizen-driven regulation, bridging business-cybersecurity gaps, and emerging trends reshaping security strategies.</itunes:summary>
      <itunes:subtitle>Join Sean Martin, host of Redefining Cyber Security Podcast, and Siân John, Chief Technology Officer at NCC Group, in an engaging discussion on the evolving cybersecurity landscape. Explore key insights on citizen-driven regulation, bridging business-cybersecurity gaps, and emerging trends reshaping security strategies.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, siân john, trends, rsa conference, sean martin, automation, cybersecurity, it projects, business, ncc group, innovation, threat intelligence, redefining cyber security podcast, data privacy, citizen advocacy, podcast, security, strategy, regulation, cyber risks, brand story, digital dawn report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fb10c61b-d1be-4d4a-8e0d-15961630ac2c</guid>
      <title>Revolutionizing Cybersecurity for Small Businesses and Mid-Market Companies | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions due to limited resources and expertise. That's where Coro comes in, revolutionizing cybersecurity for smaller enterprises with its innovative approach.</p><p><strong>Unveiling Coro: A Purpose-Built Platform</strong></p><p>The conversation between Sean Martin, host of the Redefining Cybersecurity Podcast on ITSPmagazine, and Dror Liwer, sheds light on the groundbreaking solutions offered by Coro. Positioned as the first purpose-built platform for the mid-market and small businesses, Coro addresses the cybersecurity needs of organizations that are often overlooked by traditional enterprise-focused solutions.</p><p><strong>Understanding the Threat Landscape</strong></p><p>Dror Liwer highlights the evolving threat landscape faced by small businesses and mid-market companies. Attackers are increasingly targeting these organizations due to their vulnerabilities and limited protection measures. With Coro, businesses can gain comprehensive control and protection at an affordable cost, tailored to their specific needs.</p><p><strong>Simplifying Cybersecurity Management</strong></p><p>One of the key benefits of Coro is its simplicity and ease of use. Unlike traditional cybersecurity solutions that require extensive configuration and management, Coro streamlines the deployment process, allowing businesses to be up and running within an hour for all 14 modules. By consolidating protection measures into one platform, Coro eliminates the need for multiple endpoint agents and ensures seamless integration across different modules.</p><p><strong>Peace of Mind and Assurance</strong></p><p>Coro's approach to cybersecurity is not just about protection; it's about providing peace of mind to business owners and executives. Automatic updates, simplified dashboards, and detailed reports give stakeholders the confidence to know that their systems are secure and compliant. Additionally, Coro's emphasis on transparency and accountability positions businesses to easily obtain cyber insurance by demonstrating their commitment to cybersecurity best practices.</p><p><strong>Affordable and Comprehensive Solutions</strong></p><p>Coro offers five suites tailored to different business needs, including endpoint protection, email protection, network and access, essential suite, and core complete. With competitive pricing starting at $6 per user per month, businesses can access a wide range of cybersecurity features without breaking the bank. The core complete suite, priced at $15 per user per month, provides a comprehensive package of security measures that cover all bases.</p><p><strong>The Future of Cybersecurity is Here</strong></p><p>As the cybersecurity landscape continues to evolve, solutions like Coro are paving the way for smaller businesses to achieve robust protection without the complexities and high costs associated with traditional enterprise solutions. By empowering organizations to focus on their core operations and leaving the cybersecurity heavy lifting to Coro, businesses can embrace a future where cybersecurity is no longer a headache but a seamless part of their operations.</p><p>Coro's innovative approach to cybersecurity is setting a new standard for small businesses and mid-market companies. By providing affordable, comprehensive, and user-friendly solutions, Coro is ensuring that cybersecurity is no longer a luxury but a necessity for all organizations. Embrace the future of cybersecurity with Coro and protect your business from ever-evolving threats.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 00:50:30 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://eventcoveragepodcast.com/episodes/revolutionizing-cybersecurity-for-small-businesses-and-mid-market-companies-a-brand-story-conversation-from-rsa-conference-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-X85N1TCm</link>
      <content:encoded><![CDATA[<p>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions due to limited resources and expertise. That's where Coro comes in, revolutionizing cybersecurity for smaller enterprises with its innovative approach.</p><p><strong>Unveiling Coro: A Purpose-Built Platform</strong></p><p>The conversation between Sean Martin, host of the Redefining Cybersecurity Podcast on ITSPmagazine, and Dror Liwer, sheds light on the groundbreaking solutions offered by Coro. Positioned as the first purpose-built platform for the mid-market and small businesses, Coro addresses the cybersecurity needs of organizations that are often overlooked by traditional enterprise-focused solutions.</p><p><strong>Understanding the Threat Landscape</strong></p><p>Dror Liwer highlights the evolving threat landscape faced by small businesses and mid-market companies. Attackers are increasingly targeting these organizations due to their vulnerabilities and limited protection measures. With Coro, businesses can gain comprehensive control and protection at an affordable cost, tailored to their specific needs.</p><p><strong>Simplifying Cybersecurity Management</strong></p><p>One of the key benefits of Coro is its simplicity and ease of use. Unlike traditional cybersecurity solutions that require extensive configuration and management, Coro streamlines the deployment process, allowing businesses to be up and running within an hour for all 14 modules. By consolidating protection measures into one platform, Coro eliminates the need for multiple endpoint agents and ensures seamless integration across different modules.</p><p><strong>Peace of Mind and Assurance</strong></p><p>Coro's approach to cybersecurity is not just about protection; it's about providing peace of mind to business owners and executives. Automatic updates, simplified dashboards, and detailed reports give stakeholders the confidence to know that their systems are secure and compliant. Additionally, Coro's emphasis on transparency and accountability positions businesses to easily obtain cyber insurance by demonstrating their commitment to cybersecurity best practices.</p><p><strong>Affordable and Comprehensive Solutions</strong></p><p>Coro offers five suites tailored to different business needs, including endpoint protection, email protection, network and access, essential suite, and core complete. With competitive pricing starting at $6 per user per month, businesses can access a wide range of cybersecurity features without breaking the bank. The core complete suite, priced at $15 per user per month, provides a comprehensive package of security measures that cover all bases.</p><p><strong>The Future of Cybersecurity is Here</strong></p><p>As the cybersecurity landscape continues to evolve, solutions like Coro are paving the way for smaller businesses to achieve robust protection without the complexities and high costs associated with traditional enterprise solutions. By empowering organizations to focus on their core operations and leaving the cybersecurity heavy lifting to Coro, businesses can embrace a future where cybersecurity is no longer a headache but a seamless part of their operations.</p><p>Coro's innovative approach to cybersecurity is setting a new standard for small businesses and mid-market companies. By providing affordable, comprehensive, and user-friendly solutions, Coro is ensuring that cybersecurity is no longer a luxury but a necessity for all organizations. Embrace the future of cybersecurity with Coro and protect your business from ever-evolving threats.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18619901" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9dc5304a-f399-4108-805f-e12052554457/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9dc5304a-f399-4108-805f-e12052554457&amp;feed=2M86zCcc"/>
      <itunes:title>Revolutionizing Cybersecurity for Small Businesses and Mid-Market Companies | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:22</itunes:duration>
      <itunes:summary>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions.</itunes:summary>
      <itunes:subtitle>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions.</itunes:subtitle>
      <itunes:keywords>seamless integration, innovative solutions, transparency, comprehensive suites, marco ciappelli, rsa conference, evolving threats, threat landscape, sean martin, future of cybersecurity, cybersecurity, places, robust security measures, cyber insurance, dror liwer, small businesses, simplicity, or facts, affordable pricing, peace of mind, user-friendly, mid-market companies, accountability, business owners, brand story, coro, protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5fad50bf-07aa-4301-aaa6-0e149940ba45</guid>
      <title>Protecting the Vulnerable in Cyberspace: Unveiling The CyberPeace Institute&apos;s Mission | An RSA Conference 2024 Conversation with Adrien Ogee and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Adrien Ogee</strong>, Chief Operations Officer, CyberPeace Institute [<a href="https://twitter.com/cyberpeaceinst">@CyberpeaceInst</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adrien-ogee/">https://www.linkedin.com/in/adrien-ogee/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Glimpse into CyberPeace Institute</strong></p><p>Christina welcomed Adrien, praising CyberPeace as an incredible organization with a vital mission. Adrien, an experienced cyber security professional, shared insights into his journey from working for governments to serving at the CyberPeace Institute. He emphasized the institute's focus on protecting the most vulnerable individuals globally and collaborating with governments to enhance cyber stability.</p><p><strong>Advocacy and Protective Measures</strong></p><p>Adrien elaborated on CyberPeace's advocacy efforts at international forums like the United Nations, highlighting the evidence-based approach to raise awareness among policymakers. With a network of 300 nonprofits, CyberPeace engages volunteers to assist vulnerable organizations in enhancing their cybersecurity posture. The institute's initiatives range from phishing simulations to incident response planning, aiming to protect those at risk in cyberspace.</p><p><strong>Addressing Nonprofit Challenges</strong></p><p>In response to Christina's inquiry about challenges faced by nonprofits, Adrien outlined three main threats—data breaches, financial attacks, and operational disruptions. He underscored the escalating ransomware trend and the dire consequences faced by organizations lacking robust defense mechanisms. CyberPeace's role in assisting nonprofits with cybersecurity measures underscores the institute's commitment to mitigating cyber risks for vulnerable communities.</p><p><strong>Global Impact and Future Endeavors</strong></p><p>The conversation moved into the global landscape of cybercrime, emphasizing the universal nature of threats while acknowledging regional nuances. Adrien highlighted the rise of ransomware as a pervasive concern and imparted insights on CyberPeace's collaborations with international partners to extend support to a broader array of nonprofits worldwide. The institute's focus on granular impact assessment aims to drive meaningful change at governmental and societal levels.</p><p><strong>Call to Action: Join the CyberPeace Movement</strong></p><p>As the discussion concluded, Christina underscored the critical need for collective action in combating cyber threats. Adrien stressed the importance of engaging with CyberPeace and the broader cybersecurity community to contribute skills, resources, and time towards protecting vulnerable populations. The call to action resonated with the essence of CyberPeace's mission—unity in defending against digital harm and promoting a safer online environment for all.</p><p>This conversation between Christina and Adrien at RSA 2024 highlight the role of organizations like CyberPeace Institute in fortifying cyber resilience and ensuring the safety of marginalized communities in the digital sphere.</p><p>In a world where cyber threats loom large, CyberPeace Institute's unwavering commitment to safeguarding the most vulnerable individuals underscores the transformative power of collective action in fostering a secure and inclusive digital ecosystem. Join the movement, stand united with CyberPeace, and together, let's pave the way towards a safer cyberspace for all.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>CyberPeace Institute: <a href="https://cyberpeaceinstitute.org/">https://cyberpeaceinstitute.org/</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 21:31:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Adrien Ogee, Christina Stokes)</author>
      <link>https://eventcoveragepodcast.com/episodes/protecting-the-vulnerable-in-cyberspace-unveiling-the-cyberpeace-institutes-mission-an-rsa-conference-2024-conversation-with-adrien-ogee-and-christina-stokes-on-location-coverage-with-sean-martin-and-marco-ciappelli-Qu7iGmL1</link>
      <content:encoded><![CDATA[<p><strong>Guest: Adrien Ogee</strong>, Chief Operations Officer, CyberPeace Institute [<a href="https://twitter.com/cyberpeaceinst">@CyberpeaceInst</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adrien-ogee/">https://www.linkedin.com/in/adrien-ogee/</a></p><p><strong>____________________________</strong></p><p><strong>Host: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Glimpse into CyberPeace Institute</strong></p><p>Christina welcomed Adrien, praising CyberPeace as an incredible organization with a vital mission. Adrien, an experienced cyber security professional, shared insights into his journey from working for governments to serving at the CyberPeace Institute. He emphasized the institute's focus on protecting the most vulnerable individuals globally and collaborating with governments to enhance cyber stability.</p><p><strong>Advocacy and Protective Measures</strong></p><p>Adrien elaborated on CyberPeace's advocacy efforts at international forums like the United Nations, highlighting the evidence-based approach to raise awareness among policymakers. With a network of 300 nonprofits, CyberPeace engages volunteers to assist vulnerable organizations in enhancing their cybersecurity posture. The institute's initiatives range from phishing simulations to incident response planning, aiming to protect those at risk in cyberspace.</p><p><strong>Addressing Nonprofit Challenges</strong></p><p>In response to Christina's inquiry about challenges faced by nonprofits, Adrien outlined three main threats—data breaches, financial attacks, and operational disruptions. He underscored the escalating ransomware trend and the dire consequences faced by organizations lacking robust defense mechanisms. CyberPeace's role in assisting nonprofits with cybersecurity measures underscores the institute's commitment to mitigating cyber risks for vulnerable communities.</p><p><strong>Global Impact and Future Endeavors</strong></p><p>The conversation moved into the global landscape of cybercrime, emphasizing the universal nature of threats while acknowledging regional nuances. Adrien highlighted the rise of ransomware as a pervasive concern and imparted insights on CyberPeace's collaborations with international partners to extend support to a broader array of nonprofits worldwide. The institute's focus on granular impact assessment aims to drive meaningful change at governmental and societal levels.</p><p><strong>Call to Action: Join the CyberPeace Movement</strong></p><p>As the discussion concluded, Christina underscored the critical need for collective action in combating cyber threats. Adrien stressed the importance of engaging with CyberPeace and the broader cybersecurity community to contribute skills, resources, and time towards protecting vulnerable populations. The call to action resonated with the essence of CyberPeace's mission—unity in defending against digital harm and promoting a safer online environment for all.</p><p>This conversation between Christina and Adrien at RSA 2024 highlight the role of organizations like CyberPeace Institute in fortifying cyber resilience and ensuring the safety of marginalized communities in the digital sphere.</p><p>In a world where cyber threats loom large, CyberPeace Institute's unwavering commitment to safeguarding the most vulnerable individuals underscores the transformative power of collective action in fostering a secure and inclusive digital ecosystem. Join the movement, stand united with CyberPeace, and together, let's pave the way towards a safer cyberspace for all.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>CyberPeace Institute: <a href="https://cyberpeaceinstitute.org/">https://cyberpeaceinstitute.org/</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18986423" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/1370963f-cc1b-4e2e-acfc-1339ce32276e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=1370963f-cc1b-4e2e-acfc-1339ce32276e&amp;feed=2M86zCcc"/>
      <itunes:title>Protecting the Vulnerable in Cyberspace: Unveiling The CyberPeace Institute&apos;s Mission | An RSA Conference 2024 Conversation with Adrien Ogee and Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Adrien Ogee, Christina Stokes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:45</itunes:duration>
      <itunes:summary>In the cyber space, where digital threats lurk in the shadows, organizations like the CyberPeace Institute brings hope with its mission to safeguarding the most vulnerable individuals from cyber attacks. Recently, at RSA 2024, a conversation between Christina Stokes, from ITSP magazine, and Adrien Ogee, the Chief Operations Officer of CyberPeace Institute, highlights the institute&apos;s noble mission and impactful initiatives.</itunes:summary>
      <itunes:subtitle>In the cyber space, where digital threats lurk in the shadows, organizations like the CyberPeace Institute brings hope with its mission to safeguarding the most vulnerable individuals from cyber attacks. Recently, at RSA 2024, a conversation between Christina Stokes, from ITSP magazine, and Adrien Ogee, the Chief Operations Officer of CyberPeace Institute, highlights the institute&apos;s noble mission and impactful initiatives.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, regional nuances, cyberpeace institute, data breaches, digital ecosystem ai responses can produce inaccurate information about people, sean martin, rsa, cyber volunteers, vulnerable communities, cybersecurity, conference, granular impact assessment, advocacy, collective action, places, online security, rsa conference coverage, digital peace, digital threats, financial attacks, cybercrime, rsac, or facts, rsa conference 2024, global impact, ransomware, podcast, rsaconference, cyber resilience, nonprofit organizations, adrien ogee, operational disruptions, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f30c6e85-e94d-46a1-b29f-659cd6c1147e</guid>
      <title>The Power of Authentic Connections | An RSA Conference 2024 Conversation with Larry Whiteside Jr. | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Larry Whiteside Jr.</strong>, Chief Information Security Officer, RegScale [<a href="https://twitter.com/RegScale">@RegScale</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/larrywhitesidejr/">https://www.linkedin.com/in/larrywhitesidejr/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Deeper Meaning Beyond Technology</strong></p><p>As Sean and Larry delved into their conversation, it became evident that the heart of their discourse was not solely centered around technology but rather on the individuals who drive the industry forward. Larry emphasized that at the core of cybersecurity endeavors are people—people who work tirelessly to protect businesses, societies, and the world at large. Their candid discussion shed light on the essential role of genuine care and mindfulness towards individuals in a tech-driven world.</p><p><strong>Mindfulness and Authenticity in Cybersecurity</strong></p><p>Larry’s poignant reflections on mindfulness resonated deeply, highlighting the importance of recognizing individuals as whole entities beyond their professional roles. In a fast-paced industry prone to burnout, his emphasis on genuine care for others and maintaining integrity stood out as a beacon of light. The power of authentic connections and the impact of positive actions rippled through Larry’s words, reminding us all of the profound influence we hold in each other's lives.</p><p><strong>The Origin of 'Food for Thought'</strong></p><p>Larry shared insights into his 'Food for Thought' series, revealing the inspiration behind bringing together a global community of brilliant minds to ponder on intriguing questions. His journey of seeking answers from others, fostering meaningful discussions, and sharing wisdom encapsulates the essence of collaboration and collective growth within the cybersecurity realm. Through his thoughtful videos, Larry extends an invitation to engage in deeper contemplation and exchange of ideas within the community.</p><p><strong>Embracing the Power of Connection</strong></p><p>As the conversation between Sean and Larry unfolded, it became evident that at the core of cybersecurity lies the profound impact of genuine connections. Beyond the technical intricacies and threat landscapes, it is the human touch, the empathetic gestures, and the authentic interactions that truly define the essence of cybersecurity efforts.</p><p>In a world that often prioritizes productivity over empathy, Larry Whiteside Jr.'s message serves as a poignant reminder of the transformative power of authenticity and mindfulness in forging meaningful relationships and creating a positive impact within the cybersecurity community.</p><p>This episode show is an honest heartfelt conversation between Sean Martin and Larry Whiteside Jr., offering a glimpse into the profound significance of authentic connections and genuine care within the cybersecurity landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 19:35:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Larry Whiteside Jr.)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-power-of-authentic-connections-an-rsa-conference-2024-conversation-with-larry-whiteside-jr-on-location-coverage-with-sean-martin-and-marco-ciappelli-yT2bxBdJ</link>
      <content:encoded><![CDATA[<p><strong>Guest: Larry Whiteside Jr.</strong>, Chief Information Security Officer, RegScale [<a href="https://twitter.com/RegScale">@RegScale</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/larrywhitesidejr/">https://www.linkedin.com/in/larrywhitesidejr/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>A Deeper Meaning Beyond Technology</strong></p><p>As Sean and Larry delved into their conversation, it became evident that the heart of their discourse was not solely centered around technology but rather on the individuals who drive the industry forward. Larry emphasized that at the core of cybersecurity endeavors are people—people who work tirelessly to protect businesses, societies, and the world at large. Their candid discussion shed light on the essential role of genuine care and mindfulness towards individuals in a tech-driven world.</p><p><strong>Mindfulness and Authenticity in Cybersecurity</strong></p><p>Larry’s poignant reflections on mindfulness resonated deeply, highlighting the importance of recognizing individuals as whole entities beyond their professional roles. In a fast-paced industry prone to burnout, his emphasis on genuine care for others and maintaining integrity stood out as a beacon of light. The power of authentic connections and the impact of positive actions rippled through Larry’s words, reminding us all of the profound influence we hold in each other's lives.</p><p><strong>The Origin of 'Food for Thought'</strong></p><p>Larry shared insights into his 'Food for Thought' series, revealing the inspiration behind bringing together a global community of brilliant minds to ponder on intriguing questions. His journey of seeking answers from others, fostering meaningful discussions, and sharing wisdom encapsulates the essence of collaboration and collective growth within the cybersecurity realm. Through his thoughtful videos, Larry extends an invitation to engage in deeper contemplation and exchange of ideas within the community.</p><p><strong>Embracing the Power of Connection</strong></p><p>As the conversation between Sean and Larry unfolded, it became evident that at the core of cybersecurity lies the profound impact of genuine connections. Beyond the technical intricacies and threat landscapes, it is the human touch, the empathetic gestures, and the authentic interactions that truly define the essence of cybersecurity efforts.</p><p>In a world that often prioritizes productivity over empathy, Larry Whiteside Jr.'s message serves as a poignant reminder of the transformative power of authenticity and mindfulness in forging meaningful relationships and creating a positive impact within the cybersecurity community.</p><p>This episode show is an honest heartfelt conversation between Sean Martin and Larry Whiteside Jr., offering a glimpse into the profound significance of authentic connections and genuine care within the cybersecurity landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14289672" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/acd71bf8-fdd3-428f-8962-c7e2dfc3a115/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=acd71bf8-fdd3-428f-8962-c7e2dfc3a115&amp;feed=2M86zCcc"/>
      <itunes:title>The Power of Authentic Connections | An RSA Conference 2024 Conversation with Larry Whiteside Jr. | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Larry Whiteside Jr.</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:14:52</itunes:duration>
      <itunes:summary>At the RSA Conference, amidst the bustling expo floor and the whirlwind of technology discussions, there lies a gem of a conversation that transcends the ordinary tech talk. Sean Martin of ITSP Magazine sat down with the remarkable Larry Whiteside Jr., and what unfolded was not just a dialogue about cybersecurity and industry trends but a heartfelt exploration of the human connection behind the technology.</itunes:summary>
      <itunes:subtitle>At the RSA Conference, amidst the bustling expo floor and the whirlwind of technology discussions, there lies a gem of a conversation that transcends the ordinary tech talk. Sean Martin of ITSP Magazine sat down with the remarkable Larry Whiteside Jr., and what unfolded was not just a dialogue about cybersecurity and industry trends but a heartfelt exploration of the human connection behind the technology.</itunes:subtitle>
      <itunes:keywords>collaboration, larry whiteside jr., relationship, technology, marco ciappelli, connection, rsa conference, sean martin, rsa, cybersecurity, conference, positive impact, meaningful conversations, technological advancements, rsa conference coverage, authenticity, transformative power, cybersecurity realm, rsac, rsa conference 2024, industry trends, empathy, podcast, collective growth, rsaconference, mindfulness, industry insights, digital world, genuine care, community, cybersecurityconference, human touch</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">05f72a18-0a44-471b-9050-94d43a2ac3a3</guid>
      <title>Book: Rinsed | Unveiling the Intersection of Cybercrime and Money Laundering | An RSA Conference 2024 Conversation with Author and Investigative Journalist Geoff White | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Geoff White</strong>, Author, Investigative Journalist</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/geoffwhitetech/">https://www.linkedin.com/in/geoffwhitetech/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location, Marco Ciappelli and Geoff White dive  into a fascinating conversation about the intricate world of cybercrime, investigative journalism, and the dark realms of money laundering. The duo explored the symbiotic relationship between technology, organized crime, and the evolving landscape of digital currencies like Bitcoin and NFTs.</p><p>From billion-dollar cyber heists to global money laundering rings and crypto-gangsters – Geoff White has covered it all. As an author, speaker, investigative journalist and podcast creator, his work’s been featured by Penguin, the BBC, Audible, Sky News, The Sunday Times and many more.</p><p>His new book for Penguin, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media.</p><p>His first book, Crime Dot Com, covered cybercrime’s emergence as a primal threat to modern society and was published in August 2020 by Reaktion Books. One of the key chapters detailed North Korea’s unlikely emergence as a cyber superpower. It was adapted by the BBC World Service into the hit 10-part podcast series The Lazarus Heist, co-created and co-hosted by Geoff, which immediately ranked number one in the UK Apple chart and within the top 7 in the US.</p><p>Marco Ciappelli invited Geoff White to join him on Broadcast Alley at RSA Conference 2024 to unravel the complex web of interconnected crimes and technologies shaping our modern world. Geoff shared insights from his extensive research and experience, shedding light on the hidden layers of organized crime and technological advancements.</p><p><strong>From Investigative Journalism to Podcasting</strong></p><p>Geoff White discussed his journey from covering technology stories for Channel 4 News to delving deep into cybercrime, highlighting how stories of North Korean hacking and money laundering captured his attention. His work on "The Lazarus Heist" podcast and the subsequent book delves into the astonishing world of cybercrime, where trust between criminals and innovative tactics play a pivotal role.</p><p><strong>Unraveling the Mysteries of Money Laundering</strong></p><p>In their conversation, Geoff White elaborated on the processes of money laundering, emphasizing the three crucial steps - placement, layering, and integration. He explained how technology has revolutionized the ways in which criminals launder money, leveraging crypto assets like Bitcoin while evading traditional detection methods.</p><p><strong>The Rise of Cybercrime and AI</strong></p><p>Geoff White addressed the adversarial battle between cybercriminals and security professionals, pointing out the attacker's advantage in exploiting vulnerabilities rather than developing advanced weaponry. He discussed the role of artificial intelligence in spotting suspicious transactions and the cat-and-mouse game between criminals and law enforcement agencies.</p><p><strong>A Thought-Provoking Discussion on Ethical Dilemmas</strong></p><p>As the conversation turned philosophical, Marco Ciappelli and Geoff White pondered the ethical implications of cybercrime and money laundering in modern society. They touched upon the coexistence of good and evil forces, the necessity of crime prevention, and the ongoing battle between innovation and criminal tactics.</p><p><strong>Audience Engagement and Impact</strong></p><p>Geoff White highlighted the diverse target audience for his work, encompassing cybersecurity professionals, financial crime experts, and cryptocurrency enthusiasts. By crafting engaging narratives and insightful analyses, Geoff aims to make complex topics like money laundering accessible to a broad readership, inviting them to delve into the dark corners of financial crime.</p><p>This dialogue between Marco Ciappelli and Geoff White serves as a poignant reminder of the intricate connections between technology, crime, and societal structures. By bringing these complex topics to light through compelling storytelling and in-depth research, they invite audiences to explore the hidden layers of cybercrime and money laundering, prompting critical reflections on the ethical and practical implications of these phenomena.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>About the Book</strong></p><p>Rinsed reveals how organized crooks have joined forces with the world’s most sophisticated cybercriminals. The result: a vast virtual money-laundering machine too intelligent for most authorities to crack. Through a series of jaw-dropping cases and interviews with insiders at all levels of the system, Geoff White shows how thieves are uniting to successfully get away with the most atrocious crimes on an unprecedented scale.<br /><br />The book follows money from the outrageous luxury of Dubai hotels to sleepy backwaters of coastal Ireland, from the backstreets of Nigeria to the secretive zones of North Korea, to investigate this new cyber supercartel. Through first-hand accounts from the victims of their devastating crimes, White uncovers the extraordinary true story of hi-tech laundering – and exposes its terrible human cost.<br /><br />'Rinsed is as twisty, colourful and terrifyingly eye-opening as the people White investigates. You’ll never look at wealth, technology and crime in the same way’</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks (Book): <a href="https://www.amazon.co.uk/dp/0241624835">https://www.amazon.co.uk/dp/0241624835</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 18:17:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Geoff White)</author>
      <link>https://eventcoveragepodcast.com/episodes/book-rinsed-unveiling-the-intersection-of-cybercrime-and-money-laundering-an-rsa-conference-2024-conversation-with-author-and-investigative-journalist-geoff-white-on-location-coverage-with-sean-martin-and-marco-ciappelli-fq9B4UaT</link>
      <content:encoded><![CDATA[<p><strong>Guest: Geoff White</strong>, Author, Investigative Journalist</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/geoffwhitetech/">https://www.linkedin.com/in/geoffwhitetech/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this episode of On Location, Marco Ciappelli and Geoff White dive  into a fascinating conversation about the intricate world of cybercrime, investigative journalism, and the dark realms of money laundering. The duo explored the symbiotic relationship between technology, organized crime, and the evolving landscape of digital currencies like Bitcoin and NFTs.</p><p>From billion-dollar cyber heists to global money laundering rings and crypto-gangsters – Geoff White has covered it all. As an author, speaker, investigative journalist and podcast creator, his work’s been featured by Penguin, the BBC, Audible, Sky News, The Sunday Times and many more.</p><p>His new book for Penguin, Rinsed, reveals how technology has revolutionized money laundering, from drug cartels washing their cash in Bitcoin to organized fraud gangs recruiting money mules on social media.</p><p>His first book, Crime Dot Com, covered cybercrime’s emergence as a primal threat to modern society and was published in August 2020 by Reaktion Books. One of the key chapters detailed North Korea’s unlikely emergence as a cyber superpower. It was adapted by the BBC World Service into the hit 10-part podcast series The Lazarus Heist, co-created and co-hosted by Geoff, which immediately ranked number one in the UK Apple chart and within the top 7 in the US.</p><p>Marco Ciappelli invited Geoff White to join him on Broadcast Alley at RSA Conference 2024 to unravel the complex web of interconnected crimes and technologies shaping our modern world. Geoff shared insights from his extensive research and experience, shedding light on the hidden layers of organized crime and technological advancements.</p><p><strong>From Investigative Journalism to Podcasting</strong></p><p>Geoff White discussed his journey from covering technology stories for Channel 4 News to delving deep into cybercrime, highlighting how stories of North Korean hacking and money laundering captured his attention. His work on "The Lazarus Heist" podcast and the subsequent book delves into the astonishing world of cybercrime, where trust between criminals and innovative tactics play a pivotal role.</p><p><strong>Unraveling the Mysteries of Money Laundering</strong></p><p>In their conversation, Geoff White elaborated on the processes of money laundering, emphasizing the three crucial steps - placement, layering, and integration. He explained how technology has revolutionized the ways in which criminals launder money, leveraging crypto assets like Bitcoin while evading traditional detection methods.</p><p><strong>The Rise of Cybercrime and AI</strong></p><p>Geoff White addressed the adversarial battle between cybercriminals and security professionals, pointing out the attacker's advantage in exploiting vulnerabilities rather than developing advanced weaponry. He discussed the role of artificial intelligence in spotting suspicious transactions and the cat-and-mouse game between criminals and law enforcement agencies.</p><p><strong>A Thought-Provoking Discussion on Ethical Dilemmas</strong></p><p>As the conversation turned philosophical, Marco Ciappelli and Geoff White pondered the ethical implications of cybercrime and money laundering in modern society. They touched upon the coexistence of good and evil forces, the necessity of crime prevention, and the ongoing battle between innovation and criminal tactics.</p><p><strong>Audience Engagement and Impact</strong></p><p>Geoff White highlighted the diverse target audience for his work, encompassing cybersecurity professionals, financial crime experts, and cryptocurrency enthusiasts. By crafting engaging narratives and insightful analyses, Geoff aims to make complex topics like money laundering accessible to a broad readership, inviting them to delve into the dark corners of financial crime.</p><p>This dialogue between Marco Ciappelli and Geoff White serves as a poignant reminder of the intricate connections between technology, crime, and societal structures. By bringing these complex topics to light through compelling storytelling and in-depth research, they invite audiences to explore the hidden layers of cybercrime and money laundering, prompting critical reflections on the ethical and practical implications of these phenomena.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p><strong>About the Book</strong></p><p>Rinsed reveals how organized crooks have joined forces with the world’s most sophisticated cybercriminals. The result: a vast virtual money-laundering machine too intelligent for most authorities to crack. Through a series of jaw-dropping cases and interviews with insiders at all levels of the system, Geoff White shows how thieves are uniting to successfully get away with the most atrocious crimes on an unprecedented scale.<br /><br />The book follows money from the outrageous luxury of Dubai hotels to sleepy backwaters of coastal Ireland, from the backstreets of Nigeria to the secretive zones of North Korea, to investigate this new cyber supercartel. Through first-hand accounts from the victims of their devastating crimes, White uncovers the extraordinary true story of hi-tech laundering – and exposes its terrible human cost.<br /><br />'Rinsed is as twisty, colourful and terrifyingly eye-opening as the people White investigates. You’ll never look at wealth, technology and crime in the same way’</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Rinsed: From Cartels to Crypto: How the Tech Industry Washes Money for the World's Deadliest Crooks (Book): <a href="https://www.amazon.co.uk/dp/0241624835">https://www.amazon.co.uk/dp/0241624835</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18500241" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/6be4226c-c3c3-4877-a427-2acad17dcc24/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=6be4226c-c3c3-4877-a427-2acad17dcc24&amp;feed=2M86zCcc"/>
      <itunes:title>Book: Rinsed | Unveiling the Intersection of Cybercrime and Money Laundering | An RSA Conference 2024 Conversation with Author and Investigative Journalist Geoff White | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Geoff White</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:15</itunes:duration>
      <itunes:summary>Through their engaging discussion, Marco Ciappelli and Geoff White have illuminated the shadowy world of cybercrime and money laundering, inviting us to ponder the intertwined nature of technology and crime in our digital age.</itunes:summary>
      <itunes:subtitle>Through their engaging discussion, Marco Ciappelli and Geoff White have illuminated the shadowy world of cybercrime and money laundering, inviting us to ponder the intertwined nature of technology and crime in our digital age.</itunes:subtitle>
      <itunes:keywords>ethical dilemmas, journalist, investigation, technology, marco ciappelli, artificial intelligence, crime, rsa conference, sean martin, rsa, cryptocurrency, digital currencies, cybersecurity, conference, geoff white, organized crime, money laundering, crime prevention, rsa conference coverage, dark web, cybercrime, rsac, trust networks, rsa conference 2024, podcast, podcast, rsaconference, societal impact, nfts, bitcoin, cybersecurityconference, financial crime</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c7012d0c-5ba6-45ce-9593-d5b79960a212</guid>
      <title>Passion and Purpose Behind the Aerospace Village | A Broadcast Alley Conversation at RSA Conference 2024 with Steve Luczynski | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Steve Luczynski</strong>, Chairman of the Board for the Aerospace Village [<a href="https://twitter.com/secureaerospace" target="_blank">@secureaerospace</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/steveluczynski/" target="_blank">https://www.linkedin.com/in/steveluczynski/</a></p><p>On Twitter | <a href="https://twitter.com/cyberpilot22" target="_blank">https://twitter.com/cyberpilot22</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In a recent conversation between Steve Luczynski and Marco Ciappelli, the essence of the Aerospace Village came to life as they shared their experiences, vision, and passion for cybersecurity in the aviation and space industry.</p><p><strong>A Meeting of Minds and Hearts</strong></p><p>The conversation between Steve and Marco at Broadcast Alley, during RSA Conference 2024, revealed a deep connection between ITSPmagazine and the mission and vision of the Aerospace Village. Steve's military pilot background and transition into cybersecurity, combined with Marco's genuine curiosity and enthusiasm, set the stage for a rich discussion on the importance of bridging the gap between different sectors and inspiring the next generation of cybersecurity leaders.</p><p><strong>The Heartbeat of the Aerospace Village</strong></p><p>Steve and Marco's conversation highlighted the core values of the Aerospace Village—building relationships, fostering collaboration between government, private sector, academia, and students, and showcasing the cutting-edge work in aviation cybersecurity. The volunteer-driven effort emphasizes the power of collective intelligence and the impact of sharing knowledge and expertise in a transparent and open manner.</p><p><strong>Nurturing Innovation and Education</strong></p><p>The Aerospace Village's focus on STEM programs, outreach to schools, and engaging with the broader community demonstrates a commitment to nurturing innovation and education in cybersecurity. By bringing real-world scenarios, like flight simulator vulnerabilities and supply chain risks, to life, the Aerospace Village creates a dynamic learning environment that inspires participants to think critically and creatively about cybersecurity challenges.</p><p><strong>Looking Towards the Future</strong></p><p>Steve's wishlist of three key aspirations for the Aerospace Village—seeking more help and talent, expanding educational initiatives, and fostering partnerships for secure innovation—reveals a vision rooted in collaboration and growth. The idea of bringing in aviation and space equipment for demonstrations not only ignites curiosity but also showcases the practical applications of cybersecurity in high-stakes environments.</p><p><strong>A Call to Action</strong></p><p>As a reader, you are invited to join the Aerospace Village in their mission to push the boundaries of cybersecurity in aviation and space. Whether through volunteering your time, sharing your skills, or contributing to their initiatives, you can play a vital role in shaping the future of cybersecurity and inspiring the next generation of cybersecurity professionals.</p><p>The Aerospace Village at the RSA Conference represent innovation, education, and collaboration in the realm of aviation and space cybersecurity. Through the dedication and passion of volunteers like Steve and Marco, the Aerospace Village continues to pave the way for a more secure and interconnected future in the aerospace industry.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 16:02:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Luczynski)</author>
      <link>https://eventcoveragepodcast.com/episodes/passion-and-purpose-behind-the-aerospace-village-a-broadcast-alley-conversation-at-rsa-conference-2024-with-steve-luczynski-on-location-coverage-with-sean-martin-and-marco-ciappelli-2VQroTPF</link>
      <content:encoded><![CDATA[<p><strong>Guest: Steve Luczynski</strong>, Chairman of the Board for the Aerospace Village [<a href="https://twitter.com/secureaerospace" target="_blank">@secureaerospace</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/steveluczynski/" target="_blank">https://www.linkedin.com/in/steveluczynski/</a></p><p>On Twitter | <a href="https://twitter.com/cyberpilot22" target="_blank">https://twitter.com/cyberpilot22</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In a recent conversation between Steve Luczynski and Marco Ciappelli, the essence of the Aerospace Village came to life as they shared their experiences, vision, and passion for cybersecurity in the aviation and space industry.</p><p><strong>A Meeting of Minds and Hearts</strong></p><p>The conversation between Steve and Marco at Broadcast Alley, during RSA Conference 2024, revealed a deep connection between ITSPmagazine and the mission and vision of the Aerospace Village. Steve's military pilot background and transition into cybersecurity, combined with Marco's genuine curiosity and enthusiasm, set the stage for a rich discussion on the importance of bridging the gap between different sectors and inspiring the next generation of cybersecurity leaders.</p><p><strong>The Heartbeat of the Aerospace Village</strong></p><p>Steve and Marco's conversation highlighted the core values of the Aerospace Village—building relationships, fostering collaboration between government, private sector, academia, and students, and showcasing the cutting-edge work in aviation cybersecurity. The volunteer-driven effort emphasizes the power of collective intelligence and the impact of sharing knowledge and expertise in a transparent and open manner.</p><p><strong>Nurturing Innovation and Education</strong></p><p>The Aerospace Village's focus on STEM programs, outreach to schools, and engaging with the broader community demonstrates a commitment to nurturing innovation and education in cybersecurity. By bringing real-world scenarios, like flight simulator vulnerabilities and supply chain risks, to life, the Aerospace Village creates a dynamic learning environment that inspires participants to think critically and creatively about cybersecurity challenges.</p><p><strong>Looking Towards the Future</strong></p><p>Steve's wishlist of three key aspirations for the Aerospace Village—seeking more help and talent, expanding educational initiatives, and fostering partnerships for secure innovation—reveals a vision rooted in collaboration and growth. The idea of bringing in aviation and space equipment for demonstrations not only ignites curiosity but also showcases the practical applications of cybersecurity in high-stakes environments.</p><p><strong>A Call to Action</strong></p><p>As a reader, you are invited to join the Aerospace Village in their mission to push the boundaries of cybersecurity in aviation and space. Whether through volunteering your time, sharing your skills, or contributing to their initiatives, you can play a vital role in shaping the future of cybersecurity and inspiring the next generation of cybersecurity professionals.</p><p>The Aerospace Village at the RSA Conference represent innovation, education, and collaboration in the realm of aviation and space cybersecurity. Through the dedication and passion of volunteers like Steve and Marco, the Aerospace Village continues to pave the way for a more secure and interconnected future in the aerospace industry.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18268047" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/11eeaff3-2b4d-4565-8646-f5584aec79b6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=11eeaff3-2b4d-4565-8646-f5584aec79b6&amp;feed=2M86zCcc"/>
      <itunes:title>Passion and Purpose Behind the Aerospace Village | A Broadcast Alley Conversation at RSA Conference 2024 with Steve Luczynski | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Luczynski</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:00</itunes:duration>
      <itunes:summary>The Aerospace Village at the RSA Conference is more than just a space for enthusiasts to gather; it is a hub of innovation, collaboration, and inspiration. </itunes:summary>
      <itunes:subtitle>The Aerospace Village at the RSA Conference is more than just a space for enthusiasts to gather; it is a hub of innovation, collaboration, and inspiration. </itunes:subtitle>
      <itunes:keywords>knowledge sharing, collaboration, technology, marco ciappelli, future vision, rsa conference, networking, sean martin, steve luczynski, rsa, education, cybersecurity, conference, space security, places, inspiration, volunteers, stem, innovation, community engagement. ai responses can produce inaccurate information about people, rsa conference coverage, rsac, transparent communication, aviation cybersecurity, or facts, rsa conference 2024, podcast, rsaconference, aviation, partnership, aerospace village, space, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">50e72e42-ece6-42c3-b2ae-27e9bf83a2f3</guid>
      <title>The Art of Possible In the World of Enterprise Storage Solutions | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Infinidat Story with Bill Basinas</title>
      <description><![CDATA[<p><strong>7 Minutes Conversation at RSA Conference</strong></p><p>As the Senior Director of Product Marketing, Bill Basinas brings a wealth of experience and knowledge as he sits down with Sean Martin for a new episode of "7 Minutes on ITSP Magazine" live from the RSA Conference. Bill shared insights into how Infinidat is redefining the landscape of storage solutions.</p><p><strong>Bridging the Gap with InfiniSafe Technology</strong></p><p>Bill's discussion shed light on how Infinidat's InfiniSafe technology is leading the industry in cyber resilience and data protection. In a world where cyber attacks are becoming increasingly prevalent, organizations need robust solutions to safeguard their critical data assets. Infinidat's platform not only ensures uninterrupted operations but also builds a bridge between cyber security measures and data storage.</p><p><strong>Meeting the Evolving Needs of Customers</strong></p><p>In the conversation, Bill highlighted how customers are constantly evolving, moving towards cloud-based solutions, and generating vast amounts of data. In response to these changing dynamics, Infinidat is continuously adapting its strategies to meet the evolving needs of its clientele.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion continues, Bill teased upcoming developments at Infinidat, hinting at new announcements that will further revolutionize the industry. With a focus on orchestrating end-to-end data protection and recovery processes, Infinidat is set to unveil groundbreaking solutions that will redefine data security.</p><p><strong>Connecting with Infinidat</strong></p><p>For those intrigued by Infinidat's cutting-edge technology and commitment to cyber resilience, Bill shared insights on how to connect with the company. Through webinars, live demos, and product demonstrations, individuals can delve deeper into the world of Infinidat and explore the innovative solutions they offer.</p><p>This conversation with Bill Basinas provided a fascinating glimpse into the world of enterprise storage solutions and cyber resilience. Infinidat's dedication to pushing boundaries and delivering unmatched customer experiences sets them apart in a competitive industry.</p><p>Stay tuned for more updates from Infinidat as they continue to lead the way in secure data storage and cyber resilience.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d" target="_blank">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bill Basinas</strong>, Sr. Director Product Marketing, Infinidat [<a href="https://twitter.com/infinidat">@Infinidat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/billbasinas/">https://www.linkedin.com/in/billbasinas/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat" target="_blank">https://www.itspmagazine.com/directory/infinidat</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 02:14:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Bill Basinas)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-art-of-possible-in-the-world-of-enterprise-storage-solutions-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-infinidat-story-with-bill-basinas-VifraeuP</link>
