<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/kDNbmF_B" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>Brand Stories Podcasts</title>
    <description>Listen Up, These Are Brand Stories!

A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. A Promotional Brand Story Podcast or Webcast on ITSPmagazine is designed to accomplish these same things; connecting businesses to customers — and, more importantly, the other way around. An old saying in advertising goes something like this: A brand is not what the company thinks it is, it is what the customers think it is.

Every company has a story to tell—from the small start-up to the large enterprise and everything in between.</description>
    <copyright>© Copyright 2015-2025 ITSPmagazine, Inc. All Rights Reserved</copyright>
    <language>en</language>
    <pubDate>Wed, 21 Jan 2026 02:39:12 +0000</pubDate>
    <lastBuildDate>Wed, 21 Jan 2026 02:39:23 +0000</lastBuildDate>
    <image>
      <link>https://brand-stories-podcast.simplecast.com</link>
      <title>Brand Stories Podcasts</title>
      <url>https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/78a307ef-e2eb-42e1-adfb-90df8b98b1de/3000x3000/promotional-brand-stories-podcast-cover-3500x-2.jpg?aid=rss_feed</url>
    </image>
    <link>https://brand-stories-podcast.simplecast.com</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>Listen Up, These Are Brand Stories!

A good story connects us. A good story makes us imagine and visualize a scenario; it makes us think and feel; it drives us to take action. A Promotional Brand Story Podcast or Webcast on ITSPmagazine is designed to accomplish these same things; connecting businesses to customers — and, more importantly, the other way around. An old saying in advertising goes something like this: A brand is not what the company thinks it is, it is what the customers think it is.

Every company has a story to tell—from the small start-up to the large enterprise and everything in between.</itunes:summary>
    <itunes:author>ITSPmagazine</itunes:author>
    <itunes:explicit>false</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/dc632811-2d4b-42a7-b17c-b527aa3c92d7/78a307ef-e2eb-42e1-adfb-90df8b98b1de/3000x3000/promotional-brand-stories-podcast-cover-3500x-2.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/kDNbmF_B</itunes:new-feed-url>
    <itunes:keywords>cybersecurity, infosec vendors, thought leadership, technology, infosecurity vendors, technology companies, infosecurity companies, cybersecurity companies, cybersecurity vendors, infosec companies, b2b podcasts, b2b cybersecurity, infosec, b2b brands, consumer technology, brand marketing</itunes:keywords>
    <itunes:owner>
      <itunes:name>ITSPmagazine Inc.</itunes:name>
      <itunes:email>contact@itspmagazine.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Business"/>
    <itunes:category text="Technology"/>
    <itunes:category text="Society &amp; Culture"/>
    <item>
      <guid isPermaLink="false">14df3ac7-f14e-4c83-9a2c-884cff26318c</guid>
      <title>2026 Security Predictions: Agentic SOC, China Threats, and Quantum Readiness | A Brand Highlight Conversation with Vincent Stoffer, Field Chief Technology Officer of Corelight</title>
      <description><![CDATA[<p><strong>Vincent Stoffer</strong>, Field Chief Technology Officer at <strong>Corelight</strong>, shares his predictions for 2026 and what security teams should prepare for in the coming year. With nearly a decade at <strong>Corelight</strong> and a background in network and security engineering, <strong>Stoffer</strong> brings a unique perspective on where the industry is heading.</p><p>The conversation explores the emergence of the agentic SOC, where AI agents work alongside human analysts to accelerate detection, response, and incident resolution. <strong>Stoffer</strong> explains that while the protocols and tools have been in development, 2026 is the year organizations will finally see these capabilities deliver real results. The key differentiator, he notes, is data quality. Tools that provide rich, detailed, and comprehensive network evidence will thrive in this AI-enabled environment.</p><p><strong>Stoffer</strong> also addresses the persistent threat from nation-state actors, particularly China's Typhoon campaigns targeting critical infrastructure. From energy and telecoms to international partners, these threats continue to expand with AI-powered acceleration. Understanding your environment and detecting anomalous behavior remains essential for organizations facing these sophisticated adversaries.</p><p>The discussion concludes with a look at post-quantum readiness. While quantum computing threats may be 10 to 20 years away, <strong>Stoffer</strong> emphasizes the importance of understanding cryptographic assets now. <strong>Corelight</strong> has published a white paper detailing how NDR provides the network visibility needed to locate cryptographic assets and plan migration to quantum-ready cipher suites.</p><p>This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Vincent Stoffer</strong>, Field Chief Technology Officer at <strong>Corelight</strong><br />On LinkedIn: <a href="https://www.linkedin.com/in/vincent-stoffer-07057827/">https://www.linkedin.com/in/vincent-stoffer-07057827/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Corelight</strong>: <a href="https://corelight.com">https://corelight.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Vincent Stoffer, Corelight, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, agentic SOC, network detection and response, NDR, critical infrastructure security, nation-state threats, China Typhoon campaigns, Salt Typhoon, Volt Typhoon, post-quantum cryptography, quantum readiness, AI in cybersecurity, security operations, incident response, network visibility, Zeek</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 Jan 2026 02:39:12 +0000</pubDate>
      <author>contact@itspmagazine.com (Vincent Stoffer, Corelight, ITSPmagazine, Sean Martin)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/2026-security-predictions-agentic-soc-china-threats-and-quantum-readiness-a-brand-highlight-conversation-with-vincent-stoffer-field-chief-technology-officer-of-corelight-mcKkQQo0</link>
      <content:encoded><![CDATA[<p><strong>Vincent Stoffer</strong>, Field Chief Technology Officer at <strong>Corelight</strong>, shares his predictions for 2026 and what security teams should prepare for in the coming year. With nearly a decade at <strong>Corelight</strong> and a background in network and security engineering, <strong>Stoffer</strong> brings a unique perspective on where the industry is heading.</p><p>The conversation explores the emergence of the agentic SOC, where AI agents work alongside human analysts to accelerate detection, response, and incident resolution. <strong>Stoffer</strong> explains that while the protocols and tools have been in development, 2026 is the year organizations will finally see these capabilities deliver real results. The key differentiator, he notes, is data quality. Tools that provide rich, detailed, and comprehensive network evidence will thrive in this AI-enabled environment.</p><p><strong>Stoffer</strong> also addresses the persistent threat from nation-state actors, particularly China's Typhoon campaigns targeting critical infrastructure. From energy and telecoms to international partners, these threats continue to expand with AI-powered acceleration. Understanding your environment and detecting anomalous behavior remains essential for organizations facing these sophisticated adversaries.</p><p>The discussion concludes with a look at post-quantum readiness. While quantum computing threats may be 10 to 20 years away, <strong>Stoffer</strong> emphasizes the importance of understanding cryptographic assets now. <strong>Corelight</strong> has published a white paper detailing how NDR provides the network visibility needed to locate cryptographic assets and plan migration to quantum-ready cipher suites.</p><p>This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Vincent Stoffer</strong>, Field Chief Technology Officer at <strong>Corelight</strong><br />On LinkedIn: <a href="https://www.linkedin.com/in/vincent-stoffer-07057827/">https://www.linkedin.com/in/vincent-stoffer-07057827/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Corelight</strong>: <a href="https://corelight.com">https://corelight.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Vincent Stoffer, Corelight, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, agentic SOC, network detection and response, NDR, critical infrastructure security, nation-state threats, China Typhoon campaigns, Salt Typhoon, Volt Typhoon, post-quantum cryptography, quantum readiness, AI in cybersecurity, security operations, incident response, network visibility, Zeek</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7522149" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/cdbc9319-861e-4152-87a2-27dc16680759/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=cdbc9319-861e-4152-87a2-27dc16680759&amp;feed=kDNbmF_B"/>
      <itunes:title>2026 Security Predictions: Agentic SOC, China Threats, and Quantum Readiness | A Brand Highlight Conversation with Vincent Stoffer, Field Chief Technology Officer of Corelight</itunes:title>
      <itunes:author>Vincent Stoffer, Corelight, ITSPmagazine, Sean Martin</itunes:author>
      <itunes:duration>00:07:50</itunes:duration>
      <itunes:summary>As AI transforms both cyberattacks and defense strategies, security leaders face a pivotal year ahead. Discover how the agentic SOC, nation-state threats, and post-quantum cryptography readiness are reshaping the security landscape for 2026.</itunes:summary>
      <itunes:subtitle>As AI transforms both cyberattacks and defense strategies, security leaders face a pivotal year ahead. Discover how the agentic SOC, nation-state threats, and post-quantum cryptography readiness are reshaping the security landscape for 2026.</itunes:subtitle>
      <itunes:keywords>network visibility, brand highlight, marketing podcast, salt typhoon, sean martin, post-quantum cryptography, critical infrastructure security, agentic soc, volt typhoon, vincent stoffer, nation-state threats, ndr, brand marketing, incident response, network detection and response, corelight, ai in cybersecurity, quantum readiness, china typhoon campaigns, zeek, brand story, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>171</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1c458080-df5c-4619-9044-6b24b0d278b5</guid>
      <title>Securing the Decentralized Energy Grid | A Brand Story Conversation with Rafael Narezzi of Cyber Energia</title>
      <description><![CDATA[<p>The renewable energy sector faces a critical cybersecurity gap. As wind farms, solar installations, and battery energy storage systems proliferate across the globe, they create a decentralized network of digitally controlled assets that remain largely unprotected. <strong>Rafael Narezzi</strong>, Co-Founder and CEO of <strong>Cyber Energia</strong>, brings more than two decades of technology leadership experience to address this growing vulnerability in critical infrastructure.</p><p><strong>Cyber Energia</strong> takes a fundamentally different approach to OT security. While most cybersecurity companies stop at identifying risks through CVE scores and vulnerability assessments, <strong>Cyber Energia</strong> starts from the risk and translates it into financial terms that executives can act upon. The platform connects technical findings to compliance frameworks including NIS 2.0, IEC 62443, and NERC CIP, providing asset owners with a clear maturity landscape and actionable intelligence.</p><p><strong>Rafael Narezzi</strong> explains that asset owners in the renewable sector operate differently than traditional IT environments. Financial companies often acquire energy assets as investments without maintaining technical staff on-site. When compliance regulations now hold these owners personally liable for cybersecurity failures, they need tools that speak their language: dollars, risk, and return on investment. <strong>Cyber Energia</strong> prices its services per megawatt, demonstrating its commitment to speaking the language of energy.</p><p>The decentralization of energy generation presents unique challenges. <strong>Rafael Narezzi</strong> points to recent cyber attacks on Poland's distributed grid as evidence that threat actors understand how to manipulate multiple remote locations simultaneously to destabilize power networks. Battery energy storage systems present particular risks, as compromised dispatch commands could create grid imbalances similar to the fictional scenario depicted in Ocean's 11. Yet many sites lack even basic cyber hygiene protections.</p><p><strong>Cyber Energia</strong> helps customers understand the financial impact of potential attacks. A 98-megawatt wind turbine site, for example, could lose 1.9 million dollars from just one week of downtime. This quantification enables executives to make informed decisions about relatively modest security investments that significantly reduce their risk exposure. The platform provides a single-view dashboard for organizations managing hundreds of sites across different regions, technologies, and regulatory environments.</p><p><strong>Rafael Narezzi</strong> observes that a CEO before a cyber attack is fundamentally different from a CEO after one. Organizations often underestimate digital risks compared to physical ones, despite living in an increasingly connected world. Regulations like NIS 2.0 now impose personal liability on directors and can revoke operating licenses, removing any excuse for neglecting cybersecurity. The awareness is changing, but <strong>Cyber Energia</strong> continues working to close the gap between compliance requirements and actual security posture across the renewable energy sector.</p><p>This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: <a href="https://www.studioc60.com/creation#full">https://www.studioc60.com/creation#full</a></p><p><strong>GUEST</strong></p><p><strong>Rafael Narezzi</strong>, Co-Founder and CEO of <strong>Cyber Energia</strong><br /><a href="https://www.linkedin.com/in/narezzi/">https://www.linkedin.com/in/narezzi/</a></p><p><strong>RESOURCES</strong></p><p><strong>Cyber Energia</strong><br /><a href="https://cyberenergia.com/">https://cyberenergia.com/</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Rafael Narezzi, Cyber Energia, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT cybersecurity, renewable energy security, critical infrastructure protection, NIS 2.0 compliance, IEC 62443, wind farm cybersecurity, solar energy security, battery energy storage systems, BESS security, decentralized energy grid, cyber risk quantification, energy sector compliance, NERC CIP, operational technology security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 20 Jan 2026 22:44:39 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Rafael Narezzi, Cyber Energia)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/securing-the-decentralized-energy-grid-a-brand-story-conversation-with-rafael-narezzi-of-cyber-energia-ooBkQ_yz</link>
      <content:encoded><![CDATA[<p>The renewable energy sector faces a critical cybersecurity gap. As wind farms, solar installations, and battery energy storage systems proliferate across the globe, they create a decentralized network of digitally controlled assets that remain largely unprotected. <strong>Rafael Narezzi</strong>, Co-Founder and CEO of <strong>Cyber Energia</strong>, brings more than two decades of technology leadership experience to address this growing vulnerability in critical infrastructure.</p><p><strong>Cyber Energia</strong> takes a fundamentally different approach to OT security. While most cybersecurity companies stop at identifying risks through CVE scores and vulnerability assessments, <strong>Cyber Energia</strong> starts from the risk and translates it into financial terms that executives can act upon. The platform connects technical findings to compliance frameworks including NIS 2.0, IEC 62443, and NERC CIP, providing asset owners with a clear maturity landscape and actionable intelligence.</p><p><strong>Rafael Narezzi</strong> explains that asset owners in the renewable sector operate differently than traditional IT environments. Financial companies often acquire energy assets as investments without maintaining technical staff on-site. When compliance regulations now hold these owners personally liable for cybersecurity failures, they need tools that speak their language: dollars, risk, and return on investment. <strong>Cyber Energia</strong> prices its services per megawatt, demonstrating its commitment to speaking the language of energy.</p><p>The decentralization of energy generation presents unique challenges. <strong>Rafael Narezzi</strong> points to recent cyber attacks on Poland's distributed grid as evidence that threat actors understand how to manipulate multiple remote locations simultaneously to destabilize power networks. Battery energy storage systems present particular risks, as compromised dispatch commands could create grid imbalances similar to the fictional scenario depicted in Ocean's 11. Yet many sites lack even basic cyber hygiene protections.</p><p><strong>Cyber Energia</strong> helps customers understand the financial impact of potential attacks. A 98-megawatt wind turbine site, for example, could lose 1.9 million dollars from just one week of downtime. This quantification enables executives to make informed decisions about relatively modest security investments that significantly reduce their risk exposure. The platform provides a single-view dashboard for organizations managing hundreds of sites across different regions, technologies, and regulatory environments.</p><p><strong>Rafael Narezzi</strong> observes that a CEO before a cyber attack is fundamentally different from a CEO after one. Organizations often underestimate digital risks compared to physical ones, despite living in an increasingly connected world. Regulations like NIS 2.0 now impose personal liability on directors and can revoke operating licenses, removing any excuse for neglecting cybersecurity. The awareness is changing, but <strong>Cyber Energia</strong> continues working to close the gap between compliance requirements and actual security posture across the renewable energy sector.</p><p>This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: <a href="https://www.studioc60.com/creation#full">https://www.studioc60.com/creation#full</a></p><p><strong>GUEST</strong></p><p><strong>Rafael Narezzi</strong>, Co-Founder and CEO of <strong>Cyber Energia</strong><br /><a href="https://www.linkedin.com/in/narezzi/">https://www.linkedin.com/in/narezzi/</a></p><p><strong>RESOURCES</strong></p><p><strong>Cyber Energia</strong><br /><a href="https://cyberenergia.com/">https://cyberenergia.com/</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Rafael Narezzi, Cyber Energia, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT cybersecurity, renewable energy security, critical infrastructure protection, NIS 2.0 compliance, IEC 62443, wind farm cybersecurity, solar energy security, battery energy storage systems, BESS security, decentralized energy grid, cyber risk quantification, energy sector compliance, NERC CIP, operational technology security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27506867" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/83f5e265-19e1-4af3-83b8-b71754bf8902/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=83f5e265-19e1-4af3-83b8-b71754bf8902&amp;feed=kDNbmF_B"/>
      <itunes:title>Securing the Decentralized Energy Grid | A Brand Story Conversation with Rafael Narezzi of Cyber Energia</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Rafael Narezzi, Cyber Energia</itunes:author>
      <itunes:duration>00:28:39</itunes:duration>
      <itunes:summary>The rapid expansion of renewable energy infrastructure creates unprecedented cybersecurity challenges that most organizations are unprepared to address. Discover how financial risk quantification transforms the way asset owners protect their wind, solar, and battery storage investments from invisible digital threats.</itunes:summary>
      <itunes:subtitle>The rapid expansion of renewable energy infrastructure creates unprecedented cybersecurity challenges that most organizations are unprepared to address. Discover how financial risk quantification transforms the way asset owners protect their wind, solar, and battery storage investments from invisible digital threats.</itunes:subtitle>
      <itunes:keywords>battery energy storage systems, decentralized energy grid, renewable energy security, marketing podcast, bess security, critical infrastructure protection, solar energy security, iec 62443, rafael narezzi, nis 2.0 compliance, cyber risk quantification, ot cybersecurity, brand marketing, energy sector compliance, wind farm cybersecurity, cyber energia, brand story, nerc cip, operational technology security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>170</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7d53fe4e-5e53-4609-9776-43a5ee5f61d4</guid>
      <title>From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys</title>
      <description><![CDATA[<p>In this Brand Highlight, <strong>Ivan Milenkovic</strong>, Vice President, Cyber Risk Technology at <strong>Qualys</strong>, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.</p><p>With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, <strong>Milenkovic</strong> argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, <strong>Qualys</strong> helps organizations prioritize threats based on business context through what the company calls TruRisk.</p><p><strong>Milenkovic</strong> describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.</p><p>For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.</p><p><strong>Qualys</strong> addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what <strong>Milenkovic</strong> calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Ivan Milenkovic</strong>, Vice President, Cyber Risk Technology, <strong>Qualys</strong></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ivanmilenkovic/">https://www.linkedin.com/in/ivanmilenkovic/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Qualys</strong> | <a href="https://www.qualys.com">https://www.qualys.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Ivan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Jan 2026 06:43:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ivan Milenkovic, Qualys)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-department-of-no-to-department-of-know-the-ciso-evolution-a-brand-highlight-conversation-with-ivan-milenkovic-vice-president-cyber-risk-technology-of-qualys-muPEy1yW</link>
      <content:encoded><![CDATA[<p>In this Brand Highlight, <strong>Ivan Milenkovic</strong>, Vice President, Cyber Risk Technology at <strong>Qualys</strong>, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.</p><p>With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, <strong>Milenkovic</strong> argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, <strong>Qualys</strong> helps organizations prioritize threats based on business context through what the company calls TruRisk.</p><p><strong>Milenkovic</strong> describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.</p><p>For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.</p><p><strong>Qualys</strong> addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what <strong>Milenkovic</strong> calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Ivan Milenkovic</strong>, Vice President, Cyber Risk Technology, <strong>Qualys</strong></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ivanmilenkovic/">https://www.linkedin.com/in/ivanmilenkovic/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Qualys</strong> | <a href="https://www.qualys.com">https://www.qualys.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Ivan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6361476" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9466e98d-a7d7-4a60-b135-130d03c51c0b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9466e98d-a7d7-4a60-b135-130d03c51c0b&amp;feed=kDNbmF_B"/>
      <itunes:title>From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ivan Milenkovic, Qualys</itunes:author>
      <itunes:duration>00:06:37</itunes:duration>
      <itunes:summary>Ivan Milenkovic of Qualys explains why CISOs must evolve into risk captains who translate technical signals into business language. He introduces the Risk Operations Center concept as a proactive alternative to traditional SOC approaches.</itunes:summary>
      <itunes:subtitle>Ivan Milenkovic of Qualys explains why CISOs must evolve into risk captains who translate technical signals into business language. He introduces the Risk Operations Center concept as a proactive alternative to traditional SOC approaches.</itunes:subtitle>
      <itunes:keywords>ivan milenkovic, brand highlight, risk tolerance, marketing podcast, proactive security, enterprise trurisk management, ciso, sean martin, qualys, risk operations center, brand marketing, roc, vulnerability management, brand story, security leadership, cyber risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>169</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">53985c24-ad26-4f39-9d5e-c5ff109964d5</guid>
      <title>Real-Time Protection Against AI-Driven Account Takeover Fraud | A Brand Highlight Conversation with Israel Mazin, Co-Founder and CEO of Memcyco</title>
      <description><![CDATA[<p>As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. <strong>Israel Mazin</strong>, Co-Founder and CEO of <strong>Memcyco</strong>, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.</p><p><strong>Memcyco</strong> is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, <strong>Memcyco</strong> identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.</p><p>With an agentless deployment that takes just minutes to implement, <strong>Memcyco</strong> delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Israel Mazin</strong>, Co-Founder and CEO of <strong>Memcyco</strong><br />On LinkedIn: <a href="https://www.linkedin.com/in/israel-mazin-62215b/">https://www.linkedin.com/in/israel-mazin-62215b/</a></p><p><strong>RESOURCES</strong></p><p><strong>Memcyco</strong>: <a href="https://www.memcyco.com/">https://www.memcyco.com/</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Israel Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Jan 2026 05:57:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Memcyco, Israel Mazin)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/real-time-protection-against-ai-driven-account-takeover-fraud-a-brand-highlight-conversation-with-israel-mazin-co-founder-and-ceo-of-memcyco-RG00Du_g</link>
      <content:encoded><![CDATA[<p>As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. <strong>Israel Mazin</strong>, Co-Founder and CEO of <strong>Memcyco</strong>, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.</p><p><strong>Memcyco</strong> is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, <strong>Memcyco</strong> identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.</p><p>With an agentless deployment that takes just minutes to implement, <strong>Memcyco</strong> delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Israel Mazin</strong>, Co-Founder and CEO of <strong>Memcyco</strong><br />On LinkedIn: <a href="https://www.linkedin.com/in/israel-mazin-62215b/">https://www.linkedin.com/in/israel-mazin-62215b/</a></p><p><strong>RESOURCES</strong></p><p><strong>Memcyco</strong>: <a href="https://www.memcyco.com/">https://www.memcyco.com/</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Israel Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5345800" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d665f8d0-1680-4e6a-bc7c-bd87bd6d0496/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d665f8d0-1680-4e6a-bc7c-bd87bd6d0496&amp;feed=kDNbmF_B"/>
      <itunes:title>Real-Time Protection Against AI-Driven Account Takeover Fraud | A Brand Highlight Conversation with Israel Mazin, Co-Founder and CEO of Memcyco</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Memcyco, Israel Mazin</itunes:author>
      <itunes:duration>00:05:34</itunes:duration>
      <itunes:summary>AI is making account takeover attacks faster, cheaper, and harder to stop. Discover how one company is flipping the script by detecting victims in real time and feeding scammers fake credentials they can never use.</itunes:summary>
      <itunes:subtitle>AI is making account takeover attacks faster, cheaper, and harder to stop. Discover how one company is flipping the script by detecting victims in real time and feeding scammers fake credentials they can never use.</itunes:subtitle>
      <itunes:keywords>account takeover, brand highlight, credential deception, marketing podcast, digital impersonation, sean martin, ai-driven attacks, real-time fraud detection, memcyco, website spoofing, phishing protection, fraud prevention platform, brand marketing, israel mazin, ato fraud, brand story, agentless security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>168</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">39253a5f-4b6c-4d6c-adde-1406bdba9ee2</guid>
      <title>Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox</title>
      <description><![CDATA[<p>In this Brand Highlight, we talk with <strong>Denny LeCompte</strong>, CEO and Co-Founder of <strong>Portnox</strong>, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.</p><p>Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.</p><p>The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.</p><p>A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.</p><p>Note: This story contains promotional content. Learn more.</p><p>Guest<br />Denny LeCompte, CEO and Co-Founder of Portnox<br /><a href="https://www.linkedin.com/in/dennylecompte/">https://www.linkedin.com/in/dennylecompte/</a></p><p>Resources<br />Learn more about Portnox: <a href="https://www.portnox.com/">https://www.portnox.com/</a></p><p>Are you interested in telling your story?<br />Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p>Keywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Jan 2026 03:28:29 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Denny LeCompte, Portnox)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/identity-access-and-the-rise-of-synthetic-identities-a-brand-highlight-conversation-with-denny-lecompte-ceo-and-co-founder-of-portnox-T1XiYhML</link>
      <content:encoded><![CDATA[<p>In this Brand Highlight, we talk with <strong>Denny LeCompte</strong>, CEO and Co-Founder of <strong>Portnox</strong>, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.</p><p>Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.</p><p>The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.</p><p>A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.</p><p>Note: This story contains promotional content. Learn more.</p><p>Guest<br />Denny LeCompte, CEO and Co-Founder of Portnox<br /><a href="https://www.linkedin.com/in/dennylecompte/">https://www.linkedin.com/in/dennylecompte/</a></p><p>Resources<br />Learn more about Portnox: <a href="https://www.portnox.com/">https://www.portnox.com/</a></p><p>Are you interested in telling your story?<br />Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p>Keywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5550600" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/48adfeda-6606-4a04-ab69-95d06a3cc1ed/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=48adfeda-6606-4a04-ab69-95d06a3cc1ed&amp;feed=kDNbmF_B"/>
      <itunes:title>Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Denny LeCompte, Portnox</itunes:author>
      <itunes:duration>00:05:46</itunes:duration>
      <itunes:summary>Security teams remain confident defending against traditional threats, but far less prepared for AI-driven and synthetic identities. This episode explores why access control and zero trust are becoming critical as non-human identities gain autonomy inside enterprise environments.</itunes:summary>
      <itunes:subtitle>Security teams remain confident defending against traditional threats, but far less prepared for AI-driven and synthetic identities. This episode explores why access control and zero trust are becoming critical as non-human identities gain autonomy inside enterprise environments.</itunes:subtitle>
      <itunes:keywords>marketing podcast, sean martin, access, passwordless, certificates, brand marketing, identity, portnox, denny lecompte, agentic ai, zero trust, brand story, synthetic identities</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>167</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ad846250-d637-48e3-82d6-229d14b54c7e</guid>
      <title>When AI Guesses and Security Pays: Choosing the Right Model for the Right Security Decision | A Brand Story Highlight Conversation with Michael Roytman, CTO of Empirical Security</title>
      <description><![CDATA[<p>Title: The Right Model for the Right Security Task | A Brand Highlight Conversation with Michael Roytman, Co-Founder and CTO of Empirical Security</p><p>In this Brand Highlight conversation, <strong>Michael Roytman</strong>, Co-Founder and CTO of <strong>Empirical Security</strong>, joins Sean Martin to discuss why choosing the right AI model for the right task is essential for effective cybersecurity.</p><p><strong>Michael Roytman</strong> explains how <strong>Empirical Security</strong> takes a data-driven, Moneyball-style approach to preventative security. The company builds and maintains an ensemble of models, including the open EPSS model used by over 100 vendors, global models for vulnerability exploitation forecasting, and local models tailored to each customer's unique environment.</p><p>The conversation explores a critical finding: LLMs perform poorly at predictive security tasks. <strong>Michael Roytman</strong> shares research he published in Forbes comparing EPSS to LLMs from Google, OpenAI, and Anthropic. While LLMs excel at summarization and classification, they struggle to predict future exploitation events. Purpose-built models like XGBoost consistently outperform LLMs for probability forecasting.</p><p><strong>Empirical Security</strong> positions itself as a data science company operating on security data rather than a traditional security vendor. With two-thirds of the founding team holding data science backgrounds, the company trains models from scratch and continuously retrains them as environments and threat landscapes evolve.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Michael Roytman</strong>, Co-Founder and CTO of <strong>Empirical Security</strong></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-roytman/">https://www.linkedin.com/in/michael-roytman/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Empirical Security</strong> | <a href="https://www.empiricalsecurity.com">https://www.empiricalsecurity.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Empirical Security, Michael Roytman, data-driven security, vulnerability management, EPSS, risk-based vulnerability management, AI in cybersecurity, machine learning security, LLM limitations, predictive security models, XGBoost, local models, global models, preventative security, Moneyball security, cybersecurity AI, threat intelligence, security data science, model retraining, ITSPmagazine, Brand Highlight, Studio C60</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Dec 2025 18:30:36 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Michael Roytman, Empirical Security)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-ai-guesses-and-security-pays-choosing-the-right-model-for-the-right-security-decision-a-brand-story-highlight-conversation-with-michael-roytman-cto-of-empirical-security-K9G6RAnN</link>
      <content:encoded><![CDATA[<p>Title: The Right Model for the Right Security Task | A Brand Highlight Conversation with Michael Roytman, Co-Founder and CTO of Empirical Security</p><p>In this Brand Highlight conversation, <strong>Michael Roytman</strong>, Co-Founder and CTO of <strong>Empirical Security</strong>, joins Sean Martin to discuss why choosing the right AI model for the right task is essential for effective cybersecurity.</p><p><strong>Michael Roytman</strong> explains how <strong>Empirical Security</strong> takes a data-driven, Moneyball-style approach to preventative security. The company builds and maintains an ensemble of models, including the open EPSS model used by over 100 vendors, global models for vulnerability exploitation forecasting, and local models tailored to each customer's unique environment.</p><p>The conversation explores a critical finding: LLMs perform poorly at predictive security tasks. <strong>Michael Roytman</strong> shares research he published in Forbes comparing EPSS to LLMs from Google, OpenAI, and Anthropic. While LLMs excel at summarization and classification, they struggle to predict future exploitation events. Purpose-built models like XGBoost consistently outperform LLMs for probability forecasting.</p><p><strong>Empirical Security</strong> positions itself as a data science company operating on security data rather than a traditional security vendor. With two-thirds of the founding team holding data science backgrounds, the company trains models from scratch and continuously retrains them as environments and threat landscapes evolve.</p><p>This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: <a href="https://www.studioc60.com/creation#highlight">https://www.studioc60.com/creation#highlight</a></p><p><strong>GUEST</strong></p><p><strong>Michael Roytman</strong>, Co-Founder and CTO of <strong>Empirical Security</strong></p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-roytman/">https://www.linkedin.com/in/michael-roytman/</a></p><p><strong>RESOURCES</strong></p><p>Learn more about <strong>Empirical Security</strong> | <a href="https://www.empiricalsecurity.com">https://www.empiricalsecurity.com</a></p><p>Are you interested in telling your story?<br />▶︎ Full Length Brand Story: <a href="https://www.studioc60.com/content-creation#full">https://www.studioc60.com/content-creation#full</a><br />▶︎ Brand Spotlight Story: <a href="https://www.studioc60.com/content-creation#spotlight">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ Brand Highlight Story: <a href="https://www.studioc60.com/content-creation#highlight">https://www.studioc60.com/content-creation#highlight</a></p><p><strong>KEYWORDS</strong></p><p>Empirical Security, Michael Roytman, data-driven security, vulnerability management, EPSS, risk-based vulnerability management, AI in cybersecurity, machine learning security, LLM limitations, predictive security models, XGBoost, local models, global models, preventative security, Moneyball security, cybersecurity AI, threat intelligence, security data science, model retraining, ITSPmagazine, Brand Highlight, Studio C60</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6271161" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/40d63af6-e9db-4345-ac71-c1df433a9da1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=40d63af6-e9db-4345-ac71-c1df433a9da1&amp;feed=kDNbmF_B"/>
      <itunes:title>When AI Guesses and Security Pays: Choosing the Right Model for the Right Security Decision | A Brand Story Highlight Conversation with Michael Roytman, CTO of Empirical Security</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Michael Roytman, Empirical Security</itunes:author>
      <itunes:duration>00:06:31</itunes:duration>
      <itunes:summary>Security teams are overusing general purpose AI models for decisions they were never designed to make. This conversation explains why predictive security requires purpose built models, continuous retraining, and disciplined data science.</itunes:summary>
      <itunes:subtitle>Security teams are overusing general purpose AI models for decisions they were never designed to make. This conversation explains why predictive security requires purpose built models, continuous retraining, and disciplined data science.</itunes:subtitle>
      <itunes:keywords>machinelearning, cybersecurity ai, marketing podcast, machine learning security, michael roytman, predictive security, sean martin, cybersecurity, empirical security, forecasting, risk forecasting, vulnerability, brand spotlight, security data science, brand marketing, preventative security, ai, risk, brand story podcast, vulnerability management, ed beis, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>166</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cca96598-c6b0-4e29-926f-634f0f098a04</guid>
      <title>AI Adoption Without Readiness: When AI Ambition Collides With Data Reality | A TrustedTech Brand Story Conversation with Julian Hamood, Founder and Chief Visionary Officer at Trusted Tech</title>
      <description><![CDATA[<p>As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinformation.</p><p>Julian shares that most organizations are eager to activate tools like AI agents and copilots, yet few have addressed the underlying condition of their environments. Unstructured data sprawl, fragmented cloud architectures, and legacy systems create blind spots that AI does not fix. Instead, AI accelerates whatever already exists, good or bad.</p><p>A central theme of the conversation is readiness. Julian explains that AI success depends on disciplined data classification, permission hygiene, and governance before automation begins. Without that groundwork, organizations risk exposing sensitive financial, HR, or executive data to unintended audiences simply because an AI system can surface it.</p><p>The discussion also explores the operational reality beneath the surface. Most environments are a patchwork of Azure, AWS, on-prem infrastructure, SaaS platforms, and custom applications, often shaped by multiple IT leaders over time. When AI is layered onto this complexity without architectural clarity, inaccurate outputs and flawed business decisions quickly follow.</p><p>Sean and Julian also examine how AI initiatives often emerge from unexpected places. Legal teams, business units, and individual contributors now build their own AI workflows using low-code and no-code tools, frequently outside formal IT oversight. At the same time, founders and CFOs push for rapid AI adoption while resisting the investment required to clean and secure the foundation.</p><p>The episode highlights why AI programs are never one-and-done projects. Ongoing maintenance, data validation, and security oversight are essential as inputs change and systems evolve. Julian emphasizes that organizations must treat AI as a permanent capability on the roadmap, not a short-term experiment.</p><p>Ultimately, the conversation frames AI not as a shortcut, but as a force multiplier. When paired with disciplined architecture and trusted guidance, AI enables scale, speed, and confidence. Without that discipline, it simply magnifies existing problems.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Julian Hamood</strong>, Founder and Chief Visionary Officer at TrustedTech | On LinkedIn: <a href="https://www.linkedin.com/in/julian-hamood/" target="_blank">https://www.linkedin.com/in/julian-hamood/</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ <strong>Highlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#highlight" target="_blank">https://www.studioc60.com/content-creation#highlight</a></p><p>Keywords: sean martin, julian hamood, trusted tech, ai readiness, data governance, ai security, enterprise ai, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Dec 2025 14:01:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, Julian Hamood)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/ai-adoption-without-readiness-when-ai-ambition-collides-with-data-reality-a-trustedtech-brand-story-conversation-with-julian-hamood-founder-and-chief-visionary-officer-at-trustedtech-YsMSC4rX</link>
      <content:encoded><![CDATA[<p>As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinformation.</p><p>Julian shares that most organizations are eager to activate tools like AI agents and copilots, yet few have addressed the underlying condition of their environments. Unstructured data sprawl, fragmented cloud architectures, and legacy systems create blind spots that AI does not fix. Instead, AI accelerates whatever already exists, good or bad.</p><p>A central theme of the conversation is readiness. Julian explains that AI success depends on disciplined data classification, permission hygiene, and governance before automation begins. Without that groundwork, organizations risk exposing sensitive financial, HR, or executive data to unintended audiences simply because an AI system can surface it.</p><p>The discussion also explores the operational reality beneath the surface. Most environments are a patchwork of Azure, AWS, on-prem infrastructure, SaaS platforms, and custom applications, often shaped by multiple IT leaders over time. When AI is layered onto this complexity without architectural clarity, inaccurate outputs and flawed business decisions quickly follow.</p><p>Sean and Julian also examine how AI initiatives often emerge from unexpected places. Legal teams, business units, and individual contributors now build their own AI workflows using low-code and no-code tools, frequently outside formal IT oversight. At the same time, founders and CFOs push for rapid AI adoption while resisting the investment required to clean and secure the foundation.</p><p>The episode highlights why AI programs are never one-and-done projects. Ongoing maintenance, data validation, and security oversight are essential as inputs change and systems evolve. Julian emphasizes that organizations must treat AI as a permanent capability on the roadmap, not a short-term experiment.</p><p>Ultimately, the conversation frames AI not as a shortcut, but as a force multiplier. When paired with disciplined architecture and trusted guidance, AI enables scale, speed, and confidence. Without that discipline, it simply magnifies existing problems.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Julian Hamood</strong>, Founder and Chief Visionary Officer at TrustedTech | On LinkedIn: <a href="https://www.linkedin.com/in/julian-hamood/" target="_blank">https://www.linkedin.com/in/julian-hamood/</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ <strong>Highlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#highlight" target="_blank">https://www.studioc60.com/content-creation#highlight</a></p><p>Keywords: sean martin, julian hamood, trusted tech, ai readiness, data governance, ai security, enterprise ai, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32906912" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/be72b1c8-47a3-49ea-b9ce-7334f7488894/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=be72b1c8-47a3-49ea-b9ce-7334f7488894&amp;feed=kDNbmF_B"/>