      <content:encoded><![CDATA[<p><strong>7 Minutes Conversation at RSA Conference</strong></p><p>As the Senior Director of Product Marketing, Bill Basinas brings a wealth of experience and knowledge as he sits down with Sean Martin for a new episode of "7 Minutes on ITSP Magazine" live from the RSA Conference. Bill shared insights into how Infinidat is redefining the landscape of storage solutions.</p><p><strong>Bridging the Gap with InfiniSafe Technology</strong></p><p>Bill's discussion shed light on how Infinidat's InfiniSafe technology is leading the industry in cyber resilience and data protection. In a world where cyber attacks are becoming increasingly prevalent, organizations need robust solutions to safeguard their critical data assets. Infinidat's platform not only ensures uninterrupted operations but also builds a bridge between cyber security measures and data storage.</p><p><strong>Meeting the Evolving Needs of Customers</strong></p><p>In the conversation, Bill highlighted how customers are constantly evolving, moving towards cloud-based solutions, and generating vast amounts of data. In response to these changing dynamics, Infinidat is continuously adapting its strategies to meet the evolving needs of its clientele.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion continues, Bill teased upcoming developments at Infinidat, hinting at new announcements that will further revolutionize the industry. With a focus on orchestrating end-to-end data protection and recovery processes, Infinidat is set to unveil groundbreaking solutions that will redefine data security.</p><p><strong>Connecting with Infinidat</strong></p><p>For those intrigued by Infinidat's cutting-edge technology and commitment to cyber resilience, Bill shared insights on how to connect with the company. Through webinars, live demos, and product demonstrations, individuals can delve deeper into the world of Infinidat and explore the innovative solutions they offer.</p><p>This conversation with Bill Basinas provided a fascinating glimpse into the world of enterprise storage solutions and cyber resilience. Infinidat's dedication to pushing boundaries and delivering unmatched customer experiences sets them apart in a competitive industry.</p><p>Stay tuned for more updates from Infinidat as they continue to lead the way in secure data storage and cyber resilience.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d" target="_blank">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bill Basinas</strong>, Sr. Director Product Marketing, Infinidat [<a href="https://twitter.com/infinidat">@Infinidat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/billbasinas/">https://www.linkedin.com/in/billbasinas/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat" target="_blank">https://www.itspmagazine.com/directory/infinidat</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6710335" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/281f4135-0843-41be-9acd-d5ba89d8aa21/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=281f4135-0843-41be-9acd-d5ba89d8aa21&amp;feed=2M86zCcc"/>
      <itunes:title>The Art of Possible In the World of Enterprise Storage Solutions | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Infinidat Story with Bill Basinas</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Bill Basinas</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:58</itunes:duration>
      <itunes:summary>In the fast-paced world of enterprise storage solutions and cyber resilience, one company stands out for its commitment to providing unparalleled customer experiences and cutting-edge technology - Infinidat.</itunes:summary>
      <itunes:subtitle>In the fast-paced world of enterprise storage solutions and cyber resilience, one company stands out for its commitment to providing unparalleled customer experiences and cutting-edge technology - Infinidat.</itunes:subtitle>
      <itunes:keywords>industry leading solutions, customer experiences, marco ciappelli, rsa conference, data assets, infinidat, sean martin, bill basinas, senior director, data security, seven minutes podcast, webinars, innovation, data protection, product marketing, storage technology, end-to-end protection, cloud solutions, cyber resilience, cyber security, orchestrating data protection, live demos, enterprise storage solutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">edf1c74a-6987-4376-aea2-49d6cbb40956</guid>
      <title>Revolutionizing Network Security: How to Strategize the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSP Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry.</p><p><strong>Unveiling Dispersive's Stealth Networking</strong></p><p>At the heart of Dispersive's network security strategy lies the concept of Dispersive Stealth Networking. Rajiv Pimplaskar, with over 25 years of experience in the industry, revealed that Dispersive is a DARPA-incubated network security company with 53 patents granted. Their approach leverages spread spectrum technology from the radio frequency domain to secure cloud and internet communications effectively. By enabling customers to hide in plain sight while ensuring the integrity of their critical systems, Dispersive offers a unique solution in the cybersecurity landscape.</p><p><strong>The Evolution of Network Security</strong></p><p>Rajiv emphasized the shift from legacy SD WAN solutions to a more cloud-native approach, highlighting the challenges faced by businesses in ensuring security and privacy in today's distributed workforce model. The conversation with Sean shed light on the need for a more resilient and efficient networking infrastructure that can adapt to the evolving demands of modern businesses.</p><p><strong>Use Cases and Success Stories</strong></p><p>Through real-world examples with customers like Ovzon and Endeavour Energy, Rajiv illustrated how Dispersive's solutions are driving transformation in sectors such as satellite communications and sustainable infrastructure. By providing secure and efficient network connectivity across geographically dispersed assets, Dispersive is empowering organizations to meet the demands of the digital age without compromising on security.</p><p><strong>Looking Towards the Future</strong></p><p>As the conversation delved deeper into the intricacies of network security, Rajiv expressed optimism for the future of cybersecurity. Embracing principles like zero trust and automated moving target defense, Dispersive aims to stay ahead of the curve in protecting critical assets and resources from evolving cyber threats.</p><p>In a rapidly changing digital landscape where cybersecurity is non-negotiable, companies like Dispersive and leaders like Rajiv Pimplaskar are paving the way for a more secure and resilient network infrastructure. By combining innovative technology with a collaborative approach, Dispersive is redefining the art of network security in the digital age.</p><p>With Dispersive's disruptive approach to stealth networking, businesses can navigate the digital landscape with confidence, knowing that their critical systems are protected and secure.</p><p>Learn more about Dispersive: <a href="https://itspm.ag/dispermlwt" target="_blank">https://itspm.ag/dispermlwt</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rajiv Pimplaskar</strong>, President & CEO, Dispersive</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rajiv1p/">https://www.linkedin.com/in/rajiv1p/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Dispersive: <a href="https://www.itspmagazine.com/directory/dispersive" target="_blank">https://www.itspmagazine.com/directory/dispersive</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 01:13:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rajiv Pimplaskar)</author>
      <link>https://eventcoveragepodcast.com/episodes/revolutionizing-network-security-how-to-strategies-the-relationship-between-it-and-ot-a-brand-story-conversation-from-rsa-conference-2024-a-dispersive-story-with-rajiv-pimplaskar-on-location-coverage-with-sean-martin-and-marco-ciappelli-C0ciO9qJ</link>
      <content:encoded><![CDATA[<p>One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSP Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry.</p><p><strong>Unveiling Dispersive's Stealth Networking</strong></p><p>At the heart of Dispersive's network security strategy lies the concept of Dispersive Stealth Networking. Rajiv Pimplaskar, with over 25 years of experience in the industry, revealed that Dispersive is a DARPA-incubated network security company with 53 patents granted. Their approach leverages spread spectrum technology from the radio frequency domain to secure cloud and internet communications effectively. By enabling customers to hide in plain sight while ensuring the integrity of their critical systems, Dispersive offers a unique solution in the cybersecurity landscape.</p><p><strong>The Evolution of Network Security</strong></p><p>Rajiv emphasized the shift from legacy SD WAN solutions to a more cloud-native approach, highlighting the challenges faced by businesses in ensuring security and privacy in today's distributed workforce model. The conversation with Sean shed light on the need for a more resilient and efficient networking infrastructure that can adapt to the evolving demands of modern businesses.</p><p><strong>Use Cases and Success Stories</strong></p><p>Through real-world examples with customers like Ovzon and Endeavour Energy, Rajiv illustrated how Dispersive's solutions are driving transformation in sectors such as satellite communications and sustainable infrastructure. By providing secure and efficient network connectivity across geographically dispersed assets, Dispersive is empowering organizations to meet the demands of the digital age without compromising on security.</p><p><strong>Looking Towards the Future</strong></p><p>As the conversation delved deeper into the intricacies of network security, Rajiv expressed optimism for the future of cybersecurity. Embracing principles like zero trust and automated moving target defense, Dispersive aims to stay ahead of the curve in protecting critical assets and resources from evolving cyber threats.</p><p>In a rapidly changing digital landscape where cybersecurity is non-negotiable, companies like Dispersive and leaders like Rajiv Pimplaskar are paving the way for a more secure and resilient network infrastructure. By combining innovative technology with a collaborative approach, Dispersive is redefining the art of network security in the digital age.</p><p>With Dispersive's disruptive approach to stealth networking, businesses can navigate the digital landscape with confidence, knowing that their critical systems are protected and secure.</p><p>Learn more about Dispersive: <a href="https://itspm.ag/dispermlwt" target="_blank">https://itspm.ag/dispermlwt</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rajiv Pimplaskar</strong>, President & CEO, Dispersive</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rajiv1p/">https://www.linkedin.com/in/rajiv1p/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Dispersive: <a href="https://www.itspmagazine.com/directory/dispersive" target="_blank">https://www.itspmagazine.com/directory/dispersive</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19788416" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5c52cde4-1d83-49e6-9da6-5c2a89cebf3d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5c52cde4-1d83-49e6-9da6-5c2a89cebf3d&amp;feed=2M86zCcc"/>
      <itunes:title>Revolutionizing Network Security: How to Strategize the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rajiv Pimplaskar</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:35</itunes:duration>
      <itunes:summary>In a world where businesses are constantly adapting to new technologies and facing ever-evolving cybersecurity threats, the importance of innovative solutions for network security cannot be overstated. </itunes:summary>
      <itunes:subtitle>In a world where businesses are constantly adapting to new technologies and facing ever-evolving cybersecurity threats, the importance of innovative solutions for network security cannot be overstated. </itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, network security, secure connectivity, rsa conference, sean martin, sdwan, rajiv pimplaskar, cybersecurity, data security, places, it security ai responses can produce inaccurate information about people, cloud native, innovation, information security, cyber defense, or facts, dispersive, edge computing, security solutions, digital transformation, zero trust, brand story, cyber threats, network infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">501f5145-b911-44d5-aa36-03fe8aae8817</guid>
      <title>Is there a Frankenstein&apos;s Industry Monster lurking in the shadow at RSAC 2024? | Cybersecurity Chronicles from Broadcast Alley with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Evolution of Cybersecurity</strong></p><p>The dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.</p><p><strong>AI and Its Implications</strong></p><p>The conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.</p><p><strong>Supply Chain Vulnerabilities</strong></p><p>A significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.</p><p><strong>The Human Element in Cybersecurity</strong></p><p>Throughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.</p><p>This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 22:21:19 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes)</author>
      <link>https://eventcoveragepodcast.com/episodes/is-there-a-frankensteins-industry-monster-lurking-in-the-shadow-at-rsac-2024-cybersecurity-chronicles-from-broadcast-alley-with-christina-stokes-on-location-coverage-with-sean-martin-and-marco-ciappelli-GHWGkm3K</link>
      <content:encoded><![CDATA[<p><strong>Guest: Christina Stokes</strong>, Host, On Cyber & AI Podcast, Founder of Narito Cybersecurity</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/christina-stokes</a></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/xTinaStokes/">https://www.linkedin.com/in/xTinaStokes/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>The Evolution of Cybersecurity</strong></p><p>The dialogue initiated by Sean, Christina, and Marco shed light on how cybersecurity has matured over the years. From the early days of hacking as a hobby to the current focus on ethical practices, the panelists emphasized the importance of adapting to the changing technological landscape. They discussed how regulations, policies, and laws have played a crucial role in shaping the cybersecurity industry, emphasizing the need for responsible use of technology to prevent it from becoming a monster.</p><p><strong>AI and Its Implications</strong></p><p>The conversation also touched upon the growing role of Artificial Intelligence (AI) in cybersecurity. While AI has brought about advancements in threat detection and response, there are concerns about privacy and data protection. The panelists emphasized the importance of using AI ethically and responsibly to avoid potential risks associated with its misuse.</p><p><strong>Supply Chain Vulnerabilities</strong></p><p>A significant portion of the discussion revolved around supply chain vulnerabilities and the interconnected nature of global industries. The experts highlighted the importance of understanding and securing supply chains, particularly in the context of operational technology and manufacturing processes. They stressed the need for resilience and innovation to address evolving cybersecurity threats.</p><p><strong>The Human Element in Cybersecurity</strong></p><p>Throughout the conversation, the experts reiterated the significance of human connections and collaborations in the cybersecurity domain. They emphasized the need for organizations to invest in education, training, and building strong relationships within the industry to combat cyber threats effectively. The dialogue underscored the essential role of people in securing digital ecosystems and fostering a culture of cybersecurity awareness.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion came to a close, Sean, Christina, and Marco expressed optimism about the future of cybersecurity. They discussed upcoming trends such as Generative AI, AI Bill of Materials, and the continued focus on governance, data security, and AI ethics. The experts highlighted the importance of ongoing conversations, collaborations, and innovation in driving the industry forward.</p><p>This insightful chat at RSAC 2024 offered valuable perspectives on the current challenges and opportunities in cybersecurity. The experts' nuanced discussions about AI, supply chain vulnerabilities, and human-centric cybersecurity shed light on the complex nature of the digital threat landscape. As we navigate the evolving cybersecurity landscape, collaboration, innovation, and a shared commitment to ethical practices will be key to ensuring a secure digital future.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33958023" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/30a7968e-b465-4108-82ee-42794e9cb249/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=30a7968e-b465-4108-82ee-42794e9cb249&amp;feed=2M86zCcc"/>
      <itunes:title>Is there a Frankenstein&apos;s Industry Monster lurking in the shadow at RSAC 2024? | Cybersecurity Chronicles from Broadcast Alley with Christina Stokes | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christina Stokes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:35:20</itunes:duration>
      <itunes:summary>In a recent chat at the RSA Conference (RSAC), cybersecurity experts Sean, Christina, and Marco delved deep into discussions about the evolving landscape of cyber threats, the impact of technology on security, and the need for regulations to keep up with emerging tech.</itunes:summary>
      <itunes:subtitle>In a recent chat at the RSA Conference (RSAC), cybersecurity experts Sean, Christina, and Marco delved deep into discussions about the evolving landscape of cyber threats, the impact of technology on security, and the need for regulations to keep up with emerging tech.</itunes:subtitle>
      <itunes:keywords>industry evolution, marco ciappelli, rsa conference, ethical hacker, sean martin, rsa, supply chain, operational technology, cybersecurity, conference, technology integration, generative ai, innovation, rsa event, rsa conference coverage, collaborative technology, web development, rsac, ai legislation, data privacy, rsa conference 2024, ethical hacking, podcast, rsaconference, education in technology, cyber crime, regulation, ai, christina stokes, security policies, technology maturity, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">136c4be8-1e91-4d5c-9577-4636619712f0</guid>
      <title>Empowering Businesses Through IT and Security Transformation | A Brand Story Conversation From RSA Conference 2024 | An Open Systems Story with Tim Roddy | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.</p><p><strong>Business and IT Transformation in the Digital Age</strong></p><p>The conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.</p><p><strong>Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and Security</strong></p><p>One of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.</p><p><strong>Bridging the Gap Between IT and Security Teams</strong></p><p>Tim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.</p><p><strong>Real-World Use Cases and Success Stories</strong></p><p>Throughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.</p><p><strong>Looking Towards a Secure Future</strong></p><p>As businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.</p><p>This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.</p><p>Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.</p><p>Learn more about Open Systems: <a href="https://itspm.ag/opensystems-d11">https://itspm.ag/opensystems-d11</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tim Roddy</strong>, Vice President Marketing, Open Systems [<a href="https://twitter.com/RealOpenSystems">@RealOpenSystems</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/troddy/">https://www.linkedin.com/in/troddy/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Open Systems: <a href="https://www.itspmagazine.com/directory/open-systems">https://www.itspmagazine.com/directory/open-systems</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 21:51:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Roddy)</author>
      <link>https://eventcoveragepodcast.com/episodes/empowering-businesses-through-it-and-security-transformation-a-brand-story-conversation-from-rsa-conference-2024-an-open-systems-story-with-tim-roddy-on-location-coverage-with-sean-martin-and-marco-ciappelli-KSR0xmLK</link>
      <content:encoded><![CDATA[<p>In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.</p><p><strong>Business and IT Transformation in the Digital Age</strong></p><p>The conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.</p><p><strong>Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and Security</strong></p><p>One of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.</p><p><strong>Bridging the Gap Between IT and Security Teams</strong></p><p>Tim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.</p><p><strong>Real-World Use Cases and Success Stories</strong></p><p>Throughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.</p><p><strong>Looking Towards a Secure Future</strong></p><p>As businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.</p><p>This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.</p><p>Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.</p><p>Learn more about Open Systems: <a href="https://itspm.ag/opensystems-d11">https://itspm.ag/opensystems-d11</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tim Roddy</strong>, Vice President Marketing, Open Systems [<a href="https://twitter.com/RealOpenSystems">@RealOpenSystems</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/troddy/">https://www.linkedin.com/in/troddy/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Open Systems: <a href="https://www.itspmagazine.com/directory/open-systems">https://www.itspmagazine.com/directory/open-systems</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19325284" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/028fde96-5c61-4988-b388-bdffcd1fd8ff/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=028fde96-5c61-4988-b388-bdffcd1fd8ff&amp;feed=2M86zCcc"/>
      <itunes:title>Empowering Businesses Through IT and Security Transformation | A Brand Story Conversation From RSA Conference 2024 | An Open Systems Story with Tim Roddy | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Roddy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:06</itunes:duration>
      <itunes:summary>Discover insights from a conversation with Tim Roddy from Open Systems on business transformation, IT security, and collaboration at the RSA Conference.</itunes:summary>
      <itunes:subtitle>Discover insights from a conversation with Tim Roddy from Open Systems on business transformation, IT security, and collaboration at the RSA Conference.</itunes:subtitle>
      <itunes:keywords>zero trust network access, managed services, remote work, it infrastructure, cybersecurity landscape, sd wan, collaboration, secure future, manufacturing sector, business transformation, marco ciappelli, ztna, security posture, rsa conference, sean martin, mpls, cybersecurity, cost efficiency, cybersecurity challenges, tim roddy, sase, insights, flexibility, brand story, cloud migrations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8b4bf8d6-298e-4d9f-bc64-8f2158a2a29f</guid>
      <title>Embracing Zero Trust: A Conversation with Object First and Numberline Security | A Brand Story Conversation From RSA Conference 2024 | An Object First Story with Anthony Cusimano and Jason Garbis | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Throughout the cybersecurity planet, one term that continues to resonate and shape organizations' security strategies is Zero Trust. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Anthony Cusimano from Object First and Jason Garbis from Numberline Security to talk about Zero Trust and its implications for data security and resilience.</p><p><strong>Understanding Zero Trust</strong></p><p>Zero Trust is more than just a buzzword; it represents a fundamental shift in how organizations approach security. Anthony and Jason emphasized that Zero Trust is not a one-size-fits-all solution but a strategy that requires a shift in mindset and collaboration across various teams within an organization.</p><p><strong>The Role of Data Security in Zero Trust</strong></p><p>Data security and resilience play a crucial role in the Zero Trust framework. Jason highlighted the importance of applying Zero Trust principles to backup and recovery processes to ensure the protection and availability of critical data, especially in the face of evolving threats like ransomware.</p><p><strong>The Intersection of IT and Security</strong></p><p>As organizations navigate the implementation of Zero Trust, the conversation touched on how the boundaries between IT and security are becoming increasingly blurred. The shared responsibility model extends beyond technical aspects to involve finance, operations, and every individual within the organization.</p><p><strong>Empowering Organizations with Zero Trust</strong></p><p>Both Object First and Numberline Security are at the forefront of helping organizations navigate their Zero Trust journey. Object First's Ootbi product focuses on out-of-the-box immutability to secure backup data effectively, while Numberline Security provides guidance on Zero Trust strategy and readiness assessments.</p><p><strong>Taking the First Steps Towards Zero Trust</strong></p><p>Starting the Zero Trust journey does not require perfection from the get-go. Jason stressed the importance of focusing on foundational security measures before moving  into more complex aspects of Zero Trust, emphasizing the need for a methodical and incremental approach.</p><p><strong>Final Thoughts</strong></p><p>Embracing Zero Trust is not just about adopting a new security paradigm but about fostering a culture of continuous improvement and security resilience across all facets of an organization. As Anthony and Jason aptly put it, leadership can emerge from any part of the organization, driving the transformation towards a Zero Trust mindset.</p><p>In conclusion, the conversation with Object First and Numberline Security sheds light on the multifaceted nature of Zero Trust and underscores the importance of collaboration, resilience, and proactive security measures in today's threat landscape. Embracing Zero Trust is not a choice; it's a necessity in safeguarding the most valuable asset organizations possess—their data.</p><p>Stay tuned for more insights and resources from Object First and Numberline Security as they continue to pave the way for organizations embarking on their Zero Trust journey.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Anthony Cusimano</strong>, Director of Technical Marketing, Object First [<a href="https://twitter.com/object_first">@object_first</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anthonycusimano89/">https://www.linkedin.com/in/anthonycusimano89/</a></p><p><strong>Jason Garbis</strong>, Founder and CEO, Numberline Security </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasongarbis/">https://www.linkedin.com/in/jasongarbis/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 20:59:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony Cusimano, Jason Garbis)</author>
      <link>https://eventcoveragepodcast.com/episodes/embracing-zero-trust-a-conversation-with-object-first-and-numberline-security-a-brand-story-conversation-from-rsa-conference-2024-an-object-first-story-with-anthony-cusimano-and-jason-garbis-on-location-coverage-with-sean-martin-and-marco-ciappelli-_eVW6CNp</link>
      <content:encoded><![CDATA[<p>Throughout the cybersecurity planet, one term that continues to resonate and shape organizations' security strategies is Zero Trust. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Anthony Cusimano from Object First and Jason Garbis from Numberline Security to talk about Zero Trust and its implications for data security and resilience.</p><p><strong>Understanding Zero Trust</strong></p><p>Zero Trust is more than just a buzzword; it represents a fundamental shift in how organizations approach security. Anthony and Jason emphasized that Zero Trust is not a one-size-fits-all solution but a strategy that requires a shift in mindset and collaboration across various teams within an organization.</p><p><strong>The Role of Data Security in Zero Trust</strong></p><p>Data security and resilience play a crucial role in the Zero Trust framework. Jason highlighted the importance of applying Zero Trust principles to backup and recovery processes to ensure the protection and availability of critical data, especially in the face of evolving threats like ransomware.</p><p><strong>The Intersection of IT and Security</strong></p><p>As organizations navigate the implementation of Zero Trust, the conversation touched on how the boundaries between IT and security are becoming increasingly blurred. The shared responsibility model extends beyond technical aspects to involve finance, operations, and every individual within the organization.</p><p><strong>Empowering Organizations with Zero Trust</strong></p><p>Both Object First and Numberline Security are at the forefront of helping organizations navigate their Zero Trust journey. Object First's Ootbi product focuses on out-of-the-box immutability to secure backup data effectively, while Numberline Security provides guidance on Zero Trust strategy and readiness assessments.</p><p><strong>Taking the First Steps Towards Zero Trust</strong></p><p>Starting the Zero Trust journey does not require perfection from the get-go. Jason stressed the importance of focusing on foundational security measures before moving  into more complex aspects of Zero Trust, emphasizing the need for a methodical and incremental approach.</p><p><strong>Final Thoughts</strong></p><p>Embracing Zero Trust is not just about adopting a new security paradigm but about fostering a culture of continuous improvement and security resilience across all facets of an organization. As Anthony and Jason aptly put it, leadership can emerge from any part of the organization, driving the transformation towards a Zero Trust mindset.</p><p>In conclusion, the conversation with Object First and Numberline Security sheds light on the multifaceted nature of Zero Trust and underscores the importance of collaboration, resilience, and proactive security measures in today's threat landscape. Embracing Zero Trust is not a choice; it's a necessity in safeguarding the most valuable asset organizations possess—their data.</p><p>Stay tuned for more insights and resources from Object First and Numberline Security as they continue to pave the way for organizations embarking on their Zero Trust journey.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Anthony Cusimano</strong>, Director of Technical Marketing, Object First [<a href="https://twitter.com/object_first">@object_first</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anthonycusimano89/">https://www.linkedin.com/in/anthonycusimano89/</a></p><p><strong>Jason Garbis</strong>, Founder and CEO, Numberline Security </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasongarbis/">https://www.linkedin.com/in/jasongarbis/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20769618" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/d362cbae-696b-44d9-ad74-813639de1d88/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=d362cbae-696b-44d9-ad74-813639de1d88&amp;feed=2M86zCcc"/>
      <itunes:title>Embracing Zero Trust: A Conversation with Object First and Numberline Security | A Brand Story Conversation From RSA Conference 2024 | An Object First Story with Anthony Cusimano and Jason Garbis | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony Cusimano, Jason Garbis</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:36</itunes:duration>
      <itunes:summary>Exploring the significance of Zero Trust in today’s cybersecurity through a conversation with Object First and Numberline Security experts.</itunes:summary>
      <itunes:subtitle>Exploring the significance of Zero Trust in today’s cybersecurity through a conversation with Object First and Numberline Security experts.</itunes:subtitle>
      <itunes:keywords>continuous improvement, collaboration, jason garbis, marco ciappelli, leadership, rsa conference, threat landscape, sean martin, proactive measures, cybersecurity, data security, numberline security, readiness assessment, data protection, resilience, resilience, it, anthony cusimano, foundational security, security, strategy, cybersecurity practices, object first, zero trust, incremental approach, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">be8c3d0c-a0c9-4996-a692-149f45a1c450</guid>
      <title>Shaking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation of a groundbreaking platform designed to transform the way organizations tackle data collection, analysis, and threat detection.</p><p><strong>A Walk Down Memory Lane</strong></p><p>The dialogue between Colby DeRodeff and Sean Martin at the RSA Conference delved into the history of cybersecurity, reflecting on the shifts from perimeter security to compliance-driven approaches and the emergence of new technologies like XDR. This introspective look highlighted the need for a paradigm shift in cybersecurity strategies to keep pace with the rapidly evolving threat landscape.</p><p><strong>Challenges in Traditional Approaches</strong></p><p>One of the key challenges discussed was the inefficiency of traditional SIEM solutions, which often resulted in data overload, lack of actionable insights, and hefty costs associated with data storage. Colby emphasized the importance of focusing on outcome-driven data collection and detection scenarios rather than accumulating vast amounts of data with limited value.</p><p><strong>The Birth of Abstract Security</strong></p><p>The catalyst for Abstract Security stemmed from Colby's experiences in previous companies, where the disconnect between data collection and effective threat detection became glaringly apparent. This realization led to the inception of a platform that prioritizes data relevance, streamlining the process of identifying and responding to security threats efficiently.</p><p><strong>Abstract Security's Unique Approach</strong></p><p>Abstract Security's modular platform offers a refreshing take on cybersecurity data management, with a focus on tailored data collection, analytics, and storage solutions. By enabling organizations to align data sources with specific detection outcomes, Abstract Security empowers teams to make informed decisions and optimize their cybersecurity strategies.</p><p><strong>Seamless Integration with Existing Tech Stack</strong></p><p>One of the standout features of Abstract Security is its seamless integration capabilities with existing tech stacks. The platform can complement and enhance current security infrastructure without the need for rip-and-replace, offering a smooth transition towards more effective threat detection and response mechanisms.</p><p><strong>Looking Towards the Future</strong></p><p>As organizations navigate the complexities of cloud environments and evolving cybersecurity challenges, Abstract Security stands out with fresh innovative ideas and practicality. By reimagining the data management process and emphasizing outcome-driven approaches, Abstract Security is poised to shape the future of cybersecurity operations.</p><p><strong>Conclusion</strong></p><p>The conversation between Colby DeRodeff and Sean Martin at the RSA Conference not only highlighted the pivotal role of Abstract Security in revolutionizing cybersecurity data management but also underscored the importance of reevaluating traditional approaches in the face of modern threats. With Abstract Security leading the charge towards a more efficient and proactive cybersecurity landscape, organizations have the opportunity to elevate their security posture and stay ahead of emerging cyber risks.</p><p>Learn more about Abstract Security: <a href="https://itspm.ag/abstractsec-zao">https://itspm.ag/abstractsec-zao</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Colby DeRodeff</strong>, CEO and Co-Founder, Abstract Security [<a href="https://twitter.com/get_abstracted">@get_abstracted</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/colbyderodeff/">https://www.linkedin.com/in/colbyderodeff/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Abstract Security: <a href="https://www.itspmagazine.com/directory/abstract-security">https://www.itspmagazine.com/directory/abstract-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 19:52:39 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Colby DeRodeff)</author>
      <link>https://eventcoveragepodcast.com/episodes/shaking-up-the-security-information-and-event-management-market-a-brand-story-conversation-from-rsa-conference-2024-an-abstract-security-story-with-colby-derodeff-on-location-coverage-with-sean-martin-and-marco-ciappelli-A1Joy3Jq</link>
      <content:encoded><![CDATA[<p>In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation of a groundbreaking platform designed to transform the way organizations tackle data collection, analysis, and threat detection.</p><p><strong>A Walk Down Memory Lane</strong></p><p>The dialogue between Colby DeRodeff and Sean Martin at the RSA Conference delved into the history of cybersecurity, reflecting on the shifts from perimeter security to compliance-driven approaches and the emergence of new technologies like XDR. This introspective look highlighted the need for a paradigm shift in cybersecurity strategies to keep pace with the rapidly evolving threat landscape.</p><p><strong>Challenges in Traditional Approaches</strong></p><p>One of the key challenges discussed was the inefficiency of traditional SIEM solutions, which often resulted in data overload, lack of actionable insights, and hefty costs associated with data storage. Colby emphasized the importance of focusing on outcome-driven data collection and detection scenarios rather than accumulating vast amounts of data with limited value.</p><p><strong>The Birth of Abstract Security</strong></p><p>The catalyst for Abstract Security stemmed from Colby's experiences in previous companies, where the disconnect between data collection and effective threat detection became glaringly apparent. This realization led to the inception of a platform that prioritizes data relevance, streamlining the process of identifying and responding to security threats efficiently.</p><p><strong>Abstract Security's Unique Approach</strong></p><p>Abstract Security's modular platform offers a refreshing take on cybersecurity data management, with a focus on tailored data collection, analytics, and storage solutions. By enabling organizations to align data sources with specific detection outcomes, Abstract Security empowers teams to make informed decisions and optimize their cybersecurity strategies.</p><p><strong>Seamless Integration with Existing Tech Stack</strong></p><p>One of the standout features of Abstract Security is its seamless integration capabilities with existing tech stacks. The platform can complement and enhance current security infrastructure without the need for rip-and-replace, offering a smooth transition towards more effective threat detection and response mechanisms.</p><p><strong>Looking Towards the Future</strong></p><p>As organizations navigate the complexities of cloud environments and evolving cybersecurity challenges, Abstract Security stands out with fresh innovative ideas and practicality. By reimagining the data management process and emphasizing outcome-driven approaches, Abstract Security is poised to shape the future of cybersecurity operations.</p><p><strong>Conclusion</strong></p><p>The conversation between Colby DeRodeff and Sean Martin at the RSA Conference not only highlighted the pivotal role of Abstract Security in revolutionizing cybersecurity data management but also underscored the importance of reevaluating traditional approaches in the face of modern threats. With Abstract Security leading the charge towards a more efficient and proactive cybersecurity landscape, organizations have the opportunity to elevate their security posture and stay ahead of emerging cyber risks.</p><p>Learn more about Abstract Security: <a href="https://itspm.ag/abstractsec-zao">https://itspm.ag/abstractsec-zao</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Colby DeRodeff</strong>, CEO and Co-Founder, Abstract Security [<a href="https://twitter.com/get_abstracted">@get_abstracted</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/colbyderodeff/">https://www.linkedin.com/in/colbyderodeff/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Abstract Security: <a href="https://www.itspmagazine.com/directory/abstract-security">https://www.itspmagazine.com/directory/abstract-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17717855" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9a2de0f5-0aa9-4d99-ab44-b69469d54475/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9a2de0f5-0aa9-4d99-ab44-b69469d54475&amp;feed=2M86zCcc"/>
      <itunes:title>Shaking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Colby DeRodeff</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:18:26</itunes:duration>
      <itunes:summary>Discover how Abstract Security is revolutionizing cybersecurity data management at the RSA Conference.</itunes:summary>
      <itunes:subtitle>Discover how Abstract Security is revolutionizing cybersecurity data management at the RSA Conference.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, network security, rsa conference, colby derodeff, sean martin, threat detection, infosec, cybersecurity, cybersecurity, security tech, data management, innovation, cyber awareness, cyber defense, tech news, cyber protection, abstract security, data privacy, cloud security, cyber resilience, security solutions, digital security, brand story, cyber threats, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f6a6ba17-6142-4e13-82ec-8e9adcdebab5</guid>
      <title>From Data to Defense. Behind the Scenes of the DirectDefense&apos;s Threat Report Insights | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Jim Broome | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In cybersecurity, understanding the constantly evolving landscape of threats is key to safeguarding digital assets and sensitive information. DirectDefense, a leading security services provider, offers valuable insights into the world of threat intelligence through a candid conversation with Jim Broome, the Director of DirectDefense. In a recent discussion with Sean Martin, they delved into the nuances of IT and OT convergence, network separation, and the critical significance of threat reports.</p><p><strong>Uncovering Threat Intelligence Trends</strong></p><p>The dialogue between Sean Martin and Jim Broome sheds light on the intricate details of threat intelligence gathered by DirectDefense. Jim Broome's extensive experience in the industry, coupled with DirectDefense's commitment to cybersecurity excellence, unveils compelling narratives of threat actors, attack methodologies, and strategic responses to mitigate risks effectively.</p><p><strong>From Penetration Testing to Managed Services: DirectDefense's Evolution</strong></p><p>Jim Broome narrates DirectDefense's journey from its inception, focusing on core services like penetration testing and managed services. The shift towards leveraging threat reports to provide actionable insights to clients showcases DirectDefense's proactive approach in addressing emerging cyber threats effectively.</p><p><strong>The Impact of Threat Actor Behavior on Security Posture</strong></p><p>Through real-world examples like the Scattered Spider threat group's activities, Jim Broome highlights the direct impact of threat actor behavior on organizations. By dissecting attack vectors and lessons learned from engagements with threat actors, DirectDefense empowers clients with the knowledge to strengthen their security postures.</p><p><strong>Collaboration and Customized Solutions</strong></p><p>Jim Broome emphasizes the value of collaboration and customization in cybersecurity services. By tailoring alerts, response strategies, and monitoring solutions to suit each client's unique environment, DirectDefense fosters a culture of resilience and preparedness against potential cyber threats.</p><p><strong>Empowering Organizations with Actionable Insights</strong></p><p>The blog post underscores the importance of utilizing threat reports to gain actionable insights and establish robust security protocols. DirectDefense's approach to presenting information in a tangible and practical manner resonates with organizations seeking to enhance their cybersecurity frameworks.</p><p><strong>Looking Towards the Future of Cybersecurity</strong></p><p>As cybersecurity landscapes continue to evolve, organizations face the challenge of adapting to new threats and vulnerabilities. DirectDefense's proactive stance on integrating cybersecurity solutions with core IT disciplines signals a strategic approach towards ensuring operational resilience and uptime in critical infrastructure sectors.</p><p><strong>The Essence of Collaboration and Expert Guidance</strong></p><p>DirectDefense's emphasis on collaboration, expert guidance, and responsiveness to evolving threats underscores their commitment to ensuring clients are equipped with the necessary tools and insights to navigate the complex cybersecurity landscape successfully.</p><p>DirectDefense's conversation with Jim Broome offers a glimpse into the intricate world of threat intelligence, showcasing a blend of experience, expertise, and foresight in safeguarding organizations against cyber threats. By leveraging actionable insights and strategic responses, DirectDefense paves the way for a more secure and resilient digital environment.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Broome</strong>, President and CTO, DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jim-broome-88a0a02/">https://www.linkedin.com/in/jim-broome-88a0a02/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 19:14:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Broome)</author>
      <link>https://eventcoveragepodcast.com/episodes/from-data-to-defense-behind-the-scenes-of-the-directdefenses-threat-report-insights-a-brand-story-conversation-from-rsa-conference-2024-a-directdefense-story-with-jim-broome-on-location-coverage-with-sean-martin-and-marco-ciappelli-4DMtY4s9</link>
      <content:encoded><![CDATA[<p>In cybersecurity, understanding the constantly evolving landscape of threats is key to safeguarding digital assets and sensitive information. DirectDefense, a leading security services provider, offers valuable insights into the world of threat intelligence through a candid conversation with Jim Broome, the Director of DirectDefense. In a recent discussion with Sean Martin, they delved into the nuances of IT and OT convergence, network separation, and the critical significance of threat reports.</p><p><strong>Uncovering Threat Intelligence Trends</strong></p><p>The dialogue between Sean Martin and Jim Broome sheds light on the intricate details of threat intelligence gathered by DirectDefense. Jim Broome's extensive experience in the industry, coupled with DirectDefense's commitment to cybersecurity excellence, unveils compelling narratives of threat actors, attack methodologies, and strategic responses to mitigate risks effectively.</p><p><strong>From Penetration Testing to Managed Services: DirectDefense's Evolution</strong></p><p>Jim Broome narrates DirectDefense's journey from its inception, focusing on core services like penetration testing and managed services. The shift towards leveraging threat reports to provide actionable insights to clients showcases DirectDefense's proactive approach in addressing emerging cyber threats effectively.</p><p><strong>The Impact of Threat Actor Behavior on Security Posture</strong></p><p>Through real-world examples like the Scattered Spider threat group's activities, Jim Broome highlights the direct impact of threat actor behavior on organizations. By dissecting attack vectors and lessons learned from engagements with threat actors, DirectDefense empowers clients with the knowledge to strengthen their security postures.</p><p><strong>Collaboration and Customized Solutions</strong></p><p>Jim Broome emphasizes the value of collaboration and customization in cybersecurity services. By tailoring alerts, response strategies, and monitoring solutions to suit each client's unique environment, DirectDefense fosters a culture of resilience and preparedness against potential cyber threats.</p><p><strong>Empowering Organizations with Actionable Insights</strong></p><p>The blog post underscores the importance of utilizing threat reports to gain actionable insights and establish robust security protocols. DirectDefense's approach to presenting information in a tangible and practical manner resonates with organizations seeking to enhance their cybersecurity frameworks.</p><p><strong>Looking Towards the Future of Cybersecurity</strong></p><p>As cybersecurity landscapes continue to evolve, organizations face the challenge of adapting to new threats and vulnerabilities. DirectDefense's proactive stance on integrating cybersecurity solutions with core IT disciplines signals a strategic approach towards ensuring operational resilience and uptime in critical infrastructure sectors.</p><p><strong>The Essence of Collaboration and Expert Guidance</strong></p><p>DirectDefense's emphasis on collaboration, expert guidance, and responsiveness to evolving threats underscores their commitment to ensuring clients are equipped with the necessary tools and insights to navigate the complex cybersecurity landscape successfully.</p><p>DirectDefense's conversation with Jim Broome offers a glimpse into the intricate world of threat intelligence, showcasing a blend of experience, expertise, and foresight in safeguarding organizations against cyber threats. By leveraging actionable insights and strategic responses, DirectDefense paves the way for a more secure and resilient digital environment.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Broome</strong>, President and CTO, DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jim-broome-88a0a02/">https://www.linkedin.com/in/jim-broome-88a0a02/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20489610" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2ab34e15-a6b6-407b-9125-cf29ffab0ba1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2ab34e15-a6b6-407b-9125-cf29ffab0ba1&amp;feed=2M86zCcc"/>
      <itunes:title>From Data to Defense. Behind the Scenes of the DirectDefense&apos;s Threat Report Insights | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Jim Broome | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Broome</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:19</itunes:duration>
      <itunes:summary>Explore the dynamic world of threat intelligence with DirectDefense&apos;s Jim Broome, offering insights into cybersecurity trends and strategies.</itunes:summary>
      <itunes:subtitle>Explore the dynamic world of threat intelligence with DirectDefense&apos;s Jim Broome, offering insights into cybersecurity trends and strategies.</itunes:subtitle>
      <itunes:keywords>uptime, managed services, collaboration, actionable insights, marco ciappelli, security posture, rsa conference, sean martin, cybersecurity, threat actors, vulnerabilities, customization, penetration testing, directdefense, resilience, threat intelligence, expert guidance, operational resilience, proactive approach, core it disciplines, attack methodologies, jim broome, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">67fb8134-7a75-4e3a-9948-8ff3e15dc7b0</guid>