      <itunes:title>AI Adoption Without Readiness: When AI Ambition Collides With Data Reality | A TrustedTech Brand Story Conversation with Julian Hamood, Founder and Chief Visionary Officer at Trusted Tech</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, Julian Hamood</itunes:author>
      <itunes:duration>00:34:16</itunes:duration>
      <itunes:summary>AI does not fix messy environments, it amplifies them. This episode explores what real AI readiness looks like when data, security, and architecture are treated as prerequisites rather than afterthoughts.</itunes:summary>
      <itunes:subtitle>AI does not fix messy environments, it amplifies them. This episode explores what real AI readiness looks like when data, security, and architecture are treated as prerequisites rather than afterthoughts.</itunes:subtitle>
      <itunes:keywords>marketing podcast, ai readiness, ai security, sean martin, data governance, julian hamood, brand spotlight, brand marketing, trusted tech, enterprise ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>165</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4afee443-3640-406c-9e1e-ba844df14328</guid>
      <title>Mastering The Art of Risk Management Without Losing Your Mind | A CyXcel Brand Story Conversation with Megha Kumar, Partner, Chief Product Officer &amp; Head of Geopolitical Risk</title>
      <description><![CDATA[<p>Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by complexity.</p><p>Kumar shares how digital resilience is no longer a technical problem alone. Regulations, infrastructure dependencies, geopolitical tensions, supply chain exposure, and emerging technologies such as AI now converge into a single operational reality. Organizations that treat these as isolated issues often miss the real picture, where one decision quietly amplifies risk across multiple domains.</p><p>A central theme of the conversation is proportion. Kumar emphasizes that risk management is not about eliminating uncertainty, but aligning effort with value. Not every threat matters equally to every organization. Understanding who you are, where you operate, and where you are going determines which signals deserve attention and which are simply noise.</p><p>The discussion also reframes geopolitics as a daily business concern rather than a distant policy issue. Companies operate inside global power dynamics whether they acknowledge it or not. Technology choices, supplier relationships, and market expansion decisions increasingly carry political and regulatory consequences that surface quickly and without warning.</p><p>Rather than advocating for massive new departments or rigid frameworks, Kumar outlines a practical approach. Organizations can decide whether to avoid, mitigate, transfer, or tolerate risk, then revisit those decisions as conditions change. This mindset supports growth and innovation while avoiding the false comfort of static checklists.</p><p>The episode closes on culture. Effective risk management depends on listening across roles, disciplines, and seniority. Internal dissent, diverse viewpoints, and external validation are presented as assets, not obstacles. In a world where uncertainty is constant, resilience comes from clarity, not control.</p><p>Learn more about CyXcel: <a href="https://itspm.ag/cyxcel-922331" target="_blank">https://itspm.ag/cyxcel-922331</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Megha Kumar</strong>, Partner, Chief Product Officer & Head of Geopolitical Risk at CyXcel | On LinkedIn: <a href="https://www.linkedin.com/in/drmeghakumarcyxcel/" target="_blank">https://www.linkedin.com/in/drmeghakumarcyxcel/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CyXcel: <a href="https://www.itspmagazine.com/directory/cyxcel" target="_blank">https://www.itspmagazine.com/directory/cyxcel</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ <strong>Highlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#highlight" target="_blank">https://www.studioc60.com/content-creation#highlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 16 Dec 2025 01:48:21 +0000</pubDate>
      <author>contact@itspmagazine.com (Megha Kumar, Sean Martin, CyXcel, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/mastering-the-art-of-risk-management-without-losing-your-mind-a-cyxcel-brand-story-conversation-with-megha-kumar-partner-chief-product-officer-head-of-geopolitical-risk-sug0dAgr</link>
      <content:encoded><![CDATA[<p>Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by complexity.</p><p>Kumar shares how digital resilience is no longer a technical problem alone. Regulations, infrastructure dependencies, geopolitical tensions, supply chain exposure, and emerging technologies such as AI now converge into a single operational reality. Organizations that treat these as isolated issues often miss the real picture, where one decision quietly amplifies risk across multiple domains.</p><p>A central theme of the conversation is proportion. Kumar emphasizes that risk management is not about eliminating uncertainty, but aligning effort with value. Not every threat matters equally to every organization. Understanding who you are, where you operate, and where you are going determines which signals deserve attention and which are simply noise.</p><p>The discussion also reframes geopolitics as a daily business concern rather than a distant policy issue. Companies operate inside global power dynamics whether they acknowledge it or not. Technology choices, supplier relationships, and market expansion decisions increasingly carry political and regulatory consequences that surface quickly and without warning.</p><p>Rather than advocating for massive new departments or rigid frameworks, Kumar outlines a practical approach. Organizations can decide whether to avoid, mitigate, transfer, or tolerate risk, then revisit those decisions as conditions change. This mindset supports growth and innovation while avoiding the false comfort of static checklists.</p><p>The episode closes on culture. Effective risk management depends on listening across roles, disciplines, and seniority. Internal dissent, diverse viewpoints, and external validation are presented as assets, not obstacles. In a world where uncertainty is constant, resilience comes from clarity, not control.</p><p>Learn more about CyXcel: <a href="https://itspm.ag/cyxcel-922331" target="_blank">https://itspm.ag/cyxcel-922331</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Megha Kumar</strong>, Partner, Chief Product Officer & Head of Geopolitical Risk at CyXcel | On LinkedIn: <a href="https://www.linkedin.com/in/drmeghakumarcyxcel/" target="_blank">https://www.linkedin.com/in/drmeghakumarcyxcel/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CyXcel: <a href="https://www.itspmagazine.com/directory/cyxcel" target="_blank">https://www.itspmagazine.com/directory/cyxcel</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a><br />▶︎ <strong>Highlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#highlight" target="_blank">https://www.studioc60.com/content-creation#highlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="42449749" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9c313972-16c6-44a5-9d21-b907b7ebbb16/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9c313972-16c6-44a5-9d21-b907b7ebbb16&amp;feed=kDNbmF_B"/>
      <itunes:title>Mastering The Art of Risk Management Without Losing Your Mind | A CyXcel Brand Story Conversation with Megha Kumar, Partner, Chief Product Officer &amp; Head of Geopolitical Risk</itunes:title>
      <itunes:author>Megha Kumar, Sean Martin, CyXcel, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:duration>00:44:13</itunes:duration>
      <itunes:summary>Digital risk now blends technology, regulation, geopolitics, and business strategy into a single leadership challenge. This episode explores how organizations can manage that reality with proportion, clarity, and confidence rather than fear.</itunes:summary>
      <itunes:subtitle>Digital risk now blends technology, regulation, geopolitics, and business strategy into a single leadership challenge. This episode explores how organizations can manage that reality with proportion, clarity, and confidence rather than fear.</itunes:subtitle>
      <itunes:keywords>megha kumar, digital risk management, cybersecurity leadership, marketing podcast, marco ciappelli, digital resilience, supply chain risk, sean martin, ai risk management, geopolitical risk, brand marketing, cyxcel, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>164</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">92ff8da8-4332-499b-863c-77e2758c6688</guid>
      <title>A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson</title>
      <description><![CDATA[<p>This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.</p><p>Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.</p><p>The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.</p><p>This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.</p><p>For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.</p><p>Learn more about Screenly: <a href="https://itspm.ag/screenly1o" target="_blank">https://itspm.ag/screenly1o</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Viktor Petersson</strong>, Co-founder of Screenly | On LinkedIn: <a href="https://www.linkedin.com/in/vpetersson/" target="_blank">https://www.linkedin.com/in/vpetersson/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from Screenly: <a href="https://www.itspmagazine.com/directory/screenly" target="_blank">https://www.itspmagazine.com/directory/screenly</a></p><p>LinkedIn Post: <a href="https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkk" target="_blank">https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkk</a></p><p>Blog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: <a href="https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/" target="_blank">https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><p>Keywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 25 Nov 2025 23:50:19 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, Sean Martin, ITSPmagazine, Viktor Petersson, Screenly)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-practical-look-at-incident-handling-how-a-sunday-night-bug-bounty-email-triggered-a-full-investigation-a-screenly-brand-spotlight-conversation-with-co-founder-of-screenly-viktor-petersson-_hsF4mr1</link>
      <content:encoded><![CDATA[<p>This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.</p><p>Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.</p><p>The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.</p><p>This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.</p><p>For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.</p><p>Learn more about Screenly: <a href="https://itspm.ag/screenly1o" target="_blank">https://itspm.ag/screenly1o</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Viktor Petersson</strong>, Co-founder of Screenly | On LinkedIn: <a href="https://www.linkedin.com/in/vpetersson/" target="_blank">https://www.linkedin.com/in/vpetersson/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from Screenly: <a href="https://www.itspmagazine.com/directory/screenly" target="_blank">https://www.itspmagazine.com/directory/screenly</a></p><p>LinkedIn Post: <a href="https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkk" target="_blank">https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkk</a></p><p>Blog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: <a href="https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/" target="_blank">https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><p>Keywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17091311" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1c77686b-3d1a-4f5b-87b2-75e42926b3c7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1c77686b-3d1a-4f5b-87b2-75e42926b3c7&amp;feed=kDNbmF_B"/>
      <itunes:title>A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson</itunes:title>
      <itunes:author>Marco Ciappelli, Sean Martin, ITSPmagazine, Viktor Petersson, Screenly</itunes:author>
      <itunes:duration>00:17:48</itunes:duration>
      <itunes:summary>A routine bug bounty submission triggered a deep investigation at a digital signage company and revealed how strong processes guide fast, measured incident response. The discussion highlights what transparency looks like in practice and why passwordless authentication is becoming central to reducing credential driven risks.</itunes:summary>
      <itunes:subtitle>A routine bug bounty submission triggered a deep investigation at a digital signage company and revealed how strong processes guide fast, measured incident response. The discussion highlights what transparency looks like in practice and why passwordless authentication is becoming central to reducing credential driven risks.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, viktor petersson, incidentresponse, sean martin, signage, cybersecurity, authentication, brand spotlight, bugbounty, security, brand marketing, breaches, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>163</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3c71e38a-9e80-4b0f-8db8-5c45dd10c5a0</guid>
      <title>Solar EV That Never Needs Charging w/ Robert Hoevers (Squad Mobility) | Brand Highlight Story</title>
      <description><![CDATA[<h3>The Solar Car That Charges Itself While You Live Your Life</h3><p>Growing up, I always wondered: why can't cars just recharge themselves as we drive? Turns out, someone finally built exactly that.</p><p>Robert Hoevers and his team at Squad Mobility created a solar-powered city car that does something brilliantly simple—it charges itself. There's a solar panel on the roof that continuously feeds the battery whether you're parked at the grocery store, sitting in your driveway, or cruising around town.</p><p>The engineering is impressive, but the user experience is even better. For most people living in sunny climates—anywhere between 45 degrees north and 45 degrees south latitude (roughly Spain to South Africa)—you'll never need to find a charging station. Ever.</p><p>Here's the reality: the average person drives about 12 kilometers a day for daily errands. School runs, grocery shopping, meeting friends. The Squad solar car has a 150-kilometer maximum range, and the sun replenishes what you use. You just drive it, park it, and forget about charging infrastructure entirely.</p><p>This is what smart urban mobility looks like. It's street legal with proper crash structures, seat belts, and rollover protection. It tops out at 45 or 70 kilometers per hour depending on which model you choose—fast enough for city streets, not built for highways. In Europe, you only need a moped license for the slower version.</p><p>The design sits somewhere between a golf cart and a Smart car, which makes perfect sense. Squad isn't trying to replace your family vehicle. They're solving the "second car" problem—those short daily trips where driving a massive SUV feels ridiculous.</p><p>The market is responding. Squad Mobility has over 5,300 pre-orders and secured 1.5 million euros in European subsidies. They're currently crowdfunding on Republic to bridge the final gap before production starts in about a year.</p><p>What surprised me most? Ten percent of their pre-orders come from American gated communities and golf cart neighborhoods. These communities already understand the value of compact, efficient vehicles for daily errands. Squad just made them solar-powered and street legal.</p><p>Yes, you need consistent sunlight. If you live in perpetually cloudy climates, you'll still need to plug in occasionally. But for millions of people in sunny regions tired of hunting for charging stations or paying electricity bills to charge their second car, Squad Mobility built the obvious solution that somehow nobody else did.</p><p>Sometimes innovation isn't about reinventing the wheel. It's about putting a solar panel on the roof and letting the sun do the work.</p><p>This is the future of urban mobility, and it's arriving next year.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 22 Nov 2025 04:23:24 +0000</pubDate>
      <author>contact@itspmagazine.com (Squad Mobility, Robert Hoevers, Marco Ciappelli, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/solar-ev-that-never-needs-charging-w-robert-hoevers-squad-mobility-brand-highlight-story-kXKakgly</link>
      <content:encoded><![CDATA[<h3>The Solar Car That Charges Itself While You Live Your Life</h3><p>Growing up, I always wondered: why can't cars just recharge themselves as we drive? Turns out, someone finally built exactly that.</p><p>Robert Hoevers and his team at Squad Mobility created a solar-powered city car that does something brilliantly simple—it charges itself. There's a solar panel on the roof that continuously feeds the battery whether you're parked at the grocery store, sitting in your driveway, or cruising around town.</p><p>The engineering is impressive, but the user experience is even better. For most people living in sunny climates—anywhere between 45 degrees north and 45 degrees south latitude (roughly Spain to South Africa)—you'll never need to find a charging station. Ever.</p><p>Here's the reality: the average person drives about 12 kilometers a day for daily errands. School runs, grocery shopping, meeting friends. The Squad solar car has a 150-kilometer maximum range, and the sun replenishes what you use. You just drive it, park it, and forget about charging infrastructure entirely.</p><p>This is what smart urban mobility looks like. It's street legal with proper crash structures, seat belts, and rollover protection. It tops out at 45 or 70 kilometers per hour depending on which model you choose—fast enough for city streets, not built for highways. In Europe, you only need a moped license for the slower version.</p><p>The design sits somewhere between a golf cart and a Smart car, which makes perfect sense. Squad isn't trying to replace your family vehicle. They're solving the "second car" problem—those short daily trips where driving a massive SUV feels ridiculous.</p><p>The market is responding. Squad Mobility has over 5,300 pre-orders and secured 1.5 million euros in European subsidies. They're currently crowdfunding on Republic to bridge the final gap before production starts in about a year.</p><p>What surprised me most? Ten percent of their pre-orders come from American gated communities and golf cart neighborhoods. These communities already understand the value of compact, efficient vehicles for daily errands. Squad just made them solar-powered and street legal.</p><p>Yes, you need consistent sunlight. If you live in perpetually cloudy climates, you'll still need to plug in occasionally. But for millions of people in sunny regions tired of hunting for charging stations or paying electricity bills to charge their second car, Squad Mobility built the obvious solution that somehow nobody else did.</p><p>Sometimes innovation isn't about reinventing the wheel. It's about putting a solar panel on the roof and letting the sun do the work.</p><p>This is the future of urban mobility, and it's arriving next year.</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5806796" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d973e74a-b526-4513-b1e9-100b55c394b5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d973e74a-b526-4513-b1e9-100b55c394b5&amp;feed=kDNbmF_B"/>
      <itunes:title>Solar EV That Never Needs Charging w/ Robert Hoevers (Squad Mobility) | Brand Highlight Story</itunes:title>
      <itunes:author>Squad Mobility, Robert Hoevers, Marco Ciappelli, ITSPmagazine</itunes:author>
      <itunes:duration>00:06:02</itunes:duration>
      <itunes:summary>The Solar Car That Charges Itself While You Live Your Life
Growing up, I always wondered: why can&apos;t cars just recharge themselves as we drive? Turns out, someone finally built exactly that.</itunes:summary>
      <itunes:subtitle>The Solar Car That Charges Itself While You Live Your Life
Growing up, I always wondered: why can&apos;t cars just recharge themselves as we drive? Turns out, someone finally built exactly that.</itunes:subtitle>
      <itunes:keywords>small electric car, squad mobility, marketing podcast, marco ciappelli, lsv vehicle, solar powered car, low speed vehicle, solar city car, sean martin, electric vehicle, ev charging solution, micro mobility, golf cart alternative, solar charging, solar panel car, green transportation, gated community vehicle, sustainable transport, climate tech, european ev, second car, urban ev, brand story podcast, brand story, urban mobility</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>162</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2196f688-67e5-44c5-896c-4e1f2dac8bac</guid>
      <title>How to Make One SOC Analyst Work Like Ten: Stop Normalizing Everything—Start Solving Something | A Crogl Brand Story Conversation with CEO, Monzy Merza</title>
      <description><![CDATA[<p><strong>When “Normal” Doesn’t Work: Rethinking Data and the Role of the SOC Analyst</strong></p><p>Monzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to discuss how cybersecurity teams can finally move beyond the treadmill of normalization, alert fatigue, and brittle playbooks that keep analysts from doing what they signed up to do—find and stop bad actors.</p><p>Merza draws from his experience across research, security operations, and leadership roles at Splunk, Databricks, and one of the world’s largest banks. His message is clear: the industry’s long-standing approach of forcing all data into one format before analysis has reached its limit. Organizations are spending millions trying to normalize data that constantly changes, and analysts are paying the price—buried under alerts they can’t meaningfully investigate.</p><p>The conversation highlights the human side of this issue. Analysts often join the field to protect their organizations, but instead find themselves working on repetitive tickets with little context, limited feedback loops, and an impossible expectation to know everything—from email headers to endpoint logs. They are firefighters answering endless 911 calls, most of which turn out to be false alarms.</p><p>Crogl’s approach replaces that normalization-first mindset with an analyst-first model. By operating directly on data where it lives—without requiring migration or schema alignment—it allows every analyst to investigate deeper, faster, and more consistently. Each action taken by one team member becomes shared knowledge for the next, creating an adaptive, AI-driven system that evolves with the organization.</p><p>For CISOs, this means measurable consistency, auditability, and trust in outcomes. For analysts, it means rediscovering purpose—focusing on meaningful investigations instead of administrative noise.</p><p>The result is a more capable, connected SOC where AI augments human reasoning rather than replacing it. As Merza puts it, the new normal is no normalization—just real work, done better.</p><p><strong>Watch the full interview and product demo: </strong><a href="https://youtu.be/7C4zOvF9sdk" target="_blank">https://youtu.be/7C4zOvF9sdk</a></p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Monzy Merza</strong>, Founder and CEO of CROGL | On LinkedIn: <a href="https://www.linkedin.com/in/monzymerza/" target="_blank">https://www.linkedin.com/in/monzymerza/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Brand Spotlight: The Schema Strikes Back: Killing the Normalization Tax on the SOC: <a href="https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace" target="_blank">https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace</a> [Video: <a href="https://youtu.be/Kx2JEE_tYq0" target="_blank">https://youtu.be/Kx2JEE_tYq0</a>]</p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Nov 2025 04:17:17 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, CROGL, Marco Ciappelli, Monzy Merza)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/how-to-make-one-soc-analyst-work-like-ten-stop-normalizing-everythingstart-solving-something-a-crogl-brand-story-conversation-with-ceo-monzy-merza-gUWf0fbo</link>