      <title>Presenting The Superhero Product for Browser Security at RSA Conference | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As we journey through the ever-evolving landscape of enterprise and individual cybersecurity, it is clear for organizations that is it essential to stay one step ahead of malicious actors looking to exploit vulnerabilities. One such innovative solution, SquareX, has emerged as a superhero product in the market of browser security, providing a dynamic shield against sophisticated cyber threats.</p><p>At the recent RSA Conference, the founder and cybersecurity veteran, Vivek Ramachandran, shed light on the mission behind SquareX - to empower enterprises and individuals to be fearless online. The conversation with Sean Martin focuses onto the crucial role of browsers in modern-day cyberattacks and highlighted the challenges organizations face in securing this often overlooked aspect of their IT infrastructure.</p><p><strong>Unveiling the Blind Spot in Browser Security</strong></p><p>The dialogue between Sean and Vivek underscored the significance of addressing the blind spot that browsers present in the cybersecurity posture of organizations. While traditional security measures such as firewalls and web gateways play a vital role, they often fall short in detecting and mitigating threats originating from the browser.</p><p><strong>The Power of Managed Browsers and Browser Extensions</strong></p><p>Vivek emphasized the importance of deploying managed browsers as a foundational step towards enhancing visibility and control over browser-based threats. SquareX's browser extension acts as a vigilant guardian, monitoring every tab and window for anomalous activities and potential security risks.</p><p><strong>Real-World Impact: Stories from the Field</strong></p><p>Vivek shared compelling anecdotes of how SquareX has made a tangible difference in fortifying organizations against cyber threats. From preventing data leakage through unauthorized file uploads to thwarting sophisticated social engineering attacks via malicious documents, SquareX proved its effectiveness in identifying and neutralizing threats that evaded traditional security measures.</p><p><strong>Elevating Browser Security with Cutting-Edge Technology</strong></p><p>SquareX's innovative approach to browser security leverages AI vision and in-browser macro analysis to detect and block malicious activities in real-time. By providing detailed visibility into browser-based threats and streamlining post-incident forensics, SquareX equips organizations with the tools needed to proactively defend against evolving cyber threats.</p><p><strong>The Path to Enhanced Cyber Resilience</strong></p><p>In conclusion, the discussion between Sean Martin and Vivek Ramachandran encapsulates the essence of proactive cybersecurity measures in today's threat landscape. By embracing solutions like SquareX and prioritizing browser security, organizations can bolster their cyber resilience and safeguard their digital assets against sophisticated adversaries.</p><p>As we navigate the digital frontier, the importance of browser security cannot be overstated. With SquareX leading the charge as a superhero product of cybersecurity, organizations can embark on a journey towards a more secure and resilient future online.</p><p>Cheers to the new hero!</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 18:37:24 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://eventcoveragepodcast.com/episodes/presenting-the-superhero-product-for-browser-security-at-rsa-conference-a-brand-story-conversation-from-rsa-conference-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-m30NDgCU</link>
      <content:encoded><![CDATA[<p>As we journey through the ever-evolving landscape of enterprise and individual cybersecurity, it is clear for organizations that is it essential to stay one step ahead of malicious actors looking to exploit vulnerabilities. One such innovative solution, SquareX, has emerged as a superhero product in the market of browser security, providing a dynamic shield against sophisticated cyber threats.</p><p>At the recent RSA Conference, the founder and cybersecurity veteran, Vivek Ramachandran, shed light on the mission behind SquareX - to empower enterprises and individuals to be fearless online. The conversation with Sean Martin focuses onto the crucial role of browsers in modern-day cyberattacks and highlighted the challenges organizations face in securing this often overlooked aspect of their IT infrastructure.</p><p><strong>Unveiling the Blind Spot in Browser Security</strong></p><p>The dialogue between Sean and Vivek underscored the significance of addressing the blind spot that browsers present in the cybersecurity posture of organizations. While traditional security measures such as firewalls and web gateways play a vital role, they often fall short in detecting and mitigating threats originating from the browser.</p><p><strong>The Power of Managed Browsers and Browser Extensions</strong></p><p>Vivek emphasized the importance of deploying managed browsers as a foundational step towards enhancing visibility and control over browser-based threats. SquareX's browser extension acts as a vigilant guardian, monitoring every tab and window for anomalous activities and potential security risks.</p><p><strong>Real-World Impact: Stories from the Field</strong></p><p>Vivek shared compelling anecdotes of how SquareX has made a tangible difference in fortifying organizations against cyber threats. From preventing data leakage through unauthorized file uploads to thwarting sophisticated social engineering attacks via malicious documents, SquareX proved its effectiveness in identifying and neutralizing threats that evaded traditional security measures.</p><p><strong>Elevating Browser Security with Cutting-Edge Technology</strong></p><p>SquareX's innovative approach to browser security leverages AI vision and in-browser macro analysis to detect and block malicious activities in real-time. By providing detailed visibility into browser-based threats and streamlining post-incident forensics, SquareX equips organizations with the tools needed to proactively defend against evolving cyber threats.</p><p><strong>The Path to Enhanced Cyber Resilience</strong></p><p>In conclusion, the discussion between Sean Martin and Vivek Ramachandran encapsulates the essence of proactive cybersecurity measures in today's threat landscape. By embracing solutions like SquareX and prioritizing browser security, organizations can bolster their cyber resilience and safeguard their digital assets against sophisticated adversaries.</p><p>As we navigate the digital frontier, the importance of browser security cannot be overstated. With SquareX leading the charge as a superhero product of cybersecurity, organizations can embark on a journey towards a more secure and resilient future online.</p><p>Cheers to the new hero!</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25470795" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/99e322cc-789e-4104-9a31-4753ecbc33d8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=99e322cc-789e-4104-9a31-4753ecbc33d8&amp;feed=2M86zCcc"/>
      <itunes:title>Presenting The Superhero Product for Browser Security at RSA Conference | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:30</itunes:duration>
      <itunes:summary>In the ever-evolving landscape of cybersecurity, SquareX emerges as a superhero product at the forefront of browser security, offering organizations a shield against sophisticated cyber threats.</itunes:summary>
      <itunes:subtitle>In the ever-evolving landscape of cybersecurity, SquareX emerges as a superhero product at the forefront of browser security, offering organizations a shield against sophisticated cyber threats.</itunes:subtitle>
      <itunes:keywords>innovative solution, marco ciappelli, rsa conference, rsa conference, proactive defense, sean martin, real-time detection, managed browsers, cybersecurity, browser security, security measures, digital assets, forensics, digital frontier, malicious actors, cyber resilience, post-incident analysis, ai technology, ai vision, vivek ramachandran, squarex, web gateways, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9887c531-c637-45f4-b598-b9a2ca28f076</guid>
      <title>Navigating the Future of AI Governance with LogicGate | A Brand Story Conversation From RSA Conference 2024 | A LogicGate Story with Matt Kunkel and Nick Kathmann | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The RSA Conference in San Francisco is renowned for being a hub of cutting-edge discussions around everything related to cybersecurity, and this year, one of the spotlight was on and AI governance. In this conversation featuring industry experts from LogicGate, the focus was on unraveling the challenges organizations face in adapting to the rapidly evolving landscape of AI implementation.</p><p><strong>Unveiling the Experts</strong></p><p>Moderated by Sean Martin, the discussion kicked off with a warm welcome to the LogicGate team, setting the stage for a deep dive into the complexity of AI governance. Matt Kunkel, the CEO of LogicGate, shared insights from his extensive consulting background in building GRC solutions for a diverse range of organizations. His vast experience culminated in the creation of the Risk Cloud Platform, a versatile tool that aids organizations in automating risk management processes tailored to their specific needs.</p><p><strong>The CISO Perspective</strong></p><p>Nick Kathmann, the Chief Information Security Officer at LogicGate, brought to the table over two decades of experience in cybersecurity. His journey through managing security compliance for major players like Virtustream and RSA highlighted the intricate web of challenges posed by evolving technologies like AI. Nick emphasized the critical importance of aligning internal governance with external regulations to ensure a robust security posture.</p><p><strong>Demystifying AI Governance</strong></p><p>As the conversation continues Sean Martin steered the discussion towards demystifying AI governance and its impact on organizational frameworks. The panel shed light on the dual challenges organizations face – the risk of embracing AI too recklessly and stifling innovation versus the risk of over-regulating and impeding progress. The consensus was clear – a balanced approach that marries speed and security is imperative for a successful AI governance strategy.</p><p><strong>The LogicGate Solution</strong></p><p>Matt and Nick unraveled the intricacies of the AI governance solution developed by LogicGate, designed to provide organizations with a holistic framework for managing AI risks. By integrating AI governance with existing risk management protocols, LogicGate’s platform offers a transformative approach that streamlines processes, enhances visibility, and ensures compliance with emerging standards.</p><p><strong>Looking Towards the Future</strong></p><p>The conversation concluded with a forward-looking approach, underscoring the rapidly evolving nature of AI technologies and the indispensable need for agile governance frameworks. The consensus was that staying ahead of the curve demands continuous assessment, adaptation, and alignment of AI governance with overarching business objectives.</p><p><strong>In Closing</strong></p><p>This episode of On Location Coverage at the RSA Conference 2024 offered a glimpse into the complexities and opportunities that AI governance presents for organizations worldwide. With LogicGate leading the charge in innovative solutions, the future of AI governance looks promising, anchored in a foundation of collaboration, foresight, and strategic alignment.</p><p>As organizations navigate the uncharted waters of AI implementation, partnering with pioneers like LogicGate is poised to be the key to unlocking the full potential of this transformative technology. Stay tuned for more insights and developments on AI governance as we journey towards a future powered by innovation and resilience.</p><p>Learn more about LogicGate: <a href="https://itspm.ag/logicgate-92d6bc">https://itspm.ag/logicgate-92d6bc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Matt Kunkel</strong>, CEO at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/matt-kunkel-91056143/">https://www.linkedin.com/in/matt-kunkel-91056143/</a></p><p><strong>Nick Kathmann</strong>, Chief Information Security Officer at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicholaskathmann/">https://www.linkedin.com/in/nicholaskathmann/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LogicGate: <a href="https://www.itspmagazine.com/directory/logicgate">https://www.itspmagazine.com/directory/logicgate</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 00:59:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Matt Kunkel, Nick Kathmann)</author>
      <link>https://eventcoveragepodcast.com/episodes/navigating-the-future-of-ai-governance-with-logicgate-a-brand-story-conversation-from-rsa-conference-2024-a-logicgate-story-with-matt-kunkel-and-nick-kathmann-on-location-coverage-with-sean-martin-and-marco-ciappelli-2Ul755iw</link>
      <content:encoded><![CDATA[<p>The RSA Conference in San Francisco is renowned for being a hub of cutting-edge discussions around everything related to cybersecurity, and this year, one of the spotlight was on and AI governance. In this conversation featuring industry experts from LogicGate, the focus was on unraveling the challenges organizations face in adapting to the rapidly evolving landscape of AI implementation.</p><p><strong>Unveiling the Experts</strong></p><p>Moderated by Sean Martin, the discussion kicked off with a warm welcome to the LogicGate team, setting the stage for a deep dive into the complexity of AI governance. Matt Kunkel, the CEO of LogicGate, shared insights from his extensive consulting background in building GRC solutions for a diverse range of organizations. His vast experience culminated in the creation of the Risk Cloud Platform, a versatile tool that aids organizations in automating risk management processes tailored to their specific needs.</p><p><strong>The CISO Perspective</strong></p><p>Nick Kathmann, the Chief Information Security Officer at LogicGate, brought to the table over two decades of experience in cybersecurity. His journey through managing security compliance for major players like Virtustream and RSA highlighted the intricate web of challenges posed by evolving technologies like AI. Nick emphasized the critical importance of aligning internal governance with external regulations to ensure a robust security posture.</p><p><strong>Demystifying AI Governance</strong></p><p>As the conversation continues Sean Martin steered the discussion towards demystifying AI governance and its impact on organizational frameworks. The panel shed light on the dual challenges organizations face – the risk of embracing AI too recklessly and stifling innovation versus the risk of over-regulating and impeding progress. The consensus was clear – a balanced approach that marries speed and security is imperative for a successful AI governance strategy.</p><p><strong>The LogicGate Solution</strong></p><p>Matt and Nick unraveled the intricacies of the AI governance solution developed by LogicGate, designed to provide organizations with a holistic framework for managing AI risks. By integrating AI governance with existing risk management protocols, LogicGate’s platform offers a transformative approach that streamlines processes, enhances visibility, and ensures compliance with emerging standards.</p><p><strong>Looking Towards the Future</strong></p><p>The conversation concluded with a forward-looking approach, underscoring the rapidly evolving nature of AI technologies and the indispensable need for agile governance frameworks. The consensus was that staying ahead of the curve demands continuous assessment, adaptation, and alignment of AI governance with overarching business objectives.</p><p><strong>In Closing</strong></p><p>This episode of On Location Coverage at the RSA Conference 2024 offered a glimpse into the complexities and opportunities that AI governance presents for organizations worldwide. With LogicGate leading the charge in innovative solutions, the future of AI governance looks promising, anchored in a foundation of collaboration, foresight, and strategic alignment.</p><p>As organizations navigate the uncharted waters of AI implementation, partnering with pioneers like LogicGate is poised to be the key to unlocking the full potential of this transformative technology. Stay tuned for more insights and developments on AI governance as we journey towards a future powered by innovation and resilience.</p><p>Learn more about LogicGate: <a href="https://itspm.ag/logicgate-92d6bc">https://itspm.ag/logicgate-92d6bc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Matt Kunkel</strong>, CEO at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/matt-kunkel-91056143/">https://www.linkedin.com/in/matt-kunkel-91056143/</a></p><p><strong>Nick Kathmann</strong>, Chief Information Security Officer at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicholaskathmann/">https://www.linkedin.com/in/nicholaskathmann/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LogicGate: <a href="https://www.itspmagazine.com/directory/logicgate">https://www.itspmagazine.com/directory/logicgate</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20074596" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8f4aab7e-e09f-4bbe-be2e-d16a74b7cf57/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8f4aab7e-e09f-4bbe-be2e-d16a74b7cf57&amp;feed=2M86zCcc"/>
      <itunes:title>Navigating the Future of AI Governance with LogicGate | A Brand Story Conversation From RSA Conference 2024 | A LogicGate Story with Matt Kunkel and Nick Kathmann | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Matt Kunkel, Nick Kathmann</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:53</itunes:duration>
      <itunes:summary>In this episode of LogicGate RSAC 2024 Brand Story, we delve into the world of AI governance and its impact on organizations.AI responses can produce inaccurate information about people, places, or facts.</itunes:summary>
      <itunes:subtitle>In this episode of LogicGate RSAC 2024 Brand Story, we delve into the world of AI governance and its impact on organizations.AI responses can produce inaccurate information about people, places, or facts.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, business governance, artificial intelligence, third party risk management, rsa conference, technology safety, ethics in ai, ai governance, sean martin, logic gate rsac 2024, risk and compliance, tech industry, cybersecurity, enterprise risk, compliance programs, compliance frameworks, data security, risk programs, matt kunkel, nick kathmann, regulatory risk, technology impact, privacy regulations, security teams, brand story, security and governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ea074da4-a9e3-4933-9e18-ade79af24538</guid>
      <title>Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Sean and Jon Baker, shedding light on the groundbreaking work being done at MITRE's Center for Threat Informed Defense.</p><p><strong>The Art of Possible: A Glimpse into RSA Conference 2024</strong></p><p>The RSA Conference provided a platform for cybersecurity professionals to come together and discuss pressing issues in the industry. Sean Martin and Jon Baker's conversation touched upon the theme of this year's conference, "The Art of Possible." This theme resonated with the audience as they delved into the dynamic nature of cybersecurity and the need for continual learning and growth.</p><p><strong>MITRE: A Beacon of Innovation in Cybersecurity</strong></p><p>Jon Baker, Director of the Center for Threat Informed Defense at MITRE, shared insights into the organization's rich history and its mission to solve problems for a safer world. With a focus on advancing threat informed defense globally, MITRE has been a driving force behind initiatives like the ATT&CK framework and the CVE program.</p><p><strong>Collaborative Research and Development at MITRE</strong></p><p>One of the key pillars of MITRE's work is collaborative research and development. Through projects like the Technique Inference Engine and Summoning the Pyramid, MITRE is pushing the boundaries of what is possible in cybersecurity. These projects not only aim to enhance detection capabilities but also empower security teams to proactively defend against threats.</p><p><strong>Engaging the Community: How You Can Get Involved</strong></p><p>The Center for Threat Informed Defense encourages active participation from the cybersecurity community. By leveraging resources like the Top Attack Technique Calculator and M3TID, organizations can enhance their threat intelligence capabilities and improve their defenses. MITRE also hosts global events and training sessions to promote awareness and facilitate knowledge sharing.</p><p><strong>Join the Movement: Embracing Innovation in Cybersecurity</strong></p><p>As the cybersecurity landscape continues to evolve, embracing innovation is key to staying ahead of cyber threats. MITRE's Center for Threat Informed Defense offers a roadmap for organizations looking to enhance their security posture and adapt to the changing threat landscape. By getting involved, providing feedback, and leveraging the tools and resources available, organizations can contribute to a safer and more secure digital ecosystem.</p><p><strong>Closing Thoughts</strong></p><p>The conversation between Sean Martin and Jon Baker at the RSA Conference highlighted the critical role of collaboration and innovation in cybersecurity. MITRE's Center for Threat Informed Defense is at the forefront of driving impactful research and development efforts that benefit the entire cybersecurity community. By embracing the spirit of continual learning and advancement, organizations can strengthen their defenses and create a more resilient cybersecurity posture.</p><p>Stay tuned for more insights and updates from MITRE's Center for Threat Informed Defense and join the movement towards a safer digital world.</p><p>Learn more about MITRE:<a href="https://itspm.ag/mitre-eng24">https://itspm.ag/mitre-eng24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jon Baker</strong>, Director , Center for Threat-Informed Defense, MITRE [<a href="https://twitter.com/mitrecorp"><strong>@MITREcorp</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jonathanobaker/">https://www.linkedin.com/in/jonathanobaker/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from MITRE: <a href="https://www.itspmagazine.com/directory/mitre">https://www.itspmagazine.com/directory/mitre</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 00:04:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Baker)</author>
      <link>https://eventcoveragepodcast.com/episodes/innovations-in-cybersecurity-and-threat-intelligence-solutions-a-brand-story-conversation-from-rsa-conference-2024-a-mitre-story-with-jon-baker-on-location-coverage-with-sean-martin-and-marco-ciappelli-efLbfe4o</link>
      <content:encoded><![CDATA[<p>The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Sean and Jon Baker, shedding light on the groundbreaking work being done at MITRE's Center for Threat Informed Defense.</p><p><strong>The Art of Possible: A Glimpse into RSA Conference 2024</strong></p><p>The RSA Conference provided a platform for cybersecurity professionals to come together and discuss pressing issues in the industry. Sean Martin and Jon Baker's conversation touched upon the theme of this year's conference, "The Art of Possible." This theme resonated with the audience as they delved into the dynamic nature of cybersecurity and the need for continual learning and growth.</p><p><strong>MITRE: A Beacon of Innovation in Cybersecurity</strong></p><p>Jon Baker, Director of the Center for Threat Informed Defense at MITRE, shared insights into the organization's rich history and its mission to solve problems for a safer world. With a focus on advancing threat informed defense globally, MITRE has been a driving force behind initiatives like the ATT&CK framework and the CVE program.</p><p><strong>Collaborative Research and Development at MITRE</strong></p><p>One of the key pillars of MITRE's work is collaborative research and development. Through projects like the Technique Inference Engine and Summoning the Pyramid, MITRE is pushing the boundaries of what is possible in cybersecurity. These projects not only aim to enhance detection capabilities but also empower security teams to proactively defend against threats.</p><p><strong>Engaging the Community: How You Can Get Involved</strong></p><p>The Center for Threat Informed Defense encourages active participation from the cybersecurity community. By leveraging resources like the Top Attack Technique Calculator and M3TID, organizations can enhance their threat intelligence capabilities and improve their defenses. MITRE also hosts global events and training sessions to promote awareness and facilitate knowledge sharing.</p><p><strong>Join the Movement: Embracing Innovation in Cybersecurity</strong></p><p>As the cybersecurity landscape continues to evolve, embracing innovation is key to staying ahead of cyber threats. MITRE's Center for Threat Informed Defense offers a roadmap for organizations looking to enhance their security posture and adapt to the changing threat landscape. By getting involved, providing feedback, and leveraging the tools and resources available, organizations can contribute to a safer and more secure digital ecosystem.</p><p><strong>Closing Thoughts</strong></p><p>The conversation between Sean Martin and Jon Baker at the RSA Conference highlighted the critical role of collaboration and innovation in cybersecurity. MITRE's Center for Threat Informed Defense is at the forefront of driving impactful research and development efforts that benefit the entire cybersecurity community. By embracing the spirit of continual learning and advancement, organizations can strengthen their defenses and create a more resilient cybersecurity posture.</p><p>Stay tuned for more insights and updates from MITRE's Center for Threat Informed Defense and join the movement towards a safer digital world.</p><p>Learn more about MITRE:<a href="https://itspm.ag/mitre-eng24">https://itspm.ag/mitre-eng24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jon Baker</strong>, Director , Center for Threat-Informed Defense, MITRE [<a href="https://twitter.com/mitrecorp"><strong>@MITREcorp</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jonathanobaker/">https://www.linkedin.com/in/jonathanobaker/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from MITRE: <a href="https://www.itspmagazine.com/directory/mitre">https://www.itspmagazine.com/directory/mitre</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19186854" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e877e29d-6294-418c-8164-0c0f4a19e364/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e877e29d-6294-418c-8164-0c0f4a19e364&amp;feed=2M86zCcc"/>
      <itunes:title>Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Baker</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:57</itunes:duration>
      <itunes:summary>Join Sean Martin as he discusses the present and future of cybersecurity threats with Jon Baker from MITRE, discussing cutting-edge research projects and the mission to advance threat informed defense globally.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he discusses the present and future of cybersecurity threats with Jon Baker from MITRE, discussing cutting-edge research projects and the mission to advance threat informed defense globally.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, network security, rsa conference, sean martin, threat detection, technology innovations, jon baker, cybersecurity, data protection, information security, cyber defense, threat intelligence, threat informed defense, security programs, cyber resilience, mitre, cybersecurity research, security solutions, cyber attacks, cybersecurity professionals, digital security, brand story, cyber threats, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">57354dd9-21e4-45cb-88da-a950e4badb0d</guid>
      <title>Navigating the World of Operational Technology and Cybersecurity | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Chris Walcutt | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a recent episode recorded live at the RSA Conference, an insightful discussion unfolded between Sean Martin and Chris Walcutt on the intersection of operational technology (OT) and cybersecurity. The conversation look into the challenges, insights, and best practices surrounding these vital areas of technology. Let's dive deeper into the key takeaways from this engaging dialogue.</p><p><strong>Bridging the Gap Between IT and OT</strong></p><p>Chris emphasized the importance of collaboration between IT and OT teams, highlighting the need for mutual understanding and cooperation. By fostering communication and building trust, organizations can navigate the complexities of integrating IT and OT systems effectively.</p><p><strong>Understanding Critical Infrastructure</strong></p><p>One of the key insights shared by Chris revolved around the critical nature of infrastructure, particularly in sectors such as energy, water, and manufacturing. The emphasis on resilience-based risk assessments and the need to comprehensively evaluate vulnerabilities underscored the importance of proactive cybersecurity measures.</p><p><strong>The Purdue Model and Practical Approaches</strong></p><p>Chris shed light on the Purdue model, a framework often referenced in the OT space. While acknowledging its value, he emphasized the need for practical implementations tailored to individual environments. Simplifying zones and focusing on critical operational aspects can enhance security without compromising system performance.</p><p><strong>Fostering Resilience through Collaboration</strong></p><p>The conversation underscored the significance of resilience in cybersecurity efforts. By fostering collaboration, implementing tailored security measures, and leveraging expertise across IT and OT domains, organizations can bolster their resilience to cyber threats effectively.</p><p><strong>Procurement as a Strategic Ally</strong></p><p>An insightful recommendation from Chris highlighted the role of procurement as a strategic ally in the cybersecurity landscape. Educating procurement teams on the specific needs of OT systems and integrating cybersecurity requirements into vendor contracts can fortify defense mechanisms and mitigate risks.</p><p>The dialogue between Sean Martin and Chris Walcutt offered a comprehensive glimpse into the dynamic realm of operational technology and cybersecurity. By emphasizing collaboration, risk assessment, and strategic partnerships, organizations can navigate the evolving cybersecurity landscape with resilience and adaptability.</p><p>The insights shared in this conversation serve as a valuable resource for IT and OT professionals seeking to enhance their cybersecurity practices and fortify critical infrastructure against potential threats. Embracing a proactive and collaborative approach can pave the way for a more secure and resilient technological ecosystem.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Walcutt</strong>, Chief Security Officer at DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/">https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:58:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Walcutt)</author>
      <link>https://eventcoveragepodcast.com/episodes/navigating-the-world-of-operational-technology-and-cybersecurity-a-brand-story-conversation-from-rsa-conference-2024-a-directdefense-story-with-chris-walcutt-on-location-coverage-with-sean-martin-and-marco-ciappelli-MghMTIZQ</link>
      <content:encoded><![CDATA[<p>In a recent episode recorded live at the RSA Conference, an insightful discussion unfolded between Sean Martin and Chris Walcutt on the intersection of operational technology (OT) and cybersecurity. The conversation look into the challenges, insights, and best practices surrounding these vital areas of technology. Let's dive deeper into the key takeaways from this engaging dialogue.</p><p><strong>Bridging the Gap Between IT and OT</strong></p><p>Chris emphasized the importance of collaboration between IT and OT teams, highlighting the need for mutual understanding and cooperation. By fostering communication and building trust, organizations can navigate the complexities of integrating IT and OT systems effectively.</p><p><strong>Understanding Critical Infrastructure</strong></p><p>One of the key insights shared by Chris revolved around the critical nature of infrastructure, particularly in sectors such as energy, water, and manufacturing. The emphasis on resilience-based risk assessments and the need to comprehensively evaluate vulnerabilities underscored the importance of proactive cybersecurity measures.</p><p><strong>The Purdue Model and Practical Approaches</strong></p><p>Chris shed light on the Purdue model, a framework often referenced in the OT space. While acknowledging its value, he emphasized the need for practical implementations tailored to individual environments. Simplifying zones and focusing on critical operational aspects can enhance security without compromising system performance.</p><p><strong>Fostering Resilience through Collaboration</strong></p><p>The conversation underscored the significance of resilience in cybersecurity efforts. By fostering collaboration, implementing tailored security measures, and leveraging expertise across IT and OT domains, organizations can bolster their resilience to cyber threats effectively.</p><p><strong>Procurement as a Strategic Ally</strong></p><p>An insightful recommendation from Chris highlighted the role of procurement as a strategic ally in the cybersecurity landscape. Educating procurement teams on the specific needs of OT systems and integrating cybersecurity requirements into vendor contracts can fortify defense mechanisms and mitigate risks.</p><p>The dialogue between Sean Martin and Chris Walcutt offered a comprehensive glimpse into the dynamic realm of operational technology and cybersecurity. By emphasizing collaboration, risk assessment, and strategic partnerships, organizations can navigate the evolving cybersecurity landscape with resilience and adaptability.</p><p>The insights shared in this conversation serve as a valuable resource for IT and OT professionals seeking to enhance their cybersecurity practices and fortify critical infrastructure against potential threats. Embracing a proactive and collaborative approach can pave the way for a more secure and resilient technological ecosystem.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Walcutt</strong>, Chief Security Officer at DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/">https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27043075" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3e29eb60-540a-4fec-91bb-8c01a9feeb89/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3e29eb60-540a-4fec-91bb-8c01a9feeb89&amp;feed=2M86zCcc"/>
      <itunes:title>Navigating the World of Operational Technology and Cybersecurity | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Chris Walcutt | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Walcutt</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:08</itunes:duration>
      <itunes:summary>Explore the intersection of operational technology and cybersecurity in a captivating dialogue between Sean Martin and Chris Walcutt.</itunes:summary>
      <itunes:subtitle>Explore the intersection of operational technology and cybersecurity in a captivating dialogue between Sean Martin and Chris Walcutt.</itunes:subtitle>
      <itunes:keywords>it-ot communication, cybersecurity dialogue at rsa conference, marco ciappelli, rsa conference, sean martin, it and ot integration, critical infrastructure security, operational technology, cybersecurity, ot cybersecurity best practices, enhancing ot security, building cyber resilience, cybersecurity resilience strategies, it and ot collaboration, procurement strategies for cybersecurity, understanding ot systems, bridging it and ot divide, risk management in operational technology, chris walcutt, resilience-based risk assessment, purdue model in cybersecurity, ot security challenges, vendor security contracts, cyber threats in critical infrastructure, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">382ffa9b-d2a1-4917-be53-596449cea9c8</guid>
      <title>Unveiling the World of Bad Bots: Insights from Imperva&apos;s 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.</p><p><strong>Unraveling the Bad Bot Landscape</strong></p><p>The conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.</p><p><strong>Delving into Key Statistics</strong></p><p>Erez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.</p><p><strong>Industry Insights and Use Cases</strong></p><p>The conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.</p><p><strong>Transforming Data into Action</strong></p><p>Sean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.</p><p><strong>AI's Role in Bot Evolution</strong></p><p>The discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.</p><p><strong>Safeguarding Against Bot Abuse</strong></p><p>The conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.</p><p><strong>Conclusion</strong></p><p>As the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.</p><p>By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Erez Hasson</strong>, Product Marketing Manager at Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/erezh/" target="_blank">https://www.linkedin.com/in/erezh/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:34:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Erez Hasson)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-world-of-bad-bots-insights-from-impervas-11th-edition-report-a-brand-story-conversation-from-rsa-conference-2024-an-imperva-story-with-erez-hasson-on-location-coverage-with-sean-martin-and-marco-ciappelli-OCTpYb1_</link>
      <content:encoded><![CDATA[<p>The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.</p><p><strong>Unraveling the Bad Bot Landscape</strong></p><p>The conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.</p><p><strong>Delving into Key Statistics</strong></p><p>Erez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.</p><p><strong>Industry Insights and Use Cases</strong></p><p>The conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.</p><p><strong>Transforming Data into Action</strong></p><p>Sean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.</p><p><strong>AI's Role in Bot Evolution</strong></p><p>The discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.</p><p><strong>Safeguarding Against Bot Abuse</strong></p><p>The conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.</p><p><strong>Conclusion</strong></p><p>As the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.</p><p>By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Erez Hasson</strong>, Product Marketing Manager at Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/erezh/" target="_blank">https://www.linkedin.com/in/erezh/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20799636" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/0c366cfb-c609-49a1-a691-b0801fe2cd42/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=0c366cfb-c609-49a1-a691-b0801fe2cd42&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the World of Bad Bots: Insights from Imperva&apos;s 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Erez Hasson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:21:38</itunes:duration>
      <itunes:summary>Dive into the world of cybersecurity and automated traffic with key insights from Imperva&apos;s 11th edition Bad Bot Report.</itunes:summary>
      <itunes:subtitle>Dive into the world of cybersecurity and automated traffic with key insights from Imperva&apos;s 11th edition Bad Bot Report.</itunes:subtitle>
      <itunes:keywords>automated traffic, malicious activities, web scraping, marco ciappelli, digital defense, rsa conference, bad bots, cyber intelligence, sean martin, ai-driven attacks, web security, erez hasson, cybersecurity, bot sophistication, threat mitigation, ai interface attacks, data protection, bot management, security strategies, imperva, cyber resilience, industry insights, operational costs, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3eb61506-b6cd-4422-abcf-8d5aec63997b</guid>
      <title>Embracing the Art of Possible | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Nanhi Singh | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.</p><p><strong>Embracing Technology for Business Success</strong></p><p>The theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.</p><p><strong>Navigating the Complexities of Application Environments</strong></p><p>As organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.</p><p><strong>Addressing Concerns of API-Driven Attacks</strong></p><p>The conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.</p><p><strong>Empowering Organizations with Comprehensive Security Solutions</strong></p><p>With the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.</p><p><strong>Driving Operational Efficiency and Focus</strong></p><p>In a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.</p><p><strong>Securing Applications Anywhere</strong></p><p>As applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.</p><p><strong>Conclusion</strong></p><p>The engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.</p><p>Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.</p><p>Thank you for joining us in this exploration of cybersecurity and business resilience.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Nanhi Singh</strong>, Chief Customer Officer and GM Application Security at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nanhi-singh-aa51371" target="_blank">https://www.linkedin.com/in/nanhi-singh-aa51371</a></p><p>On Twitter | <a href="https://twitter.com/NanhiSingh14" target="_blank">https://twitter.com/NanhiSingh14</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:00:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Nanhi Singh)</author>
      <link>https://eventcoveragepodcast.com/episodes/embracing-the-art-of-possible-a-brand-story-conversation-from-rsa-conference-2024-an-imperva-story-with-nanhi-singh-on-location-coverage-with-sean-martin-and-marco-ciappelli-jiOdZVBI</link>
      <content:encoded><![CDATA[<p>In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.</p><p><strong>Embracing Technology for Business Success</strong></p><p>The theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.</p><p><strong>Navigating the Complexities of Application Environments</strong></p><p>As organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.</p><p><strong>Addressing Concerns of API-Driven Attacks</strong></p><p>The conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.</p><p><strong>Empowering Organizations with Comprehensive Security Solutions</strong></p><p>With the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.</p><p><strong>Driving Operational Efficiency and Focus</strong></p><p>In a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.</p><p><strong>Securing Applications Anywhere</strong></p><p>As applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.</p><p><strong>Conclusion</strong></p><p>The engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.</p><p>Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.</p><p>Thank you for joining us in this exploration of cybersecurity and business resilience.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Nanhi Singh</strong>, Chief Customer Officer and GM Application Security at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nanhi-singh-aa51371" target="_blank">https://www.linkedin.com/in/nanhi-singh-aa51371</a></p><p>On Twitter | <a href="https://twitter.com/NanhiSingh14" target="_blank">https://twitter.com/NanhiSingh14</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19889255" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ce58d40c-de3c-4027-978d-bd86db44546e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ce58d40c-de3c-4027-978d-bd86db44546e&amp;feed=2M86zCcc"/>
      <itunes:title>Embracing the Art of Possible | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Nanhi Singh | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Nanhi Singh</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:41</itunes:duration>
      <itunes:summary>Join us for a deep dive into cybersecurity insights with Nanhi Singh from Imperva at the RSA conference.</itunes:summary>
      <itunes:subtitle>Join us for a deep dive into cybersecurity insights with Nanhi Singh from Imperva at the RSA conference.</itunes:subtitle>
      <itunes:keywords>cyberdefense, technology, marco ciappelli, rsa conference, applicationsecurity, sean martin, cyberrisk, infosec, cyberawareness, networksecurity, cybersecurity, cybersecurity, digitaltransformation, dataprotection, cloudsecurity, businesssecurity, datasecurity, cyberthreats, imperva, rsaconference, cyberaware, itsecurity, apis, nanhi singh, brand story, securitysolutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">df12e794-885a-420f-9feb-1f474dea6913</guid>
      <title>Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.</p><p><strong>Protecting Data in the New Technological Landscape</strong></p><p>Vishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.</p><p><strong>Shifting from Infrastructure to Data Protection</strong></p><p>The dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.</p><p><strong>Enabling Secure Data Collaboration with Seclore</strong></p><p>By introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.</p><p><strong>Navigating the Path to Data-Centric Security</strong></p><p>As enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.</p><p>The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.</p><p>Learn more about Seclore: <a href="https://itspm.ag/seclore-km6r">https://itspm.ag/seclore-km6r </a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vishal Gupta</strong>, CEO, Seclore [<a href="https://twitter.com/secloretech">@secloretech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jiguptaji/">https://www.linkedin.com/in/jiguptaji/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Seclore: <a href="https://www.itspmagazine.com/directory/seclore">https://www.itspmagazine.com/directory/seclore</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 02:09:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vishal Gupta)</author>
      <link>https://eventcoveragepodcast.com/episodes/embracing-data-centric-security-a-brand-story-conversation-from-rsa-conference-2024-a-seclore-story-with-vishal-gupta-on-location-coverage-with-sean-martin-and-marco-ciappelli-dJLcEk7_</link>
      <content:encoded><![CDATA[<p>Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.</p><p><strong>Protecting Data in the New Technological Landscape</strong></p><p>Vishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.</p><p><strong>Shifting from Infrastructure to Data Protection</strong></p><p>The dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.</p><p><strong>Enabling Secure Data Collaboration with Seclore</strong></p><p>By introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.</p><p><strong>Navigating the Path to Data-Centric Security</strong></p><p>As enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.</p><p>The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.</p><p>Learn more about Seclore: <a href="https://itspm.ag/seclore-km6r">https://itspm.ag/seclore-km6r </a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vishal Gupta</strong>, CEO, Seclore [<a href="https://twitter.com/secloretech">@secloretech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jiguptaji/">https://www.linkedin.com/in/jiguptaji/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Seclore: <a href="https://www.itspmagazine.com/directory/seclore">https://www.itspmagazine.com/directory/seclore</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="12652583" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/03a9c902-37ab-4d7d-9caa-db331b3481f4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=03a9c902-37ab-4d7d-9caa-db331b3481f4&amp;feed=2M86zCcc"/>
      <itunes:title>Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vishal Gupta</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:13:09</itunes:duration>
      <itunes:summary>Join Sean Martin and Visha Gupta in their insightful conversation at RSA Conference 2024 as they delve into the world of data-centric security and the evolving landscape of cybersecurity.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Visha Gupta in their insightful conversation at RSA Conference 2024 as they delve into the world of data-centric security and the evolving landscape of cybersecurity.</itunes:subtitle>
      <itunes:keywords>vishal gupta, collaboration, marco ciappelli, seclore, tech innovations, network security, rsa conference, sean martin, sean martin, cybersecurity, cybersecurity, data governance, enterprise security, data security, business resilience, data protection, information security, data compliance, data privacy, cloud security, rsa conference 2024, cyber resilience, visha gupta, data leakage prevention, data encryption, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c298ba7c-208d-472a-98c2-b0efe61aa9fb</guid>
      <title>Redefining Cybersecurity by Unlocking Government and Startup Collaboration While Enhancing Software Supply Chain Visibility | A Conversation with Melissa Oh and Anil John | Redefining CyberSecurity with Sean Martin</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Melissa Oh</strong>, Managing Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [<a href="https://twitter.com/dhsgov">@DHSgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melissa-oh/">https://www.linkedin.com/in/melissa-oh/</a></p><p><strong>Anil John</strong>, Technical Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [<a href="https://twitter.com/dhsgov">@DHSgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aniljohn/">https://www.linkedin.com/in/aniljohn/</a></p><p>On Twitter | <a href="https://twitter.com/aniltj">https://twitter.com/aniltj</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>This new episode of the 'Redefining Cybersecurity' podcast features a thought-provoking discussion on software development, supply chain security, and the innovative initiatives of the Silicon Valley Innovation Program (SVIP). The conversation was led by host Sean Martin, with insights from distinguished guests Melissa Oh, Managing Director at the Department of Homeland Security Science and Technology Directorate, and Anil John, Technical Director of the Silicon Valley Innovation Program.</p><p>Melissa Oh shared her extensive experience in public service and the innovative approach of the Silicon Valley Innovation Program in identifying emerging technology companies. Her background in Silicon Valley and dedication to solving DHS's pain points through collaboration with startups underscored the program’s mission of fostering innovation in the government sector.</p><p>Anil John, a public interest technologist, provided valuable insights into bridging the gap between the government and the startup community. His role in translating government needs into actionable solutions highlighted the importance of leveraging global talent to address local challenges and drive technological advancements in the public sector.</p><p>The discussion explored the Silicon Valley Innovation Program's unique selection process for startups, focusing on building products that have broad utility and can be readily adopted. The success story of the protobom project transitioning into an open-source tool exemplified the program's commitment to nurturing innovative solutions with real-world applications.</p><p>The significance of Software Bill of Materials (SBOM) in enhancing software supply chain visibility was emphasized, with a call to action for organizations to prioritize its inclusion in software development processes. By driving awareness and adoption of SBOM, the SVIP is empowering security leaders to enhance software security and visualization in the development pipeline.</p><p>Security leaders were encouraged to explore tools and technologies that enhance software security and visualization in the development pipeline. A call to action was made to participate in the SVIP demo week to learn about innovative solutions and capabilities and to drive the adoption of SBOM within organizations.</p><p>Key Questions Addressed</p><ul><li>How does the Silicon Valley Innovation Program (SVIP) bridge the gap between government needs and startup innovations in cybersecurity?</li><li>What role does the Software Bill of Materials (SBOM) play in enhancing software supply chain security?</li><li>How can organizations, both public and private, benefit from the innovative solutions developed through the SVIP for software supply chain visibility?</li></ul><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>SVIP Demo Week 2024: <a href="https://www.dhs.gov/science-and-technology/svip-demo-week-2024" target="_blank">https://www.dhs.gov/science-and-technology/svip-demo-week-2024</a></p><p>S&T at RSA Conference 2024: <a href="https://www.dhs.gov/science-and-technology/st-rsa">https://www.dhs.gov/science-and-technology/st-rsa</a></p><p>SVIP & CISA: Enhancing Software Security with SBOMs: <a href="https://www.youtube.com/watch?v=sNjVQaK5QW4">https://www.youtube.com/watch?v=sNjVQaK5QW4</a></p><p>Protobom Project: <a href="https://openssf.org/press-release/2024/04/16/cisa-dhs-st-and-openssf-announce-global-launch-of-software-supply-chain-open-source-project/" target="_blank">https://openssf.org/press-release/2024/04/16/cisa-dhs-st-and-openssf-announce-global-launch-of-software-supply-chain-open-source-project/</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 6 May 2024 02:09:33 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Melissa Oh, Anil John)</author>
      <link>https://eventcoveragepodcast.com/episodes/redefining-cybersecurity-by-unlocking-government-and-startup-collaboration-while-enhancing-software-supply-chain-visibility-a-conversation-with-melissa-oh-and-anil-john-redefining-cybersecurity-with-sean-martin-oCAXMOxi</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Melissa Oh</strong>, Managing Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [<a href="https://twitter.com/dhsgov">@DHSgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melissa-oh/">https://www.linkedin.com/in/melissa-oh/</a></p><p><strong>Anil John</strong>, Technical Director, Silicon Valley Innovation Program (SVIP), DHS Science & Technology Directorate [<a href="https://twitter.com/dhsgov">@DHSgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aniljohn/">https://www.linkedin.com/in/aniljohn/</a></p><p>On Twitter | <a href="https://twitter.com/aniltj">https://twitter.com/aniltj</a></p><p><strong>____________________________</strong></p><p><strong>Host: Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><a href="https://www.itspmagazine.com/sean-martin" target="_blank"><strong>View This Show's Sponsors</strong></a></p><p>___________________________</p><p><strong>Episode Notes</strong></p><p>This new episode of the 'Redefining Cybersecurity' podcast features a thought-provoking discussion on software development, supply chain security, and the innovative initiatives of the Silicon Valley Innovation Program (SVIP). The conversation was led by host Sean Martin, with insights from distinguished guests Melissa Oh, Managing Director at the Department of Homeland Security Science and Technology Directorate, and Anil John, Technical Director of the Silicon Valley Innovation Program.</p><p>Melissa Oh shared her extensive experience in public service and the innovative approach of the Silicon Valley Innovation Program in identifying emerging technology companies. Her background in Silicon Valley and dedication to solving DHS's pain points through collaboration with startups underscored the program’s mission of fostering innovation in the government sector.</p><p>Anil John, a public interest technologist, provided valuable insights into bridging the gap between the government and the startup community. His role in translating government needs into actionable solutions highlighted the importance of leveraging global talent to address local challenges and drive technological advancements in the public sector.</p><p>The discussion explored the Silicon Valley Innovation Program's unique selection process for startups, focusing on building products that have broad utility and can be readily adopted. The success story of the protobom project transitioning into an open-source tool exemplified the program's commitment to nurturing innovative solutions with real-world applications.</p><p>The significance of Software Bill of Materials (SBOM) in enhancing software supply chain visibility was emphasized, with a call to action for organizations to prioritize its inclusion in software development processes. By driving awareness and adoption of SBOM, the SVIP is empowering security leaders to enhance software security and visualization in the development pipeline.</p><p>Security leaders were encouraged to explore tools and technologies that enhance software security and visualization in the development pipeline. A call to action was made to participate in the SVIP demo week to learn about innovative solutions and capabilities and to drive the adoption of SBOM within organizations.</p><p>Key Questions Addressed</p><ul><li>How does the Silicon Valley Innovation Program (SVIP) bridge the gap between government needs and startup innovations in cybersecurity?</li><li>What role does the Software Bill of Materials (SBOM) play in enhancing software supply chain security?</li><li>How can organizations, both public and private, benefit from the innovative solutions developed through the SVIP for software supply chain visibility?</li></ul><p>___________________________</p><p><strong>Watch this and other videos on ITSPmagazine's YouTube Channel</strong></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a><br /><br />ITSPmagazine YouTube Channel:</p><p>📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p>___________________________</p><p><strong>Resources</strong></p><p>SVIP Demo Week 2024: <a href="https://www.dhs.gov/science-and-technology/svip-demo-week-2024" target="_blank">https://www.dhs.gov/science-and-technology/svip-demo-week-2024</a></p><p>S&T at RSA Conference 2024: <a href="https://www.dhs.gov/science-and-technology/st-rsa">https://www.dhs.gov/science-and-technology/st-rsa</a></p><p>SVIP & CISA: Enhancing Software Security with SBOMs: <a href="https://www.youtube.com/watch?v=sNjVQaK5QW4">https://www.youtube.com/watch?v=sNjVQaK5QW4</a></p><p>Protobom Project: <a href="https://openssf.org/press-release/2024/04/16/cisa-dhs-st-and-openssf-announce-global-launch-of-software-supply-chain-open-source-project/" target="_blank">https://openssf.org/press-release/2024/04/16/cisa-dhs-st-and-openssf-announce-global-launch-of-software-supply-chain-open-source-project/</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p>___________________________</p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: </p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Are you interested in sponsoring this show with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31725129" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/32ac58c9-62bc-4a3b-a942-88fc270e152c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=32ac58c9-62bc-4a3b-a942-88fc270e152c&amp;feed=2M86zCcc"/>
      <itunes:title>Redefining Cybersecurity by Unlocking Government and Startup Collaboration While Enhancing Software Supply Chain Visibility | A Conversation with Melissa Oh and Anil John | Redefining CyberSecurity with Sean Martin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Melissa Oh, Anil John</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/64b2465e-cabd-4111-be48-294760e6b6b5/3000x3000/download.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:00</itunes:duration>
      <itunes:summary>Discover how the Silicon Valley Innovation Program is redefining cybersecurity through innovative collaborations between the government and the startup community, as discussed by leaders Melissa Oh and Anil John. Tune in to learn about the impactful role of Software Bill of Materials in enhancing software supply chain security and how it fosters a new era of technological progress.</itunes:summary>
      <itunes:subtitle>Discover how the Silicon Valley Innovation Program is redefining cybersecurity through innovative collaborations between the government and the startup community, as discussed by leaders Melissa Oh and Anil John. Tune in to learn about the impactful role of Software Bill of Materials in enhancing software supply chain security and how it fosters a new era of technological progress.</itunes:subtitle>
      <itunes:keywords>collaboration, technology, melissa oh, melissa oh, startup, sean martin, supply chain, s-bom, anil john, anil john, cybersecurity, software, dhs, innovation, silicon valley, open source, public service, scitech, podcast, security, government, svip</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f4b63f1d-84c3-4b3d-bdb9-2cc7667561fa</guid>
      <title>Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling</title>
      <description><![CDATA[<p>In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.</p><p><strong>The Evolution of Identity Management and Its Current Challenges</strong></p><p>The conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.</p><p>Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.</p><p><strong>The Integral Role of Identity in Modern Organizations</strong></p><p>The conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.</p><p>Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.</p><p><strong>JumpCloud's Role in Shaping the Future of Identity Management</strong></p><p>As the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.</p><p>JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.</p><p><strong>Evolving with Identity Management: Insights and Future Directions</strong></p><p>In concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.</p><p>This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 6 May 2024 00:58:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling)</author>
      <link>https://eventcoveragepodcast.com/episodes/simplifying-identity-management-in-2024-a-deep-dive-into-latest-research-about-it-and-the-role-of-msps-a-jumpcloud-brand-story-with-chase-doelling-Wb95v8_d</link>
      <content:encoded><![CDATA[<p>In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.</p><p><strong>The Evolution of Identity Management and Its Current Challenges</strong></p><p>The conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.</p><p>Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.</p><p><strong>The Integral Role of Identity in Modern Organizations</strong></p><p>The conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.</p><p>Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.</p><p><strong>JumpCloud's Role in Shaping the Future of Identity Management</strong></p><p>As the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.</p><p>JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.</p><p><strong>Evolving with Identity Management: Insights and Future Directions</strong></p><p>In concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.</p><p>This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37594539" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9caa9349-6bdd-43a5-8c0d-f8621e9a8ccd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9caa9349-6bdd-43a5-8c0d-f8621e9a8ccd&amp;feed=2M86zCcc"/>
      <itunes:title>Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:39:07</itunes:duration>
      <itunes:summary>Dive into the enlightening conversation between ITSP Magazine and Chase Doling of JumpCloud, exploring the pivotal role of identity management in enhancing organizational security and operational efficiency in today&apos;s hybrid cloud environments.</itunes:summary>
      <itunes:subtitle>Dive into the enlightening conversation between ITSP Magazine and Chase Doling of JumpCloud, exploring the pivotal role of identity management in enhancing organizational security and operational efficiency in today&apos;s hybrid cloud environments.</itunes:subtitle>
      <itunes:keywords>identity lifecycle management, cloud identity, identity focused attacks, api orchestration, multi hybrid cloud environments, security identity, marco ciappelli, active directory, rsa conference, sean martin, identity management, secure identity management, jumpcloud, cybersecurity, biometrics authentication, two-factor authentication, passwordless access, digital identity, device identity management, soar, operational challenges, digital transformation, remote workforce security, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">46440124-d415-43d3-8ad1-5cc3dd90afb9</guid>
      <title>Smashing the Stack; All Good Things | Exploring Software Lifecycles from Secure By Design to End of Life | An RSA Conference 2024 Conversation with Allan Friedman and Bob Lord | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Allan Friedman</strong>, Senior Advisor and Strategist, Cybersecurity and Infrastructure Security Agency (CISA) [<a href="https://twitter.com/CISAgov">@CISAgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/allanafriedman/">https://www.linkedin.com/in/allanafriedman/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/allan-friedman">https://www.rsaconference.com/experts/allan-friedman</a></p><p><strong>Bob Lord</strong>, Senior Technical Advisor, Cybersecurity and Infrastructure Security Agency (CISA) [<a href="https://twitter.com/CISAgov">@CISAgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lordbob/">https://www.linkedin.com/in/lordbob/</a></p><p>On Twitter | <a href="https://twitter.com/boblord">https://twitter.com/boblord</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Bob%20Lord">https://www.rsaconference.com/experts/Bob%20Lord</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new On Location episode, Sean Martin hosted a conversation with Allan Friedman and Bob Lord from the Cyber Security and Infrastructure Security Agency (CISA) as part of the Chats on the Road to the RSA Conference series. The discussion centered around key topics such as securing software by design, navigating the intricacies of managing end-of-life (EOL) software, and emphasizing the crucial role of transparency in the software supply chain.</p><p>Allan Friedman, a vocal advocate for the Software Bill of Materials (SBOM) — he has the t-shirt to prove it! — explored the increasing competitiveness of getting accepted to speak at renowned conferences like RSA, reflecting the growing awareness and urgency around cybersecurity topics. His upcoming RSA presentation is set to delve into the looming challenge of end-of-life and end-of-support software—a topic that, while not new, demands innovative technical and policy-level responses to mitigate emerging threats effectively.</p><p>Bob Lord's discussion highlighted an area often overlooked yet critical for software security: memory safety. By sharing his experiences and underscoring the prevalence of vulnerabilities traced back to memory safety issues, Lord emphasized the necessity for developers and companies to adopt a more proactive and transparent approach in their software development practices. This call to action is not just about developing new solutions but also about ensuring that existing software is resilient against current and future threats.</p><p>One of the key takeaways from this episode is the imperative of transparency in the software supply chain. As Friedman notes, the path to a more secure digital infrastructure lies in the ability to have clear visibility into the software components businesses rely on—including their age, vulnerabilities, and update requirements. This clarity is essential not only for building trust between software manufacturers and their customers but also for enabling a proactive stance on cybersecurity, which can significantly reduce the risks associated with outdated or unsupported software.</p><p>Moreover, the conversation underscored the evolutionary nature of cybersecurity. As threats evolve, so too must our strategies and tools to combat them. The dialogue between Martin, Friedman, and Lord brought to light the importance of continuous learning, adaptation, and collaboration within the cybersecurity community to address these ongoing challenges.</p><p>The episode represents a microcosm of the larger conversations happening within the fields of cybersecurity and software development. As we move forward, the insights shared by Allan Friedman and Bob Lord remind us of the critical importance of design security, comprehensive policies, and, above all, the need for a collective belief in the possibility of creating safer software solutions for the future.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Smashing the Stack: Let’s Make It Less Fun And Unprofitable!: <a href="https://www.rsaconference.com/USA/agenda/session/Smashing%20the%20Stack%20Lets%20Make%20It%20Less%20Fun%20And%20Unprofitable" target="_blank">https://www.rsaconference.com/USA/agenda/session/Smashing%20the%20Stack%20Lets%20Make%20It%20Less%20Fun%20And%20Unprofitable</a></p><p>All Good Things: End of Life and End of Support in Policy and Practice: <a href="https://www.rsaconference.com/USA/agenda/session/All%20Good%20Things%20End%20of%20Life%20and%20End%20of%20Support%20in%20Policy%20and%20Practice" target="_blank">https://www.rsaconference.com/USA/agenda/session/All%20Good%20Things%20End%20of%20Life%20and%20End%20of%20Support%20in%20Policy%20and%20Practice</a></p><p>Unforgivable Vulnerabilities: <a href="https://cwe.mitre.org/documents/unforgivable_vulns/unforgivable.pdf" target="_blank">https://cwe.mitre.org/documents/unforgivable_vulns/unforgivable.pdf</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 5 May 2024 01:38:16 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Bob Lord, Allan Friedman)</author>
      <link>https://eventcoveragepodcast.com/episodes/smashing-the-stack-all-good-things-exploring-software-lifecycles-from-secure-by-design-to-end-of-life-an-rsa-conference-2024-conversation-with-allan-friedman-and-bob-lord-on-location-coverage-with-sean-martin-and-marco-ciappelli-R9boJQsW</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Allan Friedman</strong>, Senior Advisor and Strategist, Cybersecurity and Infrastructure Security Agency (CISA) [<a href="https://twitter.com/CISAgov">@CISAgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/allanafriedman/">https://www.linkedin.com/in/allanafriedman/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/allan-friedman">https://www.rsaconference.com/experts/allan-friedman</a></p><p><strong>Bob Lord</strong>, Senior Technical Advisor, Cybersecurity and Infrastructure Security Agency (CISA) [<a href="https://twitter.com/CISAgov">@CISAgov</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lordbob/">https://www.linkedin.com/in/lordbob/</a></p><p>On Twitter | <a href="https://twitter.com/boblord">https://twitter.com/boblord</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Bob%20Lord">https://www.rsaconference.com/experts/Bob%20Lord</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new On Location episode, Sean Martin hosted a conversation with Allan Friedman and Bob Lord from the Cyber Security and Infrastructure Security Agency (CISA) as part of the Chats on the Road to the RSA Conference series. The discussion centered around key topics such as securing software by design, navigating the intricacies of managing end-of-life (EOL) software, and emphasizing the crucial role of transparency in the software supply chain.</p><p>Allan Friedman, a vocal advocate for the Software Bill of Materials (SBOM) — he has the t-shirt to prove it! — explored the increasing competitiveness of getting accepted to speak at renowned conferences like RSA, reflecting the growing awareness and urgency around cybersecurity topics. His upcoming RSA presentation is set to delve into the looming challenge of end-of-life and end-of-support software—a topic that, while not new, demands innovative technical and policy-level responses to mitigate emerging threats effectively.</p><p>Bob Lord's discussion highlighted an area often overlooked yet critical for software security: memory safety. By sharing his experiences and underscoring the prevalence of vulnerabilities traced back to memory safety issues, Lord emphasized the necessity for developers and companies to adopt a more proactive and transparent approach in their software development practices. This call to action is not just about developing new solutions but also about ensuring that existing software is resilient against current and future threats.</p><p>One of the key takeaways from this episode is the imperative of transparency in the software supply chain. As Friedman notes, the path to a more secure digital infrastructure lies in the ability to have clear visibility into the software components businesses rely on—including their age, vulnerabilities, and update requirements. This clarity is essential not only for building trust between software manufacturers and their customers but also for enabling a proactive stance on cybersecurity, which can significantly reduce the risks associated with outdated or unsupported software.</p><p>Moreover, the conversation underscored the evolutionary nature of cybersecurity. As threats evolve, so too must our strategies and tools to combat them. The dialogue between Martin, Friedman, and Lord brought to light the importance of continuous learning, adaptation, and collaboration within the cybersecurity community to address these ongoing challenges.</p><p>The episode represents a microcosm of the larger conversations happening within the fields of cybersecurity and software development. As we move forward, the insights shared by Allan Friedman and Bob Lord remind us of the critical importance of design security, comprehensive policies, and, above all, the need for a collective belief in the possibility of creating safer software solutions for the future.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Smashing the Stack: Let’s Make It Less Fun And Unprofitable!: <a href="https://www.rsaconference.com/USA/agenda/session/Smashing%20the%20Stack%20Lets%20Make%20It%20Less%20Fun%20And%20Unprofitable" target="_blank">https://www.rsaconference.com/USA/agenda/session/Smashing%20the%20Stack%20Lets%20Make%20It%20Less%20Fun%20And%20Unprofitable</a></p><p>All Good Things: End of Life and End of Support in Policy and Practice: <a href="https://www.rsaconference.com/USA/agenda/session/All%20Good%20Things%20End%20of%20Life%20and%20End%20of%20Support%20in%20Policy%20and%20Practice" target="_blank">https://www.rsaconference.com/USA/agenda/session/All%20Good%20Things%20End%20of%20Life%20and%20End%20of%20Support%20in%20Policy%20and%20Practice</a></p><p>Unforgivable Vulnerabilities: <a href="https://cwe.mitre.org/documents/unforgivable_vulns/unforgivable.pdf" target="_blank">https://cwe.mitre.org/documents/unforgivable_vulns/unforgivable.pdf</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31275506" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/6f9c97aa-f771-49c4-8a7e-de0495c6f338/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=6f9c97aa-f771-49c4-8a7e-de0495c6f338&amp;feed=2M86zCcc"/>
      <itunes:title>Smashing the Stack; All Good Things | Exploring Software Lifecycles from Secure By Design to End of Life | An RSA Conference 2024 Conversation with Allan Friedman and Bob Lord | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Bob Lord, Allan Friedman</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:32</itunes:duration>
      <itunes:summary>Dive into an engaging conversation with CISA&apos;s Allan Friedman and Bob Lord, hosted by Sean Martin, as they explore the challenging landscape of cybersecurity, focusing on software security by design, end-of-life software management, and the pivotal role of transparency in the software supply chain. Their insights offer a unique look into the evolving threats and strategies in cybersecurity, inspiring a collective push towards a more secure digital future.</itunes:summary>
      <itunes:subtitle>Dive into an engaging conversation with CISA&apos;s Allan Friedman and Bob Lord, hosted by Sean Martin, as they explore the challenging landscape of cybersecurity, focusing on software security by design, end-of-life software management, and the pivotal role of transparency in the software supply chain. Their insights offer a unique look into the evolving threats and strategies in cybersecurity, inspiring a collective push towards a more secure digital future.</itunes:subtitle>
      <itunes:keywords>bob lord, transparency, technology, marco ciappelli, rsa conference, end-of-life software, software security, digital infrastructure, sean martin, rsa, allan friedman, cisa, cybersecurity, conference, vulnerabilities, memory safety, innovation, rsa conference coverage, policy, rsac, secure by design, rsa conference 2024, sbom, podcast, rsaconference, digital future, software supply chain, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">20613d25-b162-4a83-9ae0-a4d4af6b77ce</guid>
      <title>Exploring the Intersections of Politics and Cybersecurity with Congressional Nominee, Madison Horn | An RSA Conference 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Madison Horn</strong>, Congressional Candidate OK-05, Founder & CEO at RoseRock</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madisonshorn/">https://www.linkedin.com/in/madisonshorn/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Exploring Society, Technology, and the Intersection of Politics and Cybersecurity</strong></p><p>In this insightful podcast episode, Marco Ciappelli takes the lead as he discusses the upcoming RSA Conference and the unique perspectives on society and technology that will be highlighted. He introduces Madison Horn, a congressional nominee with a background in cybersecurity, who will be a present at the conference. Together, they embark on a discussion exploring the crucial link between politicians and cybersecurity, shedding light on pressing issues in our modern digital landscape.</p><p><strong>A Deep Dive into Cybersecurity and Political Engagement</strong></p><p>Madison Horn shares her journey into politics, emphasizing the critical importance of having leaders with a strong understanding of technology in office. She highlights the essential role of cybersecurity in national security and economic stability, advocating for a forward-thinking approach to legislation and regulation in the cybersecurity space.</p><p><strong>The Impact of Technology on the Workforce and Economic Opportunities</strong></p><p>The conversation extends to the transformative power of technology in creating economic opportunities and reshaping the workforce. Madison emphasizes the need for states to adapt to the evolving tech landscape, leveraging innovation to drive economic growth and job creation.</p><p><strong>Looking Ahead to RSA Conference 2024</strong></p><p>As the discussion turns towards the upcoming RSA Conference, Madison reflects on the significance of staying informed and engaged in the cybersecurity community. The duo explores the importance of attending industry events like RSA to network, learn, and contribute to shaping the future of cybersecurity policy and practice.</p><p><strong>Seeking Solutions and Collaboration in Critical Infrastructure</strong></p><p>Madison emphasizes the need for collaboration between the public and private sectors to address critical infrastructure challenges and mitigate cybersecurity risks. She advocates for modernizing infrastructure to defend against threats and ensure economic and national security.</p><p><strong>Bridging the Gap Between Politics and Cybersecurity</strong></p><p>In a passionate declaration, Madison underscores the urgency of transcending party divides to focus on effective governance and problem-solving. She calls for a renewed commitment to leadership that prioritizes the well-being and security of citizens above partisan interests.</p><p><strong>Conclusion</strong></p><p>As this pre-event coverage episode wraps up, the conversation between Marco Ciappelli and Madison Horn serves as a thought-provoking exploration of the interconnected worlds of politics and cybersecurity. Stay tuned for more insights and updates from the RSA Conference 2024 on cybersecurity, technology, and the future of digital governance.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 4 May 2024 23:51:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Madison Horn)</author>
      <link>https://eventcoveragepodcast.com/episodes/exploring-the-intersections-of-politics-and-cybersecurity-with-congressional-nominee-madison-horn-an-rsa-conference-2024-conversation-on-location-coverage-with-sean-martin-and-marco-ciappelli-lTqNjnK9</link>
      <content:encoded><![CDATA[<p><strong>Guest: Madison Horn</strong>, Congressional Candidate OK-05, Founder & CEO at RoseRock</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/madisonshorn/">https://www.linkedin.com/in/madisonshorn/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Exploring Society, Technology, and the Intersection of Politics and Cybersecurity</strong></p><p>In this insightful podcast episode, Marco Ciappelli takes the lead as he discusses the upcoming RSA Conference and the unique perspectives on society and technology that will be highlighted. He introduces Madison Horn, a congressional nominee with a background in cybersecurity, who will be a present at the conference. Together, they embark on a discussion exploring the crucial link between politicians and cybersecurity, shedding light on pressing issues in our modern digital landscape.</p><p><strong>A Deep Dive into Cybersecurity and Political Engagement</strong></p><p>Madison Horn shares her journey into politics, emphasizing the critical importance of having leaders with a strong understanding of technology in office. She highlights the essential role of cybersecurity in national security and economic stability, advocating for a forward-thinking approach to legislation and regulation in the cybersecurity space.</p><p><strong>The Impact of Technology on the Workforce and Economic Opportunities</strong></p><p>The conversation extends to the transformative power of technology in creating economic opportunities and reshaping the workforce. Madison emphasizes the need for states to adapt to the evolving tech landscape, leveraging innovation to drive economic growth and job creation.</p><p><strong>Looking Ahead to RSA Conference 2024</strong></p><p>As the discussion turns towards the upcoming RSA Conference, Madison reflects on the significance of staying informed and engaged in the cybersecurity community. The duo explores the importance of attending industry events like RSA to network, learn, and contribute to shaping the future of cybersecurity policy and practice.</p><p><strong>Seeking Solutions and Collaboration in Critical Infrastructure</strong></p><p>Madison emphasizes the need for collaboration between the public and private sectors to address critical infrastructure challenges and mitigate cybersecurity risks. She advocates for modernizing infrastructure to defend against threats and ensure economic and national security.</p><p><strong>Bridging the Gap Between Politics and Cybersecurity</strong></p><p>In a passionate declaration, Madison underscores the urgency of transcending party divides to focus on effective governance and problem-solving. She calls for a renewed commitment to leadership that prioritizes the well-being and security of citizens above partisan interests.</p><p><strong>Conclusion</strong></p><p>As this pre-event coverage episode wraps up, the conversation between Marco Ciappelli and Madison Horn serves as a thought-provoking exploration of the interconnected worlds of politics and cybersecurity. Stay tuned for more insights and updates from the RSA Conference 2024 on cybersecurity, technology, and the future of digital governance.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23186027" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/e3001b22-f182-4a42-bec3-99d7b6371371/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=e3001b22-f182-4a42-bec3-99d7b6371371&amp;feed=2M86zCcc"/>
      <itunes:title>Exploring the Intersections of Politics and Cybersecurity with Congressional Nominee, Madison Horn | An RSA Conference 2024 Conversation | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Madison Horn</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:07</itunes:duration>
      <itunes:summary>Welcome to a special pre-event coverage episode of the RSA Conference 2024, where we delve into the fascinating connection between politics and cybersecurity. Join Marco Ciappelli and Madison Horn as they discuss the intricate relationship between these two vital spheres.</itunes:summary>
      <itunes:subtitle>Welcome to a special pre-event coverage episode of the RSA Conference 2024, where we delve into the fascinating connection between politics and cybersecurity. Join Marco Ciappelli and Madison Horn as they discuss the intricate relationship between these two vital spheres.</itunes:subtitle>
      <itunes:keywords>workforce transformation, critical infrastructure, collaboration, technology, marco ciappelli, economic opportunities, leadership, rsa conference, sean martin, rsa, politics, cybersecurity, conference, cybersecurity policy, madison horn, innovation, rsa conference coverage, technology impact, rsac, national security, political engagement, diplomatic strategies with ai, rsa conference 2024, podcast, rsaconference, future trends, digital landscape, cybersecurityconference, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5e0be89-ff4c-4b24-b14c-5891e50b5c82</guid>
      <title>Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Unveiling the Origin Story</strong></p><p>In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity solutions for mid-market companies and small businesses.</p><p><strong>Solving Real-World Challenges</strong></p><p>While the cybersecurity industry often overlooks the needs of mid-market companies and small businesses, CORO identified a critical deficiency in the market. By providing a comprehensive platform with a "power of one" approach, CORO offers a simplified yet effective solution to address the unique cybersecurity challenges faced by these organizations.</p><p><strong>Empowering with Affordable Protection</strong></p><p>CORO's modular approach allows businesses to tailor their cybersecurity strategy based on their specific needs, without the burden of unnecessary complexities. With affordable pricing and automated cybersecurity tasks, CORO ensures that even organizations with limited budgets and resources can benefit from robust protection.</p><p><strong>Tailored Solutions for Every Industry</strong></p><p>Recognizing the diverse needs of different sectors, CORO offers specialized suites for industries like education and automotive. By securing both staff and students in educational environments, CORO's tailored solutions demonstrate a commitment to protecting vital institutions against cyber threats.</p><p><strong>Partnering for Success</strong></p><p>With a strong channel-centric approach, CORO collaborates closely with partners to deliver personalized support and education. From onboarding processes to managed detection and response services, CORO empowers organizations to navigate their cybersecurity journey with confidence.</p><p><strong>The Path Ahead: RSA Conference and Beyond</strong></p><p>As CORO continues its mission to revolutionize cybersecurity, Dror Liwer's upcoming engagements at the RSA Conference underscore the company's commitment to sharing knowledge and driving industry advancements. Through deeper dive discussions, use cases, and real-world outcomes, CORO aims to showcase the tangible benefits of their solutions.</p><p><strong>Stay Tuned for Chapter Two</strong></p><p>With an exciting chapter ahead, listeners are encouraged to follow CORO's journey and explore the transformative impact of their cybersecurity solutions. Whether in person at events like the RSA Conference or through online resources, the opportunity to connect with Dror Liwer and the CORO team remains open for all interested parties.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 3 May 2024 04:02:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-cybersecurity-revolution-for-small-and-medium-sized-enterprises-smes-a-brand-story-conversation-from-rsa-conference-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-2Rg37b9F</link>
      <content:encoded><![CDATA[<p><strong>Unveiling the Origin Story</strong></p><p>In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity solutions for mid-market companies and small businesses.</p><p><strong>Solving Real-World Challenges</strong></p><p>While the cybersecurity industry often overlooks the needs of mid-market companies and small businesses, CORO identified a critical deficiency in the market. By providing a comprehensive platform with a "power of one" approach, CORO offers a simplified yet effective solution to address the unique cybersecurity challenges faced by these organizations.</p><p><strong>Empowering with Affordable Protection</strong></p><p>CORO's modular approach allows businesses to tailor their cybersecurity strategy based on their specific needs, without the burden of unnecessary complexities. With affordable pricing and automated cybersecurity tasks, CORO ensures that even organizations with limited budgets and resources can benefit from robust protection.</p><p><strong>Tailored Solutions for Every Industry</strong></p><p>Recognizing the diverse needs of different sectors, CORO offers specialized suites for industries like education and automotive. By securing both staff and students in educational environments, CORO's tailored solutions demonstrate a commitment to protecting vital institutions against cyber threats.</p><p><strong>Partnering for Success</strong></p><p>With a strong channel-centric approach, CORO collaborates closely with partners to deliver personalized support and education. From onboarding processes to managed detection and response services, CORO empowers organizations to navigate their cybersecurity journey with confidence.</p><p><strong>The Path Ahead: RSA Conference and Beyond</strong></p><p>As CORO continues its mission to revolutionize cybersecurity, Dror Liwer's upcoming engagements at the RSA Conference underscore the company's commitment to sharing knowledge and driving industry advancements. Through deeper dive discussions, use cases, and real-world outcomes, CORO aims to showcase the tangible benefits of their solutions.</p><p><strong>Stay Tuned for Chapter Two</strong></p><p>With an exciting chapter ahead, listeners are encouraged to follow CORO's journey and explore the transformative impact of their cybersecurity solutions. Whether in person at events like the RSA Conference or through online resources, the opportunity to connect with Dror Liwer and the CORO team remains open for all interested parties.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21587883" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/527a446b-8efc-458b-b442-2ac949527115/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=527a446b-8efc-458b-b442-2ac949527115&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:27</itunes:duration>
      <itunes:summary>Dive into the world of cybersecurity innovation with Dror Liwer, the co-founder of CORO, as he shares the journey of revolutionizing the Small and Medium-Sized Enterprises (SMEs) cybersecurity industry with groundbreaking solutions.</itunes:summary>
      <itunes:subtitle>Dive into the world of cybersecurity innovation with Dror Liwer, the co-founder of CORO, as he shares the journey of revolutionizing the Small and Medium-Sized Enterprises (SMEs) cybersecurity industry with groundbreaking solutions.</itunes:subtitle>
      <itunes:keywords>revolutionizing cybersecurity, cybersecurity solutions, affordable protection, marco ciappelli, automated security tasks, rsa conference, sean martin, industry tailored solutions, cybersecurity, partner collaboration, innovation, educational cybersecurity, dror liwer, small businesses, cybersecurity journey, mid-market companies, brand story, coro</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e2065600-ddae-484f-973b-43c053d37bd2</guid>
      <title>Predictive Risk, Data Integrity and the Role of Large Language Models in Cybersecurity | An RSA Conference 2024 Conversation With Edna Conway and Andrea Little Limbago | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Edna Conway</strong>, CEO, EMC ADVISORS</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ednaconway" target="_blank">https://www.linkedin.com/in/ednaconway</a></p><p>On Twitter | <a href="https://twitter.com/Edna_Conway" target="_blank">https://twitter.com/Edna_Conway</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/edna-conway">https://www.rsaconference.com/experts/edna-conway</a></p><p><strong>Andrea Little Limbago</strong>, Senior Vice President, Research & Analysis, Interos</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/andrea-little-limbago/">https://www.linkedin.com/in/andrea-little-limbago/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/andrea-little-limbago">https://www.rsaconference.com/experts/andrea-little-limbago</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The dialogues in this insightful episode touch upon the evolving landscape of AI technology, particularly focusing on the adoption of large language models (LLMs) and their implications for predictive risk analysis. The speakers shed light on the need for a comprehensive framework that combines algorithmic advancements with robust policy guardrails to ensure the accurate and secure utilization of AI models.</p><p>One of the key takeaways from the conversation is the emphasis on the critical role of data scientists and engineers in leveraging AI technologies effectively. While AI models can enhance productivity and streamline workflows, human expertise remains paramount in validating data, identifying potential risks, and steering decision-making processes in the right direction.</p><p>The discussion also discuss the challenges posed by data integrity, potential attack vectors targeting AI systems, and the importance of implementing safeguards to protect against data leaks and malicious manipulations. The speakers stress the significance of maintaining stringent guardrails to uphold data accuracy and mitigate the negative impacts of erroneous information inputs.</p><p>Moreover, the episode explores the intersection of AI technology with military and diplomatic decision-making processes, highlighting the complex nature of forecasting risks and making informed strategic moves in response to evolving scenarios. The speakers reflect on the probabilistic nature of risk analysis and underscore the need for continuous refinement and insight generation to enhance predictive capabilities.</p><p>As the conversation unfolds, the panelists bring to light the nuances of AI utilization in different domains, from supply chain management to national security, underscoring the importance of tailored approaches and domain-specific expertise in maximizing the benefits of AI technologies.</p><p>In conclusion, the episode encapsulates the dynamic interplay between human intelligence and AI advancements, urging for a holistic approach towards integrating AI tools while upholding data integrity, security, and accuracy in predictive risk analysis.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Getting to True Predictive Risk: Will Data Accuracy Thwart AI’s Potential?: <a href="https://www.rsaconference.com/USA/agenda/session/Getting%20to%20True%20Predictive%20Risk%20Will%20Data%20Accuracy%20Thwart%20AIs%20Potential">https://www.rsaconference.com/USA/agenda/session/Getting%20to%20True%20Predictive%20Risk%20Will%20Data%20Accuracy%20Thwart%20AIs%20Potential</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 May 2024 15:11:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Edna Conway, Andrea Little Limbago)</author>
      <link>https://eventcoveragepodcast.com/episodes/predictive-risk-data-integrity-and-the-role-of-large-language-models-in-cybersecurity-an-rsa-conference-2024-conversation-with-edna-conway-and-andrea-little-limbago-on-location-coverage-with-sean-martin-and-marco-ciappelli-5XzPUqJo</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Edna Conway</strong>, CEO, EMC ADVISORS</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ednaconway" target="_blank">https://www.linkedin.com/in/ednaconway</a></p><p>On Twitter | <a href="https://twitter.com/Edna_Conway" target="_blank">https://twitter.com/Edna_Conway</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/edna-conway">https://www.rsaconference.com/experts/edna-conway</a></p><p><strong>Andrea Little Limbago</strong>, Senior Vice President, Research & Analysis, Interos</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/andrea-little-limbago/">https://www.linkedin.com/in/andrea-little-limbago/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/andrea-little-limbago">https://www.rsaconference.com/experts/andrea-little-limbago</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The dialogues in this insightful episode touch upon the evolving landscape of AI technology, particularly focusing on the adoption of large language models (LLMs) and their implications for predictive risk analysis. The speakers shed light on the need for a comprehensive framework that combines algorithmic advancements with robust policy guardrails to ensure the accurate and secure utilization of AI models.</p><p>One of the key takeaways from the conversation is the emphasis on the critical role of data scientists and engineers in leveraging AI technologies effectively. While AI models can enhance productivity and streamline workflows, human expertise remains paramount in validating data, identifying potential risks, and steering decision-making processes in the right direction.</p><p>The discussion also discuss the challenges posed by data integrity, potential attack vectors targeting AI systems, and the importance of implementing safeguards to protect against data leaks and malicious manipulations. The speakers stress the significance of maintaining stringent guardrails to uphold data accuracy and mitigate the negative impacts of erroneous information inputs.</p><p>Moreover, the episode explores the intersection of AI technology with military and diplomatic decision-making processes, highlighting the complex nature of forecasting risks and making informed strategic moves in response to evolving scenarios. The speakers reflect on the probabilistic nature of risk analysis and underscore the need for continuous refinement and insight generation to enhance predictive capabilities.</p><p>As the conversation unfolds, the panelists bring to light the nuances of AI utilization in different domains, from supply chain management to national security, underscoring the importance of tailored approaches and domain-specific expertise in maximizing the benefits of AI technologies.</p><p>In conclusion, the episode encapsulates the dynamic interplay between human intelligence and AI advancements, urging for a holistic approach towards integrating AI tools while upholding data integrity, security, and accuracy in predictive risk analysis.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Getting to True Predictive Risk: Will Data Accuracy Thwart AI’s Potential?: <a href="https://www.rsaconference.com/USA/agenda/session/Getting%20to%20True%20Predictive%20Risk%20Will%20Data%20Accuracy%20Thwart%20AIs%20Potential">https://www.rsaconference.com/USA/agenda/session/Getting%20to%20True%20Predictive%20Risk%20Will%20Data%20Accuracy%20Thwart%20AIs%20Potential</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32111707" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bf2a0b74-7e3e-4834-a197-c9ff660f2d62/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bf2a0b74-7e3e-4834-a197-c9ff660f2d62&amp;feed=2M86zCcc"/>
      <itunes:title>Predictive Risk, Data Integrity and the Role of Large Language Models in Cybersecurity | An RSA Conference 2024 Conversation With Edna Conway and Andrea Little Limbago | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Edna Conway, Andrea Little Limbago</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:24</itunes:duration>
      <itunes:summary>In a engaging pre-event episode of On Location coverage of the RSA Conference 2024, Sean Martin, Edna Conway, Andrea Little Limbago, and Marco Ciappelli talk about the intricacies of predictive risk and the impact of large language models in the world of cybersecurity. The discussion highlights the importance of data integrity, the role of human expertise in utilizing AI technology, and the challenges in mitigating risks associated with advanced AI models.</itunes:summary>
      <itunes:subtitle>In a engaging pre-event episode of On Location coverage of the RSA Conference 2024, Sean Martin, Edna Conway, Andrea Little Limbago, and Marco Ciappelli talk about the intricacies of predictive risk and the impact of large language models in the world of cybersecurity. The discussion highlights the importance of data integrity, the role of human expertise in utilizing AI technology, and the challenges in mitigating risks associated with advanced AI models.</itunes:subtitle>
      <itunes:keywords>domain-specific ai expertise, enhancing predictive capabilities, military decision-making and ai, national security ai applications, predictive risk analysis, marco ciappelli, rsa conference, human expertise in ai technology, ai guardrails for risk analysis, sean martin, rsa, ai technology insights, risk forecasting with ai models, risk mitigation strategies, cybersecurity, data accuracy in predictive analysis, ai and decision-making processes, conference, data security measures, ai models and data scientists, rsac, diplomatic strategies with ai, on-location coverage, rsa conference 2024, large language models, podcast, rsaconference, cybersecurity panel discussion, data integrity in ai, supply chain management with ai, cybersecurityconference, andrea little limbago, edna conway</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bdcd5ffe-2bb2-419c-b5f8-efacea8a963d</guid>