      <content:encoded><![CDATA[<p><strong>When “Normal” Doesn’t Work: Rethinking Data and the Role of the SOC Analyst</strong></p><p>Monzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to discuss how cybersecurity teams can finally move beyond the treadmill of normalization, alert fatigue, and brittle playbooks that keep analysts from doing what they signed up to do—find and stop bad actors.</p><p>Merza draws from his experience across research, security operations, and leadership roles at Splunk, Databricks, and one of the world’s largest banks. His message is clear: the industry’s long-standing approach of forcing all data into one format before analysis has reached its limit. Organizations are spending millions trying to normalize data that constantly changes, and analysts are paying the price—buried under alerts they can’t meaningfully investigate.</p><p>The conversation highlights the human side of this issue. Analysts often join the field to protect their organizations, but instead find themselves working on repetitive tickets with little context, limited feedback loops, and an impossible expectation to know everything—from email headers to endpoint logs. They are firefighters answering endless 911 calls, most of which turn out to be false alarms.</p><p>Crogl’s approach replaces that normalization-first mindset with an analyst-first model. By operating directly on data where it lives—without requiring migration or schema alignment—it allows every analyst to investigate deeper, faster, and more consistently. Each action taken by one team member becomes shared knowledge for the next, creating an adaptive, AI-driven system that evolves with the organization.</p><p>For CISOs, this means measurable consistency, auditability, and trust in outcomes. For analysts, it means rediscovering purpose—focusing on meaningful investigations instead of administrative noise.</p><p>The result is a more capable, connected SOC where AI augments human reasoning rather than replacing it. As Merza puts it, the new normal is no normalization—just real work, done better.</p><p><strong>Watch the full interview and product demo: </strong><a href="https://youtu.be/7C4zOvF9sdk" target="_blank">https://youtu.be/7C4zOvF9sdk</a></p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Monzy Merza</strong>, Founder and CEO of CROGL | On LinkedIn: <a href="https://www.linkedin.com/in/monzymerza/" target="_blank">https://www.linkedin.com/in/monzymerza/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Brand Spotlight: The Schema Strikes Back: Killing the Normalization Tax on the SOC: <a href="https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace" target="_blank">https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace</a> [Video: <a href="https://youtu.be/Kx2JEE_tYq0" target="_blank">https://youtu.be/Kx2JEE_tYq0</a>]</p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37541652" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7acaf1b3-642f-4545-9ff0-4146e27f3b94/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7acaf1b3-642f-4545-9ff0-4146e27f3b94&amp;feed=kDNbmF_B"/>
      <itunes:title>How to Make One SOC Analyst Work Like Ten: Stop Normalizing Everything—Start Solving Something | A Crogl Brand Story Conversation with CEO, Monzy Merza</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, CROGL, Marco Ciappelli, Monzy Merza</itunes:author>
      <itunes:duration>00:39:06</itunes:duration>
      <itunes:summary>This Brand Story episode explores how security operations can move past the limits of data normalization and enable every analyst to perform like an entire team. Monzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to show how AI-driven collaboration reshapes what’s possible in the SOC.</itunes:summary>
      <itunes:subtitle>This Brand Story episode explores how security operations can move past the limits of data normalization and enable every analyst to perform like an entire team. Monzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to show how AI-driven collaboration reshapes what’s possible in the SOC.</itunes:subtitle>
      <itunes:keywords>data, marketing podcast, marco ciappelli, siem, sean martin, cybersecurity, crogl, soc, monzy merza, brand marketing, ai, brand story podcast, brand story, analyst</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>161</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3b72c983-7ae9-460b-a445-ddbef5252877</guid>
      <title>The Schema Strikes Back: Killing the Normalization Tax on the SOC | A Crogl Spotlight Brand Story Conversation with Cory Wallace</title>
      <description><![CDATA[<p><strong>Breaking Free from Data Normalization: A Smarter Path for Security Teams</strong></p><p>Traditional security models were built on a simple idea: collect data, normalize it, and analyze it. But as Director of Product Marketing Cory Wallace explains in this conversation with Sean Martin, that model no longer fits the reality of modern security operations. Data now lives across systems, clouds, and lakes—making normalization an inefficient, error-prone step that slows teams down and risks critical blind spots.</p><p><strong>Rethinking How Analysts Work with Data</strong></p><p>Cory describes how schema drift, inconsistent field naming, and vendor-specific query languages have turned the analyst’s job into a maze of manual mapping and guesswork. Each product update or schema change introduces a chance to miss something important—something an attacker is counting on. Crogl’s new patent eliminates this problem by enabling search and correlation across unnormalized data, creating a unified analytical view without forcing everything into one rigid format.</p><p><strong>From Data Chaos to Analyst Empowerment</strong></p><p>This shift isn’t just technical—it’s cultural. Instead of treating SOC analysts as passive alert closers, Crogl’s model empowers them with meaningful context from the start. Alerts now come with historical data, cross-referenced fields, and prebuilt queries, giving analysts the information they need to make decisions faster and more confidently.</p><p><strong>Efficiency with Intelligence</strong></p><p>Wallace explains how this approach saves time, reduces training burdens, and cuts dependency on multiple query languages. It helps overworked teams move from reactive triage to proactive investigation. By removing unnecessary layers of data transformation, organizations can accelerate incident resolution, minimize risk, and help analysts focus on what matters most—catching what others miss.</p><p>At its core, the conversation highlights how removing the barriers of data normalization can redefine what’s possible in modern security operations.</p><p><strong>Watch the full interview:</strong> <a href="https://youtu.be/Kx2JEE_tYq0" target="_blank">https://youtu.be/Kx2JEE_tYq0</a></p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Cory Wallace</strong>, Director of Product Marketing at CROGL | On LinkedIn: <a href="https://www.linkedin.com/in/corywallacecrogl/" target="_blank">https://www.linkedin.com/in/corywallacecrogl/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Press Release: <a href="https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.html" target="_blank">https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.html</a><br /><br />Forbes Article: <a href="https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/" target="_blank">https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/</a><br /><br />LinkedIn Post: <a href="https://www.linkedin.com/posts/activity-7391913358817517569-QaCH" target="_blank">https://www.linkedin.com/posts/activity-7391913358817517569-QaCH</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Nov 2025 00:43:31 +0000</pubDate>
      <author>contact@itspmagazine.com (CROGL, Sean Martin, Marco Ciappelli, ITSPmagazine, Cory Wallace)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-crogl-spotlight-brand-story-conversation-with-cory-wallace-Aq0k1_4w</link>
      <content:encoded><![CDATA[<p><strong>Breaking Free from Data Normalization: A Smarter Path for Security Teams</strong></p><p>Traditional security models were built on a simple idea: collect data, normalize it, and analyze it. But as Director of Product Marketing Cory Wallace explains in this conversation with Sean Martin, that model no longer fits the reality of modern security operations. Data now lives across systems, clouds, and lakes—making normalization an inefficient, error-prone step that slows teams down and risks critical blind spots.</p><p><strong>Rethinking How Analysts Work with Data</strong></p><p>Cory describes how schema drift, inconsistent field naming, and vendor-specific query languages have turned the analyst’s job into a maze of manual mapping and guesswork. Each product update or schema change introduces a chance to miss something important—something an attacker is counting on. Crogl’s new patent eliminates this problem by enabling search and correlation across unnormalized data, creating a unified analytical view without forcing everything into one rigid format.</p><p><strong>From Data Chaos to Analyst Empowerment</strong></p><p>This shift isn’t just technical—it’s cultural. Instead of treating SOC analysts as passive alert closers, Crogl’s model empowers them with meaningful context from the start. Alerts now come with historical data, cross-referenced fields, and prebuilt queries, giving analysts the information they need to make decisions faster and more confidently.</p><p><strong>Efficiency with Intelligence</strong></p><p>Wallace explains how this approach saves time, reduces training burdens, and cuts dependency on multiple query languages. It helps overworked teams move from reactive triage to proactive investigation. By removing unnecessary layers of data transformation, organizations can accelerate incident resolution, minimize risk, and help analysts focus on what matters most—catching what others miss.</p><p>At its core, the conversation highlights how removing the barriers of data normalization can redefine what’s possible in modern security operations.</p><p><strong>Watch the full interview:</strong> <a href="https://youtu.be/Kx2JEE_tYq0" target="_blank">https://youtu.be/Kx2JEE_tYq0</a></p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>GUEST</strong></p><p><strong>Cory Wallace</strong>, Director of Product Marketing at CROGL | On LinkedIn: <a href="https://www.linkedin.com/in/corywallacecrogl/" target="_blank">https://www.linkedin.com/in/corywallacecrogl/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Press Release: <a href="https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.html" target="_blank">https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.html</a><br /><br />Forbes Article: <a href="https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/" target="_blank">https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/</a><br /><br />LinkedIn Post: <a href="https://www.linkedin.com/posts/activity-7391913358817517569-QaCH" target="_blank">https://www.linkedin.com/posts/activity-7391913358817517569-QaCH</a></p><p>Are you interested in telling your story?<br />▶︎ <strong>Full Length Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#full" target="_blank">https://www.studioc60.com/content-creation#full</a><br />▶︎ <strong>Spotlight Brand Story:</strong> <a href="https://www.studioc60.com/content-creation#spotlight" target="_blank">https://www.studioc60.com/content-creation#spotlight</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19579038" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/dec84742-9f5f-4df8-824b-b5f74c7ef97d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=dec84742-9f5f-4df8-824b-b5f74c7ef97d&amp;feed=kDNbmF_B"/>
      <itunes:title>The Schema Strikes Back: Killing the Normalization Tax on the SOC | A Crogl Spotlight Brand Story Conversation with Cory Wallace</itunes:title>
      <itunes:author>CROGL, Sean Martin, Marco Ciappelli, ITSPmagazine, Cory Wallace</itunes:author>
      <itunes:duration>00:20:23</itunes:duration>
      <itunes:summary>This episode explores how Crogl’s patented approach removes the need for data normalization, allowing security teams to query unstructured data directly across systems. Director of Product Marketing Cory Wallace joins Sean Martin to discuss how this innovation empowers analysts, reduces schema drift, and restores visibility across complex environments.</itunes:summary>
      <itunes:subtitle>This episode explores how Crogl’s patented approach removes the need for data normalization, allowing security teams to query unstructured data directly across systems. Director of Product Marketing Cory Wallace joins Sean Martin to discuss how this innovation empowers analysts, reduces schema drift, and restores visibility across complex environments.</itunes:subtitle>
      <itunes:keywords>cory wallace, data, investigation, marketing podcast, sean martin, cybersecurity, crogl, schema, soc, normalization, brand marketing, ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>160</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9f2bdc96-89c4-4f9c-941d-b4baddfd6df7</guid>
      <title>Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufacturing, and Critical Infrastructure | An Asimily Brand Origin Story with Shankar Somasundaram, CEO and Founder</title>
      <description><![CDATA[<p>The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.</p><p>Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.</p><p>During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.</p><p>The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.</p><p>Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.</p><p>This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.</p><p>Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.</p><p>The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.</p><p>Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.</p><p>This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.</p><p>Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.</p><p>The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.</p><p>Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.</p><p>Today, as healthcare systems, manufacturing facilities, and critical infrastructure become increasingly connected, the vision Somasundaram brought to Asimily's founding has proven both timely and necessary. The company's development reflects not just market demand, but the value of approaching familiar problems from fresh perspectives informed by real operational experience.</p><p>Learn more about Asimily: <a href="itspm.ag/asimily-104921">itspm.ag/asimily-104921</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong> Shankar Somasundaram, CEO & Founder, Asimily  | On LinkedIn: <a href="https://www.linkedin.com/in/shankar-somasundaram-a7315b/">https://www.linkedin.com/in/shankar-somasundaram-a7315b/</a><br /><strong>Company Directory:</strong> <a href="https://www.itspmagazine.com/directory/asimily">https://www.itspmagazine.com/directory/asimily</a><br /><br /><strong>Resources</strong></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 17 Sep 2025 23:14:46 +0000</pubDate>
      <author>contact@itspmagazine.com (Asimily, Shankar Somasundaram, Marco Ciappelli, Sean Martin, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/why-this-cybersecurity-executive-left-corporate-to-start-asimily-and-secure-healthcare-manufacturing-and-critical-infrastructure-an-asimily-brand-origin-story-with-shankar-somasundaram-ceo-and-founder-Kmoexx7J</link>
      <content:encoded><![CDATA[<p>The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.</p><p>Somasundaram's path to founding Asimily began with diverse technical experience spanning telecommunications and early machine learning development. This foundation proved essential when he transitioned to cybersecurity, eventually building and growing the IoT security division at a major enterprise security company.</p><p>During his corporate tenure, Somasundaram gained direct exposure to security challenges across healthcare systems, industrial facilities, utilities, manufacturing plants, and oil and gas operations. Each vertical revealed the same fundamental problem: existing security solutions were designed for traditional IT environments where confidentiality and integrity took precedence, but operational technology environments operated under entirely different rules.</p><p>The mismatch became clear through everyday operational realities. Hospital ultrasound machines couldn't be taken offline during procedures for security updates. Manufacturing production lines couldn't be rebooted for patches without scheduling expensive downtime. Power plant control systems required continuous availability to serve communities. These environments prioritized operational continuity above traditional security controls.</p><p>Beyond technical challenges, Somasundaram observed a persistent communication gap between security and operations teams. IT security professionals spoke in terms of vulnerabilities and patch management. Operations teams focused on uptime, safety protocols, and production schedules. Neither group had effective frameworks for translating their concerns into language the other could understand and act upon.</p><p>This divide created frustration for Chief Security Officers who understood risks existed but lacked clear paths to mitigation that wouldn't disrupt critical business operations. Organizations could identify thousands of vulnerabilities across their operational technology environments, but struggled to prioritize which issues actually posed meaningful risks given their specific operational contexts.</p><p>Somasundaram recognized an opportunity to approach this problem differently. Rather than building another vulnerability scanner or forcing operational environments to conform to IT security models, he envisioned a platform that would provide contextual risk analysis and actionable mitigation strategies tailored to operational requirements.</p><p>The decision to leave corporate security and start Asimily wasn't impulsive. Somasundaram had previous entrepreneurial experience and understood the startup process. He waited for the right convergence of market need, personal readiness, and strategic opportunity. When corporate priorities shifted through acquisitions, the conditions aligned for his departure.</p><p>Asimily's founding mission centered on bridging the gap between operational technology and information technology teams. The company wouldn't just build another security tool; it would create a translation layer enabling different organizational departments to collaborate effectively on risk reduction.</p><p>This approach required understanding multiple stakeholder perspectives within client organizations. Sometimes the primary user would be a Chief Information Security Officer. Other times, it might be a manufacturing operations head managing production floors, or a clinical operations director in healthcare. The platform needed to serve all these perspectives while maintaining technical depth.</p><p>Somasundaram's product engineering background informed this multi-stakeholder approach. His experience with complex system integration—from telecommunications infrastructure to machine learning algorithms—provided insight into how security platforms could integrate with existing IT infrastructure while addressing operational technology requirements.</p><p>The vision extended beyond traditional vulnerability management to comprehensive risk analysis considering operational context, business impact, and regulatory requirements. Rather than treating all vulnerabilities equally, Asimily would analyze each device within its specific environment and use case, providing organizations with actionable intelligence for informed decision-making.</p><p>Somasundaram's entrepreneurial journey illustrates how diverse technical experience, industry knowledge, and strategic timing converge to address complex market problems. His transition from corporate executive to startup founder demonstrates how deep industry exposure can reveal opportunities to solve problems that established players might overlook or underestimate.</p><p>Today, as healthcare systems, manufacturing facilities, and critical infrastructure become increasingly connected, the vision Somasundaram brought to Asimily's founding has proven both timely and necessary. The company's development reflects not just market demand, but the value of approaching familiar problems from fresh perspectives informed by real operational experience.</p><p>Learn more about Asimily: <a href="itspm.ag/asimily-104921">itspm.ag/asimily-104921</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong> Shankar Somasundaram, CEO & Founder, Asimily  | On LinkedIn: <a href="https://www.linkedin.com/in/shankar-somasundaram-a7315b/">https://www.linkedin.com/in/shankar-somasundaram-a7315b/</a><br /><strong>Company Directory:</strong> <a href="https://www.itspmagazine.com/directory/asimily">https://www.itspmagazine.com/directory/asimily</a><br /><br /><strong>Resources</strong></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="33482807" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e24a1df7-4052-42e1-b19b-a9adef8b4b8b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e24a1df7-4052-42e1-b19b-a9adef8b4b8b&amp;feed=kDNbmF_B"/>
      <itunes:title>Why This Cybersecurity Executive Left Corporate to Start Asimily and Secure Healthcare, Manufacturing, and Critical Infrastructure | An Asimily Brand Origin Story with Shankar Somasundaram, CEO and Founder</itunes:title>
      <itunes:author>Asimily, Shankar Somasundaram, Marco Ciappelli, Sean Martin, ITSPmagazine</itunes:author>
      <itunes:duration>00:34:52</itunes:duration>
      <itunes:summary>The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.
</itunes:summary>
      <itunes:subtitle>The decision to leave a successful corporate position and start a company requires more than just identifying a market opportunity. For Shankar Somasundaram, it required witnessing firsthand how traditional cybersecurity approaches consistently failed in the environments that matter most to society: hospitals, manufacturing plants, power facilities, and critical infrastructure.
</itunes:subtitle>
      <itunes:keywords>hankar somasundaram, machinelearning, techinnovation, iotsecurity, marketing podcast, marco ciappelli, entrepreneurjourney, legal, sean martin, techfounder, startupstory, cybersecurity, industrialsecurity, originstory, productengineering, risk management, securityplatform, healthcaretech, startupjourney, cybersecurityentrepreneur, techleadership, incident response, symantec, techcareer, otsecurity, asimily, brand story podcast, itotconvergence, businessstrategy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>159</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c85741a-0fc5-4da6-88cb-344885e729e1</guid>
      <title>Legal, Technical, and Human: A New Model for Cyber Resilience | A CyXcel Brand Origin Story with Bryan Marlatt</title>
      <description><![CDATA[<p>What happens when a cybersecurity incident requires legal precision, operational coordination, and business empathy—all at once? That’s the core question addressed in this origin story with Bryan Marlatt, Chief Regional Officer for North America at CyXcel.</p><p>Bryan brings over 30 years of experience in IT and cybersecurity, with a history as a CISO, consultant, and advisor. He now helps lead an organization that sits at the intersection of law, cyber, and geopolitics—an uncommon combination that reflects the complexity of modern risk. CyXcel was founded to address this reality head-on, integrating legal counsel, cybersecurity expertise, and operational insight into a single, business-first consulting model.</p><p>Rather than treat cybersecurity as a checklist or a technical hurdle, Bryan frames it as a service that should start with the business itself: its goals, values, partnerships, and operating environment. That’s why their engagements often begin with conversations with sales, finance, or operations—not just the CIO or CISO. It’s about understanding what needs to be protected and why, before prescribing how.</p><p>CyXcel supports clients before, during, and after incidents—ranging from tailored tabletop exercises to legal coordination during breach response and post-incident recovery planning. Their work spans critical sectors like healthcare, utilities, finance, manufacturing, and agriculture—where technology, law, and regulation often converge under pressure.</p><p>Importantly, Bryan emphasizes the need for tailored guidance, not generic frameworks. He notes that many companies don’t realize how incomplete their protections are until it’s too late. In one example, he recounts a hospital system that chose to “pay the fine” rather than invest in cybersecurity—a decision that risks reputational and operational harm far beyond the regulatory penalty.</p><p>From privacy laws and third-party contract reviews to incident forensics and geopolitical risk analysis, this episode reveals how cybersecurity consulting is evolving to meet a broader—and more human—set of business needs.</p><p>Learn more about CyXcel: <a href="https://itspm.ag/cyxcel-922331" target="_blank">https://itspm.ag/cyxcel-922331</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bryan Marlatt</strong>, Chief Regional Officer (North America) at CyXcel | On LinkedIn: <a href="https://www.linkedin.com/in/marlattb/" target="_blank">https://www.linkedin.com/in/marlattb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CyXcel: <a href="https://www.itspmagazine.com/directory/cyxcel" target="_blank">https://www.itspmagazine.com/directory/cyxcel</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 26 Aug 2025 18:35:08 +0000</pubDate>
      <author>contact@itspmagazine.com (Bryan Marlatt, ITSPmagazine, CyXcel, Sean Martin, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/legal-technical-and-human-a-new-model-for-cyber-resilience-a-cyxcel-brand-origin-story-with-bryan-marlatt-GgDZEqQb</link>
      <content:encoded><![CDATA[<p>What happens when a cybersecurity incident requires legal precision, operational coordination, and business empathy—all at once? That’s the core question addressed in this origin story with Bryan Marlatt, Chief Regional Officer for North America at CyXcel.</p><p>Bryan brings over 30 years of experience in IT and cybersecurity, with a history as a CISO, consultant, and advisor. He now helps lead an organization that sits at the intersection of law, cyber, and geopolitics—an uncommon combination that reflects the complexity of modern risk. CyXcel was founded to address this reality head-on, integrating legal counsel, cybersecurity expertise, and operational insight into a single, business-first consulting model.</p><p>Rather than treat cybersecurity as a checklist or a technical hurdle, Bryan frames it as a service that should start with the business itself: its goals, values, partnerships, and operating environment. That’s why their engagements often begin with conversations with sales, finance, or operations—not just the CIO or CISO. It’s about understanding what needs to be protected and why, before prescribing how.</p><p>CyXcel supports clients before, during, and after incidents—ranging from tailored tabletop exercises to legal coordination during breach response and post-incident recovery planning. Their work spans critical sectors like healthcare, utilities, finance, manufacturing, and agriculture—where technology, law, and regulation often converge under pressure.</p><p>Importantly, Bryan emphasizes the need for tailored guidance, not generic frameworks. He notes that many companies don’t realize how incomplete their protections are until it’s too late. In one example, he recounts a hospital system that chose to “pay the fine” rather than invest in cybersecurity—a decision that risks reputational and operational harm far beyond the regulatory penalty.</p><p>From privacy laws and third-party contract reviews to incident forensics and geopolitical risk analysis, this episode reveals how cybersecurity consulting is evolving to meet a broader—and more human—set of business needs.</p><p>Learn more about CyXcel: <a href="https://itspm.ag/cyxcel-922331" target="_blank">https://itspm.ag/cyxcel-922331</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bryan Marlatt</strong>, Chief Regional Officer (North America) at CyXcel | On LinkedIn: <a href="https://www.linkedin.com/in/marlattb/" target="_blank">https://www.linkedin.com/in/marlattb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CyXcel: <a href="https://www.itspmagazine.com/directory/cyxcel" target="_blank">https://www.itspmagazine.com/directory/cyxcel</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19986944" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/2e21f416-1b02-4fbb-89e9-5ef1c30f99e5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=2e21f416-1b02-4fbb-89e9-5ef1c30f99e5&amp;feed=kDNbmF_B"/>
      <itunes:title>Legal, Technical, and Human: A New Model for Cyber Resilience | A CyXcel Brand Origin Story with Bryan Marlatt</itunes:title>
      <itunes:author>Bryan Marlatt, ITSPmagazine, CyXcel, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:duration>00:20:49</itunes:duration>
      <itunes:summary>Cyber risk touches legal obligations, operational priorities, and even geopolitical decisions. This episode explores a consulting model that puts business understanding first—and builds security around it.</itunes:summary>
      <itunes:subtitle>Cyber risk touches legal obligations, operational priorities, and even geopolitical decisions. This episode explores a consulting model that puts business understanding first—and builds security around it.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, legal, sean martin, digital forensics, cybersecurity, consulting 	•	brand story, risk management, bryan marlatt, brand marketing, incident response, privacy, brand story podcast</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>158</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">054b6edf-24fc-458f-bbfc-d3e2624580bf</guid>
      <title>Access Roulette: How to Stop Betting Your Security on Standing Privileges | A Brand Story with Ofir Stein, CTO and Co-Founder of Apono | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>At Black Hat 2025, Sean Martin sits down with Ofir Stein, CTO and Co-Founder of Apono, to discuss the pressing challenges of identity and access management in today’s hybrid, AI-driven environments. Stein’s background in technology infrastructure and DevOps, paired with his co-founder’s deep cybersecurity expertise, positions the company to address one of the most common yet critical problems in enterprise security: how to secure permissions without slowing the pace of business.</p><p>Organizations often face a tug-of-war between security teams seeking to minimize risk and engineering or business units pushing for rapid access to systems. Stein explains that traditional approaches to access control — where permissions are either always on or granted through manual processes — create friction and risk. Over-provisioned accounts become prime targets for attackers, while delayed access slows innovation.</p><p>Apono addresses this through a Zero Standing Privilege approach, where no user — human or non-human — retains permanent permissions. Instead, access is dynamically granted based on business context and automatically revoked when no longer needed. This ensures engineers and systems get the right access at the right time, without exposing unnecessary attack surfaces.</p><p>The platform integrates seamlessly with existing identity providers, governance systems, and IT workflows, allowing organizations to centralize visibility and control without replacing existing tools. Dynamic, context-based policies replace static rules, enabling access that adapts to changing conditions, including the unpredictable needs of AI agents and automated workflows.</p><p>Stein also highlights continuous discovery and anomaly detection capabilities, enabling organizations to see and act on changes in privilege usage in real time. By coupling visibility with automated policy enforcement, organizations can not only identify over-privileged accounts but also remediate them immediately — avoiding the cycle of one-off audits followed by privilege creep.</p><p>The result is a solution that scales with modern enterprise needs, reduces risk, and empowers both security teams and end users. As Stein notes, giving engineers control over their own access — including the ability to revoke it — fosters a culture of shared responsibility for security, rather than one of gatekeeping.</p><p>Learn more about Apono: <a href="https://itspm.ag/apono-1034" target="_blank">https://itspm.ag/apono-1034</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Ofir Stein</strong>, CTO and Co-Founder of Apono | On LinkedIn: <a href="https://www.linkedin.com/in/ofir-stein/" target="_blank">https://www.linkedin.com/in/ofir-stein/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Apono: <a href="https://www.itspmagazine.com/directory/apono" target="_blank">https://www.itspmagazine.com/directory/apono</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, ofir stein, apono, zero standing privilege, access management, identity security, privilege creep, just in time access, ai security, governance, cloud security, black hat, black hat usa 2025, cybersecurity, permissions</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 15 Aug 2025 17:51:31 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, Ofir Stein, Apono)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/access-roulette-how-to-stop-betting-your-security-on-standing-privileges-a-brand-story-with-ofir-stein-cto-and-co-founder-of-apono-a-black-hat-usa-2025-conference-on-location-brand-story-HD5Uq_kf</link>
      <content:encoded><![CDATA[<p>At Black Hat 2025, Sean Martin sits down with Ofir Stein, CTO and Co-Founder of Apono, to discuss the pressing challenges of identity and access management in today’s hybrid, AI-driven environments. Stein’s background in technology infrastructure and DevOps, paired with his co-founder’s deep cybersecurity expertise, positions the company to address one of the most common yet critical problems in enterprise security: how to secure permissions without slowing the pace of business.</p><p>Organizations often face a tug-of-war between security teams seeking to minimize risk and engineering or business units pushing for rapid access to systems. Stein explains that traditional approaches to access control — where permissions are either always on or granted through manual processes — create friction and risk. Over-provisioned accounts become prime targets for attackers, while delayed access slows innovation.</p><p>Apono addresses this through a Zero Standing Privilege approach, where no user — human or non-human — retains permanent permissions. Instead, access is dynamically granted based on business context and automatically revoked when no longer needed. This ensures engineers and systems get the right access at the right time, without exposing unnecessary attack surfaces.</p><p>The platform integrates seamlessly with existing identity providers, governance systems, and IT workflows, allowing organizations to centralize visibility and control without replacing existing tools. Dynamic, context-based policies replace static rules, enabling access that adapts to changing conditions, including the unpredictable needs of AI agents and automated workflows.</p><p>Stein also highlights continuous discovery and anomaly detection capabilities, enabling organizations to see and act on changes in privilege usage in real time. By coupling visibility with automated policy enforcement, organizations can not only identify over-privileged accounts but also remediate them immediately — avoiding the cycle of one-off audits followed by privilege creep.</p><p>The result is a solution that scales with modern enterprise needs, reduces risk, and empowers both security teams and end users. As Stein notes, giving engineers control over their own access — including the ability to revoke it — fosters a culture of shared responsibility for security, rather than one of gatekeeping.</p><p>Learn more about Apono: <a href="https://itspm.ag/apono-1034" target="_blank">https://itspm.ag/apono-1034</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Ofir Stein</strong>, CTO and Co-Founder of Apono | On LinkedIn: <a href="https://www.linkedin.com/in/ofir-stein/" target="_blank">https://www.linkedin.com/in/ofir-stein/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Apono: <a href="https://www.itspmagazine.com/directory/apono" target="_blank">https://www.itspmagazine.com/directory/apono</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, ofir stein, apono, zero standing privilege, access management, identity security, privilege creep, just in time access, ai security, governance, cloud security, black hat, black hat usa 2025, cybersecurity, permissions</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17584898" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ecad8aba-2509-4c29-ab94-178e33539ad7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ecad8aba-2509-4c29-ab94-178e33539ad7&amp;feed=kDNbmF_B"/>
      <itunes:title>Access Roulette: How to Stop Betting Your Security on Standing Privileges | A Brand Story with Ofir Stein, CTO and Co-Founder of Apono | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, Ofir Stein, Apono</itunes:author>
      <itunes:duration>00:18:19</itunes:duration>
      <itunes:summary>This episode explores how dynamic, context-aware access controls can eliminate the friction between security and productivity. Learn how a Zero Standing Privilege approach protects both human and AI identities while enabling organizations to operate at full speed without compromising safety.</itunes:summary>
      <itunes:subtitle>This episode explores how dynamic, context-aware access controls can eliminate the friction between security and productivity. Learn how a Zero Standing Privilege approach protects both human and AI identities while enabling organizations to operate at full speed without compromising safety.</itunes:subtitle>
      <itunes:keywords>access management, identity security, zero standing privilege, ai security, black hat, sean martin, cybersecurity, permissions, privilege creep, just in time access, ofir stein, black hat usa 2025, cloud security, apono, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>157</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f9ad8114-f2b5-491a-a9b8-b66852c5df3d</guid>
      <title>Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status &amp; More | Brand Story with ThreatLocker from Black Hat USA 2025</title>
      <description><![CDATA[<p><strong>Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More</strong></p><p>ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.</p><p>Zero trust security continues evolving beyond theoretical frameworks into practical business solutions, as demonstrated by ThreatLocker's latest announcements at Black Hat USA 2025. The company introduced Defense Against Configuration (DAC), a monitoring tool addressing a critical gap in zero trust implementations.</p><p>Kieran Human, Special Projects Engineer at ThreatLocker, explained the challenge driving DAC's development. Organizations implementing zero trust often struggle with configuration management, potentially leaving systems vulnerable despite security investments. DAC monitors configurations continuously, alerting administrators to potential security issues and mapping findings to compliance frameworks including Essential 8.</p><p>The tool addresses human factors in security implementation. Technical staff sometimes create overly permissive rules to minimize user complaints, compromising security posture. DAC provides weekly reports to executives, ensuring oversight of configuration decisions and maintaining security standards across the organization.</p><p>ThreatLocker's approach distinguishes itself through "denied by default, allowed by exception" methodology, contrasting with traditional endpoint detection and response solutions that permit by default and block threats reactively. This fundamental difference requires careful implementation to avoid business disruption.</p><p>The company's learning mode capabilities address deployment concerns. With over 10,000 built-in application profiles, ThreatLocker automates policy creation while learning organizational workflows. This reduces manual configuration requirements that previously made zero trust implementations tedious and time-intensive.</p><p>FedRAMP certification represents another significant milestone, opening government sector opportunities. Federal compliance requirements previously excluded ThreatLocker from certain contracts, despite strong customer demand for their zero trust capabilities. This certification enables expansion into highly regulated environments requiring stringent security controls.</p><p>Customer testimonials continue validating the approach. One user reported preventing three breaches after implementing ThreatLocker's zero trust solution, demonstrating measurable security improvements. Such feedback reinforces the practical value of properly implemented zero trust architecture.</p><p>The balance between security and business functionality remains crucial. Organizations need security solutions that protect assets without hampering productivity. ThreatLocker's principle of least privilege implementation focuses on enabling business requirements with minimal necessary permissions rather than creating restrictive environments that impede operations.</p><p>Human described working closely with CEO Danny Jenkins, emphasizing the collaborative environment that drives product innovation. His engineering perspective provides valuable insights into customer needs while maintaining focus on practical security solutions that work in real-world environments.</p><p>As zero trust adoption accelerates across industries, tools like DAC become essential for maintaining security posture while meeting business demands. The combination of automated learning, configuration monitoring, and compliance mapping addresses practical implementation challenges facing security teams today.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kieran Human,</strong> Special Project Engineer at ThreatLocker | On LinkedIn | <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 15 Aug 2025 17:19:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, kieran Human, threatLocker)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/event-recap-kieran-human-at-black-hat-usa-2025-threatlocker-unveils-configuration-defense-achieves-fedramp-status-more-brand-story-with-threatlocker-from-black-hat-usa-2025-pLv0YMz3</link>
      <content:encoded><![CDATA[<p><strong>Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More</strong></p><p>ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.</p><p>Zero trust security continues evolving beyond theoretical frameworks into practical business solutions, as demonstrated by ThreatLocker's latest announcements at Black Hat USA 2025. The company introduced Defense Against Configuration (DAC), a monitoring tool addressing a critical gap in zero trust implementations.</p><p>Kieran Human, Special Projects Engineer at ThreatLocker, explained the challenge driving DAC's development. Organizations implementing zero trust often struggle with configuration management, potentially leaving systems vulnerable despite security investments. DAC monitors configurations continuously, alerting administrators to potential security issues and mapping findings to compliance frameworks including Essential 8.</p><p>The tool addresses human factors in security implementation. Technical staff sometimes create overly permissive rules to minimize user complaints, compromising security posture. DAC provides weekly reports to executives, ensuring oversight of configuration decisions and maintaining security standards across the organization.</p><p>ThreatLocker's approach distinguishes itself through "denied by default, allowed by exception" methodology, contrasting with traditional endpoint detection and response solutions that permit by default and block threats reactively. This fundamental difference requires careful implementation to avoid business disruption.</p><p>The company's learning mode capabilities address deployment concerns. With over 10,000 built-in application profiles, ThreatLocker automates policy creation while learning organizational workflows. This reduces manual configuration requirements that previously made zero trust implementations tedious and time-intensive.</p><p>FedRAMP certification represents another significant milestone, opening government sector opportunities. Federal compliance requirements previously excluded ThreatLocker from certain contracts, despite strong customer demand for their zero trust capabilities. This certification enables expansion into highly regulated environments requiring stringent security controls.</p><p>Customer testimonials continue validating the approach. One user reported preventing three breaches after implementing ThreatLocker's zero trust solution, demonstrating measurable security improvements. Such feedback reinforces the practical value of properly implemented zero trust architecture.</p><p>The balance between security and business functionality remains crucial. Organizations need security solutions that protect assets without hampering productivity. ThreatLocker's principle of least privilege implementation focuses on enabling business requirements with minimal necessary permissions rather than creating restrictive environments that impede operations.</p><p>Human described working closely with CEO Danny Jenkins, emphasizing the collaborative environment that drives product innovation. His engineering perspective provides valuable insights into customer needs while maintaining focus on practical security solutions that work in real-world environments.</p><p>As zero trust adoption accelerates across industries, tools like DAC become essential for maintaining security posture while meeting business demands. The combination of automated learning, configuration monitoring, and compliance mapping addresses practical implementation challenges facing security teams today.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kieran Human,</strong> Special Project Engineer at ThreatLocker | On LinkedIn | <a href="https://www.linkedin.com/in/kieran-human-5495ab170/" target="_blank">https://www.linkedin.com/in/kieran-human-5495ab170/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7793799" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0283548b-aadd-4c8f-9f30-4f524c965b33/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0283548b-aadd-4c8f-9f30-4f524c965b33&amp;feed=kDNbmF_B"/>
      <itunes:title>Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status &amp; More | Brand Story with ThreatLocker from Black Hat USA 2025</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, kieran Human, threatLocker</itunes:author>
      <itunes:duration>00:08:07</itunes:duration>
      <itunes:summary>ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.