      <title>The Five Most Dangerous New Attack Techniques You Need to Know About | An RSA Conference 2024 Conversation With Ed Skoudis, Heather Mahalik Barnhart, and Johannes Ullrich | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Ed Skoudis</strong>, President at SANS Technology Institute [<a href="https://twitter.com/SANS_EDU">@SANS_EDU</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/edskoudis/">https://www.linkedin.com/in/edskoudis/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/ed-skoudis">https://www.rsaconference.com/experts/ed-skoudis</a></p><p><strong>Heather Mahalik Barnhart</strong>, Faculty Fellow & DFIR Curriculum Lead at SANS, Sr Dir of Community Engagement at Cellebrite [<a href="https://twitter.com/Cellebrite">@Cellebrite</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/heather-mahalik-cellebrite/" target="_blank">https://www.linkedin.com/in/heather-mahalik-cellebrite/</a></p><p>On Twitter | <a href="https://twitter.com/HeatherMahalik" target="_blank">https://twitter.com/HeatherMahalik</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/heather-mahalik">https://www.rsaconference.com/experts/heather-mahalik</a></p><p><strong>Johannes Ullrich</strong>, Dean of Research at SANS Technology Institute [<a href="https://twitter.com/sansforensics">@sansforensics</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">https://www.linkedin.com/in/johannesullrich/</a></p><p>On Twitter | <a href="https://twitter.com/sans_isc" target="_blank">https://twitter.com/sans_isc</a></p><p>On Mastodon | <a href="https://infosec.exchange/@jullrich" target="_blank">https://infosec.exchange/@jullrich</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/johannes-ullrich">https://www.rsaconference.com/experts/johannes-ullrich</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of the On Location Podcast with Sean and Marco, listeners were treated to an in-depth preview of the RSA Conference SANS Keynote, featuring engaging dialogues with industry luminaries Ed Skoudis, Heather Mahalik Barnhart, and Johannes Ullrich. Each brought to the fore their unique perspectives and expertise, providing a fascinating glimpse into the current state and future direction of cybersecurity.</p><p>Ed Skoudis, President of the SANS Technology Institute College, stands at the forefront of cybersecurity education, guiding the future of the field through his leadership and vision. As moderator of the RSA Conference keynote panel, Skoudis emphasized the panel's history and its focus on burgeoning cybersecurity threats and innovations. His dual role as a SANS fellow and the founder of CounterHack challenges underscores a commitment to practical, real-world applications of cybersecurity knowledge.</p><p>Heather Mahalik Barnhart brings a wealth of experience as the Curriculum Lead at SANS and a Senior Director of Community Engagement at Celebrite. Her expertise in mobile threats and digital intelligence is pivotal in an era where mobile devices are ubiquitous. Barnhart's focus on the escalation of mobile security threats underscores the critical need for continuous vigilance and advanced protective measures in cybersecurity practices.</p><p>Johannes Ullrich, Dean of Research for the SANS Technology Institute College, brings his profound insights into web application security to the discussion. His leadership at the Internet Storm Center provides him with a unique vantage point on the latest cyber threats and defensive strategies. Ullrich's work exemplifies the essential nature of forward-looking research in developing effective cybersecurity defenses.</p><p>The conversation highlights not just individual achievements but also the collective effort of the panel to address current cyber threats while preparing for future challenges. The keynote panelists discussed their approach to selecting topics that not only resonate with current issues but also anticipate future threats. This proactive approach is a testament to their deep understanding of the cybersecurity landscape and their commitment to equipping professionals with the knowledge to stay one step ahead.</p><p>Terrence Williams, a new addition to the panel and a notable figure in cloud security from Amazon, and Steve Sims, an authority on offensive security curriculum at SANS, were also mentioned as key contributors to the upcoming keynote session. Their inclusion promises to bring fresh insights and a broader perspective to the discussions, enriching the discourse on cybersecurity's most pressing and complex issues.</p><p>Key Questions Addressed</p><ul><li>How does SANS choose the five topics for the RSA Conference SANS Keynote?</li><li>What are the key cybersecurity trends and threats for the future?</li><li>How can individuals and organizations mitigate these identified threats?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Five Most Dangerous New Attack Techniques You Need to Know About: <a href="https://www.rsaconference.com/Library/presentation/USA/2024/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About" target="_blank">https://www.rsaconference.com/Library/presentation/USA/2024/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 May 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ed Skoudis, Heather Mahalik Barnhart, Johannes Ullrich)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-five-most-dangerous-new-attack-techniques-you-need-to-know-about-an-rsa-conference-2024-conversation-with-ed-skoudis-heather-mahalik-barnhart-and-johannes-ullrich-on-location-coverage-with-sean-martin-and-marco-ciappelli-fOWfAgHh</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Ed Skoudis</strong>, President at SANS Technology Institute [<a href="https://twitter.com/SANS_EDU">@SANS_EDU</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/edskoudis/">https://www.linkedin.com/in/edskoudis/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/ed-skoudis">https://www.rsaconference.com/experts/ed-skoudis</a></p><p><strong>Heather Mahalik Barnhart</strong>, Faculty Fellow & DFIR Curriculum Lead at SANS, Sr Dir of Community Engagement at Cellebrite [<a href="https://twitter.com/Cellebrite">@Cellebrite</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/heather-mahalik-cellebrite/" target="_blank">https://www.linkedin.com/in/heather-mahalik-cellebrite/</a></p><p>On Twitter | <a href="https://twitter.com/HeatherMahalik" target="_blank">https://twitter.com/HeatherMahalik</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/heather-mahalik">https://www.rsaconference.com/experts/heather-mahalik</a></p><p><strong>Johannes Ullrich</strong>, Dean of Research at SANS Technology Institute [<a href="https://twitter.com/sansforensics">@sansforensics</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/johannesullrich/" target="_blank">https://www.linkedin.com/in/johannesullrich/</a></p><p>On Twitter | <a href="https://twitter.com/sans_isc" target="_blank">https://twitter.com/sans_isc</a></p><p>On Mastodon | <a href="https://infosec.exchange/@jullrich" target="_blank">https://infosec.exchange/@jullrich</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/johannes-ullrich">https://www.rsaconference.com/experts/johannes-ullrich</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of the On Location Podcast with Sean and Marco, listeners were treated to an in-depth preview of the RSA Conference SANS Keynote, featuring engaging dialogues with industry luminaries Ed Skoudis, Heather Mahalik Barnhart, and Johannes Ullrich. Each brought to the fore their unique perspectives and expertise, providing a fascinating glimpse into the current state and future direction of cybersecurity.</p><p>Ed Skoudis, President of the SANS Technology Institute College, stands at the forefront of cybersecurity education, guiding the future of the field through his leadership and vision. As moderator of the RSA Conference keynote panel, Skoudis emphasized the panel's history and its focus on burgeoning cybersecurity threats and innovations. His dual role as a SANS fellow and the founder of CounterHack challenges underscores a commitment to practical, real-world applications of cybersecurity knowledge.</p><p>Heather Mahalik Barnhart brings a wealth of experience as the Curriculum Lead at SANS and a Senior Director of Community Engagement at Celebrite. Her expertise in mobile threats and digital intelligence is pivotal in an era where mobile devices are ubiquitous. Barnhart's focus on the escalation of mobile security threats underscores the critical need for continuous vigilance and advanced protective measures in cybersecurity practices.</p><p>Johannes Ullrich, Dean of Research for the SANS Technology Institute College, brings his profound insights into web application security to the discussion. His leadership at the Internet Storm Center provides him with a unique vantage point on the latest cyber threats and defensive strategies. Ullrich's work exemplifies the essential nature of forward-looking research in developing effective cybersecurity defenses.</p><p>The conversation highlights not just individual achievements but also the collective effort of the panel to address current cyber threats while preparing for future challenges. The keynote panelists discussed their approach to selecting topics that not only resonate with current issues but also anticipate future threats. This proactive approach is a testament to their deep understanding of the cybersecurity landscape and their commitment to equipping professionals with the knowledge to stay one step ahead.</p><p>Terrence Williams, a new addition to the panel and a notable figure in cloud security from Amazon, and Steve Sims, an authority on offensive security curriculum at SANS, were also mentioned as key contributors to the upcoming keynote session. Their inclusion promises to bring fresh insights and a broader perspective to the discussions, enriching the discourse on cybersecurity's most pressing and complex issues.</p><p>Key Questions Addressed</p><ul><li>How does SANS choose the five topics for the RSA Conference SANS Keynote?</li><li>What are the key cybersecurity trends and threats for the future?</li><li>How can individuals and organizations mitigate these identified threats?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The Five Most Dangerous New Attack Techniques You Need to Know About: <a href="https://www.rsaconference.com/Library/presentation/USA/2024/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About" target="_blank">https://www.rsaconference.com/Library/presentation/USA/2024/The%20Five%20Most%20Dangerous%20New%20Attack%20Techniques%20You%20Need%20to%20Know%20About</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28350232" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/b3060ea0-b267-4852-98f3-be637ce108ee/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=b3060ea0-b267-4852-98f3-be637ce108ee&amp;feed=2M86zCcc"/>
      <itunes:title>The Five Most Dangerous New Attack Techniques You Need to Know About | An RSA Conference 2024 Conversation With Ed Skoudis, Heather Mahalik Barnhart, and Johannes Ullrich | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ed Skoudis, Heather Mahalik Barnhart, Johannes Ullrich</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:29:30</itunes:duration>
      <itunes:summary>The &apos;On Location podcast with Sean and Marco&apos; episode featured a panel of distinguished guests including Ed Skoudis, President of the SANS Technology Institute College, Heather Mahalik Barnhart, Curriculum Lead at SANS and Senior Director of Community Engagement at Celebrite, Johannes Ullrich, the Dean of Research for the SANS Technology Institute College. The episode provided a sneak preview of the upcoming RSA conference keynote panel moderated by Ed Skoudis.</itunes:summary>
      <itunes:subtitle>The &apos;On Location podcast with Sean and Marco&apos; episode featured a panel of distinguished guests including Ed Skoudis, President of the SANS Technology Institute College, Heather Mahalik Barnhart, Curriculum Lead at SANS and Senior Director of Community Engagement at Celebrite, Johannes Ullrich, the Dean of Research for the SANS Technology Institute College. The episode provided a sneak preview of the upcoming RSA conference keynote panel moderated by Ed Skoudis.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, threats, sean martin, rsa, technological innovation, web application security, digital forensics, cybersecurity, conference, penetration testing, sans, keynote panel, ed skoudis, mobile threats, rsac, steve sims, mitigation, on-location coverage, cloud security, rsa conference 2024, podcast, rsaconference, johannes ullrich, cybersecurityconference, heather mahalik barnhart, heather mahalik barnhart, training, terrence williams</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2525c3f6-e383-44a4-992a-648db7262e9c</guid>
      <title>Unveiling the Future of Cybersecurity From A Venture Capital Investors as we approach the beginning of RSA Conference 2024 | An RSA Conference 2024 Conversation With Dave DeWalt | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Dave DeWalt</strong>, Founder & CEO, NightDragon [<a href="https://twitter.com/nightdragon">@nightdragon</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ddewalt/">https://www.linkedin.com/in/ddewalt/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/dave-dewalt">https://www.rsaconference.com/experts/dave-dewalt</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Navigating the Cybersecurity Horizon: Anticipating RSA Conference 2024</strong></p><p>In a thoughtfully pre-event episode, seasoned cybersecurity expert Dave DeWalt share the microphone with Sean Martin and Marco Ciappelli to set the stage for an in-depth exploration of the dynamic cybersecurity landscape anticipating what will be RSA Conference 2024. Their engaging conversation with Dave DeWalt, a titan in the cybersecurity investment space, unveils an intricate web of challenges and pioneering solutions that are at the forefront of the battle against digital threats.</p><p><strong>Venture Capital's Role in Shaping Cybersecurity's Future</strong></p><p>DeWalt, with his profound experience and insights, brings into focus the critical role of venture capital in steering the future of cybersecurity. Highlighting the importance of strategic investments and partnerships, he underscores the necessity for a specialized approach—akin to that seen in fintech and biotech ventures—towards fostering security-oriented technological advancements. By casting a spotlight on venture capital, the discussion emphasizes its pivotal role in incubating innovations that promise to redefine cyber defense mechanisms.</p><p><strong>The Confluence of Electronic Warfare and Cyber Strategies</strong></p><p>A particularly compelling segment of their conversation veers into the impending intersection of electronic warfare and cyber strategies. As cyber threats evolve, DeWalt predicts a paradigm shift where hacking transcends conventional malware attacks, venturing into the realm of radio frequency (RF) based tactics. This speculative yet insightful projection hints at a future where cybersecurity and electronic warfare converge, illustrating the urgent need for adaptive and forward-thinking defensive measures.</p><p><strong>Securing the Software Supply Chain</strong></p><p>Another focal point of the discussion revolves around the vital necessity of securing the software supply chain—a challenge magnified by recent high-profile breaches. The conversation delves into the strategic importance of a secure-by-design philosophy, propelling a proactive approach to safeguarding the integrity of software infrastructures against insidious threats. This segment highlights the ongoing evolution of cybersecurity strategies to protect the digital backbone of global commerce and communication.</p><p><strong>Strengthening Public-Private Partnerships and Global Cooperation</strong></p><p>In addressing the complexities of cybersecurity, the dialogue sheds light on the essentiality of robust public-private partnerships and global cooperation. With cyber threats recognizing no borders, the collective action of governments, private entities, and tech conglomerates is underscored as a sine qua non for a comprehensive defense strategy. This united front, as envisioned by cybersecurity leaders, signifies a beacon of hope in the arduous journey towards securing cyberspace.</p><p><strong>Conclusion: A Call to Arms</strong></p><p>As the RSA Conference 2024 approaches, this pre-event episode serves as a clarion call to the global cybersecurity community. It beckons industry stalwarts, innovators, policymakers, and practitioners to converge, collaborate, and collectively navigate the tempestuous seas of digital threats. Through enlightening conversations and shared wisdom, the path to a more secure digital future becomes clearer, guiding the collective quest for resilience against the ever-evolving landscape of cyber threats.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Ensuring Intelligence, National Security in a Rapidly Changing Technology World: <a href="https://www.rsaconference.com/USA/agenda/session/Ensuring%20Intelligence%20National%20Security%20in%20a%20Rapidly%20Changing%20Technology%20World">https://www.rsaconference.com/USA/agenda/session/Ensuring%20Intelligence%20National%20Security%20in%20a%20Rapidly%20Changing%20Technology%20World</a></p><p>CSAC: <a href="https://www.cisa.gov/news-events/news/director-easterly-announces-new-members-join-cisas-cybersecurity-advisory-committee" target="_blank">https://www.cisa.gov/news-events/news/director-easterly-announces-new-members-join-cisas-cybersecurity-advisory-committee</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 May 2024 02:11:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dave DeWalt)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-future-of-cybersecurity-from-a-venture-capital-investors-as-we-approach-the-beginning-of-rsa-conference-2024-an-rsa-conference-2024-conversation-with-dave-dewalt-on-location-coverage-with-sean-martin-and-marco-ciappelli-_FcAmlrm</link>
      <content:encoded><![CDATA[<p><strong>Guest: Dave DeWalt</strong>, Founder & CEO, NightDragon [<a href="https://twitter.com/nightdragon">@nightdragon</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ddewalt/">https://www.linkedin.com/in/ddewalt/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/dave-dewalt">https://www.rsaconference.com/experts/dave-dewalt</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Navigating the Cybersecurity Horizon: Anticipating RSA Conference 2024</strong></p><p>In a thoughtfully pre-event episode, seasoned cybersecurity expert Dave DeWalt share the microphone with Sean Martin and Marco Ciappelli to set the stage for an in-depth exploration of the dynamic cybersecurity landscape anticipating what will be RSA Conference 2024. Their engaging conversation with Dave DeWalt, a titan in the cybersecurity investment space, unveils an intricate web of challenges and pioneering solutions that are at the forefront of the battle against digital threats.</p><p><strong>Venture Capital's Role in Shaping Cybersecurity's Future</strong></p><p>DeWalt, with his profound experience and insights, brings into focus the critical role of venture capital in steering the future of cybersecurity. Highlighting the importance of strategic investments and partnerships, he underscores the necessity for a specialized approach—akin to that seen in fintech and biotech ventures—towards fostering security-oriented technological advancements. By casting a spotlight on venture capital, the discussion emphasizes its pivotal role in incubating innovations that promise to redefine cyber defense mechanisms.</p><p><strong>The Confluence of Electronic Warfare and Cyber Strategies</strong></p><p>A particularly compelling segment of their conversation veers into the impending intersection of electronic warfare and cyber strategies. As cyber threats evolve, DeWalt predicts a paradigm shift where hacking transcends conventional malware attacks, venturing into the realm of radio frequency (RF) based tactics. This speculative yet insightful projection hints at a future where cybersecurity and electronic warfare converge, illustrating the urgent need for adaptive and forward-thinking defensive measures.</p><p><strong>Securing the Software Supply Chain</strong></p><p>Another focal point of the discussion revolves around the vital necessity of securing the software supply chain—a challenge magnified by recent high-profile breaches. The conversation delves into the strategic importance of a secure-by-design philosophy, propelling a proactive approach to safeguarding the integrity of software infrastructures against insidious threats. This segment highlights the ongoing evolution of cybersecurity strategies to protect the digital backbone of global commerce and communication.</p><p><strong>Strengthening Public-Private Partnerships and Global Cooperation</strong></p><p>In addressing the complexities of cybersecurity, the dialogue sheds light on the essentiality of robust public-private partnerships and global cooperation. With cyber threats recognizing no borders, the collective action of governments, private entities, and tech conglomerates is underscored as a sine qua non for a comprehensive defense strategy. This united front, as envisioned by cybersecurity leaders, signifies a beacon of hope in the arduous journey towards securing cyberspace.</p><p><strong>Conclusion: A Call to Arms</strong></p><p>As the RSA Conference 2024 approaches, this pre-event episode serves as a clarion call to the global cybersecurity community. It beckons industry stalwarts, innovators, policymakers, and practitioners to converge, collaborate, and collectively navigate the tempestuous seas of digital threats. Through enlightening conversations and shared wisdom, the path to a more secure digital future becomes clearer, guiding the collective quest for resilience against the ever-evolving landscape of cyber threats.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Ensuring Intelligence, National Security in a Rapidly Changing Technology World: <a href="https://www.rsaconference.com/USA/agenda/session/Ensuring%20Intelligence%20National%20Security%20in%20a%20Rapidly%20Changing%20Technology%20World">https://www.rsaconference.com/USA/agenda/session/Ensuring%20Intelligence%20National%20Security%20in%20a%20Rapidly%20Changing%20Technology%20World</a></p><p>CSAC: <a href="https://www.cisa.gov/news-events/news/director-easterly-announces-new-members-join-cisas-cybersecurity-advisory-committee" target="_blank">https://www.cisa.gov/news-events/news/director-easterly-announces-new-members-join-cisas-cybersecurity-advisory-committee</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33543820" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/83cd802c-8f9e-42d3-a358-ee8fe3790b78/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=83cd802c-8f9e-42d3-a358-ee8fe3790b78&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the Future of Cybersecurity From A Venture Capital Investors as we approach the beginning of RSA Conference 2024 | An RSA Conference 2024 Conversation With Dave DeWalt | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dave DeWalt</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:34:54</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they delve into the world of cybersecurity at the RSA Conference 2024, featuring thought-provoking discussions with industry experts such as Dave DeWalt</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they delve into the world of cybersecurity at the RSA Conference 2024, featuring thought-provoking discussions with industry experts such as Dave DeWalt</itunes:subtitle>
      <itunes:keywords>global cooperation, technology investments, marco ciappelli, rsa conference, government collaboration, leadership in cybersecurity, sean martin, sean martin, rsa, venture capital, cybersecurity, cybersecurity, future of hacking, conference, content integrity, public-private partnerships, rsac, cyber investments, threat intelligence, on-location coverage, rsa conference 2024, deep fakes, podcast, rsaconference, dave dewalt, software supply chain, cybersecurityconference, cyber threats, electronic warfare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b96db431-2fae-42dc-97fb-0fc6a6c80941</guid>
      <title>Deception Is on the Rise, But Is It Time to Unleash Engagement Operations? | An RSA Conference 2024 Conversation With Ondrej Nekovar and Jan Pohl | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests:</strong></p><p><strong>Ondrej Nekovar</strong>, Director of Cyber Security, Board Member, SPCSS s.p. [<a href="https://twitter.com/csirtspcss">@csirtspcss</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/onekovar/">https://www.linkedin.com/in/onekovar/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Ondrej%20Nekovar">https://www.rsaconference.com/experts/Ondrej%20Nekovar</a></p><p><strong>Jan Pohl</strong>, Analyst, SPCSS s.p. [<a href="https://twitter.com/csirtspcss">@csirtspcss</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jan-pohl-89231a264/" target="_blank">https://www.linkedin.com/in/jan-pohl-89231a264/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Jan%20Pohl">https://www.rsaconference.com/experts/Jan%20Pohl</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>On this new On Location episode, Sean Martin and Marco Ciappelli dive into the intricate world of cyber deception and engagement operations with guests Ondrej Nekovar and Jan Pohl. The conversation kicks off with an intriguing discussion about the art of deception, drawing parallels between magician tricks and psychological manipulation in cybersecurity. Sean and Marco navigate through the complexities of cyber deception, shedding light on its historical roots and modern applications.</p><p>Ondrej and Jan, experts in the field of cybersecurity strategy and active defense, share their expertise on the evolving landscape of cyber threats and the role of deception in defense mechanisms. Their journey into cyber deception unfolds as they highlight the necessity of incorporating false assets to mislead adversaries in the digital realm. The duo emphasizes the importance of leveraging cyber threat intelligence and modern defense techniques to stay ahead of malicious actors.</p><p>Furthermore, the discussion pivots towards the strategic implementation of deception in security programs. Ondrej and Jan elaborate on the significance of creating a cohesive narrative to anticipate and thwart potential cyberattacks. They underscore the meticulous planning required to craft deceptive scenarios that outsmart adversaries and bolster organizational defenses.</p><p>As the conversation progresses, the guests delve into the nuanced world of cyber counterintelligence and the utilization of frameworks like MITRE ATT&CK to enhance defense strategies. Ondrej and Jan's insightful case study during their upcoming RSA Conference talk promises to offer profound insights into the practical application of cyber deception and active defense mechanisms.</p><p>Key Questions Addressed</p><ul><li>What is the role of deception in defense mechanisms?</li><li>How can cyber deception enhance organizational defenses?</li><li>What are the strategic insights provided by Ondrej and Jan for fortifying digital defenses?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Deception Is on the Rise, But Is It Time to Unleash Engagement Operations?: <a href="https://www.rsaconference.com/USA/agenda/session/Deception%20Is%20on%20the%20Rise%20But%20Is%20It%20Time%20to%20Unleash%20Engagement%20Operations">https://www.rsaconference.com/USA/agenda/session/Deception%20Is%20on%20the%20Rise%20But%20Is%20It%20Time%20to%20Unleash%20Engagement%20Operations</a></p><p>Time to Talk About Cyber Counterintelligence: <a href="https://www.rsaconference.com/USA/agenda/session/Time%20to%20Talk%20About%20Cyber%20Counterintelligence" target="_blank">https://www.rsaconference.com/USA/agenda/session/Time%20to%20Talk%20About%20Cyber%20Counterintelligence</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 1 May 2024 20:12:08 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ondrej Nekovar, Jan Pohl)</author>
      <link>https://eventcoveragepodcast.com/episodes/deception-is-on-the-rise-but-is-it-time-to-unleash-engagement-operations-an-rsa-conference-2024-conversation-with-ondrej-nekovar-and-jan-pohl-on-location-coverage-with-sean-martin-and-marco-ciappelli-ith8lb8t</link>
      <content:encoded><![CDATA[<p><strong>Guests:</strong></p><p><strong>Ondrej Nekovar</strong>, Director of Cyber Security, Board Member, SPCSS s.p. [<a href="https://twitter.com/csirtspcss">@csirtspcss</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/onekovar/">https://www.linkedin.com/in/onekovar/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Ondrej%20Nekovar">https://www.rsaconference.com/experts/Ondrej%20Nekovar</a></p><p><strong>Jan Pohl</strong>, Analyst, SPCSS s.p. [<a href="https://twitter.com/csirtspcss">@csirtspcss</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jan-pohl-89231a264/" target="_blank">https://www.linkedin.com/in/jan-pohl-89231a264/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Jan%20Pohl">https://www.rsaconference.com/experts/Jan%20Pohl</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>On this new On Location episode, Sean Martin and Marco Ciappelli dive into the intricate world of cyber deception and engagement operations with guests Ondrej Nekovar and Jan Pohl. The conversation kicks off with an intriguing discussion about the art of deception, drawing parallels between magician tricks and psychological manipulation in cybersecurity. Sean and Marco navigate through the complexities of cyber deception, shedding light on its historical roots and modern applications.</p><p>Ondrej and Jan, experts in the field of cybersecurity strategy and active defense, share their expertise on the evolving landscape of cyber threats and the role of deception in defense mechanisms. Their journey into cyber deception unfolds as they highlight the necessity of incorporating false assets to mislead adversaries in the digital realm. The duo emphasizes the importance of leveraging cyber threat intelligence and modern defense techniques to stay ahead of malicious actors.</p><p>Furthermore, the discussion pivots towards the strategic implementation of deception in security programs. Ondrej and Jan elaborate on the significance of creating a cohesive narrative to anticipate and thwart potential cyberattacks. They underscore the meticulous planning required to craft deceptive scenarios that outsmart adversaries and bolster organizational defenses.</p><p>As the conversation progresses, the guests delve into the nuanced world of cyber counterintelligence and the utilization of frameworks like MITRE ATT&CK to enhance defense strategies. Ondrej and Jan's insightful case study during their upcoming RSA Conference talk promises to offer profound insights into the practical application of cyber deception and active defense mechanisms.</p><p>Key Questions Addressed</p><ul><li>What is the role of deception in defense mechanisms?</li><li>How can cyber deception enhance organizational defenses?</li><li>What are the strategic insights provided by Ondrej and Jan for fortifying digital defenses?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Deception Is on the Rise, But Is It Time to Unleash Engagement Operations?: <a href="https://www.rsaconference.com/USA/agenda/session/Deception%20Is%20on%20the%20Rise%20But%20Is%20It%20Time%20to%20Unleash%20Engagement%20Operations">https://www.rsaconference.com/USA/agenda/session/Deception%20Is%20on%20the%20Rise%20But%20Is%20It%20Time%20to%20Unleash%20Engagement%20Operations</a></p><p>Time to Talk About Cyber Counterintelligence: <a href="https://www.rsaconference.com/USA/agenda/session/Time%20to%20Talk%20About%20Cyber%20Counterintelligence" target="_blank">https://www.rsaconference.com/USA/agenda/session/Time%20to%20Talk%20About%20Cyber%20Counterintelligence</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22847684" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/955fcc37-78cb-4ec3-8aaa-9f5c6dba9b2d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=955fcc37-78cb-4ec3-8aaa-9f5c6dba9b2d&amp;feed=2M86zCcc"/>
      <itunes:title>Deception Is on the Rise, But Is It Time to Unleash Engagement Operations? | An RSA Conference 2024 Conversation With Ondrej Nekovar and Jan Pohl | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ondrej Nekovar, Jan Pohl</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:46</itunes:duration>
      <itunes:summary>Immerse yourself in the world of cybersecurity with industry leaders Ondrej and Jan as they unravel the strategic nuances of cyber deception and active defense, offering valuable insights for fortifying digital defenses. Join Sean Martin and Marco Ciappelli in a captivating exploration of cybersecurity tactics, bridging ancient techniques with modern cybersecurity challenges to stay ahead of evolving threats.</itunes:summary>
      <itunes:subtitle>Immerse yourself in the world of cybersecurity with industry leaders Ondrej and Jan as they unravel the strategic nuances of cyber deception and active defense, offering valuable insights for fortifying digital defenses. Join Sean Martin and Marco Ciappelli in a captivating exploration of cybersecurity tactics, bridging ancient techniques with modern cybersecurity challenges to stay ahead of evolving threats.</itunes:subtitle>
      <itunes:keywords>deception techniques, marco ciappelli, marco ciappelli, rsa conference, sean martin, rsa, defense mechanisms, cybersecurity, digital defenses, cyber deception, conference, mitre att&amp;ck, engagement operations, cyber counterintelligence, active defense, case study, rsac, threat intelligence, strategic insights, on-location coverage, rsa conference 2024, podcast, malicious actors, rsaconference, jan pohl, ondrej nekovar, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">955340a3-a314-4491-b558-3cb26635064d</guid>
      <title>Automated Behavioral Fingerprinting: The Key to Cloud Security | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta</title>
      <description><![CDATA[<p>When you are only looking for malicious indicators, you will NEVER get security teams in control of the rapidly evolving threats to their organizations. When Brooke Motta's co-founder, Jimmy Mesta, was a security architect, and consulting companies on Kubernetes security at the very start of containerization, he witnessed a paradigm shift to defining your environment in a declarative way, through code. He decided to apply this paradigm shift toward a positive security model.</p><p>To this end, RAD Security was born. RAD Security creates fingerprints of known good behavior and notifies on drift from that behavior. RAD Security have built fingerprints for cloud native workloads, identities, and infrastructure to detect attacks through meaningful drift that signifies attacker behavior. RAD Security have also built a real-time posture model that can accept the data from our drift engine, so teams can constantly refine their shift-left efforts with the best data possible. By necessity, RAD Security have the first runtime agent that would automate the creation of these behavioral fingerprints.</p><p>Today, teams use RAD Security’s industry-first positive security model for their zero trust initiatives, posture management for cloud native infrastructure, and detection of zero days in runtime. RAD Security's mission is to empower engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In today’s environment, attackers are more versed in cloud native security than security teams.</p><p>RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. To learn more, meet with Brooke Motta and her RAD Security co-founder Jimmy Mesta at the Innovation Sandbox on Monday, May 6th, where they will be participating in the pitch contest.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO and Co-Founder of RAD Security [<a href="https://twitter.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/" target="_blank">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://twitter.com/brookelynz1" target="_blank">https://twitter.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>RAD Security Blog: <a href="https://itspm.ag/radsec-477a54" target="_blank">https://itspm.ag/radsec-477a54</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Apr 2024 21:26:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta)</author>
      <link>https://eventcoveragepodcast.com/episodes/automated-behavioral-fingerprinting-the-key-to-cloud-security-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-rad-security-story-with-brooke-motta-3hiVWijZ</link>
      <content:encoded><![CDATA[<p>When you are only looking for malicious indicators, you will NEVER get security teams in control of the rapidly evolving threats to their organizations. When Brooke Motta's co-founder, Jimmy Mesta, was a security architect, and consulting companies on Kubernetes security at the very start of containerization, he witnessed a paradigm shift to defining your environment in a declarative way, through code. He decided to apply this paradigm shift toward a positive security model.</p><p>To this end, RAD Security was born. RAD Security creates fingerprints of known good behavior and notifies on drift from that behavior. RAD Security have built fingerprints for cloud native workloads, identities, and infrastructure to detect attacks through meaningful drift that signifies attacker behavior. RAD Security have also built a real-time posture model that can accept the data from our drift engine, so teams can constantly refine their shift-left efforts with the best data possible. By necessity, RAD Security have the first runtime agent that would automate the creation of these behavioral fingerprints.</p><p>Today, teams use RAD Security’s industry-first positive security model for their zero trust initiatives, posture management for cloud native infrastructure, and detection of zero days in runtime. RAD Security's mission is to empower engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In today’s environment, attackers are more versed in cloud native security than security teams.</p><p>RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. To learn more, meet with Brooke Motta and her RAD Security co-founder Jimmy Mesta at the Innovation Sandbox on Monday, May 6th, where they will be participating in the pitch contest.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO and Co-Founder of RAD Security [<a href="https://twitter.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/" target="_blank">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://twitter.com/brookelynz1" target="_blank">https://twitter.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>RAD Security Blog: <a href="https://itspm.ag/radsec-477a54" target="_blank">https://itspm.ag/radsec-477a54</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6781923" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9dbc86ea-a374-4f02-a00d-c3f5fc6bf012/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9dbc86ea-a374-4f02-a00d-c3f5fc6bf012&amp;feed=2M86zCcc"/>
      <itunes:title>Automated Behavioral Fingerprinting: The Key to Cloud Security | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/77a29884-103b-4b82-b3a4-468f70c8f0fe/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:03</itunes:duration>
      <itunes:summary>Cloud native development is the biggest threat facing security teams today. For teams to achieve true resilience against emerging threats, detection and response solutions must evolve their approach beyond signature-based, one-size-fits-all solutions. RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. Listen to this new episode of &quot;7 Minutes on ITSPmagazine&quot; to hear RAD Security&apos;s Brooke Motta share their latest Innovation Short Brand Story.</itunes:summary>
      <itunes:subtitle>Cloud native development is the biggest threat facing security teams today. For teams to achieve true resilience against emerging threats, detection and response solutions must evolve their approach beyond signature-based, one-size-fits-all solutions. RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. Listen to this new episode of &quot;7 Minutes on ITSPmagazine&quot; to hear RAD Security&apos;s Brooke Motta share their latest Innovation Short Brand Story.</itunes:subtitle>
      <itunes:keywords>kubernetes, ultimate source of truth, environment, skills gap, marco ciappelli, rsa conference, sean martin, rad security, brooke motta, vulnerabilities, organizations, seven minutes podcast, material changes, co-founder, containerized environments, cloud native development, challenges, security teams, unique behavioral fingerprints, ceo, cloud breaches</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d189e067-ef4b-4ae8-a661-2595528c7ed6</guid>
      <title>Women Empowering the Cybersecurity Industry - Insights from Infosecurity Europe with Keynote Stephanie Hare | An On Location Coverage Conversation with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Stephanie Hare</strong>, Researcher, Broadcaster, Author</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stephaniehare/">https://www.linkedin.com/in/stephaniehare/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Unveiling Pre-Event Conversations: Women in Cybersecurity</strong></p><p>Set against the vibrant backdrop of Infosecurity Europe in London, the initial episode of the Infosecurity Europe Coverage by On Location With Marco and Sean features a compelling dialogue with Stephanie Hare. A distinguished researcher and author, Stephanie navigates the intricate interplay of technology ethics within the cybersecurity sphere.</p><p><strong>Navigating the Cyber World: Stephanie Hare's Journey</strong></p><p>Stephanie Hare shares her insights, stressing the importance of expanding the cybersecurity talent pool. Her extensive involvement in research, broadcasting, and writing showcases the varied avenues through which one can significantly impact the industry.</p><p><strong>Bridging the Diversity Gap: Challenges and Solutions</strong></p><p>The discussion delves into the persistent diversity hurdles that the cybersecurity industry faces. Stephanie points out the essential role of inclusive perspectives in driving innovation and resilience against cybersecurity threats. The conversation emphasizes the strategic necessity for organizations to adopt inclusivity and diversity within their teams.</p><p><strong>Empowering Through Knowledge: The Role of Education</strong></p><p>Highlighting the power of education, Stephanie advocates for the dissemination of knowledge and empowerment, especially among the youth and those transitioning into cybersecurity from non-traditional backgrounds. Her vision promotes a more inclusive and dynamic sector.</p><p><strong>Looking Ahead: Infosecurity Europe and Beyond</strong></p><p>The episode transitions to the upcoming activities at Infosecurity Europe, focusing on women's contributions to cybersecurity and the importance of inclusivity in the sector. As the event approaches, participants look forward to engaging with transformative insights and discussions spearheaded by leaders like Stephanie Hare.</p><p><strong>Conclusion</strong></p><p>This blog post, through Stephanie Hare's expert perspectives, captures the essence of the crucial discussions at Infosecurity Europe, spotlighting the pivotal role of women in shaping a more inclusive and robust cybersecurity industry.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Women in Cybersecurity Keynote: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219367.women-in-cybersecurity.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219367.women-in-cybersecurity.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Apr 2024 03:23:16 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Stephanie Hare)</author>
      <link>https://eventcoveragepodcast.com/episodes/women-empowering-the-cybersecurity-industry-insights-from-infosecurity-europe-with-keynote-stephanie-hare-an-on-location-coverage-conversation-with-sean-martin-and-marco-ciappelli-P0e6VMHF</link>
      <content:encoded><![CDATA[<p><strong>Guest: Stephanie Hare</strong>, Researcher, Broadcaster, Author</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/stephaniehare/">https://www.linkedin.com/in/stephaniehare/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Unveiling Pre-Event Conversations: Women in Cybersecurity</strong></p><p>Set against the vibrant backdrop of Infosecurity Europe in London, the initial episode of the Infosecurity Europe Coverage by On Location With Marco and Sean features a compelling dialogue with Stephanie Hare. A distinguished researcher and author, Stephanie navigates the intricate interplay of technology ethics within the cybersecurity sphere.</p><p><strong>Navigating the Cyber World: Stephanie Hare's Journey</strong></p><p>Stephanie Hare shares her insights, stressing the importance of expanding the cybersecurity talent pool. Her extensive involvement in research, broadcasting, and writing showcases the varied avenues through which one can significantly impact the industry.</p><p><strong>Bridging the Diversity Gap: Challenges and Solutions</strong></p><p>The discussion delves into the persistent diversity hurdles that the cybersecurity industry faces. Stephanie points out the essential role of inclusive perspectives in driving innovation and resilience against cybersecurity threats. The conversation emphasizes the strategic necessity for organizations to adopt inclusivity and diversity within their teams.</p><p><strong>Empowering Through Knowledge: The Role of Education</strong></p><p>Highlighting the power of education, Stephanie advocates for the dissemination of knowledge and empowerment, especially among the youth and those transitioning into cybersecurity from non-traditional backgrounds. Her vision promotes a more inclusive and dynamic sector.</p><p><strong>Looking Ahead: Infosecurity Europe and Beyond</strong></p><p>The episode transitions to the upcoming activities at Infosecurity Europe, focusing on women's contributions to cybersecurity and the importance of inclusivity in the sector. As the event approaches, participants look forward to engaging with transformative insights and discussions spearheaded by leaders like Stephanie Hare.</p><p><strong>Conclusion</strong></p><p>This blog post, through Stephanie Hare's expert perspectives, captures the essence of the crucial discussions at Infosecurity Europe, spotlighting the pivotal role of women in shaping a more inclusive and robust cybersecurity industry.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Women in Cybersecurity Keynote: <a href="https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219367.women-in-cybersecurity.html">https://www.infosecurityeurope.com/en-gb/conference-programme/session-details.3783.219367.women-in-cybersecurity.html</a></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25168013" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/341293bb-fa74-41ef-83d3-a6a165708515/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=341293bb-fa74-41ef-83d3-a6a165708515&amp;feed=2M86zCcc"/>
      <itunes:title>Women Empowering the Cybersecurity Industry - Insights from Infosecurity Europe with Keynote Stephanie Hare | An On Location Coverage Conversation with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Stephanie Hare</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/15a9cf98-8aba-405a-ae3f-c15a6c1b9a2a/3000x3000/infosecurity-eu-2024-podcast-cover-850x850.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:11</itunes:duration>
      <itunes:summary>In the premiere episode of On Location With Marco and Sean at Infosecurity Europe in London, we dive into the significant roles women play in cybersecurity and explore the critical need for inclusivity within the industry. Join us as Stephanie Hare illuminates the key challenges and opportunities in this dynamic  field.</itunes:summary>
      <itunes:subtitle>In the premiere episode of On Location With Marco and Sean at Infosecurity Europe in London, we dive into the significant roles women play in cybersecurity and explore the critical need for inclusivity within the industry. Join us as Stephanie Hare illuminates the key challenges and opportunities in this dynamic  field.</itunes:subtitle>
      <itunes:keywords>stephaniehare, techethicsdebate, marco ciappelli, infoseceventcoverage, educationempowerment, inclusivityintech, cybersecurityeducation, cybersecuritythoughtleadership, sean martin, infosecurity, cybersecurity, cybersecuritydiversity, conference, cybersecuritystrategy, cybersecuritytalent, womenleadersintech, industryinnovation, stephanie hare, cybersecurity conference, womenincybersecurity, on location podcast, on-location coverage, podcast, infoseclondon, seanmartin, empoweringdiversetalent, infosecurityeurope, cybersecurity event, cybersecurityinsights, techindustrydiversity, technologyethics, cybersecuritychallenges, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cac60a9d-2433-40ca-8e4d-899176decbf0</guid>
      <title>Infosecurity Europe 2024 Coverage Countdown and Insights with Sean and Marco | An On Location Coverage Conversation with Event Director Nicole Mills and Conference Manager Victoria Aitken</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Nicole Mills</strong>, Exhibition Director at Infosecurity Europe [<a href="https://twitter.com/Infosecurity">@Infosecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicolemmills/" target="_blank">https://www.linkedin.com/in/nicolemmills/</a></p><p><strong>Victoria Aitken</strong>, Conference Manager at Infosecurity Europe [<a href="https://twitter.com/Infosecurity">@Infosecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vickyaitken/">https://www.linkedin.com/in/vickyaitken/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Starting the Countdown with Sean and Marco</strong></p><p>In a lively conversation, Sean and Marco discuss the anticipation leading up to Infosecurity Europe, sharing intriguing insights and predictions about the event. From favorite places to true stories, their dynamic exchange sets the tone for an exciting journey ahead.</p><p><strong>Meeting the Industry Leaders</strong></p><p>Nicole Mills and Victoria Aitken, from Infosecurity Europe, shed light on their roles and the evolution of the event over the years. With Nicole as the event director and Victoria as the conference manager, their expertise fuels the growth and success of this premier cybersecurity gathering.</p><p><strong>Unveiling the Theme: Rethink the Power of Security</strong></p><p>Dive into the core theme of this year's event, "Rethink the Power of Security," as Nicole elaborates on the strategic vision behind the theme. Explore how this concept drives the conference program, bringing together top-notch speakers, workshops, and exhibitors to shape the future of cybersecurity.</p><p><strong>Innovation Unleashed: Showcasing Tomorrow's Tech</strong></p><p>Discover the innovative showcases and startup zones that highlight cutting-edge technologies and solutions. From the Discovery Zone to the Startup Zone, experience a glimpse into the future of cybersecurity through a lens of creativity, entrepreneurship, and disruptive innovation.</p><p><strong>Keynotes and Conversations: A Deep Dive</strong></p><p>Get a sneak peek into the lineup of keynote speakers and their thought-provoking talks. From AI experts to industry leaders like Claire Williams from F1, the keynote stage promises a rich tapestry of discussions on trust, crisis management, and the power of collaboration in the cybersecurity landscape.</p><p><strong>Empowering Women in Cyber</strong></p><p>Stephanie Hare headlines a special afternoon dedicated to women in cybersecurity, emphasizing diversity, inclusion, and allyship in the industry. Learn how Infosecurity Europe champions gender equality and amplifies the voices of women professionals shaping the future of cybersecurity.</p><p><strong>Looking Ahead: Tomorrow's Topics</strong></p><p>Explore the new stage "Tomorrow's Topics," focusing on channel insights and the evolving trends in the cybersecurity domain. Discover how Infosecurity Europe stays ahead of the curve by embracing fresh perspectives, diverse voices, and transformative ideas in the ever-evolving cybersecurity landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Apr 2024 01:43:12 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Victoria Aitken, Nicole Mills)</author>
      <link>https://eventcoveragepodcast.com/episodes/infosecurity-europe-2024-coverage-countdown-and-insights-with-sean-and-marco-an-on-location-coverage-conversation-with-event-director-nicole-mills-and-conference-manager-victoria-aitken-NcDBLQvi</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Nicole Mills</strong>, Exhibition Director at Infosecurity Europe [<a href="https://twitter.com/Infosecurity">@Infosecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicolemmills/" target="_blank">https://www.linkedin.com/in/nicolemmills/</a></p><p><strong>Victoria Aitken</strong>, Conference Manager at Infosecurity Europe [<a href="https://twitter.com/Infosecurity">@Infosecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vickyaitken/">https://www.linkedin.com/in/vickyaitken/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p><strong>Starting the Countdown with Sean and Marco</strong></p><p>In a lively conversation, Sean and Marco discuss the anticipation leading up to Infosecurity Europe, sharing intriguing insights and predictions about the event. From favorite places to true stories, their dynamic exchange sets the tone for an exciting journey ahead.</p><p><strong>Meeting the Industry Leaders</strong></p><p>Nicole Mills and Victoria Aitken, from Infosecurity Europe, shed light on their roles and the evolution of the event over the years. With Nicole as the event director and Victoria as the conference manager, their expertise fuels the growth and success of this premier cybersecurity gathering.</p><p><strong>Unveiling the Theme: Rethink the Power of Security</strong></p><p>Dive into the core theme of this year's event, "Rethink the Power of Security," as Nicole elaborates on the strategic vision behind the theme. Explore how this concept drives the conference program, bringing together top-notch speakers, workshops, and exhibitors to shape the future of cybersecurity.</p><p><strong>Innovation Unleashed: Showcasing Tomorrow's Tech</strong></p><p>Discover the innovative showcases and startup zones that highlight cutting-edge technologies and solutions. From the Discovery Zone to the Startup Zone, experience a glimpse into the future of cybersecurity through a lens of creativity, entrepreneurship, and disruptive innovation.</p><p><strong>Keynotes and Conversations: A Deep Dive</strong></p><p>Get a sneak peek into the lineup of keynote speakers and their thought-provoking talks. From AI experts to industry leaders like Claire Williams from F1, the keynote stage promises a rich tapestry of discussions on trust, crisis management, and the power of collaboration in the cybersecurity landscape.</p><p><strong>Empowering Women in Cyber</strong></p><p>Stephanie Hare headlines a special afternoon dedicated to women in cybersecurity, emphasizing diversity, inclusion, and allyship in the industry. Learn how Infosecurity Europe champions gender equality and amplifies the voices of women professionals shaping the future of cybersecurity.</p><p><strong>Looking Ahead: Tomorrow's Topics</strong></p><p>Explore the new stage "Tomorrow's Topics," focusing on channel insights and the evolving trends in the cybersecurity domain. Discover how Infosecurity Europe stays ahead of the curve by embracing fresh perspectives, diverse voices, and transformative ideas in the ever-evolving cybersecurity landscape.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr">https://www.youtube.com/playlist?list=PLnYu0psdcllTcLEF2H9r2svIRrI1P4Qkr</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about InfoSecurity Europe 2024: <a href="https://itspm.ag/iseu24reg">https://itspm.ag/iseu24reg</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23387997" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/3cfea3f9-88b5-47c0-9e47-eeb85de0ca26/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=3cfea3f9-88b5-47c0-9e47-eeb85de0ca26&amp;feed=2M86zCcc"/>
      <itunes:title>Infosecurity Europe 2024 Coverage Countdown and Insights with Sean and Marco | An On Location Coverage Conversation with Event Director Nicole Mills and Conference Manager Victoria Aitken</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Victoria Aitken, Nicole Mills</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/15a9cf98-8aba-405a-ae3f-c15a6c1b9a2a/3000x3000/infosecurity-eu-2024-podcast-cover-850x850.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:20</itunes:duration>
      <itunes:summary>Join us for an exclusive inside look at the latest happenings at Infosecurity Europe as explored by industry experts Sean and Marco. From keynote speakers to innovative showcases, get ready to dive into the heart of cybersecurity excellence.</itunes:summary>
      <itunes:subtitle>Join us for an exclusive inside look at the latest happenings at Infosecurity Europe as explored by industry experts Sean and Marco. From keynote speakers to innovative showcases, get ready to dive into the heart of cybersecurity excellence.</itunes:subtitle>
      <itunes:keywords>marcociappelli, ai experts, marco ciappelli, keynote speakers, diversity in cybersecurity, sean martin, women in cyber, victoria aitken, infosecurity, cybersecurity, conference, technology showcase, innovation, victoriaaitken, nicolemills, cybersecurity conference, on location podcast, nicole mills, on-location coverage, industry trends, cybersecurity insights, podcast, seanmartin, infosecurityeurope, cybersecurity event, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb98b8bb-b0cd-49c4-97ea-2e3cf0e93502</guid>