</itunes:summary>
      <itunes:subtitle>ThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.
</itunes:subtitle>
      <itunes:keywords>compliance, cyberdefense, cybertechnology, enterprisesecurity, zerotrust, marco ciappelli, infosec, cybersecurity, blackhat2025, endpointprotection, threatlocker, fedramp, endpoint, allowlisting, applicationcontrol, riskmanagement, securitymanagement, cyberresilience, misconfiguration, securityconfiguration, brand marketing, configuration, securityarchitecture, securitytools, brand story podcast, zero trust, brand story, kieran human, securitysolutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>156</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">362a1abb-9652-4ac1-af86-f4a513768e45</guid>
      <title>Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company’s latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.</p><p>Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.</p><p>The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.</p><p>Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.</p><p>The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.</p><p>The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year’s findings.</p><p>Learn more about Zscaler: <a href="https://itspm.ag/zscaler-327152" target="_blank">https://itspm.ag/zscaler-327152</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Brett Stone-Gross</strong>, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: <a href="https://www.linkedin.com/in/brett-stone-gross/" target="_blank">https://www.linkedin.com/in/brett-stone-gross/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Zscaler: <a href="https://www.itspmagazine.com/directory/zscaler" target="_blank">https://www.itspmagazine.com/directory/zscaler</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Aug 2025 18:32:53 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Marco Ciappelli, Brett Stone-Gross, Zscaler)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/data-kidnapping-because-file-encryption-is-so-2020-a-brand-story-with-brett-stone-gross-senior-director-of-threat-intelligence-at-zscaler-a-black-hat-usa-2025-conference-on-location-brand-story-X7hKwxG_</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company’s latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.</p><p>Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.</p><p>The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.</p><p>Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.</p><p>The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.</p><p>The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year’s findings.</p><p>Learn more about Zscaler: <a href="https://itspm.ag/zscaler-327152" target="_blank">https://itspm.ag/zscaler-327152</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Brett Stone-Gross</strong>, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: <a href="https://www.linkedin.com/in/brett-stone-gross/" target="_blank">https://www.linkedin.com/in/brett-stone-gross/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Zscaler: <a href="https://www.itspmagazine.com/directory/zscaler" target="_blank">https://www.itspmagazine.com/directory/zscaler</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20345939" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6c3dc61f-c32c-44dd-81eb-3391b9ad259c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6c3dc61f-c32c-44dd-81eb-3391b9ad259c&amp;feed=kDNbmF_B"/>
      <itunes:title>Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Marco Ciappelli, Brett Stone-Gross, Zscaler</itunes:author>
      <itunes:duration>00:21:11</itunes:duration>
      <itunes:summary>Ransomware groups are increasingly abandoning file encryption in favor of high-value data theft, using extortion to extract massive payouts while avoiding the spotlight. This conversation reveals who they target, how they operate, and what organizations can do to shut down their most exploitable weaknesses.</itunes:summary>
      <itunes:subtitle>Ransomware groups are increasingly abandoning file encryption in favor of high-value data theft, using extortion to extract massive payouts while avoiding the spotlight. This conversation reveals who they target, how they operate, and what organizations can do to shut down their most exploitable weaknesses.</itunes:subtitle>
      <itunes:keywords>brett stone-gross, network security, file transfer vulnerability, black hat, sean martin, zscaler, data protection, black hat usa 2025, cyber defense, data breach, threat intelligence, zero trust security, ransomware, data extortion, cyber attacks</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>155</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f35042d6-f049-4ac2-aaf4-d436c23c1be2</guid>
      <title>From Excel to Excellence: Transforming Cybersecurity Workforce Management | A Brand Story with Deidre Diamond, Founder and CEO of CyberSN, and Carraig Stanwyck, CEO and Former Fortune 200 CISO | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p><i>Marco Ciappelli of ITSPmagazine explores cybersecurity workforce transformation with CyberSN's Deidre Diamond and Fortune 200 CISO-turned-CEO Carraig Stanwyck</i></p><p>The corridors of Black Hat 2025 in Las Vegas buzzed with conversations about AI and emerging threats, but one of the most compelling discussions centered on something decidedly human: how we actually manage our cybersecurity teams. Marco Ciappelli, Co-Founder and CMO of ITSPmagazine, connected with longtime industry colleague Deidre Diamond, who brought along Carraig Stanwyck—a seasoned cybersecurity leader who recently transitioned from Fortune 200 CISO to CEO.</p><p>"It's been great running into people I know here at Black Hat," Ciappelli noted, "but finding Deidre after 11 years—and meeting the people she's been working with—that's what these events are really about. Finding out what's happening in the industry and reconnecting."</p><p>Diamond, who has spent 11 years in cybersecurity with eight years focused on talent matching and three years developing workforce risk management practices at CyberSN, brought a unique perspective to the conversation. Her journey from building a cyber taxonomy and job matching solution to addressing the industry's critical workforce challenges—retention, burnout, capability gaps, and career planning—set the stage for understanding how one Fortune 200 CISO discovered the limitations of traditional workforce management.</p><p>The Excel Trap: When Good Intentions Meet Reality</p><p>When Stanwyck thought he had workforce management figured out, he was using Excel spreadsheets and conducting regular happiness surveys with his cybersecurity team. As someone who started his career in human intelligence and carried that people-focused approach through government, startups, and enterprise organizations, he believed he was ahead of the curve.</p><p>"I thought I already had a solution," Stanwyck reflects. "I was already meeting with my people, doing specific surveys to track happiness and belonging because I wanted to catch issues early. You get your team right, and you can do anything."</p><p>But when he met Deidre Diamond from CyberSN at RSA two years ago, his confidence was quickly shaken. "She was talking about workforce risk management, and I was like, 'Well, yeah, I do that. I'm all set. I'm covered.'" Diamond's response was simple: "Show me how you visualize the data you use."</p><p>That's when Stanwyck discovered the limitations of his Excel-based approach—old data, time-intensive processes, and a fundamental lack of real-time visibility into how his team actually functioned.</p><p>Beyond Job Titles: The Hidden Workforce Reality</p><p>What CyberSN's platform revealed transformed Stanwyck's understanding of his own team. "You can re-interview your people like a recorder," he explains. "You can see that someone you hired as an analyst is doing all this engineering work—maybe they're better on the engineering team."</p><p>The platform provided something Stanwyck had never experienced: quantitative visibility into how his team's time was actually being spent. "It gave me a level of visibility in the team, what they were doing, and how their time was being spent at a quantitative level that there's no way for me to replicate manually."</p><p>Even more revealing was the discovery that job descriptions become obsolete almost immediately. "The job description of our talent is old within weeks and within months from the day it's created—if it was even created correctly at all," Diamond noted during the conversation.</p><p>The Fulfillment Factor: Beyond Happiness to Purpose</p><p>While Stanwyck's happiness surveys captured surface-level satisfaction, CyberSN's approach dug into something more fundamental. "HappinessHappy is important, but one that feels fulfilled—that they have a purpose—that's the key," Stanwyck emphasizes.</p><p>The platform's approach to understanding team members went beyond traditional metrics. "When you know where they want to go, how they feel about the team, you get all this extra data," Stanwyck explains. "Your ability to craft development plans, to help them move through different parts of the team, to help with career planning—it becomes so nailed that they can't help but see their way forward."</p><p>The impact was immediate and lasting. When Stanwyck transitioned to his CEO role, his team specifically requested that the organization renew their CyberSN contract. "These teammates feel like, wow, they're investing in understanding me more and planning more. It just adds to professional efficacy."</p><p>From Reactive to Strategic: The Business Case Revolution</p><p>Perhaps the most significant transformation was in business communication. Every cybersecurity leader knows the refrain: "We don't have enough people." But quantifying that gap had always been nearly impossible.</p><p>"How do you show the gaps and how you're not able to meet specific capability requirements?" Stanwyck asks. "It's really hard using the lack of tools you have right now—it's very subjective."</p><p>CyberSN's dual visualization capability became a game-changer. "You can see the whole org chart from people—what they're doing. But you can also flip it and see that same org chart from a capabilities perspective," Stanwyck describes. "Here's all the capabilities we need. How are they staffed? What are we missing? How do we plan for the future as we grow?"</p><p>This visibility transformed conversations with executive leadership. "It's easier to get budgets, easier to make a business case for where you're going as you grow," Stanwyck notes. "CIOs, CFOs, CEOs can now understand what the security leader is dealing with in a way that's logical, not just a spreadsheet."</p><p>The Multi-Tool Discovery</p><p>The platform revealed something crucial about modern cybersecurity teams: people are multi-tools, not single-purpose instruments. "You hire somebody because they do X or Y—that's the assumption," Stanwyck explains. "But when you get to know them better through the taxonomies, when you figure out what they end up doing on the team even if it wasn't what they were hired for, you start realizing these tools are multi-tools."</p><p>This discovery enabled better strategic planning and resource allocation. "It allows you to have a much better plan for how you're gonna leverage them throughout the organization, help them upscale, identify those opportunities for them to maximize the value they're able to provide."</p><p>The Human Element in an AI-Driven World</p><p>As Black Hat 2025 showcased the latest in AI and automation, Stanwyck offered a refreshing perspective on the role of humans in cybersecurity's future. "AI technologies are really statistical models of existing information—they're not creative, they're not thinking outside the box," he observes.</p><p>Instead of replacement, Stanwyck advocates for empowerment. "I'm excited about companies that take a smarter approach—how do we empower the human? It's kind of like putting that superhero costume on rather than getting rid of them."</p><p>For cybersecurity leaders still managing teams through spreadsheets and gut feelings, this Black Hat conversation offers a clear message: true workforce visibility isn't just about knowing who works for you—it's about understanding how they work, what fulfills them, and how to strategically position your human capabilities for the challenges ahead.</p><p><i>CyberSN's workforce risk management platform transforms how cybersecurity leaders understand, develop, and strategically deploy their most valuable asset: their people.</i></p><p>Learn more about CyberSN: <a href="https://itspm.ag/cybersn-476941" target="_blank">https://itspm.ag/cybersn-476941</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Deidre Diamond</strong>, Founder and CEO of CyberSN | On LinkedIn: <a href="https://www.linkedin.com/in/deidrediamond/" target="_blank">https://www.linkedin.com/in/deidrediamond/</a></p><p><strong>Carraig Stanwyck</strong>, CEO at 3 Tree Tech and former Fortune 200 CISO | On LinkedIn: <a href="https://www.linkedin.com/in/carraig-stanwyck/" target="_blank">https://www.linkedin.com/in/carraig-stanwyck/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CyberSN: <a href="https://www.itspmagazine.com/directory/cybersn" target="_blank">https://www.itspmagazine.com/directory/cybersn</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>marco ciappelli, deidre diamond, carraig stanwyck, cybersecurity, workforce management, talent retention, job descriptions, skills gap, leadership, employee engagement, career development, black hat, black hat usa, black hat 2025, workforce risk management</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Aug 2025 18:08:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, Carraig Stanwyck, CyberSN, 3 Tree Tech, Deidre Diamond)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/cybersecurity-hiring-is-not-brokenyour-job-descriptions-are-a-brand-story-with-deidre-diamond-founder-and-ceo-of-cybersn-and-carraig-stanwyck-ceo-and-former-fortune-200-ciso-a-black-hat-usa-2025-conference-on-location-brand-story-03Sh_Qc2</link>
      <content:encoded><![CDATA[<p><i>Marco Ciappelli of ITSPmagazine explores cybersecurity workforce transformation with CyberSN's Deidre Diamond and Fortune 200 CISO-turned-CEO Carraig Stanwyck</i></p><p>The corridors of Black Hat 2025 in Las Vegas buzzed with conversations about AI and emerging threats, but one of the most compelling discussions centered on something decidedly human: how we actually manage our cybersecurity teams. Marco Ciappelli, Co-Founder and CMO of ITSPmagazine, connected with longtime industry colleague Deidre Diamond, who brought along Carraig Stanwyck—a seasoned cybersecurity leader who recently transitioned from Fortune 200 CISO to CEO.</p><p>"It's been great running into people I know here at Black Hat," Ciappelli noted, "but finding Deidre after 11 years—and meeting the people she's been working with—that's what these events are really about. Finding out what's happening in the industry and reconnecting."</p><p>Diamond, who has spent 11 years in cybersecurity with eight years focused on talent matching and three years developing workforce risk management practices at CyberSN, brought a unique perspective to the conversation. Her journey from building a cyber taxonomy and job matching solution to addressing the industry's critical workforce challenges—retention, burnout, capability gaps, and career planning—set the stage for understanding how one Fortune 200 CISO discovered the limitations of traditional workforce management.</p><p>The Excel Trap: When Good Intentions Meet Reality</p><p>When Stanwyck thought he had workforce management figured out, he was using Excel spreadsheets and conducting regular happiness surveys with his cybersecurity team. As someone who started his career in human intelligence and carried that people-focused approach through government, startups, and enterprise organizations, he believed he was ahead of the curve.</p><p>"I thought I already had a solution," Stanwyck reflects. "I was already meeting with my people, doing specific surveys to track happiness and belonging because I wanted to catch issues early. You get your team right, and you can do anything."</p><p>But when he met Deidre Diamond from CyberSN at RSA two years ago, his confidence was quickly shaken. "She was talking about workforce risk management, and I was like, 'Well, yeah, I do that. I'm all set. I'm covered.'" Diamond's response was simple: "Show me how you visualize the data you use."</p><p>That's when Stanwyck discovered the limitations of his Excel-based approach—old data, time-intensive processes, and a fundamental lack of real-time visibility into how his team actually functioned.</p><p>Beyond Job Titles: The Hidden Workforce Reality</p><p>What CyberSN's platform revealed transformed Stanwyck's understanding of his own team. "You can re-interview your people like a recorder," he explains. "You can see that someone you hired as an analyst is doing all this engineering work—maybe they're better on the engineering team."</p><p>The platform provided something Stanwyck had never experienced: quantitative visibility into how his team's time was actually being spent. "It gave me a level of visibility in the team, what they were doing, and how their time was being spent at a quantitative level that there's no way for me to replicate manually."</p><p>Even more revealing was the discovery that job descriptions become obsolete almost immediately. "The job description of our talent is old within weeks and within months from the day it's created—if it was even created correctly at all," Diamond noted during the conversation.</p><p>The Fulfillment Factor: Beyond Happiness to Purpose</p><p>While Stanwyck's happiness surveys captured surface-level satisfaction, CyberSN's approach dug into something more fundamental. "HappinessHappy is important, but one that feels fulfilled—that they have a purpose—that's the key," Stanwyck emphasizes.</p><p>The platform's approach to understanding team members went beyond traditional metrics. "When you know where they want to go, how they feel about the team, you get all this extra data," Stanwyck explains. "Your ability to craft development plans, to help them move through different parts of the team, to help with career planning—it becomes so nailed that they can't help but see their way forward."</p><p>The impact was immediate and lasting. When Stanwyck transitioned to his CEO role, his team specifically requested that the organization renew their CyberSN contract. "These teammates feel like, wow, they're investing in understanding me more and planning more. It just adds to professional efficacy."</p><p>From Reactive to Strategic: The Business Case Revolution</p><p>Perhaps the most significant transformation was in business communication. Every cybersecurity leader knows the refrain: "We don't have enough people." But quantifying that gap had always been nearly impossible.</p><p>"How do you show the gaps and how you're not able to meet specific capability requirements?" Stanwyck asks. "It's really hard using the lack of tools you have right now—it's very subjective."</p><p>CyberSN's dual visualization capability became a game-changer. "You can see the whole org chart from people—what they're doing. But you can also flip it and see that same org chart from a capabilities perspective," Stanwyck describes. "Here's all the capabilities we need. How are they staffed? What are we missing? How do we plan for the future as we grow?"</p><p>This visibility transformed conversations with executive leadership. "It's easier to get budgets, easier to make a business case for where you're going as you grow," Stanwyck notes. "CIOs, CFOs, CEOs can now understand what the security leader is dealing with in a way that's logical, not just a spreadsheet."</p><p>The Multi-Tool Discovery</p><p>The platform revealed something crucial about modern cybersecurity teams: people are multi-tools, not single-purpose instruments. "You hire somebody because they do X or Y—that's the assumption," Stanwyck explains. "But when you get to know them better through the taxonomies, when you figure out what they end up doing on the team even if it wasn't what they were hired for, you start realizing these tools are multi-tools."</p><p>This discovery enabled better strategic planning and resource allocation. "It allows you to have a much better plan for how you're gonna leverage them throughout the organization, help them upscale, identify those opportunities for them to maximize the value they're able to provide."</p><p>The Human Element in an AI-Driven World</p><p>As Black Hat 2025 showcased the latest in AI and automation, Stanwyck offered a refreshing perspective on the role of humans in cybersecurity's future. "AI technologies are really statistical models of existing information—they're not creative, they're not thinking outside the box," he observes.</p><p>Instead of replacement, Stanwyck advocates for empowerment. "I'm excited about companies that take a smarter approach—how do we empower the human? It's kind of like putting that superhero costume on rather than getting rid of them."</p><p>For cybersecurity leaders still managing teams through spreadsheets and gut feelings, this Black Hat conversation offers a clear message: true workforce visibility isn't just about knowing who works for you—it's about understanding how they work, what fulfills them, and how to strategically position your human capabilities for the challenges ahead.</p><p><i>CyberSN's workforce risk management platform transforms how cybersecurity leaders understand, develop, and strategically deploy their most valuable asset: their people.</i></p><p>Learn more about CyberSN: <a href="https://itspm.ag/cybersn-476941" target="_blank">https://itspm.ag/cybersn-476941</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Deidre Diamond</strong>, Founder and CEO of CyberSN | On LinkedIn: <a href="https://www.linkedin.com/in/deidrediamond/" target="_blank">https://www.linkedin.com/in/deidrediamond/</a></p><p><strong>Carraig Stanwyck</strong>, CEO at 3 Tree Tech and former Fortune 200 CISO | On LinkedIn: <a href="https://www.linkedin.com/in/carraig-stanwyck/" target="_blank">https://www.linkedin.com/in/carraig-stanwyck/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CyberSN: <a href="https://www.itspmagazine.com/directory/cybersn" target="_blank">https://www.itspmagazine.com/directory/cybersn</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>marco ciappelli, deidre diamond, carraig stanwyck, cybersecurity, workforce management, talent retention, job descriptions, skills gap, leadership, employee engagement, career development, black hat, black hat usa, black hat 2025, workforce risk management</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20864208" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/44220717-324a-4353-9d49-ac5457a6fdde/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=44220717-324a-4353-9d49-ac5457a6fdde&amp;feed=kDNbmF_B"/>
      <itunes:title>From Excel to Excellence: Transforming Cybersecurity Workforce Management | A Brand Story with Deidre Diamond, Founder and CEO of CyberSN, and Carraig Stanwyck, CEO and Former Fortune 200 CISO | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, Carraig Stanwyck, CyberSN, 3 Tree Tech, Deidre Diamond</itunes:author>
      <itunes:duration>00:21:43</itunes:duration>
      <itunes:summary>The corridors of Black Hat 2025 in Las Vegas buzzed with conversations about AI and emerging threats, but one of the most compelling discussions centered on something decidedly human: how we actually manage our cybersecurity teams. Marco Ciappelli, Co-Founder and CMO of ITSPmagazine, connected with longtime industry colleague Deidre Diamond, who brought along Carraig Stanwyck—a seasoned cybersecurity leader who recently transitioned from Fortune 200 CISO to CEO.</itunes:summary>
      <itunes:subtitle>The corridors of Black Hat 2025 in Las Vegas buzzed with conversations about AI and emerging threats, but one of the most compelling discussions centered on something decidedly human: how we actually manage our cybersecurity teams. Marco Ciappelli, Co-Founder and CMO of ITSPmagazine, connected with longtime industry colleague Deidre Diamond, who brought along Carraig Stanwyck—a seasoned cybersecurity leader who recently transitioned from Fortune 200 CISO to CEO.</itunes:subtitle>
      <itunes:keywords>carraig stanwyck, skills gap, marco ciappelli, leadership, talent retention, black hat, deidre diamond, cybersecurity, workforce management, employee engagement, workforce risk management, career development, job descriptions, black hat usa, black hat 2025</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>154</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">353025a4-5693-44ec-9a92-32235bb82113</guid>
      <title>How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Brand Story with Mike Wayne, Vice President, Global Sales at BlinkOps | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>Mike Wayne, responsible for global sales at BlinkOps, joins ITSPmagazine host Sean Martin to discuss how organizations can harness agentic AI to transform security operations—and much more.</p><p>The conversation begins with a clear reality: business processes are complex, and when security is added into the mix, orchestrating workflows efficiently becomes even more challenging. BlinkOps addresses this by providing a platform that not only automates security tasks but also extends across HR, finance, sales, and marketing. By enabling automation in areas like employee onboarding/offboarding or access management, the platform helps organizations improve efficiency, reduce risk, and free human talent for higher-value work.</p><p>Mike explains that while traditional SOAR tools require heavy scripting and ongoing maintenance, BlinkOps takes a different approach. Its security co-pilot allows users to describe automations in plain language, which are then generated—90% complete—by the system. Whether the user is a SOC analyst or an HR manager, the platform supports low-code and no-code capabilities, making automation accessible to “citizen developers” across the organization.</p><p>The concept of micro agents is central. Instead of relying on large, complex AI models that can hallucinate or act unpredictably, BlinkOps uses focused, purpose-built agents with smaller context windows. These agents handle specific tasks—such as enriching security alerts—within larger workflows, ensuring accuracy and control.</p><p>The benefits are tangible. One customer’s triage agent processed 400 alerts in just eight days without direct human intervention, while another saved $1.8 million in manual endpoint deployment costs over a single month. Outcomes like reduced mean time to respond (MTTR) and faster time to automation are key drivers for adoption, especially when facing zero-day vulnerabilities where speed is critical.</p><p>BlinkOps runs as SaaS, hybrid, or in secure environments like GovCloud, making it adaptable for organizations of all sizes and compliance requirements.</p><p>The takeaway is clear: AI-driven automation doesn’t just improve security operations—it creates new efficiencies across the enterprise. As Mike puts it, when a process can be automated, “just blink it.”</p><p>Learn more about BlinkOps: <a href="https://itspm.ag/blinkops-942780" target="_blank">https://itspm.ag/blinkops-942780</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Mike Wayne, Vice President, Global Sales at BlinkOps | On Linkedin: <a href="https://www.linkedin.com/in/mikejwayne/" target="_blank">https://www.linkedin.com/in/mikejwayne/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlinkOps: <a href="https://www.itspmagazine.com/directory/blinkops" target="_blank">https://www.itspmagazine.com/directory/blinkops</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, mike wayne, blink ops, ai automation, agentic ai, micro agents, security automation, soc automation, workflow automation, zero day response, alert triage, enrichment agent, low code automation, cyber security ai, enterprise automation, black hat usa, black hat 2025</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Aug 2025 01:21:38 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mike Wayne, BlinkOps)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/how-to-automate-cybersecurity-operations-without-coding-crying-or-calling-it-at-2-am-a-brand-story-with-mike-wayne-vice-president-global-sales-at-blinkops-a-black-hat-usa-2025-conference-on-location-brand-story-_YpUbfOf</link>
      <content:encoded><![CDATA[<p>Mike Wayne, responsible for global sales at BlinkOps, joins ITSPmagazine host Sean Martin to discuss how organizations can harness agentic AI to transform security operations—and much more.</p><p>The conversation begins with a clear reality: business processes are complex, and when security is added into the mix, orchestrating workflows efficiently becomes even more challenging. BlinkOps addresses this by providing a platform that not only automates security tasks but also extends across HR, finance, sales, and marketing. By enabling automation in areas like employee onboarding/offboarding or access management, the platform helps organizations improve efficiency, reduce risk, and free human talent for higher-value work.</p><p>Mike explains that while traditional SOAR tools require heavy scripting and ongoing maintenance, BlinkOps takes a different approach. Its security co-pilot allows users to describe automations in plain language, which are then generated—90% complete—by the system. Whether the user is a SOC analyst or an HR manager, the platform supports low-code and no-code capabilities, making automation accessible to “citizen developers” across the organization.</p><p>The concept of micro agents is central. Instead of relying on large, complex AI models that can hallucinate or act unpredictably, BlinkOps uses focused, purpose-built agents with smaller context windows. These agents handle specific tasks—such as enriching security alerts—within larger workflows, ensuring accuracy and control.</p><p>The benefits are tangible. One customer’s triage agent processed 400 alerts in just eight days without direct human intervention, while another saved $1.8 million in manual endpoint deployment costs over a single month. Outcomes like reduced mean time to respond (MTTR) and faster time to automation are key drivers for adoption, especially when facing zero-day vulnerabilities where speed is critical.</p><p>BlinkOps runs as SaaS, hybrid, or in secure environments like GovCloud, making it adaptable for organizations of all sizes and compliance requirements.</p><p>The takeaway is clear: AI-driven automation doesn’t just improve security operations—it creates new efficiencies across the enterprise. As Mike puts it, when a process can be automated, “just blink it.”</p><p>Learn more about BlinkOps: <a href="https://itspm.ag/blinkops-942780" target="_blank">https://itspm.ag/blinkops-942780</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Mike Wayne, Vice President, Global Sales at BlinkOps | On Linkedin: <a href="https://www.linkedin.com/in/mikejwayne/" target="_blank">https://www.linkedin.com/in/mikejwayne/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlinkOps: <a href="https://www.itspmagazine.com/directory/blinkops" target="_blank">https://www.itspmagazine.com/directory/blinkops</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>sean martin, mike wayne, blink ops, ai automation, agentic ai, micro agents, security automation, soc automation, workflow automation, zero day response, alert triage, enrichment agent, low code automation, cyber security ai, enterprise automation, black hat usa, black hat 2025</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18990495" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/95cd00b0-c58a-45b8-9080-2ca95390061c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=95cd00b0-c58a-45b8-9080-2ca95390061c&amp;feed=kDNbmF_B"/>
      <itunes:title>How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Brand Story with Mike Wayne, Vice President, Global Sales at BlinkOps | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mike Wayne, BlinkOps</itunes:author>
      <itunes:duration>00:19:46</itunes:duration>
      <itunes:summary>AI-powered micro agents are enabling organizations to automate targeted tasks quickly and reliably, reducing manual work and accelerating response times in security and beyond. This conversation reveals how a platform approach can extend automation benefits from SOCs to every corner of the enterprise.</itunes:summary>
      <itunes:subtitle>AI-powered micro agents are enabling organizations to automate targeted tasks quickly and reliably, reducing manual work and accelerating response times in security and beyond. This conversation reveals how a platform approach can extend automation benefits from SOCs to every corner of the enterprise.</itunes:subtitle>
      <itunes:keywords>enterprise automation, low code automation, zero day response, sean martin, workflow automation, alert triage, ai automation, mike wayne, enrichment agent, micro agents, cyber security ai, soc automation, black hat usa, security automation, agentic ai, black hat 2025, blink ops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>153</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2eb5c85d-1b25-4986-bbb5-083dee200665</guid>
      <title>Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>In an era where organizations depend heavily on commercial applications to run their operations, the integrity of those applications has become a top security concern. Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital, shares how protecting the software supply chain now extends far beyond open source risk.</p><p>Zdjelar outlines how modern applications are built from a mix of first-party, contracted, open source, and proprietary third-party components. By the time software reaches production, its lineage spans geographies, development teams, and sometimes even AI-generated code. Incidents like SolarWinds, Kaseya, and CircleCI demonstrate that trusted vendors are no longer immune to compromise, and commercial software can introduce critical vulnerabilities or malicious payloads deep into enterprise systems.</p><p>Regulatory drivers are increasing scrutiny. Executive Order 14028, Europe’s Cyber Resilience Act, DORA, and U.S. Department of Defense software sourcing restrictions all require greater transparency, such as a Software Bill of Materials (SBOM). However, Zdjelar cautions that SBOMs—while valuable—are like ingredient lists without recipes: they don’t reveal if a product is secure, just what’s in it.</p><p>ReversingLabs addresses this gap with a no-compromise analysis engine capable of deconstructing any file, of any size or complexity, to assess its safety. This capability enables organizations to make risk-based decisions, continuously monitor for unexpected changes between software versions, and operationalize controls at points such as procurement, SCCM deployments, or file transfers into critical environments.</p><p>For CISOs, this represents a true technical control where previously only contractual clauses, questionnaires, or insurance policies existed. By placing analysis at the front of the software lifecycle, organizations can reduce reliance on costly manual testing and sandboxing, improve detection of tampering or hidden behavior, and even influence cyber insurance rates.</p><p>The takeaway is clear: software supply chain security is a board-level concern, and the focus must expand beyond open source. With the right controls, organizations can avoid becoming the next headline-making breach and maintain trust with customers, partners, and regulators.</p><p>Learn more about ReversingLabs: <a href="https://itspm.ag/reversinglabs-v57b" target="_blank">https://itspm.ag/reversinglabs-v57b</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | On Linkedin: <a href="https://www.linkedin.com/in/sasazdjelar/" target="_blank">https://www.linkedin.com/in/sasazdjelar/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ReversingLabs: <a href="https://www.itspmagazine.com/directory/reversinglabs" target="_blank">https://www.itspmagazine.com/directory/reversinglabs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, Black Hat USA, sean martin, saša zdjelar, software supply chain security, commercial software risk, binary analysis, software bill of materials, sbom security, malicious code detection, ciso strategies, third party software risk, software tampering detection, malware analysis tools, devsecops security, application security testing, cybersecurity compliance</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 14 Aug 2025 00:21:39 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, ReversingLabs, Saša Zdjelar)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/your-business-apps-are-bringing-friends-you-didnt-invite-a-brand-story-with-saa-zdjelar-chief-trust-officer-at-reversinglabs-and-operating-partner-at-crosspoint-capital-a-black-hat-usa-2025-conference-on-location-brand-story-a2sfPy_B</link>
      <content:encoded><![CDATA[<p>In an era where organizations depend heavily on commercial applications to run their operations, the integrity of those applications has become a top security concern. Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital, shares how protecting the software supply chain now extends far beyond open source risk.</p><p>Zdjelar outlines how modern applications are built from a mix of first-party, contracted, open source, and proprietary third-party components. By the time software reaches production, its lineage spans geographies, development teams, and sometimes even AI-generated code. Incidents like SolarWinds, Kaseya, and CircleCI demonstrate that trusted vendors are no longer immune to compromise, and commercial software can introduce critical vulnerabilities or malicious payloads deep into enterprise systems.</p><p>Regulatory drivers are increasing scrutiny. Executive Order 14028, Europe’s Cyber Resilience Act, DORA, and U.S. Department of Defense software sourcing restrictions all require greater transparency, such as a Software Bill of Materials (SBOM). However, Zdjelar cautions that SBOMs—while valuable—are like ingredient lists without recipes: they don’t reveal if a product is secure, just what’s in it.</p><p>ReversingLabs addresses this gap with a no-compromise analysis engine capable of deconstructing any file, of any size or complexity, to assess its safety. This capability enables organizations to make risk-based decisions, continuously monitor for unexpected changes between software versions, and operationalize controls at points such as procurement, SCCM deployments, or file transfers into critical environments.</p><p>For CISOs, this represents a true technical control where previously only contractual clauses, questionnaires, or insurance policies existed. By placing analysis at the front of the software lifecycle, organizations can reduce reliance on costly manual testing and sandboxing, improve detection of tampering or hidden behavior, and even influence cyber insurance rates.</p><p>The takeaway is clear: software supply chain security is a board-level concern, and the focus must expand beyond open source. With the right controls, organizations can avoid becoming the next headline-making breach and maintain trust with customers, partners, and regulators.</p><p>Learn more about ReversingLabs: <a href="https://itspm.ag/reversinglabs-v57b" target="_blank">https://itspm.ag/reversinglabs-v57b</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | On Linkedin: <a href="https://www.linkedin.com/in/sasazdjelar/" target="_blank">https://www.linkedin.com/in/sasazdjelar/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ReversingLabs: <a href="https://www.itspmagazine.com/directory/reversinglabs" target="_blank">https://www.itspmagazine.com/directory/reversinglabs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, Black Hat USA, sean martin, saša zdjelar, software supply chain security, commercial software risk, binary analysis, software bill of materials, sbom security, malicious code detection, ciso strategies, third party software risk, software tampering detection, malware analysis tools, devsecops security, application security testing, cybersecurity compliance</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26941759" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/fa889b36-e8a3-4712-8e37-7a2e45956cd3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=fa889b36-e8a3-4712-8e37-7a2e45956cd3&amp;feed=kDNbmF_B"/>
      <itunes:title>Your Business Apps Are Bringing Friends You Didn’t Invite | A Brand Story with Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, ReversingLabs, Saša Zdjelar</itunes:author>
      <itunes:duration>00:28:03</itunes:duration>
      <itunes:summary>Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.</itunes:summary>
      <itunes:subtitle>Commercial software supply chain risk is no longer theoretical—breaches show trusted vendors can introduce vulnerabilities or malicious code into critical environments. This episode reveals how organizations can implement technical controls to analyze and verify any software they run, turning visibility into actionable risk reduction.</itunes:subtitle>
      <itunes:keywords>malware analysis tools, sbom security, sean martin, binary analysis, software bill of materials, saša zdjelar, cybersecurity compliance, application security testing, commercial software risk, software supply chain security, third party software risk, black hat usa, software tampering detection, devsecops security, black hat 2025, ciso strategies, malicious code detection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>152</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0ad90470-a804-4f70-a697-e84981d392ba</guid>