      <title>Unpacking Data Privacy and AI Ethics at RSA Conference 2024 | An RSA Conference 2024 Conversation With Anu Talus | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Anu Talus</strong>, Head of the Office of the Information Commissioner (TSV), and Chair of the European Data Protection Board (EDPB) [<a href="https://twitter.com/EU_EDPB">@EU_EDPB</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anu-talus-657a892/">https://www.linkedin.com/in/anu-talus-657a892/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Anu%20Talus">https://www.rsaconference.com/experts/Anu%20Talus</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The latest episode of the On Location podcast, hosted by Sean Martin and Marco Ciappelli, provided a deep dive into the crucial topics of data privacy and AI ethics, featuring an enlightening discussion with Anu Talus, the Finnish Data Protection Ombudsman. The conversation explored the intersection of GDPR, the AI Act, and the ethical considerations surrounding artificial intelligence.</p><p><strong>The Role of Anu Talus: Protecting Data Privacy in Europe</strong></p><p>Anu Talus, the Finnish Data Protection Ombudsman and chair of the European Data Protection Board, shed light on the dual role she holds in safeguarding data privacy across Europe. With a comprehensive overview of the GDPR and its application in the new reality of AI, Talus emphasized the importance of a harmonized approach to data protection legislation.</p><p><strong>Unveiling the Complexity: AI Act and GDPR Interconnection</strong></p><p>The discussion with Talus goes deep into the intricate interplay between the AI Act and GDPR, highlighting the essential role of the GDPR in regulating the processing of personal data in AI applications. The conversation underscored the need for a consistent and comprehensive enforcement mechanism to ensure the protection of individuals' privacy rights.</p><p><strong>Navigating Ethical Dilemmas: Balancing Innovation and Risk</strong></p><p>Ethical considerations in AI governance were a focal point of the conversation, with a deliberate exploration of the challenges posed by emerging technologies like deepfakes and misinformation. Talus emphasized the significance of conducting thorough risk assessments to strike a balance between innovation and ethical usage of AI.</p><p><strong>Bridging Stakeholders: Collaboration for Effective Legislation</strong></p><p>The episode highlighted the importance of stakeholder engagement in the legislative process, emphasizing the need for diverse perspectives to inform effective policymaking. Talus underscored the value of collaborative efforts among researchers, policymakers, and industry innovators in shaping meaningful and enforceable regulations.</p><p><strong>Looking Ahead: Insights and Experiences from RSA Conference 2024</strong></p><p>As Anu Talus prepared to participate in a panel on AI Governance and Ethics at the RSA Conference, the podcast provided a glimpse into the anticipated discussions around data privacy, AI ethics, and legislative perspectives. The panel promised a robust dialogue with industry experts and privacy advocates, offering attendees a wealth of insights to carry forward.</p><p><strong>Join the Conversation: A Call to Action for Data Privacy Advocates</strong></p><p>The episode concluded with a call to action for listeners to engage with the evolving landscape of data privacy and AI ethics. Encouraging attendance at the RSA Conference panel, Sean Martin and Marco Ciappelli emphasized the importance of continued dialogue and collaboration in shaping a secure and ethically-driven AI ecosystem.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>AI Governance & Ethics: A Discussion with the Big Players: <a href="https://www.rsaconference.com/USA/agenda/session/AI%20Governance%20%20Ethics%20A%20Discussion%20with%20the%20Big%20Players">https://www.rsaconference.com/USA/agenda/session/AI%20Governance%20%20Ethics%20A%20Discussion%20with%20the%20Big%20Players</a></p><p>EDPB: <a href="https://www.edpb.europa.eu/edpb_en" target="_blank">https://www.edpb.europa.eu/edpb_en</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 27 Apr 2024 01:27:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Anu Talus)</author>
      <link>https://eventcoveragepodcast.com/episodes/unpacking-data-privacy-and-ai-ethics-at-rsa-conference-2024-an-rsa-conference-2024-conversation-with-anu-talus-on-location-coverage-with-sean-martin-and-marco-ciappelli-gym_SsrT</link>
      <content:encoded><![CDATA[<p><strong>Guest: Anu Talus</strong>, Head of the Office of the Information Commissioner (TSV), and Chair of the European Data Protection Board (EDPB) [<a href="https://twitter.com/EU_EDPB">@EU_EDPB</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anu-talus-657a892/">https://www.linkedin.com/in/anu-talus-657a892/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Anu%20Talus">https://www.rsaconference.com/experts/Anu%20Talus</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The latest episode of the On Location podcast, hosted by Sean Martin and Marco Ciappelli, provided a deep dive into the crucial topics of data privacy and AI ethics, featuring an enlightening discussion with Anu Talus, the Finnish Data Protection Ombudsman. The conversation explored the intersection of GDPR, the AI Act, and the ethical considerations surrounding artificial intelligence.</p><p><strong>The Role of Anu Talus: Protecting Data Privacy in Europe</strong></p><p>Anu Talus, the Finnish Data Protection Ombudsman and chair of the European Data Protection Board, shed light on the dual role she holds in safeguarding data privacy across Europe. With a comprehensive overview of the GDPR and its application in the new reality of AI, Talus emphasized the importance of a harmonized approach to data protection legislation.</p><p><strong>Unveiling the Complexity: AI Act and GDPR Interconnection</strong></p><p>The discussion with Talus goes deep into the intricate interplay between the AI Act and GDPR, highlighting the essential role of the GDPR in regulating the processing of personal data in AI applications. The conversation underscored the need for a consistent and comprehensive enforcement mechanism to ensure the protection of individuals' privacy rights.</p><p><strong>Navigating Ethical Dilemmas: Balancing Innovation and Risk</strong></p><p>Ethical considerations in AI governance were a focal point of the conversation, with a deliberate exploration of the challenges posed by emerging technologies like deepfakes and misinformation. Talus emphasized the significance of conducting thorough risk assessments to strike a balance between innovation and ethical usage of AI.</p><p><strong>Bridging Stakeholders: Collaboration for Effective Legislation</strong></p><p>The episode highlighted the importance of stakeholder engagement in the legislative process, emphasizing the need for diverse perspectives to inform effective policymaking. Talus underscored the value of collaborative efforts among researchers, policymakers, and industry innovators in shaping meaningful and enforceable regulations.</p><p><strong>Looking Ahead: Insights and Experiences from RSA Conference 2024</strong></p><p>As Anu Talus prepared to participate in a panel on AI Governance and Ethics at the RSA Conference, the podcast provided a glimpse into the anticipated discussions around data privacy, AI ethics, and legislative perspectives. The panel promised a robust dialogue with industry experts and privacy advocates, offering attendees a wealth of insights to carry forward.</p><p><strong>Join the Conversation: A Call to Action for Data Privacy Advocates</strong></p><p>The episode concluded with a call to action for listeners to engage with the evolving landscape of data privacy and AI ethics. Encouraging attendance at the RSA Conference panel, Sean Martin and Marco Ciappelli emphasized the importance of continued dialogue and collaboration in shaping a secure and ethically-driven AI ecosystem.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>AI Governance & Ethics: A Discussion with the Big Players: <a href="https://www.rsaconference.com/USA/agenda/session/AI%20Governance%20%20Ethics%20A%20Discussion%20with%20the%20Big%20Players">https://www.rsaconference.com/USA/agenda/session/AI%20Governance%20%20Ethics%20A%20Discussion%20with%20the%20Big%20Players</a></p><p>EDPB: <a href="https://www.edpb.europa.eu/edpb_en" target="_blank">https://www.edpb.europa.eu/edpb_en</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21741827" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/4953433b-d132-413c-862b-ab852d405a89/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=4953433b-d132-413c-862b-ab852d405a89&amp;feed=2M86zCcc"/>
      <itunes:title>Unpacking Data Privacy and AI Ethics at RSA Conference 2024 | An RSA Conference 2024 Conversation With Anu Talus | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Anu Talus</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:37</itunes:duration>
      <itunes:summary>Join us as we share another insightful conversation from the On Location Podcast Coverage of RSA Conference 2024 hosted by Sean Martin and Marco Ciappelli.</itunes:summary>
      <itunes:subtitle>Join us as we share another insightful conversation from the On Location Podcast Coverage of RSA Conference 2024 hosted by Sean Martin and Marco Ciappelli.</itunes:subtitle>
      <itunes:keywords>misinformation, anu talus, marco ciappelli, marco ciappelli, rsa conference, cybersecurity conversations, ai governance, sean martin, rsa, cybersecurity, data protection legislation, deepfakes, rsa conference session, conference, gdpr, rsac, rsac, on location podcast, data privacy, on-location coverage, rsa conference 2024, podcast, ai ethics, rsaconference, legislative perspectives, european data protection board, stakeholder engagement, ethics in technology, ai act, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0d425fdb-8314-4df4-9477-542518abc7c8</guid>
      <title>Blackjack and Breaches: History of Ransomware on the Casino Industry | An RSA Conference 2024 Conversation With Tennisha Martin and Aleise McGowan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Tennisha Martin</strong>, Executive Director and Chairwoman at BlackGirlsHack [<a href="https://twitter.com/blackgirlshack">@blackgirlshack</a>]</p><p>On LinkedIn | <a href="https://linkedin.com/in/tennisha" target="_blank">https://linkedin.com/in/tennisha</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Tennisha%20Martin">https://www.rsaconference.com/experts/Tennisha%20Martin</a></p><p><strong>Aleise McGowan</strong>, Chief Information Security Officer, BlackGirlsHack [<a href="https://twitter.com/blackgirlshack">@blackgirlshack</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aleisemcgowan/">https://www.linkedin.com/in/aleisemcgowan/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Aleise%20McGowan">https://www.rsaconference.com/experts/Aleise%20McGowan</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The upcoming Blackjack and Breaches RSA Cconference talk featuring Tennisha Martin, a seasoned cybersecurity specialist, and Aleise McGowan, a renowned data breach investigator, promises to be an enlightening exploration of cybersecurity challenges, data breach trends, and the specific risks that casinos face.</p><p>Tennisha Martin, with her extensive background in cybersecurity strategy and risk management, is anticipated to share insights on the evolving cyber threats landscape and the crucial strategies organizations, including casinos, can implement to fortify their defenses. Aleise McGowan, known for her expertise in forensic analysis and incident response, is poised to delve into the intricacies of data breach investigations, highlighting the unique challenges that casinos encounter in safeguarding sensitive information and maintaining robust casino security measures.</p><p>The forthcoming presentation by Tennisha Martin and Aleise McGowan is aimed at shedding light on the importance of collaborative approaches in cybersecurity, particularly in industries like casinos where the risks can be heightened. Their combined insights and experiences are expected to underscore the significance of proactive cybersecurity practices and strategic incident response protocols tailored to the casino environment.</p><p>As we look forward to the Blackjack and Breaches RSA Conference session with Tennisha Martin and Aleise McGowan, the anticipation of their expertise and knowledge sharing, including insights on casino security risks, sets the stage for a compelling dialogue on cybersecurity best practices and the imperative for organizations, including casinos, to prioritize data security. Stay tuned for an insightful exploration of cybersecurity resilience and data breach mitigation strategies and to hear what Marco thinks about potential jail time.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Blackjack and Breaches: History of Ransomware on the Casino Industry: <a href="https://www.rsaconference.com/USA/agenda/session/Blackjack%20and%20Breaches%20History%20of%20Ransomware%20on%20the%20Casino%20Industry" target="_blank">https://www.rsaconference.com/USA/agenda/session/Blackjack%20and%20Breaches%20History%20of%20Ransomware%20on%20the%20Casino%20Industry</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Apr 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Aleise McGowan, Tennisha Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/blackjack-and-breaches-history-of-ransomware-on-the-casino-industry-an-rsa-conference-2024-conversation-with-tennisha-martin-and-aleise-mcgowan-on-location-coverage-with-sean-martin-and-marco-ciappelli-wGWwz150</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Tennisha Martin</strong>, Executive Director and Chairwoman at BlackGirlsHack [<a href="https://twitter.com/blackgirlshack">@blackgirlshack</a>]</p><p>On LinkedIn | <a href="https://linkedin.com/in/tennisha" target="_blank">https://linkedin.com/in/tennisha</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Tennisha%20Martin">https://www.rsaconference.com/experts/Tennisha%20Martin</a></p><p><strong>Aleise McGowan</strong>, Chief Information Security Officer, BlackGirlsHack [<a href="https://twitter.com/blackgirlshack">@blackgirlshack</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/aleisemcgowan/">https://www.linkedin.com/in/aleisemcgowan/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Aleise%20McGowan">https://www.rsaconference.com/experts/Aleise%20McGowan</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The upcoming Blackjack and Breaches RSA Cconference talk featuring Tennisha Martin, a seasoned cybersecurity specialist, and Aleise McGowan, a renowned data breach investigator, promises to be an enlightening exploration of cybersecurity challenges, data breach trends, and the specific risks that casinos face.</p><p>Tennisha Martin, with her extensive background in cybersecurity strategy and risk management, is anticipated to share insights on the evolving cyber threats landscape and the crucial strategies organizations, including casinos, can implement to fortify their defenses. Aleise McGowan, known for her expertise in forensic analysis and incident response, is poised to delve into the intricacies of data breach investigations, highlighting the unique challenges that casinos encounter in safeguarding sensitive information and maintaining robust casino security measures.</p><p>The forthcoming presentation by Tennisha Martin and Aleise McGowan is aimed at shedding light on the importance of collaborative approaches in cybersecurity, particularly in industries like casinos where the risks can be heightened. Their combined insights and experiences are expected to underscore the significance of proactive cybersecurity practices and strategic incident response protocols tailored to the casino environment.</p><p>As we look forward to the Blackjack and Breaches RSA Conference session with Tennisha Martin and Aleise McGowan, the anticipation of their expertise and knowledge sharing, including insights on casino security risks, sets the stage for a compelling dialogue on cybersecurity best practices and the imperative for organizations, including casinos, to prioritize data security. Stay tuned for an insightful exploration of cybersecurity resilience and data breach mitigation strategies and to hear what Marco thinks about potential jail time.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Blackjack and Breaches: History of Ransomware on the Casino Industry: <a href="https://www.rsaconference.com/USA/agenda/session/Blackjack%20and%20Breaches%20History%20of%20Ransomware%20on%20the%20Casino%20Industry" target="_blank">https://www.rsaconference.com/USA/agenda/session/Blackjack%20and%20Breaches%20History%20of%20Ransomware%20on%20the%20Casino%20Industry</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25416942" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/182a5b05-bedb-48ec-9769-0ffd0dd62398/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=182a5b05-bedb-48ec-9769-0ffd0dd62398&amp;feed=2M86zCcc"/>
      <itunes:title>Blackjack and Breaches: History of Ransomware on the Casino Industry | An RSA Conference 2024 Conversation With Tennisha Martin and Aleise McGowan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Aleise McGowan, Tennisha Martin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:26</itunes:duration>
      <itunes:summary>Join us as we discuss the upcoming RSA Conference session, Blackjack and Breaches, featuring cybersecurity specialist Tennisha Martin and data breach investigator Aleise McGowan where we explore cybersecurity challenges, data breach trends, and the unique risks faced by industries like casinos.</itunes:summary>
      <itunes:subtitle>Join us as we discuss the upcoming RSA Conference session, Blackjack and Breaches, featuring cybersecurity specialist Tennisha Martin and data breach investigator Aleise McGowan where we explore cybersecurity challenges, data breach trends, and the unique risks faced by industries like casinos.</itunes:subtitle>
      <itunes:keywords>knowledge sharing, expertise, marco ciappelli, tennisha martin, trends, casino security, risks, rsa conference, high-risk environments, sean martin, rsa, collaborative approaches, cybersecurity, proactive, rsa conference session, conference, casinos, information security, rsac, data breach, on-location coverage, rsa conference 2024, podcast, security, rsaconference, incident response, aleise mcgowan, challenges, aleise mcgowan, strategies, cybersecurityconference, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21093363-dc85-4a72-bc31-f2218b8f2d2b</guid>
      <title>Leading the Charge to Fortify Web Browsing Security | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Vivek Ramachandran, a cybersecurity luminary with over two decades of experience, embarked on a transformative journey from developer to esteemed security researcher. His relentless pursuit of innovation led to the creation of SquareX, a pioneering cybersecurity company redefining secure web browsing.</p><p>Vivek's journey epitomizes a shift towards innovative and proactive cybersecurity measures. With a keen eye for detecting vulnerabilities and a passion for safeguarding corporate assets, he envisioned a solution that transcends traditional security paradigms. SquareX stands as a testament to Vivek's commitment to fortifying online defenses against sophisticated cyber threats.</p><p>By providing real-time attack detection and comprehensive insights, SquareX empowers organizations to fortify their web browsing environment effectively. Vivek's team's innovations address the critical gap in existing security measures, offering a holistic approach to threat mitigation. With a focus on user-centric protection and robust defense mechanisms, SquareX champions a new era of cybersecurity resilience. Vivek's visionary leadership positions SquareX as a trailblazer in secure browsing solutions.</p><p>As SquareX continues to make strides in the cybersecurity arena, Vivek's story serves as an inspiration for budding innovators and security enthusiasts while providing much-needed confidence for business and security leaders looking to protect their business assets.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 25 Apr 2024 21:33:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://eventcoveragepodcast.com/episodes/leading-the-charge-to-fortify-web-browsing-security-a-brand-story-conversation-from-rsa-conference-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-TdK043QW</link>
      <content:encoded><![CDATA[<p>Vivek Ramachandran, a cybersecurity luminary with over two decades of experience, embarked on a transformative journey from developer to esteemed security researcher. His relentless pursuit of innovation led to the creation of SquareX, a pioneering cybersecurity company redefining secure web browsing.</p><p>Vivek's journey epitomizes a shift towards innovative and proactive cybersecurity measures. With a keen eye for detecting vulnerabilities and a passion for safeguarding corporate assets, he envisioned a solution that transcends traditional security paradigms. SquareX stands as a testament to Vivek's commitment to fortifying online defenses against sophisticated cyber threats.</p><p>By providing real-time attack detection and comprehensive insights, SquareX empowers organizations to fortify their web browsing environment effectively. Vivek's team's innovations address the critical gap in existing security measures, offering a holistic approach to threat mitigation. With a focus on user-centric protection and robust defense mechanisms, SquareX champions a new era of cybersecurity resilience. Vivek's visionary leadership positions SquareX as a trailblazer in secure browsing solutions.</p><p>As SquareX continues to make strides in the cybersecurity arena, Vivek's story serves as an inspiration for budding innovators and security enthusiasts while providing much-needed confidence for business and security leaders looking to protect their business assets.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19724412" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/9c86e816-208b-4fbd-93a5-e1fc1b359277/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=9c86e816-208b-4fbd-93a5-e1fc1b359277&amp;feed=2M86zCcc"/>
      <itunes:title>Leading the Charge to Fortify Web Browsing Security | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:20:31</itunes:duration>
      <itunes:summary>Join cybersecurity visionary Vivek Ramachandran as he shares his transformative journey from developer to researcher to CEO of SquareX, offering dynamic solutions to fortify web browsing security. Discover the innovative defense mechanisms and proactive measures reshaping the cybersecurity landscape in this thought-provoking conversation.</itunes:summary>
      <itunes:subtitle>Join cybersecurity visionary Vivek Ramachandran as he shares his transformative journey from developer to researcher to CEO of SquareX, offering dynamic solutions to fortify web browsing security. Discover the innovative defense mechanisms and proactive measures reshaping the cybersecurity landscape in this thought-provoking conversation.</itunes:subtitle>
      <itunes:keywords>secure solutions, innovative defense, innovative solutions, marco ciappelli, rsa conference, sean martin, cybersecurity resilience, web browsing, cybersecurity luminary, proactive measures, cybersecurity, threat mitigation, visionary founder, digital assets, cyber defense, security solutions, vivek ramachandran, squarex, cyber threats, advanced threats, transformative journey</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7add164b-7502-4929-ba7e-a00a8b85538f</guid>
      <title>New Research Reveals Five New Trends for Cyber Resilience | A Brand Story Conversation From RSA Conference 2024 | An AT&amp;T Cybersecurity Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The upcoming thought leadership research set to be announced at the RSA Conference which will be presented by Theresa Lanowitz, the Head of Cybersecurity Evangelism at AT&T Cybersecurity, promises to dive into critical aspects of cyber resilience, providing actionable advice for organizations to enhance their cybersecurity strategies. AT&T Cybersecurity aims to empower businesses of all sizes to strengthen their security posture and embrace a proactive approach to cyber resilience through the insights delivered through their upcoming thought leadership report for 2024.</p><p>As organizations navigate the complex cybersecurity landscape, the focus on cyber resilience becomes paramount. The thought leadership report intends to prompt discussions within organizations, urging them to reevaluate their cybersecurity strategies and resilience efforts. By sharing insights and trends in cybersecurity, the report aims to equip businesses with the tools needed to enhance their security practices.</p><p>The interconnected nature of the supply chain, both physical and software-based, presents challenges and opportunities for businesses of all sizes. Assessing the security posture of vendors and partners is crucial in mitigating cyber threats and ensuring a robust cybersecurity framework within organizations. The thought leadership report from AT&T Cybersecurity seeks to guide organizations in fortifying their security posture and navigating the ever-evolving threat landscape effectively.</p><p>Be sure to connect with the Theresa and the rest of the AT&T Cybersecurity team during the RSA Conference. You can learn more and find them by visiting: <a href="https://itspm.ag/att-cy4nk3" target="_blank">https://itspm.ag/att-cy4nk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Head of Cybersecurity Evangelism at AT&T Cybersecurity [<a href="https://cybersecurity.att.com/newsroom/events/rsac2024?utm_content=att-cyber">@attcyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/">https://www.linkedin.com/in/theresalanowitz/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Theresa%20Lanowitz">https://www.rsaconference.com/experts/Theresa%20Lanowitz</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AT&T Cybersecurity: <a href="https://www.itspmagazine.com/directory/att-cybersecurity">https://www.itspmagazine.com/directory/att-cybersecurity</a></p><p>The Possibilities, Risks, and Rewards of Cyber Tech Convergence: <a href="https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence">https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence</a></p><p>New Research Reveals Five New Trends for Cyber Resilience: <a href="https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience">https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 24 Apr 2024 18:43:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://eventcoveragepodcast.com/episodes/new-research-reveals-five-new-trends-for-cyber-resilience-a-brand-story-conversation-from-rsa-conference-2024-an-att-cybersecurity-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-cJoN_SGO</link>
      <content:encoded><![CDATA[<p>The upcoming thought leadership research set to be announced at the RSA Conference which will be presented by Theresa Lanowitz, the Head of Cybersecurity Evangelism at AT&T Cybersecurity, promises to dive into critical aspects of cyber resilience, providing actionable advice for organizations to enhance their cybersecurity strategies. AT&T Cybersecurity aims to empower businesses of all sizes to strengthen their security posture and embrace a proactive approach to cyber resilience through the insights delivered through their upcoming thought leadership report for 2024.</p><p>As organizations navigate the complex cybersecurity landscape, the focus on cyber resilience becomes paramount. The thought leadership report intends to prompt discussions within organizations, urging them to reevaluate their cybersecurity strategies and resilience efforts. By sharing insights and trends in cybersecurity, the report aims to equip businesses with the tools needed to enhance their security practices.</p><p>The interconnected nature of the supply chain, both physical and software-based, presents challenges and opportunities for businesses of all sizes. Assessing the security posture of vendors and partners is crucial in mitigating cyber threats and ensuring a robust cybersecurity framework within organizations. The thought leadership report from AT&T Cybersecurity seeks to guide organizations in fortifying their security posture and navigating the ever-evolving threat landscape effectively.</p><p>Be sure to connect with the Theresa and the rest of the AT&T Cybersecurity team during the RSA Conference. You can learn more and find them by visiting: <a href="https://itspm.ag/att-cy4nk3" target="_blank">https://itspm.ag/att-cy4nk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Head of Cybersecurity Evangelism at AT&T Cybersecurity [<a href="https://cybersecurity.att.com/newsroom/events/rsac2024?utm_content=att-cyber">@attcyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/">https://www.linkedin.com/in/theresalanowitz/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Theresa%20Lanowitz">https://www.rsaconference.com/experts/Theresa%20Lanowitz</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AT&T Cybersecurity: <a href="https://www.itspmagazine.com/directory/att-cybersecurity">https://www.itspmagazine.com/directory/att-cybersecurity</a></p><p>The Possibilities, Risks, and Rewards of Cyber Tech Convergence: <a href="https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence">https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence</a></p><p>New Research Reveals Five New Trends for Cyber Resilience: <a href="https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience">https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18443001" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5265ce60-11d9-4b26-82a3-aa34fc79d189/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5265ce60-11d9-4b26-82a3-aa34fc79d189&amp;feed=2M86zCcc"/>
      <itunes:title>New Research Reveals Five New Trends for Cyber Resilience | A Brand Story Conversation From RSA Conference 2024 | An AT&amp;T Cybersecurity Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:19:11</itunes:duration>
      <itunes:summary>Discover critical insights on enhancing cybersecurity strategies and embracing cyber resilience in the upcoming thought leadership research from AT&amp;T Cybersecurity. Join the conversation with Theresa Lanowitz on reevaluating cybersecurity approaches and fortifying security postures to navigate the complex cybersecurity landscape effectively.</itunes:summary>
      <itunes:subtitle>Discover critical insights on enhancing cybersecurity strategies and embracing cyber resilience in the upcoming thought leadership research from AT&amp;T Cybersecurity. Join the conversation with Theresa Lanowitz on reevaluating cybersecurity approaches and fortifying security postures to navigate the complex cybersecurity landscape effectively.</itunes:subtitle>
      <itunes:keywords>thought leadership, marco ciappelli, security posture, trends, complex landscape, rsa conference, critical aspects, sean martin, supply chain, vendors, cybersecurity, proactive approach, cyber resilience, insights, theresa lanowitz, robust framework, effective navigation, at&amp;t cybersecurity, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7c41513d-72fd-4d37-bb62-aea3fcb65f99</guid>
      <title>Cybersecurity&apos;s Next Legal and Policy Frontier: AI, the Software Supply Chain, Software Liability | An RSA Conference 2024 Conversation With Jim Dempsey and Jacob DePriest | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Jim Dempsey</strong>, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [<a href="https://twitter.com/FSIStanford">@FSIStanford</a>]; Lecturer, UC Berkeley Law School [<a href="https://twitter.com/BerkeleyLaw">@BerkeleyLaw</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/james-dempsey-8a10a623/" target="_blank">https://www.linkedin.com/in/james-dempsey-8a10a623/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/James%20Dempsey">https://www.rsaconference.com/experts/James%20Dempsey</a></p><p><strong>Jacob DePriest</strong>, VP, Deputy Chief Security Officer, GitHub [<a href="https://twitter.com/github">@github</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jacobdepriest/">https://www.linkedin.com/in/jacobdepriest/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Jacob%20DePriest">https://www.rsaconference.com/experts/Jacob%20DePriest</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of On Location with Sean and Marco, the hosts, Sean Martin and Marco Ciappelli, dive into the intricate world of software supply chain challenges and the dynamic interplay of AI and cybersecurity. Joining the conversation are two distinguished guests: Jim Dempsey, a lecturer at UC Berkeley Law School and Senior Policy Advisor at the Stanford program on geopolitics, technology, and governance, and Jacob DePriest, Deputy Chief Security Officer at GitHub.</p><p>The episode kicks off with a vibrant discussion on the achievements of Jim and Jacob, who have both been accepted to speak at the RSA Conference, highlighting their significant contributions to the cybersecurity field. Jim Dempsey introduces his perspective from a legal and regulatory standpoint, emphasizing the importance of understanding the legal frameworks surrounding cybersecurity and his efforts to demystify this complex landscape through his published work.</p><p>Sean Martin skillfully navigates the conversation towards the juxtaposition of AI technology within the domain of software supply chain risks, probing into the potential benefits and dangers that AI presents for both attackers and defenders. Jacob DePriest provides a nuanced view of the software supply chain, emphasizing the multifaceted components, from development and deployment to the inherent risks posed by threat actors actively seeking exploitation opportunities.</p><p>A significant portion of the episode is dedicated to exploring the notion of software liability, with Jim Dempsey offering a thought-provoking analogy of constructing an airplane mid-flight to capture the evolving nature of technology and cybersecurity. He shares insights into the current legal debates surrounding software liability and the potential for legislative action to incentivize the creation of more secure software products.</p><p>Marco Ciappelli and Sean Martin deliberate on the implications of placing accountability on developers and the broader industry to enhance cyber hygiene as a societal norm. They underscore the vital role of collaboration across various stakeholders in addressing cybersecurity challenges.</p><p>As the discussion draws to a close, the episode previews the upcoming RSA Conference talks by Jim and Jacob, promising engaging sessions on the legal and policy frontiers of cybersecurity and the evolving landscape of AI and software supply chain management. The hosts encourage listeners to engage further with these critical topics at the conference, highlighting the importance of these discussions in shaping the future of cybersecurity and technology.</p><p>Top Questions Addressed</p><ul><li>How is AI influencing the cybersecurity landscape?</li><li>What are the legal implications of software liability?</li><li>How can the software supply chain be secured against emerging cyber threats?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Cybersecurity’s Next Legal and Policy Frontier: Software Liability: <a href="https://www.rsaconference.com/usa/agenda/session/Cybersecuritys%20Next%20Legal%20and%20Policy%20Frontier%20Software%20Liability">https://www.rsaconference.com/usa/agenda/session/Cybersecuritys%20Next%20Legal%20and%20Policy%20Frontier%20Software%20Liability</a></p><p>AI, the Software Supply Chain, and Other (Not So) Puzzling Pieces: <a href="https://www.rsaconference.com/usa/agenda/session/AI%20the%20Software%20Supply%20Chain%20and%20Other%20Not%20So%20Puzzling%20Pieces">https://www.rsaconference.com/usa/agenda/session/AI%20the%20Software%20Supply%20Chain%20and%20Other%20Not%20So%20Puzzling%20Pieces</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 24 Apr 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Dempsey, Jacob DePriest)</author>
      <link>https://eventcoveragepodcast.com/episodes/cybersecuritys-next-legal-and-policy-frontier-ai-the-software-supply-chain-software-liability-an-rsa-conference-2024-conversation-with-jim-dempsey-and-jacob-depriest-on-location-coverage-with-sean-martin-and-marco-ciappelli-6tnG5603</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Jim Dempsey</strong>, Senior Policy Advisor, Stanford Program on Geopolitics, Technology and Governance [<a href="https://twitter.com/FSIStanford">@FSIStanford</a>]; Lecturer, UC Berkeley Law School [<a href="https://twitter.com/BerkeleyLaw">@BerkeleyLaw</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/james-dempsey-8a10a623/" target="_blank">https://www.linkedin.com/in/james-dempsey-8a10a623/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/James%20Dempsey">https://www.rsaconference.com/experts/James%20Dempsey</a></p><p><strong>Jacob DePriest</strong>, VP, Deputy Chief Security Officer, GitHub [<a href="https://twitter.com/github">@github</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jacobdepriest/">https://www.linkedin.com/in/jacobdepriest/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Jacob%20DePriest">https://www.rsaconference.com/experts/Jacob%20DePriest</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of On Location with Sean and Marco, the hosts, Sean Martin and Marco Ciappelli, dive into the intricate world of software supply chain challenges and the dynamic interplay of AI and cybersecurity. Joining the conversation are two distinguished guests: Jim Dempsey, a lecturer at UC Berkeley Law School and Senior Policy Advisor at the Stanford program on geopolitics, technology, and governance, and Jacob DePriest, Deputy Chief Security Officer at GitHub.</p><p>The episode kicks off with a vibrant discussion on the achievements of Jim and Jacob, who have both been accepted to speak at the RSA Conference, highlighting their significant contributions to the cybersecurity field. Jim Dempsey introduces his perspective from a legal and regulatory standpoint, emphasizing the importance of understanding the legal frameworks surrounding cybersecurity and his efforts to demystify this complex landscape through his published work.</p><p>Sean Martin skillfully navigates the conversation towards the juxtaposition of AI technology within the domain of software supply chain risks, probing into the potential benefits and dangers that AI presents for both attackers and defenders. Jacob DePriest provides a nuanced view of the software supply chain, emphasizing the multifaceted components, from development and deployment to the inherent risks posed by threat actors actively seeking exploitation opportunities.</p><p>A significant portion of the episode is dedicated to exploring the notion of software liability, with Jim Dempsey offering a thought-provoking analogy of constructing an airplane mid-flight to capture the evolving nature of technology and cybersecurity. He shares insights into the current legal debates surrounding software liability and the potential for legislative action to incentivize the creation of more secure software products.</p><p>Marco Ciappelli and Sean Martin deliberate on the implications of placing accountability on developers and the broader industry to enhance cyber hygiene as a societal norm. They underscore the vital role of collaboration across various stakeholders in addressing cybersecurity challenges.</p><p>As the discussion draws to a close, the episode previews the upcoming RSA Conference talks by Jim and Jacob, promising engaging sessions on the legal and policy frontiers of cybersecurity and the evolving landscape of AI and software supply chain management. The hosts encourage listeners to engage further with these critical topics at the conference, highlighting the importance of these discussions in shaping the future of cybersecurity and technology.</p><p>Top Questions Addressed</p><ul><li>How is AI influencing the cybersecurity landscape?</li><li>What are the legal implications of software liability?</li><li>How can the software supply chain be secured against emerging cyber threats?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Cybersecurity’s Next Legal and Policy Frontier: Software Liability: <a href="https://www.rsaconference.com/usa/agenda/session/Cybersecuritys%20Next%20Legal%20and%20Policy%20Frontier%20Software%20Liability">https://www.rsaconference.com/usa/agenda/session/Cybersecuritys%20Next%20Legal%20and%20Policy%20Frontier%20Software%20Liability</a></p><p>AI, the Software Supply Chain, and Other (Not So) Puzzling Pieces: <a href="https://www.rsaconference.com/usa/agenda/session/AI%20the%20Software%20Supply%20Chain%20and%20Other%20Not%20So%20Puzzling%20Pieces">https://www.rsaconference.com/usa/agenda/session/AI%20the%20Software%20Supply%20Chain%20and%20Other%20Not%20So%20Puzzling%20Pieces</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32073661" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/80e0b482-1acf-49f4-931f-5303ac3df088/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=80e0b482-1acf-49f4-931f-5303ac3df088&amp;feed=2M86zCcc"/>
      <itunes:title>Cybersecurity&apos;s Next Legal and Policy Frontier: AI, the Software Supply Chain, Software Liability | An RSA Conference 2024 Conversation With Jim Dempsey and Jacob DePriest | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Dempsey, Jacob DePriest</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:22</itunes:duration>
      <itunes:summary>In this engaging episode of the On Location with Sean and Marco, the group explores the evolving landscape of software supply chain security and AI&apos;s role in cybersecurity with insights from Jim Dempsey of UC Berkeley and Jacob DePriest of GitHub. Their discussion uncovers the complexities of legal frameworks, the innovative use of AI technologies in defending against cyber threats, and the critical debate on software liability, promising a deep dive into the future challenges and opportunities within cybersecurity.</itunes:summary>
      <itunes:subtitle>In this engaging episode of the On Location with Sean and Marco, the group explores the evolving landscape of software supply chain security and AI&apos;s role in cybersecurity with insights from Jim Dempsey of UC Berkeley and Jacob DePriest of GitHub. Their discussion uncovers the complexities of legal frameworks, the innovative use of AI technologies in defending against cyber threats, and the critical debate on software liability, promising a deep dive into the future challenges and opportunities within cybersecurity.</itunes:subtitle>
      <itunes:keywords>collaboration, technology, marco ciappelli, software liability, rsa conference, sean martin, rsa, adversarial attack, uc berkeley, cybersecurity, law, conference, github, jim dempsey, policy, legal framework, jacob depriest, rsac, geopolitics, on-location coverage, rsa conference 2024, podcast, jacob depriest, security, rsaconference, machine learning, jim dempsey, ai, software supply chain, cybersecurityconference</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f86dfc1b-c9e2-4e0c-b9e4-11e6b272d89f</guid>
      <title>RSA Conference 2024 Keynote: The Cybercrime Unicorns: Exploring the First and Next Decades of Corporate Ransomware | An RSA Conference 2024 Conversation With Mikko Hypponen | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Mikko Hypponen</strong>, Chief Research Officer (CRO) at WithSecure [<a href="https://twitter.com/WithSecure" target="_blank">@WithSecure</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/hypponen/" target="_blank">https://www.linkedin.com/in/hypponen/</a></p><p>On Twitter | <a href="https://twitter.com/mikko" target="_blank">https://twitter.com/mikko</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Mikko%20Hypponen">https://www.rsaconference.com/experts/Mikko%20Hypponen</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of On Location with Sean and Marco Podcast, the dynamic duo engage in an insightful conversation with Mikko Hypponen. Mikko shares his vast experience in the cybersecurity field, tracing back to the early days of malware on floppy disks in 1991. He emphasizes the importance of long-term dedication and expertise in becoming a global cybersecurity expert.</p><p>The discussion explores the evolution of cybersecurity over the past three decades, highlighting the shift towards increased security on mobile devices compared to traditional computers. Mikko elaborates on the rise of corporate ransomware and the organized crime tactics employed by ransomware gangs. He underscores the significance of branding and reputation management within cybercrime circles.</p><p>Sean and Marco inquire about the targets and methods employed by ransomware gangs, shedding light on the random and widespread nature of cyber attacks. Mikko shares insights on the vulnerability of organizations to exploits and the intricate dynamics of the ransomware ecosystem.</p><p>The episode concludes with anticipation for Mikko's keynote address at the RSA Conference, where he promises surprises and intriguing revelations. Listeners are left with a sense of excitement and anticipation for the informative and engaging session at the conference. Overall, the episode offers a deep dive into the world of cybersecurity, featuring thought-provoking discussions and expert insights from Mikko Hypponen, setting the stage for a compelling and enriching podcast experience.</p><p>Key Questions Addressed</p><ul><li>How has cybersecurity evolved over the past three decades?</li><li>What are the targets and methods employed by ransomware gangs?</li><li>What surprises can we expect in the RSA Conference keynote?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The First Decade of Corporate Ransomware: <a href="https://www.rsaconference.com/usa/agenda/session/The-First-Decade-of-Corporate-Ransomware">https://www.rsaconference.com/usa/agenda/session/The-First-Decade-of-Corporate-Ransomware</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 22 Apr 2024 18:11:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mikko Hypponen)</author>
      <link>https://eventcoveragepodcast.com/episodes/rsa-conference-2024-keynote-the-cybercrime-unicorns-exploring-the-first-and-next-decades-of-corporate-ransomware-an-rsa-conference-2024-conversation-with-mikko-hypponen-on-location-coverage-with-sean-martin-and-marco-ciappelli-uTDE7CDL</link>
      <content:encoded><![CDATA[<p><strong>Guest: Mikko Hypponen</strong>, Chief Research Officer (CRO) at WithSecure [<a href="https://twitter.com/WithSecure" target="_blank">@WithSecure</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/hypponen/" target="_blank">https://www.linkedin.com/in/hypponen/</a></p><p>On Twitter | <a href="https://twitter.com/mikko" target="_blank">https://twitter.com/mikko</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Mikko%20Hypponen">https://www.rsaconference.com/experts/Mikko%20Hypponen</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new episode of On Location with Sean and Marco Podcast, the dynamic duo engage in an insightful conversation with Mikko Hypponen. Mikko shares his vast experience in the cybersecurity field, tracing back to the early days of malware on floppy disks in 1991. He emphasizes the importance of long-term dedication and expertise in becoming a global cybersecurity expert.</p><p>The discussion explores the evolution of cybersecurity over the past three decades, highlighting the shift towards increased security on mobile devices compared to traditional computers. Mikko elaborates on the rise of corporate ransomware and the organized crime tactics employed by ransomware gangs. He underscores the significance of branding and reputation management within cybercrime circles.</p><p>Sean and Marco inquire about the targets and methods employed by ransomware gangs, shedding light on the random and widespread nature of cyber attacks. Mikko shares insights on the vulnerability of organizations to exploits and the intricate dynamics of the ransomware ecosystem.</p><p>The episode concludes with anticipation for Mikko's keynote address at the RSA Conference, where he promises surprises and intriguing revelations. Listeners are left with a sense of excitement and anticipation for the informative and engaging session at the conference. Overall, the episode offers a deep dive into the world of cybersecurity, featuring thought-provoking discussions and expert insights from Mikko Hypponen, setting the stage for a compelling and enriching podcast experience.</p><p>Key Questions Addressed</p><ul><li>How has cybersecurity evolved over the past three decades?</li><li>What are the targets and methods employed by ransomware gangs?</li><li>What surprises can we expect in the RSA Conference keynote?</li></ul><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>The First Decade of Corporate Ransomware: <a href="https://www.rsaconference.com/usa/agenda/session/The-First-Decade-of-Corporate-Ransomware">https://www.rsaconference.com/usa/agenda/session/The-First-Decade-of-Corporate-Ransomware</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23434224" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/c59ea470-a8c0-474e-97fa-d1a7577954d0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=c59ea470-a8c0-474e-97fa-d1a7577954d0&amp;feed=2M86zCcc"/>
      <itunes:title>RSA Conference 2024 Keynote: The Cybercrime Unicorns: Exploring the First and Next Decades of Corporate Ransomware | An RSA Conference 2024 Conversation With Mikko Hypponen | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mikko Hypponen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:24:23</itunes:duration>
      <itunes:summary>Explore the captivating world of cybersecurity with insights from Mikko Hypponen as he shares his expertise and journey from the early days of malware to the evolving landscape of corporate ransomware. Join hosts Sean and Marco on a new On Location episode with a promise of surprises and thought-provoking revelations at the RSA Conference.</itunes:summary>
      <itunes:subtitle>Explore the captivating world of cybersecurity with insights from Mikko Hypponen as he shares his expertise and journey from the early days of malware to the evolving landscape of corporate ransomware. Join hosts Sean and Marco on a new On Location episode with a promise of surprises and thought-provoking revelations at the RSA Conference.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, ciappelli, research, marco, sean martin, rsa, cybersecurity, conference, hypponen, sean, malware, officer, rsac, evolution, mikko, on-location coverage, rsa conference 2024, rsa conference 2024, episode, chief, martin, ransomware, podcast, rsaconference, branding, insights, cybersecurityconference, mikko hypponen</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7f12d4f1-0c4f-46b8-a24d-f2ad22fbfe8a</guid>
      <title>Unveiling the New Short Podcast Format — 7 Minutes on ITSPmagazine | On Location Podcast with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast | <a href="https://www.itspmagazine.com/marco-ciappelli" target="_blank">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>Episode Notes</strong></p><p>In a fast-paced world where time is a precious commodity, ITSPmagazine is revolutionizing the way we consume podcast content with their latest episode format - 7 Minutes on ITSPmagazine. Sean Martin and Marco Ciappelli, the dynamic duo behind this innovative concept, are here to shake things up in the podcasting arena.</p><p><strong>The Concept</strong></p><p>The premise of 7 Minutes on ITSPmagazine is simple yet brilliant. In just seven minutes, listeners are taken on a whirlwind journey through a concise and impactful brand announcement story. This short podcast format is designed for those moments when you need a quick burst of insightful content without committing to a full-length episode.</p><p><strong>Testing the Waters</strong></p><p>Sean and Marco are boldly stepping into uncharted territory by testing this new format. By asking three key questions - What are you announcing? Who is it for? What are the desired objectives or outcomes? - they delve straight into the heart of the matter, ensuring that every minute of the seven is packed with valuable information.</p><p><strong>Audio and Video Experience</strong></p><p>One of the beauty of 7 Minutes on ITSPmagazine is its versatility. Whether you prefer to listen to the audio-only version or watch the video podcast, ITSPmagazine has got you covered. The duo's investment in the video aspect elevates the podcasting experience, bringing a visual element to the storytelling.</p><p><strong>Announcing at RSA Conference</strong></p><p>Sean and Marco are gearing up for the RSA Conference, where they plan to unveil an array of exciting brand stories. From broadcast alley interviews with industry veterans like Teresa Leinovitz and Vivek Ramachandran to media room briefings with cybersecurity experts, ITSPmagazine promises a diverse lineup that will captivate audiences.</p><p><strong>Engaging the Audience</strong></p><p>The ultimate goal of 7 Minutes on ITSPmagazine is to engage and inform the audience. Through thought-provoking conversations with industry leaders, the podcast aims to shed light on the latest trends, research, and innovations in cybersecurity. By inviting listeners to participate in the journey, Sean and Marco are fostering a community of like-minded individuals eager to stay informed.</p><p><strong>Call to Action</strong></p><p>As the clock winds down on the podcast, Sean and Marco issue a compelling call to action. They invite listeners to join them at RSA Conference, either in person or virtually, to be a part of the immersive experience. By sharing updates, recaps, and exclusive insights, ITSPmagazine promises to keep the audience entertained and educated every step of the way.</p><p><strong>Conclusion</strong></p><p>In just seven minutes, Sean Martin and Marco Ciappelli have encapsulated the essence of innovation and engagement in the podcasting world. 7 Minutes on ITSPmagazine is not just a podcast; it's an experience, a community, and a journey worth embarking on. Join them on this exciting venture and discover a new way to stay connected in a rapidly evolving industry.</p><p><strong>Seven minutes. Done.</strong></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Catch all of our RSA Conference coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>View more conferences and events: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>ITSPmagazine YouTube Channel — Be sure to share and subscribe!<br />📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Subscribe to the Newsletter: <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 ">https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 </a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Catch the regular catch-up videos here: <a href="https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn" target="_blank">https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in creating custom podcasts with us, being part of a conversation, promoting your brand, or sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 19 Apr 2024 23:40:36 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine On Location, Sean Martin)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-new-short-podcast-format-7-minutes-on-itspmagazine-on-location-podcast-with-sean-martin-and-marco-ciappelli-kq_e2838</link>
      <content:encoded><![CDATA[<p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast | <a href="https://www.itspmagazine.com/marco-ciappelli" target="_blank">https://www.itspmagazine.com/marco-ciappelli</a></p><p><strong>Episode Notes</strong></p><p>In a fast-paced world where time is a precious commodity, ITSPmagazine is revolutionizing the way we consume podcast content with their latest episode format - 7 Minutes on ITSPmagazine. Sean Martin and Marco Ciappelli, the dynamic duo behind this innovative concept, are here to shake things up in the podcasting arena.</p><p><strong>The Concept</strong></p><p>The premise of 7 Minutes on ITSPmagazine is simple yet brilliant. In just seven minutes, listeners are taken on a whirlwind journey through a concise and impactful brand announcement story. This short podcast format is designed for those moments when you need a quick burst of insightful content without committing to a full-length episode.</p><p><strong>Testing the Waters</strong></p><p>Sean and Marco are boldly stepping into uncharted territory by testing this new format. By asking three key questions - What are you announcing? Who is it for? What are the desired objectives or outcomes? - they delve straight into the heart of the matter, ensuring that every minute of the seven is packed with valuable information.</p><p><strong>Audio and Video Experience</strong></p><p>One of the beauty of 7 Minutes on ITSPmagazine is its versatility. Whether you prefer to listen to the audio-only version or watch the video podcast, ITSPmagazine has got you covered. The duo's investment in the video aspect elevates the podcasting experience, bringing a visual element to the storytelling.</p><p><strong>Announcing at RSA Conference</strong></p><p>Sean and Marco are gearing up for the RSA Conference, where they plan to unveil an array of exciting brand stories. From broadcast alley interviews with industry veterans like Teresa Leinovitz and Vivek Ramachandran to media room briefings with cybersecurity experts, ITSPmagazine promises a diverse lineup that will captivate audiences.</p><p><strong>Engaging the Audience</strong></p><p>The ultimate goal of 7 Minutes on ITSPmagazine is to engage and inform the audience. Through thought-provoking conversations with industry leaders, the podcast aims to shed light on the latest trends, research, and innovations in cybersecurity. By inviting listeners to participate in the journey, Sean and Marco are fostering a community of like-minded individuals eager to stay informed.</p><p><strong>Call to Action</strong></p><p>As the clock winds down on the podcast, Sean and Marco issue a compelling call to action. They invite listeners to join them at RSA Conference, either in person or virtually, to be a part of the immersive experience. By sharing updates, recaps, and exclusive insights, ITSPmagazine promises to keep the audience entertained and educated every step of the way.</p><p><strong>Conclusion</strong></p><p>In just seven minutes, Sean Martin and Marco Ciappelli have encapsulated the essence of innovation and engagement in the podcasting world. 7 Minutes on ITSPmagazine is not just a podcast; it's an experience, a community, and a journey worth embarking on. Join them on this exciting venture and discover a new way to stay connected in a rapidly evolving industry.</p><p><strong>Seven minutes. Done.</strong></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Catch all of our RSA Conference coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>View more conferences and events: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>ITSPmagazine YouTube Channel — Be sure to share and subscribe!<br />📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Subscribe to the Newsletter: <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 ">https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 </a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Catch the regular catch-up videos here: <a href="https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn" target="_blank">https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in creating custom podcasts with us, being part of a conversation, promoting your brand, or sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6761427" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/bb2ab89c-3010-4810-b3b3-14b8c91a837a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=bb2ab89c-3010-4810-b3b3-14b8c91a837a&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the New Short Podcast Format — 7 Minutes on ITSPmagazine | On Location Podcast with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine On Location, Sean Martin</itunes:author>
      <itunes:duration>00:07:02</itunes:duration>
      <itunes:summary>The premise of 7 Minutes on ITSPmagazine is simple yet brilliant. In just seven minutes, listeners are taken on a whirlwind journey through a concise and impactful brand announcement story. This short podcast format is designed for those moments when you need a quick burst of insightful content without committing to a full-length episode.</itunes:summary>
      <itunes:subtitle>The premise of 7 Minutes on ITSPmagazine is simple yet brilliant. In just seven minutes, listeners are taken on a whirlwind journey through a concise and impactful brand announcement story. This short podcast format is designed for those moments when you need a quick burst of insightful content without committing to a full-length episode.</itunes:subtitle>
      <itunes:keywords>podcasting, technology, brand announcement, rsa conference, tech trends, short podcast, seven minutes podcast, cyber awareness, information security, podcast, video podcast, it news, itspmagazine channel, itspmagazine, industry leaders, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0f9edb1b-f12a-4de1-bf60-e5fe4c873958</guid>
      <title>The Art of Possible: Getting a Peek into the Future of Cybersecurity Innovations | An RSA Conference 2024 Conversation With Cecilia Murtagh Marinier | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guest: Cecilia Murtagh Marinier</strong>, Cybersecurity Advisor - Strategy, Innovation & Scholars at RSA Conference [<a href="https://twitter.com/rsaconference">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/">https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new On Location with Sean and Marco episode, hosts Sean Martin and Marco Ciappelli are joined by a special guest, Cecilia Murtagh Marinier, renowned for her pivotal role in overseeing innovation programs and scholar initiatives at the RSA Conference. The trio embarks on an insightful conversation, navigating through a myriad of topics central to the RSA Conference 2024 and the broader landscape of technology and security.</p><p>The discussion kicks off with a light-hearted exchange about the unpredictability of San Francisco weather and the personal tradition of acquiring new jackets during the RSA conferences. Quickly shifting gears, they delve into the anticipations surrounding the conference, reminiscing about past interactions with notable figures such as Linda, Britta, and Jessica Robinson, and emphasizing the vibrancy of aerospace village and upcoming discussions on sandbox innovation.</p><p>A significant portion of the conversation is dedicated to the College Day, the scholar program, and the sandbox innovation, spotlighting the RSA Conference's commitment to nurturing the future generation of security professionals. Cecilia eloquently outlines her role in fostering innovation across the conference, with a special focus on contests and expos aimed at spotlighting emerging talents and startups within the cybersecurity realm.</p><p>Artificial Intelligence (AI) takes center stage as the trio explores its transformative impact on security practices and the anticipation of its further integration into the RSA Conference's themes. Cecilia shares insights into the Innovation Sandbox Contest and Launchpad, highlighting the remarkable potential and diversity of participating companies.</p><p>The episode is peppered with personal anecdotes and reflections on the evolution of the cybersecurity sector, underscoring the importance of community, diversity, and innovation. Special mention is made of the diverse tracks and villages at the RSA Conference, each offering unique perspectives on security and technology's role in society.</p><p>As the conversation winds down, excitement builds for the RSA Conference 2024, with encouraging calls for participation and engagement. The hosts reflect on the importance of community and innovation, urging listeners to stay tuned for what promises to be an extraordinary event.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 11 Apr 2024 03:26:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Cecilia Murtagh Marinier)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-art-of-possible-getting-a-peek-into-the-future-of-cybersecurity-innovations-an-rsa-conference-2024-conversation-with-cecilia-murtagh-marinier-on-location-coverage-with-sean-martin-and-marco-ciappelli-mTwDgjIS</link>
      <content:encoded><![CDATA[<p><strong>Guest: Cecilia Murtagh Marinier</strong>, Cybersecurity Advisor - Strategy, Innovation & Scholars at RSA Conference [<a href="https://twitter.com/rsaconference">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/">https://www.linkedin.com/in/cecilia-murtagh-marinier-14967/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this new On Location with Sean and Marco episode, hosts Sean Martin and Marco Ciappelli are joined by a special guest, Cecilia Murtagh Marinier, renowned for her pivotal role in overseeing innovation programs and scholar initiatives at the RSA Conference. The trio embarks on an insightful conversation, navigating through a myriad of topics central to the RSA Conference 2024 and the broader landscape of technology and security.</p><p>The discussion kicks off with a light-hearted exchange about the unpredictability of San Francisco weather and the personal tradition of acquiring new jackets during the RSA conferences. Quickly shifting gears, they delve into the anticipations surrounding the conference, reminiscing about past interactions with notable figures such as Linda, Britta, and Jessica Robinson, and emphasizing the vibrancy of aerospace village and upcoming discussions on sandbox innovation.</p><p>A significant portion of the conversation is dedicated to the College Day, the scholar program, and the sandbox innovation, spotlighting the RSA Conference's commitment to nurturing the future generation of security professionals. Cecilia eloquently outlines her role in fostering innovation across the conference, with a special focus on contests and expos aimed at spotlighting emerging talents and startups within the cybersecurity realm.</p><p>Artificial Intelligence (AI) takes center stage as the trio explores its transformative impact on security practices and the anticipation of its further integration into the RSA Conference's themes. Cecilia shares insights into the Innovation Sandbox Contest and Launchpad, highlighting the remarkable potential and diversity of participating companies.</p><p>The episode is peppered with personal anecdotes and reflections on the evolution of the cybersecurity sector, underscoring the importance of community, diversity, and innovation. Special mention is made of the diverse tracks and villages at the RSA Conference, each offering unique perspectives on security and technology's role in society.</p><p>As the conversation winds down, excitement builds for the RSA Conference 2024, with encouraging calls for participation and engagement. The hosts reflect on the importance of community and innovation, urging listeners to stay tuned for what promises to be an extraordinary event.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31070000" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/de65ec7c-8b87-445a-9a6f-c0102559b918/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=de65ec7c-8b87-445a-9a6f-c0102559b918&amp;feed=2M86zCcc"/>
      <itunes:title>The Art of Possible: Getting a Peek into the Future of Cybersecurity Innovations | An RSA Conference 2024 Conversation With Cecilia Murtagh Marinier | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Cecilia Murtagh Marinier</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:19</itunes:duration>
      <itunes:summary>Sean Martin, Marco Ciappelli, and Cecilia Murtagh Marinier embark on a journey through the evolving landscape of technology and security, highlighting innovative programs and the transformative impact of AI at the RSA Conference 2024. Listen in for insightful discussions, personal anecdotes, and a glimpse into the future of cybersecurity that promises to engage and inspire listeners.</itunes:summary>
      <itunes:subtitle>Sean Martin, Marco Ciappelli, and Cecilia Murtagh Marinier embark on a journey through the evolving landscape of technology and security, highlighting innovative programs and the transformative impact of AI at the RSA Conference 2024. Listen in for insightful discussions, personal anecdotes, and a glimpse into the future of cybersecurity that promises to engage and inspire listeners.</itunes:subtitle>
      <itunes:keywords>cecilia murtagh marinier, technology, marco ciappelli, innovation sandbox, artificial intelligence, sean martin, cyber warriors, contests, cybersecurity, cyber ops, generative ai, innovation, rsac, on-location coverage, rsa conference 2024, rsa conference 2024, startups, security, rsaconference, scholars, ai, community, cybersecurityconference, san francisco, launchpad</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b7c3b2a0-3e47-49d4-92e7-9e0191ebc93c</guid>
      <title>Confused Learning: Supply Chain Attacks through Machine Learning Models | A Conversation With Adrian Wood and Mary Walker | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Mary Walker</strong>, Security Engineer, Dropbox [<a href="https://twitter.com/Dropbox">@Dropbox</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marywalkerdfir/">https://www.linkedin.com/in/marywalkerdfir/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392</a></p><p><strong>Adrian Wood</strong>, Security Engineer, Dropbox [<a href="https://twitter.com/Dropbox">@Dropbox</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adrian-wood-threlfall/">https://www.linkedin.com/in/adrian-wood-threlfall/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>On this episode of On Location with Sean and Marco, Sean Martin hosts the show solo, discussing supply chain attacks through machine learning models with guests Mary Walker and Adrian Wood. Mary and Adrian, both security engineers at Dropbox, share insights on their journey in cybersecurity and research on exploiting machine learning models. They delve into the implications of machine learning models being used as software programs containing malware and the risks associated with model repositories.</p><p>The conversation explores the ease of poisoning machine learning models and the importance of understanding the provenance of models for risk mitigation. Mary and Adrian emphasize the need for enhanced detection mechanisms for shadow AI and proactive measures for securing model repositories. Additionally, they discuss the impact of AI standardization and the legal implications surrounding AI development.</p><p>The episode concludes with a call to action for listeners to engage in discussions on supply chain attacks, join Mary and Adrian for their talk at Black Hat Asia, participate in Q&A sessions, and contribute to the open-source tools developed by the guests.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Confused Learning: Supply Chain Attacks through Machine Learning Models: <a href="https://www.blackhat.com/asia-24/briefings/schedule/#confused-learning-supply-chain-attacks-through-machine-learning-models-37794" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/#confused-learning-supply-chain-attacks-through-machine-learning-models-37794</a></p><p>Offensive Machine Learning Playbooks: <a href="https://wiki.offsecml.com/" target="_blank">https://wiki.offsecml.com</a></p><p>Blog describing the attack killchain for bug bounty: <a href="https://5stars217.github.io/" target="_blank">https://5stars217.github.io</a></p><p>Learn more about Black Hat Asia 2024: <a href="https://www.blackhat.com/asia-24/">https://www.blackhat.com/asia-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 9 Apr 2024 18:41:21 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Walker, Adrian Wood)</author>
      <link>https://eventcoveragepodcast.com/episodes/confused-learning-supply-chain-attacks-through-machine-learning-models-a-conversation-with-adrian-wood-and-mary-walker-on-location-coverage-with-sean-martin-and-marco-ciappelli-DngVAAlV</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Mary Walker</strong>, Security Engineer, Dropbox [<a href="https://twitter.com/Dropbox">@Dropbox</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marywalkerdfir/">https://www.linkedin.com/in/marywalkerdfir/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#mary-walker-47392</a></p><p><strong>Adrian Wood</strong>, Security Engineer, Dropbox [<a href="https://twitter.com/Dropbox">@Dropbox</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/adrian-wood-threlfall/">https://www.linkedin.com/in/adrian-wood-threlfall/</a></p><p>At Black Hat | <a href="https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/speakers.html#adrian-wood-39398</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>On this episode of On Location with Sean and Marco, Sean Martin hosts the show solo, discussing supply chain attacks through machine learning models with guests Mary Walker and Adrian Wood. Mary and Adrian, both security engineers at Dropbox, share insights on their journey in cybersecurity and research on exploiting machine learning models. They delve into the implications of machine learning models being used as software programs containing malware and the risks associated with model repositories.</p><p>The conversation explores the ease of poisoning machine learning models and the importance of understanding the provenance of models for risk mitigation. Mary and Adrian emphasize the need for enhanced detection mechanisms for shadow AI and proactive measures for securing model repositories. Additionally, they discuss the impact of AI standardization and the legal implications surrounding AI development.</p><p>The episode concludes with a call to action for listeners to engage in discussions on supply chain attacks, join Mary and Adrian for their talk at Black Hat Asia, participate in Q&A sessions, and contribute to the open-source tools developed by the guests.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--">https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Confused Learning: Supply Chain Attacks through Machine Learning Models: <a href="https://www.blackhat.com/asia-24/briefings/schedule/#confused-learning-supply-chain-attacks-through-machine-learning-models-37794" target="_blank">https://www.blackhat.com/asia-24/briefings/schedule/#confused-learning-supply-chain-attacks-through-machine-learning-models-37794</a></p><p>Offensive Machine Learning Playbooks: <a href="https://wiki.offsecml.com/" target="_blank">https://wiki.offsecml.com</a></p><p>Blog describing the attack killchain for bug bounty: <a href="https://5stars217.github.io/" target="_blank">https://5stars217.github.io</a></p><p>Learn more about Black Hat Asia 2024: <a href="https://www.blackhat.com/asia-24/">https://www.blackhat.com/asia-24/</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27150635" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/5452ef16-7bcd-41f0-976b-94bde1ceceab/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=5452ef16-7bcd-41f0-976b-94bde1ceceab&amp;feed=2M86zCcc"/>
      <itunes:title>Confused Learning: Supply Chain Attacks through Machine Learning Models | A Conversation With Adrian Wood and Mary Walker | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Walker, Adrian Wood</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/1067899a-8e07-4937-a965-40e068610c27/3000x3000/black-hat-asia-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:28:15</itunes:duration>
      <itunes:summary>Join Sean Martin as he explores the world of supply chain attacks through machine learning models with security engineers Mary Walker and Adrian Wood from Dropbox. Discover the hidden risks of using machine learning models as software programs and the proactive steps needed to safeguard against shadow AI threats.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he explores the world of supply chain attacks through machine learning models with security engineers Mary Walker and Adrian Wood from Dropbox. Discover the hidden risks of using machine learning models as software programs and the proactive steps needed to safeguard against shadow AI threats.</itunes:subtitle>
      <itunes:keywords>black hat asia, confused learning, mary walker, marco, black hat, sean martin, supply chain attacks, malware analysis, offensive machine learning, digital forensics, cybersecurity, application security, adversary simulation, redefining cybersecurity, blackhat, adrian wood, black hat asia, on-location coverage, shadow ml, cyber security, black hat asia 2024, machine learning, adrian wood, shadow ai, ai, mary walker, red team, adversary emulation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f9948d8-f7ef-47a5-8f9d-9825367b5835</guid>
      <title>ITSPmagazine Podcasts Catch-Up | Thinking About and Looking Forward to all the Engaging Conversations That Will Happen at RSA Conference 2024 | On Location Podcast with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>Episode Notes</strong></p><p>In a dynamic and engaging episode of the On Location Podcast, hosts Sean Martin and Marco Ciappelli take listeners on a captivating journey through their on-location plans leading up to the RSA Conference 2024. The duo's insightful conversations shed light on the diverse topics and vibrant energy surrounding one of the most anticipated cybersecurity events of the year.</p><p>The podcast kicks off with Sean and Marco bantering about app functionalities and the picturesque backdrop of Mount Fuji (no is not!). Their camaraderie and playful exchange set the tone for a series of discussions that seamlessly blend tech-talk with personal anecdotes, offering listeners a glimpse into the human side of the cybersecurity community and their coverages around the world.</p><p>As the hosts dive into the preparations for the RSA Conference, they provide a behind-the-scenes look at the meticulous planning and excitement building up to the event. From testing out equipment to reminiscing about past experiences, Sean and Marco offer valuable insights into the multifaceted nature of cybersecurity conferences.</p><p>The conversation evolves to highlight the theme of innovation and the intersection of art and technology within the cybersecurity landscape. Through engaging dialogues with industry futurists and thought leaders, Sean and Marco emphasize the significance of embracing emerging technologies like AI while pondering the ethical implications that accompany such advancements.</p><p>Amidst the buzz of the upcoming conference, Sean and Marco extend a heartfelt call to action to their audience, inviting them to actively participate in shaping the podcast's future content. Emphasizing the importance of community engagement and diverse perspectives, the hosts encourage listeners to contribute their ideas and suggestions for future episodes, showcasing the inclusive spirit that drives the On Location Podcast.</p><p>As the podcast draws to a close, Sean and Marco exude a palpable sense of anticipation for the RSA Conference 2024. Their infectious enthusiasm, coupled with a commitment to fostering engaging conversations and connections within the cybersecurity community, sets the stage for an immersive and insightful event experience.</p><p>This On Location Podcast episode featuring Sean Martin and Marco Ciappelli offers a compelling blend of candid conversations, insightful reflections, and a heartfelt call to action for audience engagement. As the hosts gear up for the RSA Conference 2024, listeners are in for a dynamic and enriching podcast experience that showcases the vibrancy and diversity of the cybersecurity landscape.</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Catch all of our RSA Conference coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>View more conferences and events: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>ITSPmagazine YouTube Channel — Be sure to share and subscribe!<br />📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Subscribe to the Newsletter: <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 ">https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 </a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Catch the regular catch-up videos here: <a href="https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn" target="_blank">https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in creating custom podcasts with us, being part of a conversation, promoting your brand, or sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 7 Apr 2024 18:00:23 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, Sean Martin, ITSPmagazine On Location)</author>
      <link>https://eventcoveragepodcast.com/episodes/itspmagazine-podcasts-catch-up-thinking-about-and-looking-forward-to-all-the-engaging-conversations-that-will-happen-at-rsa-conference-2024-on-location-podcast-with-sean-martin-and-marco-ciappelli-rdK8K8Ld</link>
      <content:encoded><![CDATA[<p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>] | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>Episode Notes</strong></p><p>In a dynamic and engaging episode of the On Location Podcast, hosts Sean Martin and Marco Ciappelli take listeners on a captivating journey through their on-location plans leading up to the RSA Conference 2024. The duo's insightful conversations shed light on the diverse topics and vibrant energy surrounding one of the most anticipated cybersecurity events of the year.</p><p>The podcast kicks off with Sean and Marco bantering about app functionalities and the picturesque backdrop of Mount Fuji (no is not!). Their camaraderie and playful exchange set the tone for a series of discussions that seamlessly blend tech-talk with personal anecdotes, offering listeners a glimpse into the human side of the cybersecurity community and their coverages around the world.</p><p>As the hosts dive into the preparations for the RSA Conference, they provide a behind-the-scenes look at the meticulous planning and excitement building up to the event. From testing out equipment to reminiscing about past experiences, Sean and Marco offer valuable insights into the multifaceted nature of cybersecurity conferences.</p><p>The conversation evolves to highlight the theme of innovation and the intersection of art and technology within the cybersecurity landscape. Through engaging dialogues with industry futurists and thought leaders, Sean and Marco emphasize the significance of embracing emerging technologies like AI while pondering the ethical implications that accompany such advancements.</p><p>Amidst the buzz of the upcoming conference, Sean and Marco extend a heartfelt call to action to their audience, inviting them to actively participate in shaping the podcast's future content. Emphasizing the importance of community engagement and diverse perspectives, the hosts encourage listeners to contribute their ideas and suggestions for future episodes, showcasing the inclusive spirit that drives the On Location Podcast.</p><p>As the podcast draws to a close, Sean and Marco exude a palpable sense of anticipation for the RSA Conference 2024. Their infectious enthusiasm, coupled with a commitment to fostering engaging conversations and connections within the cybersecurity community, sets the stage for an immersive and insightful event experience.</p><p>This On Location Podcast episode featuring Sean Martin and Marco Ciappelli offers a compelling blend of candid conversations, insightful reflections, and a heartfelt call to action for audience engagement. As the hosts gear up for the RSA Conference 2024, listeners are in for a dynamic and enriching podcast experience that showcases the vibrancy and diversity of the cybersecurity landscape.</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Catch all of our RSA Conference coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>View more conferences and events: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>ITSPmagazine YouTube Channel — Be sure to share and subscribe!<br />📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Subscribe to the Newsletter: <a href="https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 ">https://www.linkedin.com/build-relation/newsletter-follow?entityUrn=7109347022809309184 </a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Catch the regular catch-up videos here: <a href="https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn" target="_blank">https://youtube.com/playlist?list=PLnYu0psdcllQGJIyWHoPPDigW-B0ANjhn</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a></p><p>Are you interested in creating custom podcasts with us, being part of a conversation, promoting your brand, or sponsoring an ITSPmagazine Channel?</p><p>👉 <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16913811" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/8a6dbb55-b752-469b-838c-9c88ece03be5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=8a6dbb55-b752-469b-838c-9c88ece03be5&amp;feed=2M86zCcc"/>
      <itunes:title>ITSPmagazine Podcasts Catch-Up | Thinking About and Looking Forward to all the Engaging Conversations That Will Happen at RSA Conference 2024 | On Location Podcast with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>Marco Ciappelli, Sean Martin, ITSPmagazine On Location</itunes:author>
      <itunes:duration>00:17:35</itunes:duration>
      <itunes:summary>Explore the dynamic world of cybersecurity and industry insights with Sean Martin and Marco Ciappelli in this engaging podcast episode leading up to the RSA Conference 2024.</itunes:summary>
      <itunes:subtitle>Explore the dynamic world of cybersecurity and industry insights with Sean Martin and Marco Ciappelli in this engaging podcast episode leading up to the RSA Conference 2024.</itunes:subtitle>
      <itunes:keywords>cybersecurity events, thought leadership, conversation series, cybersecurity, community engagement, industry experts, innovation, interactive podcast, ethical implications, podcast episode, event coverage, rsa conference 2024, cybersecurity community, industry insights, future trends, ai in cybersecurity, digital transformation, technology fusion, tech talk, on-location experience</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">55677c9c-cc15-4714-80e6-bff0dedcdfd8</guid>
      <title>Embracing Technology Safely: A Look into Consilio&apos;s Role in Legal Cybersecurity | A Brand Story Conversation from LegalWeek 2024 | A Consilio Story with James Jansen</title>
      <description><![CDATA[<p><strong>Guest: James Jansen</strong>, Vice President & Global Head - Cyber Response Solutions at Consilio [<a href="https://twitter.com/ConsilioGlobal" target="_blank">@ConsilioGlobal</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/james-jansen-076a0214/" target="_blank">https://www.linkedin.com/in/james-jansen-076a0214/</a></p><p>In the latest episode of Brand Stories, Sean Martin and Marco Ciappelli host James Jansen, Vice President & Global Head of Cyber Response Solutions at Consilio as he sheds light on the critical intersection of technology and cybersecurity in the legal space. The conversation dives deep into the challenges and opportunities that arise when embracing technology while maintaining a keen focus on cybersecurity and risk management.</p><p>The Importance of a Technology-Forward Approach: Consilio has always been at the forefront of embracing technology to drive efficiencies in legal workflows. With a forward-leaning attitude towards legal technology services, Consilio understands the significance of technology in assisting clients with various legal processes. From conceptual analytics to technology-assisted reviews, it has consistently leaned into new technologies with a blend of curiosity and skepticism, ensuring that they are utilized in the right way for their clients.</p><p>Navigating the Landscape of AI in Legal Processes: As technology evolves, Consilio continues to vet new technologies and adopt innovative solutions to enhance their services. Particularly noteworthy is the adoption of generative AI, which presents both opportunities and challenges. Jansen emphasizes the importance of having humans at the wheel, underscoring the critical role of human oversight in leveraging technology effectively.</p><p>Fostering a Culture of Cybersecurity: The dialogue highlights the need for a cultural shift within organizations towards cybersecurity. Every business is a potential target for cyber attacks, emphasizing the importance of developing a cybersecurity-conscious culture. By empowering employees to recognize and address cybersecurity threats, organizations can bolster their defenses and mitigate risks effectively.</p><p>Enabling Legal Teams to Embrace Technology Safely: Consilio's role in helping legal teams navigate the complexities of technology integration is paramount. By offering insights, resources, and expertise, they assist organizations in managing legal processes, protecting data, and handling incidents with precision. Their commitment to connecting the human element with technological advancements ensures a balanced approach that prioritizes both innovation and security.</p><p>Consilio stands out as a trusted partner for legal teams seeking to leverage technology safely and effectively. By emphasizing the importance of human oversight, fostering a culture of cybersecurity, and embracing innovative solutions like generative AI, it is possible to lead with a strategic approach to navigating the intersection of technology and legal cybersecurity.</p><p>By adopting a technology-forward approach and prioritizing cybersecurity, Consilio is paving the way for legal teams to navigate the digital age with confidence and resilience.</p><p>To learn more about Consilio and how they can assist your organization in embracing technology safely in the legal space, visit their website at <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a> or reach out to their team for personalized insights and solutions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/brand-story" target="_blank"><i>Learn more: </i>https://www.itspmagazine.com/brand-story</a></p><p><strong>Resources</strong><br />Learn more about Consilio and their offering: <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a></p><p>Hear more stories from the Consilio team on their directory page: <a href="https://www.itspmagazine.com/directory/consilio" target="_blank">https://www.itspmagazine.com/directory/consilio</a></p><p>Are you interested in telling your Brand Story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 5 Apr 2024 02:48:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, James Jansen)</author>
      <link>https://eventcoveragepodcast.com/episodes/embracing-technology-safely-a-look-into-consilios-role-in-legal-cybersecurity-a-brand-story-conversation-from-legalweek-2024-a-consilio-story-with-james-jansen-VUn7oTZv</link>
      <content:encoded><![CDATA[<p><strong>Guest: James Jansen</strong>, Vice President & Global Head - Cyber Response Solutions at Consilio [<a href="https://twitter.com/ConsilioGlobal" target="_blank">@ConsilioGlobal</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/james-jansen-076a0214/" target="_blank">https://www.linkedin.com/in/james-jansen-076a0214/</a></p><p>In the latest episode of Brand Stories, Sean Martin and Marco Ciappelli host James Jansen, Vice President & Global Head of Cyber Response Solutions at Consilio as he sheds light on the critical intersection of technology and cybersecurity in the legal space. The conversation dives deep into the challenges and opportunities that arise when embracing technology while maintaining a keen focus on cybersecurity and risk management.</p><p>The Importance of a Technology-Forward Approach: Consilio has always been at the forefront of embracing technology to drive efficiencies in legal workflows. With a forward-leaning attitude towards legal technology services, Consilio understands the significance of technology in assisting clients with various legal processes. From conceptual analytics to technology-assisted reviews, it has consistently leaned into new technologies with a blend of curiosity and skepticism, ensuring that they are utilized in the right way for their clients.</p><p>Navigating the Landscape of AI in Legal Processes: As technology evolves, Consilio continues to vet new technologies and adopt innovative solutions to enhance their services. Particularly noteworthy is the adoption of generative AI, which presents both opportunities and challenges. Jansen emphasizes the importance of having humans at the wheel, underscoring the critical role of human oversight in leveraging technology effectively.</p><p>Fostering a Culture of Cybersecurity: The dialogue highlights the need for a cultural shift within organizations towards cybersecurity. Every business is a potential target for cyber attacks, emphasizing the importance of developing a cybersecurity-conscious culture. By empowering employees to recognize and address cybersecurity threats, organizations can bolster their defenses and mitigate risks effectively.</p><p>Enabling Legal Teams to Embrace Technology Safely: Consilio's role in helping legal teams navigate the complexities of technology integration is paramount. By offering insights, resources, and expertise, they assist organizations in managing legal processes, protecting data, and handling incidents with precision. Their commitment to connecting the human element with technological advancements ensures a balanced approach that prioritizes both innovation and security.</p><p>Consilio stands out as a trusted partner for legal teams seeking to leverage technology safely and effectively. By emphasizing the importance of human oversight, fostering a culture of cybersecurity, and embracing innovative solutions like generative AI, it is possible to lead with a strategic approach to navigating the intersection of technology and legal cybersecurity.</p><p>By adopting a technology-forward approach and prioritizing cybersecurity, Consilio is paving the way for legal teams to navigate the digital age with confidence and resilience.</p><p>To learn more about Consilio and how they can assist your organization in embracing technology safely in the legal space, visit their website at <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a> or reach out to their team for personalized insights and solutions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/brand-story" target="_blank"><i>Learn more: </i>https://www.itspmagazine.com/brand-story</a></p><p><strong>Resources</strong><br />Learn more about Consilio and their offering: <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a></p><p>Hear more stories from the Consilio team on their directory page: <a href="https://www.itspmagazine.com/directory/consilio" target="_blank">https://www.itspmagazine.com/directory/consilio</a></p><p>Are you interested in telling your Brand Story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29733279" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/2970b0d1-7943-486a-9707-1dcac30221bf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=2970b0d1-7943-486a-9707-1dcac30221bf&amp;feed=2M86zCcc"/>
      <itunes:title>Embracing Technology Safely: A Look into Consilio&apos;s Role in Legal Cybersecurity | A Brand Story Conversation from LegalWeek 2024 | A Consilio Story with James Jansen</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, James Jansen</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/864f79ea-3930-4e59-9ec6-5845a67a2310/3000x3000/brand-stories-on-itspmagazine-podcast-cover-3500.jpg?aid=rss_feed"/>
      <itunes:duration>00:30:56</itunes:duration>
      <itunes:summary>Join us for an insightful episode of a new Brand Story to explore how Consilio is revolutionizing legal cybersecurity with a tech-forward approach.</itunes:summary>
      <itunes:subtitle>Join us for an insightful episode of a new Brand Story to explore how Consilio is revolutionizing legal cybersecurity with a tech-forward approach.</itunes:subtitle>
      <itunes:keywords>cyber incident response, ediscovery, cybersecurity solutions, human oversight, embracing technology safely, legal data breaches, risk management, generative ai, legal culture, legal technology services, data protection, cybersecurity challenges, ai in legal, technology in law, legal cybersecurity, technology adoption, legal tech, privacy regulations, legal operations, cybersecurity culture, consilio</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">dab3bd55-af6c-4ea1-b9ee-b31a60f846d3</guid>
      <title>Exploring the Excitement of Aerospace Village at RSA Conference 2024 | A Conversation With Henry Danielson and Liz Wharton | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Henry Danielson</strong>, Volunteer at AeroSpace Village [<a href="https://twitter.com/SecureAerospace">@SecureAerospace</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/henry-danielson-43a61213/">https://www.linkedin.com/in/henry-danielson-43a61213/</a></p><p>On Twitter | <a href="https://twitter.com/hdanielson">https://twitter.com/hdanielson</a></p><p><strong>Liz Wharton</strong>, Founder, Silver Key Strategies [<a href="https://www.twitter.com/silverkeystrat">@silverkeystrat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/elizabeth-wharton/" target="_blank">https://www.linkedin.com/in/elizabeth-wharton/</a></p><p>On Mastodon | <a href="https://infosec.exchange/@LawyerLiz" target="_blank">https://infosec.exchange/@LawyerLiz</a></p><p>On Twitter | <a href="https://twitter.com/LawyerLiz" target="_blank">https://twitter.com/LawyerLiz</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The Aerospace Village at the RSA Conference 2024 is gearing up to be an event filled with innovation, collaboration, and excitement. In a recent episode of "Chats on the Road to RSA Conference 2024" with Sean Martin and Marco Ciappelli, the hosts digs into the details of what attendees can expect at the Aerospace Village. Let's take a closer look at the insights shared during this engaging discussion.</p><p><strong>Unveiling the Aerospace Village Experience:</strong></p><p>The podcast episode kicks off with Marco Ciappelli welcoming listeners to the conversation alongside guests Henry Danielson and Liz Wharton. The trio's palpable enthusiasm sets the stage for a deep dive into the diverse offerings of the Aerospace Village at RSA Conference 2024.</p><p><strong>Innovative Initiatives and Collaborations:</strong></p><p>Henry Danielson shares exclusive details about the Aerospace Village's collaboration with BuddhaBot to introduce a unique badge experience focused on constellations. The hands-on challenges and engaging activities promise an immersive experience for attendees, emphasizing learning through interactive participation.</p><p><strong>Exciting Activities and Exhibits:</strong></p><p>The conversation unfolds with discussions on Pentest partners' flight simulator and the AMSAT project, showcasing opportunities for visitors to explore CubeSat technology and ground control stations. The Space Grand Challenge, aimed at educating young minds in the cybersecurity realm, further highlights the village's commitment to fostering innovation and knowledge sharing.</p><p><strong>Insightful Industry Conversations:</strong></p><p>Liz Wharton sheds light on the importance of vulnerability disclosures in the aerospace industry and emphasizes the significance of building robust security practices collaboratively. The dialogue underscores the village's role in fostering critical conversations around cybersecurity, aviation, and space exploration.</p><p><strong>Community Engagement and Visionary Leadership:</strong></p><p>Hosts and Guests express their excitement for the upcoming RSA Conference and encourage attendees to join the vibrant community at the Aerospace Village. From showcasing cutting-edge technologies to facilitating thought-provoking discussions, the village promises to be a hub of inspiration and knowledge exchange.</p><p>As the episode concludes, the hosts extend a warm invitation to all enthusiasts, innovators, and industry professionals to participate in the vibrant experience awaiting them at the Aerospace Village during RSA Conference 2024. The blend of education, engagement, and collaboration sets the stage for an unforgettable event that promises to shape the future of aerospace and cybersecurity industries.</p><p>Stay tuned for more updates and insights as we venture into the dynamic world of Aerospace Village at RSA Conference 2024!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Cal Poly Space Grand Challenge: <a href="https://cci.calpoly.edu/empower/space-grand-challenge-program" target="_blank">https://cci.calpoly.edu/empower/space-grand-challenge-program</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 4 Apr 2024 19:43:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Henry Danielson, Liz Wharton)</author>
      <link>https://eventcoveragepodcast.com/episodes/exploring-the-excitement-of-aerospace-village-at-rsa-conference-2024-a-conversation-with-henry-danielson-and-liz-wharton-on-location-coverage-with-sean-martin-and-marco-ciappelli-BX6OD14u</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Henry Danielson</strong>, Volunteer at AeroSpace Village [<a href="https://twitter.com/SecureAerospace">@SecureAerospace</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/henry-danielson-43a61213/">https://www.linkedin.com/in/henry-danielson-43a61213/</a></p><p>On Twitter | <a href="https://twitter.com/hdanielson">https://twitter.com/hdanielson</a></p><p><strong>Liz Wharton</strong>, Founder, Silver Key Strategies [<a href="https://www.twitter.com/silverkeystrat">@silverkeystrat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/elizabeth-wharton/" target="_blank">https://www.linkedin.com/in/elizabeth-wharton/</a></p><p>On Mastodon | <a href="https://infosec.exchange/@LawyerLiz" target="_blank">https://infosec.exchange/@LawyerLiz</a></p><p>On Twitter | <a href="https://twitter.com/LawyerLiz" target="_blank">https://twitter.com/LawyerLiz</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The Aerospace Village at the RSA Conference 2024 is gearing up to be an event filled with innovation, collaboration, and excitement. In a recent episode of "Chats on the Road to RSA Conference 2024" with Sean Martin and Marco Ciappelli, the hosts digs into the details of what attendees can expect at the Aerospace Village. Let's take a closer look at the insights shared during this engaging discussion.</p><p><strong>Unveiling the Aerospace Village Experience:</strong></p><p>The podcast episode kicks off with Marco Ciappelli welcoming listeners to the conversation alongside guests Henry Danielson and Liz Wharton. The trio's palpable enthusiasm sets the stage for a deep dive into the diverse offerings of the Aerospace Village at RSA Conference 2024.</p><p><strong>Innovative Initiatives and Collaborations:</strong></p><p>Henry Danielson shares exclusive details about the Aerospace Village's collaboration with BuddhaBot to introduce a unique badge experience focused on constellations. The hands-on challenges and engaging activities promise an immersive experience for attendees, emphasizing learning through interactive participation.</p><p><strong>Exciting Activities and Exhibits:</strong></p><p>The conversation unfolds with discussions on Pentest partners' flight simulator and the AMSAT project, showcasing opportunities for visitors to explore CubeSat technology and ground control stations. The Space Grand Challenge, aimed at educating young minds in the cybersecurity realm, further highlights the village's commitment to fostering innovation and knowledge sharing.</p><p><strong>Insightful Industry Conversations:</strong></p><p>Liz Wharton sheds light on the importance of vulnerability disclosures in the aerospace industry and emphasizes the significance of building robust security practices collaboratively. The dialogue underscores the village's role in fostering critical conversations around cybersecurity, aviation, and space exploration.</p><p><strong>Community Engagement and Visionary Leadership:</strong></p><p>Hosts and Guests express their excitement for the upcoming RSA Conference and encourage attendees to join the vibrant community at the Aerospace Village. From showcasing cutting-edge technologies to facilitating thought-provoking discussions, the village promises to be a hub of inspiration and knowledge exchange.</p><p>As the episode concludes, the hosts extend a warm invitation to all enthusiasts, innovators, and industry professionals to participate in the vibrant experience awaiting them at the Aerospace Village during RSA Conference 2024. The blend of education, engagement, and collaboration sets the stage for an unforgettable event that promises to shape the future of aerospace and cybersecurity industries.</p><p>Stay tuned for more updates and insights as we venture into the dynamic world of Aerospace Village at RSA Conference 2024!</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Cal Poly Space Grand Challenge: <a href="https://cci.calpoly.edu/empower/space-grand-challenge-program" target="_blank">https://cci.calpoly.edu/empower/space-grand-challenge-program</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24086114" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/cc4d4243-276d-480a-86b4-522d0834da96/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=cc4d4243-276d-480a-86b4-522d0834da96&amp;feed=2M86zCcc"/>
      <itunes:title>Exploring the Excitement of Aerospace Village at RSA Conference 2024 | A Conversation With Henry Danielson and Liz Wharton | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Henry Danielson, Liz Wharton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:25:03</itunes:duration>
      <itunes:summary>Unveiling the Thrilling Aerospace Village Experience at RSA Conference 2024.</itunes:summary>
      <itunes:subtitle>Unveiling the Thrilling Aerospace Village Experience at RSA Conference 2024.</itunes:subtitle>
      <itunes:keywords>aerospace village exhibits, liz wharton, constellations badge, technology, visionary leadership, aerospace village activities, rsa sandbox, aerospace industry, vulnerability disclosures, cybersecurity, community engagement, innovation, space exploration, cybersecurity education, amsat project, rsac, space grand challenge, on-location coverage, rsa conference 2024, rsa conference 2024, henry danielson, rsaconference, flight simulator, aerospace village, cybersecurityconference, industry conversations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">89762329-e4a8-40a6-bef5-23c9c58a674b</guid>
      <title>Now You’re in Role: The Fearless CISO | A Conversation With Jessica Robinson | A Deep Dive into RSA Conference 2024 | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Guests: Jessica Robinson</strong>, Executive Officer of PurePoint International [<a href="https://purepoint-international.com/">@PurIntl</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/">https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/jessica-robinson">https://www.rsaconference.com/experts/jessica-robinson</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The RSA Conference 2024 is just around the corner, and our hosts Sean Martin and Marco Ciappelli are gearing up for an insightful and engaging on-location coverage of the event. In this second Chat On The Road to RSA Conference 2024 conversation with cybersecurity expert Jessica Robinson, we got a sneak peek into what to expect from this year's talk she will give during the event.</p><p><strong>Now You’re in Role: The Fearless CISO</strong></p><p>As a follow up to the talk last year at RSAC, attendees will learn the top three skills for success for any first time CISOs to advance and grow their cybersecurity program. This talk will be a discussion on what is most important as we start to really think about what is required for success in the CISO role as it directly relates to the success of the cybersecurity program.</p><p>The stage is set for an enriching dialogue on the nuances of the CISO role, cybersecurity programs, and the evolving landscape of cyber threats. Jessica Robinson, with her wealth of experience and fearless approach to cybersecurity leadership, promises to dive deep into the art of making possibilities a reality in the realm of cybersecurity.</p><p><strong>Embracing Fear to Unlock Potential</strong></p><p>One of the key themes that emerged from the conversation was the idea of embracing fear to unlock untapped potential. Jessica emphasized the importance of facing challenges head-on, advocating for cybersecurity programs, and pushing boundaries to drive meaningful change within organizations. By transforming fear into a catalyst for growth and innovation, CISOs can navigate the complex cybersecurity landscape with confidence and resilience.</p><p><strong>The Art of Possibility in Cybersecurity</strong></p><p>The theme of this year's RSA Conference, "The Art of Possible," resonates deeply with Jessica's approach to cybersecurity leadership. By infusing creativity, strategic thinking, and a proactive mindset into their roles, CISOs can redefine what is achievable in the realm of cybersecurity. The session with Jessica promises to offer valuable insights on how to leverage the art of possibility to advance cybersecurity programs and drive success in an ever-evolving threat landscape.</p><p><strong>Joining the Conversation</strong></p><p>As Sean Martin and Marco Ciappelli gear up for the RSA Conference 2024, they invite cybersecurity enthusiasts, industry experts, and professionals to join them on this enriching journey. The on-location coverage promises to capture the pulse of the conference, featuring engaging conversations, expert insights, and thought-provoking discussions on the future of cybersecurity.</p><p>With Jessica Robinson's fearless approach to cybersecurity leadership and the insightful conversations lined up for the RSA Conference 2024, this year's event is set to be a landmark gathering for cybersecurity professionals. Stay tuned for more updates, interviews, and coverage as Sean Martin and Marco Ciappelli bring you the latest insights from the forefront of cybersecurity innovation.</p><p>RSA Conference 2024 promises to be a platform where possibilities converge with reality, fear transforms into opportunity, and cybersecurity leaders pave the way for a secure digital future. Join us on this exciting journey as we explore the art of possibility in cybersecurity with Sean Martin, Marco Ciappelli, and a host of industry experts at RSA Conference 2024.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Now You’re in Role: The Fearless CISO: <a href="https://www.rsaconference.com/USA/agenda/session/Now%20Youre%20in%20Role%20The%20Fearless%20CISO">https://www.rsaconference.com/USA/agenda/session/Now%20Youre%20in%20Role%20The%20Fearless%20CISO</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 2 Apr 2024 00:32:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jessica Robinson)</author>
      <link>https://eventcoveragepodcast.com/episodes/now-youre-in-role-the-fearless-ciso-a-conversation-with-jessica-robinson-a-deep-dive-into-rsa-conference-2024-on-location-coverage-with-sean-martin-and-marco-ciappelli-2GYnh1mF</link>
      <content:encoded><![CDATA[<p><strong>Guests: Jessica Robinson</strong>, Executive Officer of PurePoint International [<a href="https://purepoint-international.com/">@PurIntl</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/">https://www.linkedin.com/in/jessica-a-robinson-she-her-22740311/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/jessica-robinson">https://www.rsaconference.com/experts/jessica-robinson</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/sean-martin" target="_blank">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>The RSA Conference 2024 is just around the corner, and our hosts Sean Martin and Marco Ciappelli are gearing up for an insightful and engaging on-location coverage of the event. In this second Chat On The Road to RSA Conference 2024 conversation with cybersecurity expert Jessica Robinson, we got a sneak peek into what to expect from this year's talk she will give during the event.</p><p><strong>Now You’re in Role: The Fearless CISO</strong></p><p>As a follow up to the talk last year at RSAC, attendees will learn the top three skills for success for any first time CISOs to advance and grow their cybersecurity program. This talk will be a discussion on what is most important as we start to really think about what is required for success in the CISO role as it directly relates to the success of the cybersecurity program.</p><p>The stage is set for an enriching dialogue on the nuances of the CISO role, cybersecurity programs, and the evolving landscape of cyber threats. Jessica Robinson, with her wealth of experience and fearless approach to cybersecurity leadership, promises to dive deep into the art of making possibilities a reality in the realm of cybersecurity.</p><p><strong>Embracing Fear to Unlock Potential</strong></p><p>One of the key themes that emerged from the conversation was the idea of embracing fear to unlock untapped potential. Jessica emphasized the importance of facing challenges head-on, advocating for cybersecurity programs, and pushing boundaries to drive meaningful change within organizations. By transforming fear into a catalyst for growth and innovation, CISOs can navigate the complex cybersecurity landscape with confidence and resilience.</p><p><strong>The Art of Possibility in Cybersecurity</strong></p><p>The theme of this year's RSA Conference, "The Art of Possible," resonates deeply with Jessica's approach to cybersecurity leadership. By infusing creativity, strategic thinking, and a proactive mindset into their roles, CISOs can redefine what is achievable in the realm of cybersecurity. The session with Jessica promises to offer valuable insights on how to leverage the art of possibility to advance cybersecurity programs and drive success in an ever-evolving threat landscape.</p><p><strong>Joining the Conversation</strong></p><p>As Sean Martin and Marco Ciappelli gear up for the RSA Conference 2024, they invite cybersecurity enthusiasts, industry experts, and professionals to join them on this enriching journey. The on-location coverage promises to capture the pulse of the conference, featuring engaging conversations, expert insights, and thought-provoking discussions on the future of cybersecurity.</p><p>With Jessica Robinson's fearless approach to cybersecurity leadership and the insightful conversations lined up for the RSA Conference 2024, this year's event is set to be a landmark gathering for cybersecurity professionals. Stay tuned for more updates, interviews, and coverage as Sean Martin and Marco Ciappelli bring you the latest insights from the forefront of cybersecurity innovation.</p><p>RSA Conference 2024 promises to be a platform where possibilities converge with reality, fear transforms into opportunity, and cybersecurity leaders pave the way for a secure digital future. Join us on this exciting journey as we explore the art of possibility in cybersecurity with Sean Martin, Marco Ciappelli, and a host of industry experts at RSA Conference 2024.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Now You’re in Role: The Fearless CISO: <a href="https://www.rsaconference.com/USA/agenda/session/Now%20Youre%20in%20Role%20The%20Fearless%20CISO">https://www.rsaconference.com/USA/agenda/session/Now%20Youre%20in%20Role%20The%20Fearless%20CISO</a></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22530456" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/301f8dd4-87c1-42ba-92cc-287ee9e895b2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=301f8dd4-87c1-42ba-92cc-287ee9e895b2&amp;feed=2M86zCcc"/>
      <itunes:title>Now You’re in Role: The Fearless CISO | A Conversation With Jessica Robinson | A Deep Dive into RSA Conference 2024 | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jessica Robinson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:23:26</itunes:duration>
      <itunes:summary>Join us for an exclusive preview of the engaging conversations and insights from RSA Conference 2024 with cybersecurity experts Sean Martin and Marco Ciappelli.</itunes:summary>
      <itunes:subtitle>Join us for an exclusive preview of the engaging conversations and insights from RSA Conference 2024 with cybersecurity experts Sean Martin and Marco Ciappelli.</itunes:subtitle>
      <itunes:keywords>cybersecurity leadership, thought leadership, jessica robinson, cybersecurity programs, cybersecurity, personal management, professional development, innovation, information security, rsac, on-location coverage, rsa conference 2024, rsaconference, cyber resilience, ciso role, industry insights, art of possibility, cybersecurity trends, digital security, cybersecurityconference, cyber threats, fear in cybersecurity, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2c02a757-3d0a-4a87-b1bf-a5e3f9c65712</guid>
      <title>The Art of Hacking the Final Frontier: Learn How to Bring Your Own Satellite by Crafting Virtual Labs | An On Location HackSpaceCon Coverage Conversation with Tim Fowler</title>
      <description><![CDATA[<p><strong>Guest: Tim Fowler</strong>, Offensive Security Analyst, Black Hills Information Security [<a href="https://twitter.com/BHinfoSecurity">@BHinfoSecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/roobixx/" target="_blank">https://www.linkedin.com/in/roobixx/</a></p><p>On Twitter | <a href="https://twitter.com/roobixx" target="_blank">https://twitter.com/roobixx</a></p><p>At HackSpaceCon | <a href="https://www.hackspacecon.com/speakers24#tim-fowler">https://www.hackspacecon.com/speakers24#tim-fowler</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this thought-provoking episode of On Location with Sean and Marco, we soar into the fascinating world of space cybersecurity with our esteemed guest, Tim Fowler. As a penetration tester at Black Hills Information Security, specializing in offensive security, Tim shares his intriguing transition from focusing on terrestrial cybersecurity challenges to those within the space domain.</p><p>With the space industry rapidly democratizing, he highlights the urgency for better securing our assets in space, drawing a compelling parallel with the historical oversight in the industrial control systems (ICS) sector. The conversation explores the unique challenges and opportunities space cybersecurity presents, including the emerging need for governance, risk, and compliance (GRC) frameworks tailored for space. Tim's insights shed light on the importance of secure software development and contingency planning in this critical yet exhilarating field.</p><p>Additionally, Tim enthuses about his upcoming workshop at HackSpaceCon, 'Bring Your Own Satellite' (BYOS), aimed at demystifying space cybersecurity through hands-on experience with virtual satellites. The episode also humorously touches upon the concept of 'Deorbit plans' and the fanciful notion of hacking the 'Death Star,' blending deep technical discussion with engaging speculative thought.</p><p>This episode is a must-listen for anyone curious about the nexus of cybersecurity and space exploration, offering a unique perspective on a domain that is becoming increasingly integral to our daily lives and future aspirations.</p><p>Key Questions Addressed</p><ul><li>How can cybersecurity principles be applied to the space domain?</li><li>What challenges does the democratization of space present to cybersecurity?</li><li>How does one begin building a virtual satellite lab?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>HackSpaceCon: <a href="https://www.hackspacecon.com/">https://www.hackspacecon.com/</a></p><p>About Tim's "Bring Your Own Satellite" Workshop: <a href="https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/">https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 29 Mar 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Fowler)</author>
      <link>https://eventcoveragepodcast.com/episodes/the-art-of-hacking-the-final-frontier-learn-how-to-bring-your-own-satellite-by-crafting-virtual-labs-an-on-location-hackspacecon-coverage-conversation-with-tim-fowler-s_HpAIL9</link>
      <content:encoded><![CDATA[<p><strong>Guest: Tim Fowler</strong>, Offensive Security Analyst, Black Hills Information Security [<a href="https://twitter.com/BHinfoSecurity">@BHinfoSecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/roobixx/" target="_blank">https://www.linkedin.com/in/roobixx/</a></p><p>On Twitter | <a href="https://twitter.com/roobixx" target="_blank">https://twitter.com/roobixx</a></p><p>At HackSpaceCon | <a href="https://www.hackspacecon.com/speakers24#tim-fowler">https://www.hackspacecon.com/speakers24#tim-fowler</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>In this thought-provoking episode of On Location with Sean and Marco, we soar into the fascinating world of space cybersecurity with our esteemed guest, Tim Fowler. As a penetration tester at Black Hills Information Security, specializing in offensive security, Tim shares his intriguing transition from focusing on terrestrial cybersecurity challenges to those within the space domain.</p><p>With the space industry rapidly democratizing, he highlights the urgency for better securing our assets in space, drawing a compelling parallel with the historical oversight in the industrial control systems (ICS) sector. The conversation explores the unique challenges and opportunities space cybersecurity presents, including the emerging need for governance, risk, and compliance (GRC) frameworks tailored for space. Tim's insights shed light on the importance of secure software development and contingency planning in this critical yet exhilarating field.</p><p>Additionally, Tim enthuses about his upcoming workshop at HackSpaceCon, 'Bring Your Own Satellite' (BYOS), aimed at demystifying space cybersecurity through hands-on experience with virtual satellites. The episode also humorously touches upon the concept of 'Deorbit plans' and the fanciful notion of hacking the 'Death Star,' blending deep technical discussion with engaging speculative thought.</p><p>This episode is a must-listen for anyone curious about the nexus of cybersecurity and space exploration, offering a unique perspective on a domain that is becoming increasingly integral to our daily lives and future aspirations.</p><p>Key Questions Addressed</p><ul><li>How can cybersecurity principles be applied to the space domain?</li><li>What challenges does the democratization of space present to cybersecurity?</li><li>How does one begin building a virtual satellite lab?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>HackSpaceCon: <a href="https://www.hackspacecon.com/">https://www.hackspacecon.com/</a></p><p>About Tim's "Bring Your Own Satellite" Workshop: <a href="https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/">https://www.linkedin.com/posts/roobixx_satellitecommunication-virtuallab-spacetech-activity-7168236170760404992-uY1_/</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31994171" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/61909891-5356-4b67-9f1c-0b5fe7fbc69d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=61909891-5356-4b67-9f1c-0b5fe7fbc69d&amp;feed=2M86zCcc"/>
      <itunes:title>The Art of Hacking the Final Frontier: Learn How to Bring Your Own Satellite by Crafting Virtual Labs | An On Location HackSpaceCon Coverage Conversation with Tim Fowler</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Fowler</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/1ef2a21a-33b8-44a9-b9fa-0030e615a4e0/3000x3000/download-1.jpg?aid=rss_feed"/>
      <itunes:duration>00:33:17</itunes:duration>
      <itunes:summary>Soar into the uncharted atmosphere of space cybersecurity with Tim Fowler, as he shares his journey from terrestrial cybersecurity to the final frontier at HackSpaceCon. Explore the future of hacking satellites, the significance of &apos;Deorbit plans,&apos; and the exhilarating world of building your own virtual satellite lab in this captivating episode.</itunes:summary>
      <itunes:subtitle>Soar into the uncharted atmosphere of space cybersecurity with Tim Fowler, as he shares his journey from terrestrial cybersecurity to the final frontier at HackSpaceCon. Explore the future of hacking satellites, the significance of &apos;Deorbit plans,&apos; and the exhilarating world of building your own virtual satellite lab in this captivating episode.</itunes:subtitle>
      <itunes:keywords>bring your own satellite, risk compliance, satellites, marco ciappelli, sean martin, tim fowler, cybersecurity, offensive security, penetration testing, space debris, space force, deorbit plan, hackspacecon, ics, software defined radio, space cybersecurity, black hills information security, virtual lab, space, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b57a8aa5-7e7e-43da-ba8f-a961ab5df3fd</guid>
      <title>Unveiling the Art of Possible: A Glimpse into RSA Conference 2024 | An On Location Conference Coverage Conversation with Linda Gray Martin and Britta Glade</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Linda Gray Martin</strong>, Vice President at RSA Conference [<a href="https://twitter.com/RSAConference" target="_blank">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/linda-gray-martin-223708/" target="_blank">https://www.linkedin.com/in/linda-gray-martin-223708/</a></p><p>On Twitter | <a href="https://twitter.com/LindaJaneGray" target="_blank">https://twitter.com/LindaJaneGray</a></p><p><strong>Britta Glade</strong>, Vice President, Content & Curation at RSA Conference [<a href="https://twitter.com/RSAConference" target="_blank">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/britta-glade-5251003/" target="_blank">https://www.linkedin.com/in/britta-glade-5251003/</a></p><p>On Twitter | <a href="https://twitter.com/brittaglade" target="_blank">https://twitter.com/brittaglade</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Welcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible. This year, we're breaking down the walls of impossibility, bringing the power of imagination, humanity, innovation and community into the realm of cybersecurity and beyond.</p><p><strong>The Fabric of Creativity</strong></p><p>In an engaging exchange between the On Location Coverages hosts Sean Martin and Marco Ciappelli, the conversation begins with a reflection on what’s possible. Martin and Ciappelli, in a funny exchange bring forth the concept of the "plausible impossible," a creative doctrine that pushes the boundaries of our imagination and challenges the limits of reality. This theme strongly correlates with this year's RSA Conference, focused on exploring the myriad potentials within the cybersecurity landscape.</p><p><strong>Tradition Meets Innovation</strong></p><p>A tradition that Sean and Marco hold dear is the annual inclusion of Linda Gray Martin and Britta Glade, central figures in the orchestration of the RSA Conference. Their participation signifies the commencement of a profound exploration into cybersecurity trends, themes, and innovative ideas set to shape the future. The conversation warmly unfolds to welcome these pivotal voices, shedding light on the central theme, "The Art of Possible," and its implications for the global cybersecurity community.</p><p><strong>Bridging Ideas and Implementation</strong></p><p>The discourse navigates through various aspects of the conference, from keynote speakers to new tracks, emphasizing the commitment to diversity, advancement, and community. With over 2,700 submissions and a broad spectrum of sessions, the RSA Conference stands as a testament to what becomes attainable when different minds unite in pursuit of a shared vision.</p><p>Among the highlights, Linda Gray Martin and Britta Glade touch upon the essence of community at the conference, illustrating how collective effort can transcend traditional barriers, fostering innovation and progress. The introduction of new programs, such as the Next Stage Expo, reaffirms the conference’s dedication to nurturing growth at every level, providing a stepping stone for emerging companies.</p><p><strong>Forging Ahead: The Exploration Continues</strong></p><p>As we venture closer to RSA Conference 2024, set against the backdrop of San Francisco's iconic Moscone Center, the anticipation builds for what promises to be an extraordinary congregation of cybersecurity’s brightest. From groundbreaking keynotes by industry visionaries to immersive track sessions that traverse the unknown, the conference is a beacon for those eager to explore the vastness of what’s achievable.</p><p><strong>A Journey Awaits</strong></p><p>For newcomers and veterans alike, RSA Conference 2024 is more than an event; it's an expedition into the heart of innovation, an opportunity to witness the unfolding of the art of possible firsthand. With thoughtful preparation and an open mind, attendees are poised to discover insights that could redefine the trajectory of cybersecurity and beyond.</p><p>As we inch closer to May 2024, the excitement is palpable, with much left to uncover. This year’s RSA Conference is not just a event; it's a convergence of ideas, a celebration of potential, and most importantly, a gathering of a community that believes fiercely in the art of turning the impossible into the possible.</p><p>Join us, as we step into a realm where imagination meets reality, at RSA Conference 2024.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Mar 2024 21:52:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Linda Gray Martin, Britta Glade)</author>
      <link>https://eventcoveragepodcast.com/episodes/unveiling-the-art-of-possible-a-glimpse-into-rsa-conference-2024-an-on-location-conference-coverage-conversation-with-linda-gray-martin-and-britta-glade-ZbhUttq5</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Linda Gray Martin</strong>, Vice President at RSA Conference [<a href="https://twitter.com/RSAConference" target="_blank">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/linda-gray-martin-223708/" target="_blank">https://www.linkedin.com/in/linda-gray-martin-223708/</a></p><p>On Twitter | <a href="https://twitter.com/LindaJaneGray" target="_blank">https://twitter.com/LindaJaneGray</a></p><p><strong>Britta Glade</strong>, Vice President, Content & Curation at RSA Conference [<a href="https://twitter.com/RSAConference" target="_blank">@RSAConference</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/britta-glade-5251003/" target="_blank">https://www.linkedin.com/in/britta-glade-5251003/</a></p><p>On Twitter | <a href="https://twitter.com/brittaglade" target="_blank">https://twitter.com/brittaglade</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Welcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible. This year, we're breaking down the walls of impossibility, bringing the power of imagination, humanity, innovation and community into the realm of cybersecurity and beyond.</p><p><strong>The Fabric of Creativity</strong></p><p>In an engaging exchange between the On Location Coverages hosts Sean Martin and Marco Ciappelli, the conversation begins with a reflection on what’s possible. Martin and Ciappelli, in a funny exchange bring forth the concept of the "plausible impossible," a creative doctrine that pushes the boundaries of our imagination and challenges the limits of reality. This theme strongly correlates with this year's RSA Conference, focused on exploring the myriad potentials within the cybersecurity landscape.</p><p><strong>Tradition Meets Innovation</strong></p><p>A tradition that Sean and Marco hold dear is the annual inclusion of Linda Gray Martin and Britta Glade, central figures in the orchestration of the RSA Conference. Their participation signifies the commencement of a profound exploration into cybersecurity trends, themes, and innovative ideas set to shape the future. The conversation warmly unfolds to welcome these pivotal voices, shedding light on the central theme, "The Art of Possible," and its implications for the global cybersecurity community.</p><p><strong>Bridging Ideas and Implementation</strong></p><p>The discourse navigates through various aspects of the conference, from keynote speakers to new tracks, emphasizing the commitment to diversity, advancement, and community. With over 2,700 submissions and a broad spectrum of sessions, the RSA Conference stands as a testament to what becomes attainable when different minds unite in pursuit of a shared vision.</p><p>Among the highlights, Linda Gray Martin and Britta Glade touch upon the essence of community at the conference, illustrating how collective effort can transcend traditional barriers, fostering innovation and progress. The introduction of new programs, such as the Next Stage Expo, reaffirms the conference’s dedication to nurturing growth at every level, providing a stepping stone for emerging companies.</p><p><strong>Forging Ahead: The Exploration Continues</strong></p><p>As we venture closer to RSA Conference 2024, set against the backdrop of San Francisco's iconic Moscone Center, the anticipation builds for what promises to be an extraordinary congregation of cybersecurity’s brightest. From groundbreaking keynotes by industry visionaries to immersive track sessions that traverse the unknown, the conference is a beacon for those eager to explore the vastness of what’s achievable.</p><p><strong>A Journey Awaits</strong></p><p>For newcomers and veterans alike, RSA Conference 2024 is more than an event; it's an expedition into the heart of innovation, an opportunity to witness the unfolding of the art of possible firsthand. With thoughtful preparation and an open mind, attendees are poised to discover insights that could redefine the trajectory of cybersecurity and beyond.</p><p>As we inch closer to May 2024, the excitement is palpable, with much left to uncover. This year’s RSA Conference is not just a event; it's a convergence of ideas, a celebration of potential, and most importantly, a gathering of a community that believes fiercely in the art of turning the impossible into the possible.</p><p>Join us, as we step into a realm where imagination meets reality, at RSA Conference 2024.</p><p>Be sure to follow our Coverage Journey and subscribe to our podcasts!</p><p><strong>____________________________</strong></p><p>Follow our RSA Conference USA 2024 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>On YouTube: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllS-B9eaPcHUVmy_lGrbIw9J</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about RSA Conference USA 2024: <a href="https://itspm.ag/rsa-cordbw" target="_blank">https://itspm.ag/rsa-cordbw</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><p>Want to tell your Brand Story as part of our event coverage?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf" target="_blank">https://itspm.ag/evtcovbrf</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="31045720" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/65e31332-8357-4b82-9a1b-e4a165892794/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=65e31332-8357-4b82-9a1b-e4a165892794&amp;feed=2M86zCcc"/>
      <itunes:title>Unveiling the Art of Possible: A Glimpse into RSA Conference 2024 | An On Location Conference Coverage Conversation with Linda Gray Martin and Britta Glade</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Linda Gray Martin, Britta Glade</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8b228a38-ccfd-4755-a800-d6e74d07a551/3000x3000/rsa-conference-usa-2024-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:32:18</itunes:duration>
      <itunes:summary>Welcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible.</itunes:summary>
      <itunes:subtitle>Welcome to the kickoff of our comprehensive coverage for RSA Conference 2024, a pivotal gathering that unites minds from all corners of cybersecurity under one expansive theme: The Art of Possible.</itunes:subtitle>
      <itunes:keywords>cyberdefense, securitytips, iotsecurity, securityevent, hacking, dataprivacy, cyberrisk, infosec, networksecurity, identitytheft, privacyprotection, infosecevent, rsac, cybereducation, cloudsecurity, vulnerabilitymanagement, cyberthreats, cyberattack, rsaconference, encryption, cyberaware, phishing, cybersecurityconference, malwareanalysis</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14a0bbbb-4cdb-407f-95d1-1e3d0d76aaf6</guid>
      <title>Crisis Management: Strategies When Communicating with Multiple Stakeholders | An On Location Conference Coverage Conversation with Mary Chaney, Melanie Ensign, and Shawn Tuma</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Mary Chaney</strong>, Chairwoman, CEO and President, Minorities in Cybersecurity </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marynchaney/">https://www.linkedin.com/in/marynchaney/</a></p><p><strong>Melanie Ensign</strong>, Founder & CEO, Discernible Inc</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melanieensign/">https://www.linkedin.com/in/melanieensign/</a></p><p><strong>Shawn Tuma</strong>, Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP [<a href="https://twitter.com/SpencerFane">@SpencerFane</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawnetuma/" target="_blank">https://www.linkedin.com/in/shawnetuma/</a></p><p>On Twitter | <a href="https://twitter.com/shawnetuma" target="_blank">https://twitter.com/shawnetuma</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At the forefront of this On Location with Sean and Marco are MiC Annual Conference panelists: Mary Chaney, CEO of Minorities in Cybersecurity; Melanie Ensign, founder and CEO of Discernible; and Shawn Tuma, a specialist in cybersecurity and data privacy law. The conversation centers around crisis management, particularly emphasizing the importance of preparation, defined roles, and adept communication strategies.</p><p>Mary shares from her experiences, asserting the necessity for someone with the authority to make decisive actions in a crisis. Shawn echoes her sentiments, adding the need to prepare for catastrophic incident response rather than everyday incident response. Also discussed is the importance of having out-of-band communication platforms for secure discussions during a crisis.</p><p>All three panelists agree on the importance of involving companies in making their environments more inviting, safe, productive, and successful for diverse workers in the cybersecurity industry.</p><p>Key Questions Addressed</p><ul><li>How important is preparation in incident response?</li><li>What is the role of secure communication platforms during a crisis?</li><li>How can companies create more welcoming and productive environments in the cybersecurity industry?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a><br /><br />ITSPmagazine YouTube Channel: 📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 15 Mar 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Chaney, Shawn Tuma, Melanie Ensign)</author>
      <link>https://eventcoveragepodcast.com/episodes/crisis-management-strategies-when-communicating-with-multiple-stakeholders-an-on-location-conference-coverage-conversation-with-mary-chaney-melanie-ensign-and-shawn-tuma-0vRBTQop</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Mary Chaney</strong>, Chairwoman, CEO and President, Minorities in Cybersecurity </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marynchaney/">https://www.linkedin.com/in/marynchaney/</a></p><p><strong>Melanie Ensign</strong>, Founder & CEO, Discernible Inc</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/melanieensign/">https://www.linkedin.com/in/melanieensign/</a></p><p><strong>Shawn Tuma</strong>, Co-Chair, Data Privacy & Cybersecurity Practice, Spencer Fane LLP [<a href="https://twitter.com/SpencerFane">@SpencerFane</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawnetuma/" target="_blank">https://www.linkedin.com/in/shawnetuma/</a></p><p>On Twitter | <a href="https://twitter.com/shawnetuma" target="_blank">https://twitter.com/shawnetuma</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>At the forefront of this On Location with Sean and Marco are MiC Annual Conference panelists: Mary Chaney, CEO of Minorities in Cybersecurity; Melanie Ensign, founder and CEO of Discernible; and Shawn Tuma, a specialist in cybersecurity and data privacy law. The conversation centers around crisis management, particularly emphasizing the importance of preparation, defined roles, and adept communication strategies.</p><p>Mary shares from her experiences, asserting the necessity for someone with the authority to make decisive actions in a crisis. Shawn echoes her sentiments, adding the need to prepare for catastrophic incident response rather than everyday incident response. Also discussed is the importance of having out-of-band communication platforms for secure discussions during a crisis.</p><p>All three panelists agree on the importance of involving companies in making their environments more inviting, safe, productive, and successful for diverse workers in the cybersecurity industry.</p><p>Key Questions Addressed</p><ul><li>How important is preparation in incident response?</li><li>What is the role of secure communication platforms during a crisis?</li><li>How can companies create more welcoming and productive environments in the cybersecurity industry?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a><br /><br />ITSPmagazine YouTube Channel: 📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35569188" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/053a1706-f2d3-45f6-9b34-f2ec54d622f4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=053a1706-f2d3-45f6-9b34-f2ec54d622f4&amp;feed=2M86zCcc"/>
      <itunes:title>Crisis Management: Strategies When Communicating with Multiple Stakeholders | An On Location Conference Coverage Conversation with Mary Chaney, Melanie Ensign, and Shawn Tuma</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Chaney, Shawn Tuma, Melanie Ensign</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8710ef5b-3aa5-493e-aa81-1d5231fd0490/3000x3000/mic-conference-2024-square.jpg?aid=rss_feed"/>
      <itunes:duration>00:37:00</itunes:duration>
      <itunes:summary>Join us for a revealing conversation on crisis management with leaders in the cybersecurity field: Mary Chaney, Melanie Ensign, and Shawn Tuma. Learn about their valuable insights on the importance of adequate preparations in cyber incident response, using secure communication platforms during a crisis, and creating welcoming and productive environments in cybersecurity.</itunes:summary>
      <itunes:subtitle>Join us for a revealing conversation on crisis management with leaders in the cybersecurity field: Mary Chaney, Melanie Ensign, and Shawn Tuma. Learn about their valuable insights on the importance of adequate preparations in cyber incident response, using secure communication platforms during a crisis, and creating welcoming and productive environments in cybersecurity.</itunes:subtitle>
      <itunes:keywords>workforce, communication platforms, marco ciappelli, security posture, diversity in cybersecurity, secure communication, cyber incident, crisis management, sean martin, company environments, data privacy law, diversity programs, cybersecurity, conference, mary chaney, mary chaney, on location, diverse teams, preparation, diversity, minorities in cybersecurity, event coverage, feedback, melanie ensign, productivity, incident response, shawn tuma, shawn tuma, cybersecurity industry</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2f54915a-187b-42b8-bd85-837a71648515</guid>
      <title>What Executive Leaders Can Do to Change Their Company&apos;s Culture | An On Location Conference Coverage Conversation with Denitra Letrice and Dwan Jones</title>
      <description><![CDATA[<p><strong>Guests: </strong></p><p><strong>Denitra Letrice</strong>, Director of Cybersecurity Planning & Engagement, MassMutual</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/denitraletrice/">https://www.linkedin.com/in/denitraletrice/</a></p><p>On Twitter | <a href="https://twitter.com/denitraletrice">https://twitter.com/denitraletrice</a></p><p><strong>Dwan Jones</strong>, Directory of Diversity, Equity and Inclusion, ISC2 [<a href="https://twitter.com/ISC2">@ISC2</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dwanjones/">https://www.linkedin.com/in/dwanjones/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of the "On Location with Sean and Marco" discusses the crucial topic of company culture and its impact on organizations, particularly in the cybersecurity field. Throughout the episode, Sean Martin and Marco Ciappelli engage in thought-provoking conversations with guests Denitra Letrice and Dwan Jones, focusing on the significance of cultivating a positive work culture. The discussion emphasizes the idea that a strong company culture is essential for attracting and retaining top talent, especially in a highly competitive industry like cybersecurity.</p><p>Denitra Letrice and Dwan Jones provide valuable insights into the need for organizations to create inclusive and diverse environments where employees feel valued and can thrive. They stress the importance of executive leaders listening to and understanding the experiences of their workforce to drive positive change and improve overall productivity. They also highlight the significance of continuous feedback, engagement surveys, and creating safe spaces for open communication within the workplace, underscoring that building a healthy work environment requires intentional effort, assessments, and a willingness to address systemic issues that may hinder organizational culture.</p><p>Furthermore, the episode previews an upcoming session at the Minorities in Cybersecurity (MiC) Annual Conference in Dallas, Texas, with Denitra Letrice and Dwan Jones as panelists for this session. Titled "What Executive Leaders Can Do to Change Their Company's Culture," the session aims to provide actionable strategies for executives to enhance their organizational culture and drive positive outcomes.</p><p>Overall, the episode serves as a platform for insightful discussions on the role of leadership in shaping company culture, the importance of diversity and inclusion, and the impact of culture on attracting and retaining talent in the cybersecurity industry. It encourages listeners to consider the value of creating a supportive and empowering work environment for long-term success.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a><br /><br />ITSPmagazine YouTube Channel: 📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Mar 2024 00:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dwan Jones, Denitra Letrice)</author>
      <link>https://eventcoveragepodcast.com/episodes/what-executive-leaders-can-do-to-change-their-companys-culture-an-on-location-conference-coverage-conversation-with-denitra-letrice-and-dwan-jones-V1FMQ6BT</link>
      <content:encoded><![CDATA[<p><strong>Guests: </strong></p><p><strong>Denitra Letrice</strong>, Director of Cybersecurity Planning & Engagement, MassMutual</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/denitraletrice/">https://www.linkedin.com/in/denitraletrice/</a></p><p>On Twitter | <a href="https://twitter.com/denitraletrice">https://twitter.com/denitraletrice</a></p><p><strong>Dwan Jones</strong>, Directory of Diversity, Equity and Inclusion, ISC2 [<a href="https://twitter.com/ISC2">@ISC2</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dwanjones/">https://www.linkedin.com/in/dwanjones/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>This episode of the "On Location with Sean and Marco" discusses the crucial topic of company culture and its impact on organizations, particularly in the cybersecurity field. Throughout the episode, Sean Martin and Marco Ciappelli engage in thought-provoking conversations with guests Denitra Letrice and Dwan Jones, focusing on the significance of cultivating a positive work culture. The discussion emphasizes the idea that a strong company culture is essential for attracting and retaining top talent, especially in a highly competitive industry like cybersecurity.</p><p>Denitra Letrice and Dwan Jones provide valuable insights into the need for organizations to create inclusive and diverse environments where employees feel valued and can thrive. They stress the importance of executive leaders listening to and understanding the experiences of their workforce to drive positive change and improve overall productivity. They also highlight the significance of continuous feedback, engagement surveys, and creating safe spaces for open communication within the workplace, underscoring that building a healthy work environment requires intentional effort, assessments, and a willingness to address systemic issues that may hinder organizational culture.</p><p>Furthermore, the episode previews an upcoming session at the Minorities in Cybersecurity (MiC) Annual Conference in Dallas, Texas, with Denitra Letrice and Dwan Jones as panelists for this session. Titled "What Executive Leaders Can Do to Change Their Company's Culture," the session aims to provide actionable strategies for executives to enhance their organizational culture and drive positive outcomes.</p><p>Overall, the episode serves as a platform for insightful discussions on the role of leadership in shaping company culture, the importance of diversity and inclusion, and the impact of culture on attracting and retaining talent in the cybersecurity industry. It encourages listeners to consider the value of creating a supportive and empowering work environment for long-term success.</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p>Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:</p><p>📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq">https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq</a></p><p>Redefining Society Podcast with Marco Ciappelli playlist: 📺 <a href="https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9" target="_blank">https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9</a><br /><br />ITSPmagazine YouTube Channel: 📺 <a href="https://www.youtube.com/@itspmagazine" target="_blank">https://www.youtube.com/@itspmagazine</a></p><p>Be sure to share and subscribe!</p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25557424" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/ff204a9e-0f0a-44fc-983a-70ac038378c7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=ff204a9e-0f0a-44fc-983a-70ac038378c7&amp;feed=2M86zCcc"/>
      <itunes:title>What Executive Leaders Can Do to Change Their Company&apos;s Culture | An On Location Conference Coverage Conversation with Denitra Letrice and Dwan Jones</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dwan Jones, Denitra Letrice</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8710ef5b-3aa5-493e-aa81-1d5231fd0490/3000x3000/mic-conference-2024-square.jpg?aid=rss_feed"/>
      <itunes:duration>00:26:35</itunes:duration>
      <itunes:summary>Dive into this episode of &quot;On Location with Sean and Marco&quot;  as they explore the profound impact of company culture on cybersecurity organizations with guests Denitra Letrice and Dwan Jones. Gain valuable insights on fostering inclusive environments, driving positive change, and unlocking the potential of organizational culture in the dynamic realm of cybersecurity.</itunes:summary>
      <itunes:subtitle>Dive into this episode of &quot;On Location with Sean and Marco&quot;  as they explore the profound impact of company culture on cybersecurity organizations with guests Denitra Letrice and Dwan Jones. Gain valuable insights on fostering inclusive environments, driving positive change, and unlocking the potential of organizational culture in the dynamic realm of cybersecurity.</itunes:subtitle>
      <itunes:keywords>denitra letrice, workplace environment, systemic issues, marco ciappelli, empowerment, inclusion, diversity in cybersecurity, leadership, talent retention, organizational culture, engagement surveys, sean martin, positive change, diversity programs, cybersecurity, dwan jones, dwan jones, on location, diversity, minorities in cybersecurity, event coverage, leadership development in cybersecurity, feedback, company culture, cybersecurity industry, executive leaders</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">59fb48f6-11d0-4d09-8e0c-a94edd5a45ed</guid>
      <title>Diversity in Depth: From FBI Special Agent to Corporate Leader to Cybersecurity Advocate | A Minorities in Cybersecurity Conference Coverage Conversation with Mary N. Chaney</title>
      <description><![CDATA[<p><strong>Guest: Mary N. Chaney,</strong> Chairwoman, CEO and President, Minorities in Cybersecurity</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marynchaney/" target="_blank">https://www.linkedin.com/in/marynchaney/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join hosts Sean Martin and Marco Ciappelli for this new On Location event coverage episode along with Mary Chaney, a lawyer and seasoned professional in the cybersecurity field, as they focus on the pivotal topic of diversity and inclusion in the cybersecurity industry. Chaney highlights the creation and purpose of the Minorities in Cybersecurity organization and annual conference, emphasizing leadership development, empowerment, and creating safe spaces for professional growth.</p><p>The episode explicitly explores the importance of diversity in depth, promoting tangible actions to support retention and advancement of minority leaders. It also discusses the diverse range of topics covered in the conference, sessions on crisis management, financial planning, and cultural change within organizations. The episode concludes with a call to action for listeners to participate in the conference and support the mission of minorities in cybersecurity. During the discussion, Mary Chaney clearly demonstrates a commitment to fostering a more inclusive and diverse cybersecurity landscape.</p><p>Top 3 Questions Addressed</p><ul><li>Why did Mary Chaney start Minorities in Cybersecurity?</li><li>What is the theme of the conference in Dallas?</li><li>How does Mary Chaney describe the leadership development opportunities in the organization?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 8 Mar 2024 05:05:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mary N. Chaney)</author>
      <link>https://eventcoveragepodcast.com/episodes/diversity-in-depth-from-fbi-special-agent-to-corporate-leader-to-cybersecurity-advocate-a-minorities-in-cybersecurity-conference-coverage-conversation-with-mary-n-chaney-Q5osqgFN</link>
      <content:encoded><![CDATA[<p><strong>Guest: Mary N. Chaney,</strong> Chairwoman, CEO and President, Minorities in Cybersecurity</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marynchaney/" target="_blank">https://www.linkedin.com/in/marynchaney/</a></p><p><strong>____________________________</strong></p><p><strong>Hosts: </strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber" target="_blank">@RedefiningCyber</a>]</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine" target="_blank">@ITSPmagazine</a>] and Host of Redefining Society Podcast</p><p>On ITSPmagazine | <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli" target="_blank">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>Episode Notes</strong></p><p>Join hosts Sean Martin and Marco Ciappelli for this new On Location event coverage episode along with Mary Chaney, a lawyer and seasoned professional in the cybersecurity field, as they focus on the pivotal topic of diversity and inclusion in the cybersecurity industry. Chaney highlights the creation and purpose of the Minorities in Cybersecurity organization and annual conference, emphasizing leadership development, empowerment, and creating safe spaces for professional growth.</p><p>The episode explicitly explores the importance of diversity in depth, promoting tangible actions to support retention and advancement of minority leaders. It also discusses the diverse range of topics covered in the conference, sessions on crisis management, financial planning, and cultural change within organizations. The episode concludes with a call to action for listeners to participate in the conference and support the mission of minorities in cybersecurity. During the discussion, Mary Chaney clearly demonstrates a commitment to fostering a more inclusive and diverse cybersecurity landscape.</p><p>Top 3 Questions Addressed</p><ul><li>Why did Mary Chaney start Minorities in Cybersecurity?</li><li>What is the theme of the conference in Dallas?</li><li>How does Mary Chaney describe the leadership development opportunities in the organization?</li></ul><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage" target="_blank">https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more about Minorities in Cybersecurity: <a href="https://www.mincybsec.org/" target="_blank">https://www.mincybsec.org/</a></p><p>Annual Conference: <a href="https://www.mincybsec.org/annual-conference" target="_blank">https://www.mincybsec.org/annual-conference</a></p><p><strong>____________________________</strong></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast" target="_blank">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:</p><p><a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast" target="_blank"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>Are you interested in sponsoring our event coverage with an ad placement in the podcast?</p><p><strong>Learn More</strong> 👉 <a href="https://itspm.ag/podadplc" target="_blank">https://itspm.ag/podadplc</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21602565" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/6853a7cf-f356-41f5-99a6-42a5eaa97e06/episodes/7e0a948e-30dc-44bb-8cd9-be420cec442c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=6853a7cf-f356-41f5-99a6-42a5eaa97e06&amp;awEpisodeId=7e0a948e-30dc-44bb-8cd9-be420cec442c&amp;feed=2M86zCcc"/>
      <itunes:title>Diversity in Depth: From FBI Special Agent to Corporate Leader to Cybersecurity Advocate | A Minorities in Cybersecurity Conference Coverage Conversation with Mary N. Chaney</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mary N. Chaney</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/8710ef5b-3aa5-493e-aa81-1d5231fd0490/3000x3000/mic-conference-2024-square.jpg?aid=rss_feed"/>
      <itunes:duration>00:22:28</itunes:duration>
      <itunes:summary>Join hosts Sean Martin and Marco Ciappelli for this new On Location event coverage episode along with Mary Chaney, a seasoned professional in the cybersecurity field. Explore their discussion on diversity, inclusion, and leadership within the industry, focusing on the significance of the annual Minorities in Cybersecurity conference and its impact on empowering underrepresented groups and fostering a more inclusive cybersecurity environment for all professionals.</itunes:summary>
      <itunes:subtitle>Join hosts Sean Martin and Marco Ciappelli for this new On Location event coverage episode along with Mary Chaney, a seasoned professional in the cybersecurity field. Explore their discussion on diversity, inclusion, and leadership within the industry, focusing on the significance of the annual Minorities in Cybersecurity conference and its impact on empowering underrepresented groups and fostering a more inclusive cybersecurity environment for all professionals.</itunes:subtitle>
      <itunes:keywords>inclusion and diversity in tech, diversity in cybersecurity, conference with mary chaney, on location, cybersecurity leadership opportunities, minorities in cybersecurity, event coverage, leadership development in cybersecurity, challenges in cybersecurity profession, cybersecurity career journey, cybersecurity conference themes</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>