      <title>Black Hat 2025: Crogl&apos;s CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p><strong>Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity</strong></p><p>Crogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.</p><p>Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At Black Hat USA 2025, Crogl CEO Monzy Merza revealed how his company is tackling one of cybersecurity's most persistent challenges: the overwhelming volume of security alerts that leaves analysts either ignoring potential threats or burning out from investigation fatigue.</p><p>The problem runs deeper than most organizations realize. Merza observed analysts routinely closing hundreds of alerts with a single click, not from laziness or malice, but from sheer necessity. "When you look at the history of breaches, the signal of the breach was there. And somebody ignored it," he explained during his ITSPmagazine interview, highlighting a critical gap between alert generation and meaningful investigation.</p><p>Traditional approaches have failed because they expect human analysts to become "unicorns" - experts capable of mastering multiple data platforms simultaneously while remembering complex query languages and schemas. This unrealistic expectation has created what Merza calls the "human unicorn challenge," where organizations struggle to find personnel who can effectively navigate their increasingly complex security infrastructure.</p><p>Crogl's solution fundamentally reimagines the relationship between human intuition and machine automation. Rather than forcing analysts to adapt to multiple tools, the platform creates a semantic knowledge graph that maps data relationships across an organization's entire security ecosystem. When alerts arrive, the system automatically conducts investigations using established kill chain methodologies, freeing analysts to focus on higher-value activities like threat hunting and strategic security initiatives.</p><p>The privacy-first architecture addresses growing concerns about data sovereignty. Operating as a completely self-contained system with no internet dependencies, Crogl can run air-gapped in the most sensitive environments, including defense intelligence communities. The platform connects to existing tools through APIs without requiring data movement, duplication, or transformation.</p><p>Real-world results demonstrate the platform's versatility. One customer discovered their analysts were using Crogl for fraud detection - an application never intended by the original design. The system's ability to process natural language descriptions and convert them into executable security processes has reduced response times from weeks to minutes for complex threat hunting operations.</p><p>For security leaders evaluating AI integration, Merza advocates an experimental approach. Rather than attempting comprehensive transformation, he suggests starting with focused pilot programs that address specific pain points. This measured strategy allows organizations to validate AI's value while maintaining operational stability.</p><p>The broader implications extend beyond security operations. By removing technical barriers and emphasizing domain expertise over tool competency, platforms like Crogl enable security teams to become strategic business enablers rather than reactive alert processors. Organizations gain the flexibility to maintain their preferred data architectures while ensuring comprehensive security coverage across distributed environments.</p><p>As cyber threats continue evolving, the industry's response must prioritize both technological capability and human potential. Solutions that enhance analyst intuition while automating routine tasks represent a sustainable path forward for security operations at scale.<br /> </p><p><strong>Watch the full interview:</strong> https://youtu.be/0GqPtPXD2ik<br /> </p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monzy Merza</strong>, Founder and CEO of CROGL | On Linkedin: <a href="https://www.linkedin.com/in/monzymerza/" target="_blank">https://www.linkedin.com/in/monzymerza/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 13 Aug 2025 23:01:28 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, CROGL, Monzy Merza)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story-GM99xw7H</link>
      <content:encoded><![CDATA[<p><strong>Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity</strong></p><p>Crogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.</p><p>Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At Black Hat USA 2025, Crogl CEO Monzy Merza revealed how his company is tackling one of cybersecurity's most persistent challenges: the overwhelming volume of security alerts that leaves analysts either ignoring potential threats or burning out from investigation fatigue.</p><p>The problem runs deeper than most organizations realize. Merza observed analysts routinely closing hundreds of alerts with a single click, not from laziness or malice, but from sheer necessity. "When you look at the history of breaches, the signal of the breach was there. And somebody ignored it," he explained during his ITSPmagazine interview, highlighting a critical gap between alert generation and meaningful investigation.</p><p>Traditional approaches have failed because they expect human analysts to become "unicorns" - experts capable of mastering multiple data platforms simultaneously while remembering complex query languages and schemas. This unrealistic expectation has created what Merza calls the "human unicorn challenge," where organizations struggle to find personnel who can effectively navigate their increasingly complex security infrastructure.</p><p>Crogl's solution fundamentally reimagines the relationship between human intuition and machine automation. Rather than forcing analysts to adapt to multiple tools, the platform creates a semantic knowledge graph that maps data relationships across an organization's entire security ecosystem. When alerts arrive, the system automatically conducts investigations using established kill chain methodologies, freeing analysts to focus on higher-value activities like threat hunting and strategic security initiatives.</p><p>The privacy-first architecture addresses growing concerns about data sovereignty. Operating as a completely self-contained system with no internet dependencies, Crogl can run air-gapped in the most sensitive environments, including defense intelligence communities. The platform connects to existing tools through APIs without requiring data movement, duplication, or transformation.</p><p>Real-world results demonstrate the platform's versatility. One customer discovered their analysts were using Crogl for fraud detection - an application never intended by the original design. The system's ability to process natural language descriptions and convert them into executable security processes has reduced response times from weeks to minutes for complex threat hunting operations.</p><p>For security leaders evaluating AI integration, Merza advocates an experimental approach. Rather than attempting comprehensive transformation, he suggests starting with focused pilot programs that address specific pain points. This measured strategy allows organizations to validate AI's value while maintaining operational stability.</p><p>The broader implications extend beyond security operations. By removing technical barriers and emphasizing domain expertise over tool competency, platforms like Crogl enable security teams to become strategic business enablers rather than reactive alert processors. Organizations gain the flexibility to maintain their preferred data architectures while ensuring comprehensive security coverage across distributed environments.</p><p>As cyber threats continue evolving, the industry's response must prioritize both technological capability and human potential. Solutions that enhance analyst intuition while automating routine tasks represent a sustainable path forward for security operations at scale.<br /> </p><p><strong>Watch the full interview:</strong> https://youtu.be/0GqPtPXD2ik<br /> </p><p>Learn more about CROGL: <a href="https://itspm.ag/crogl-103909" target="_blank">https://itspm.ag/crogl-103909</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monzy Merza</strong>, Founder and CEO of CROGL | On Linkedin: <a href="https://www.linkedin.com/in/monzymerza/" target="_blank">https://www.linkedin.com/in/monzymerza/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CROGL: <a href="https://www.itspmagazine.com/directory/crogl" target="_blank">https://www.itspmagazine.com/directory/crogl</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18328448" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/825ed906-91ad-4639-b2a7-d767cdfd3d97/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=825ed906-91ad-4639-b2a7-d767cdfd3d97&amp;feed=kDNbmF_B"/>
      <itunes:title>Black Hat 2025: Crogl&apos;s CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, CROGL, Monzy Merza</itunes:author>
      <itunes:duration>00:19:05</itunes:duration>
      <itunes:summary>Crogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.</itunes:summary>
      <itunes:subtitle>Crogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.</itunes:subtitle>
      <itunes:keywords>cyberdefense, airsecurity, enterprisesecurity, privacyfirst, securityinnovation, securityoperations, siem, incidentresponse, sean martin, infosec, infosecurity, cybersecurity, blackhat2025, securityanalytics, crogl, alertfatigue, threathunting, agenticai, onpremises, datasovereignty, monzy merza, securityautomation, securitytools, ai, cyberintelligence, soar, brand story podcast, brand story, ssdc, genai, discovery</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>151</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71573197-f39f-4007-83c6-831fa3caebdb</guid>
      <title>The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Brand Story with HD Moore, Founder and CEO of RunZero | A Black Hat USA 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management</p><p>In this episode, Sean Martin speaks with HD Moore, Founder and CEO of RunZero, about the often-overlooked truth in cybersecurity: the greatest risks are usually the things you don’t know exist in your environment.</p><p>Moore’s career has spanned decades of penetration testing, tool creation, and product development, including leading the creation of Metasploit. That background shapes his approach at RunZero—applying attacker-grade discovery techniques to uncover devices, networks, and vulnerabilities that traditional tools miss.<br /> </p><p>Why Discovery Matters Most</p><p>Through repeated penetration tests for high-security organizations, Moore observed a consistent pattern: breaches rarely occurred because defenders ignored known issues, but rather because attackers exploited unknown assets. These unknowns often bypassed mitigation strategies simply because they weren’t on the organization’s radar.<br /> </p><p>Beyond CVEs</p><p>Moore emphasizes that an overreliance on CVE lists leaves organizations blind to real-world risks. Many breaches stem from misconfigurations, weak credentials, or overlooked systems—problems that can be exploited within days of a vulnerability being announced. The answer, he says, is to focus on exposure and attack paths in real time, not just lists of patchable flaws.<br /> </p><p>Revealing the Gaps</p><p>RunZero’s approach often doubles the asset count organizations believe they have, uncovering systems outside existing scanning or endpoint management coverage. By leveraging unauthenticated discovery techniques, they detect exploitable conditions from an attacker’s perspective—identifying forgotten hardware, outdated firmware, and network segmentation issues that open dangerous pathways.<br /> </p><p>Changing the Game</p><p>This depth of discovery enables security teams to prioritize the small subset of issues that pose the highest business risk, rather than drowning in thousands of low-impact findings. It also helps organizations rebuild their security programs from the ground up—ensuring that every device is accounted for, properly segmented, and monitored.<br /> </p><p>Collaboration and Community</p><p>Moore also shares his ongoing contributions to open source through Project Discovery, integrating and enhancing tools like the nuclei scanner to accelerate vulnerability detection for everyone—not just paying customers.<br /> </p><p>The message is clear: if you want to close the gaps, you first need to know exactly where they are—and that requires a new level of visibility most teams have never had.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>HD Moore, Founder and CEO of RunZero | On Linkedin: <a href="https://www.linkedin.com/in/hdmoore/" target="_blank">https://www.linkedin.com/in/hdmoore/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 13 Aug 2025 01:45:51 +0000</pubDate>
      <author>contact@itspmagazine.com (HD Moore, ITSPmagazine, runZero, Sean Martin, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw</link>
      <content:encoded><![CDATA[<p>The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management</p><p>In this episode, Sean Martin speaks with HD Moore, Founder and CEO of RunZero, about the often-overlooked truth in cybersecurity: the greatest risks are usually the things you don’t know exist in your environment.</p><p>Moore’s career has spanned decades of penetration testing, tool creation, and product development, including leading the creation of Metasploit. That background shapes his approach at RunZero—applying attacker-grade discovery techniques to uncover devices, networks, and vulnerabilities that traditional tools miss.<br /> </p><p>Why Discovery Matters Most</p><p>Through repeated penetration tests for high-security organizations, Moore observed a consistent pattern: breaches rarely occurred because defenders ignored known issues, but rather because attackers exploited unknown assets. These unknowns often bypassed mitigation strategies simply because they weren’t on the organization’s radar.<br /> </p><p>Beyond CVEs</p><p>Moore emphasizes that an overreliance on CVE lists leaves organizations blind to real-world risks. Many breaches stem from misconfigurations, weak credentials, or overlooked systems—problems that can be exploited within days of a vulnerability being announced. The answer, he says, is to focus on exposure and attack paths in real time, not just lists of patchable flaws.<br /> </p><p>Revealing the Gaps</p><p>RunZero’s approach often doubles the asset count organizations believe they have, uncovering systems outside existing scanning or endpoint management coverage. By leveraging unauthenticated discovery techniques, they detect exploitable conditions from an attacker’s perspective—identifying forgotten hardware, outdated firmware, and network segmentation issues that open dangerous pathways.<br /> </p><p>Changing the Game</p><p>This depth of discovery enables security teams to prioritize the small subset of issues that pose the highest business risk, rather than drowning in thousands of low-impact findings. It also helps organizations rebuild their security programs from the ground up—ensuring that every device is accounted for, properly segmented, and monitored.<br /> </p><p>Collaboration and Community</p><p>Moore also shares his ongoing contributions to open source through Project Discovery, integrating and enhancing tools like the nuclei scanner to accelerate vulnerability detection for everyone—not just paying customers.<br /> </p><p>The message is clear: if you want to close the gaps, you first need to know exactly where they are—and that requires a new level of visibility most teams have never had.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>HD Moore, Founder and CEO of RunZero | On Linkedin: <a href="https://www.linkedin.com/in/hdmoore/" target="_blank">https://www.linkedin.com/in/hdmoore/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19542621" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0d5ff2b8-16bd-4833-839c-573865e7f2bd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0d5ff2b8-16bd-4833-839c-573865e7f2bd&amp;feed=kDNbmF_B"/>
      <itunes:title>The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Brand Story with HD Moore, Founder and CEO of RunZero | A Black Hat USA 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>HD Moore, ITSPmagazine, runZero, Sean Martin, Marco Ciappelli</itunes:author>
      <itunes:duration>00:20:21</itunes:duration>
      <itunes:summary>This episode explores why the most dangerous vulnerabilities are often the ones organizations don’t even know exist. HD Moore shares how attacker-grade discovery techniques can expose hidden assets, broken segmentation, and overlooked weaknesses before they become breach points.
</itunes:summary>
      <itunes:subtitle>This episode explores why the most dangerous vulnerabilities are often the ones organizations don’t even know exist. HD Moore shares how attacker-grade discovery techniques can expose hidden assets, broken segmentation, and overlooked weaknesses before they become breach points.
</itunes:subtitle>
      <itunes:keywords>hd moore, marketing podcast, networking, sean martin, assets, cybersecurity, pentesting, vulnerability, exposure, misconfiguration, asset, brand marketing, runzero, iot, risk, brand story podcast, brand story, ssdc, discovery</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>150</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b24d6c1b-6c1f-4bea-91e7-0dc87b3a71d4</guid>
      <title>Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 | A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Subo Guha</title>
      <description><![CDATA[<p><strong>Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 </strong><br />A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas<br />An ITSPmagazine Brand Story with <strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber</p><p>____________________________<br /><br />Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.</p><p>Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.</p><p>The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.</p><p>What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.</p><p>The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.</p><p>Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.</p><p>The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.</p><p>Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.</p><p>The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.</p><p>Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.</p><p>As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations.<br /> </p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 12 Aug 2025 22:23:17 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Marco Ciappelli, ITSPmagazine, Subo Guha)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/stellar-cyber-revolutionizes-soc-cybersecurity-operations-with-human-augmented-autonomous-platform-at-black-hat-2025-a-stellar-cyber-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-subo-guha-gruzzLoP</link>
      <content:encoded><![CDATA[<p><strong>Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 </strong><br />A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas<br />An ITSPmagazine Brand Story with <strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber</p><p>____________________________<br /><br />Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.</p><p>Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.</p><p>The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.</p><p>What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.</p><p>The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.</p><p>Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.</p><p>The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.</p><p>Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.</p><p>The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.</p><p>Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.</p><p>As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations.<br /> </p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16969262" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1dee1d7a-6c02-492b-88d2-fd9be78eee7f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1dee1d7a-6c02-492b-88d2-fd9be78eee7f&amp;feed=kDNbmF_B"/>
      <itunes:title>Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 | A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Subo Guha</itunes:title>
      <itunes:author>Sean Martin, Marco Ciappelli, ITSPmagazine, Subo Guha</itunes:author>
      <itunes:duration>00:17:40</itunes:duration>
      <itunes:summary>Stellar Cyber unveiled their human-augmented autonomous SOC platform at Black Hat 2025, transforming security operations by reducing thousands of alerts to manageable dozens while empowering analysts through AI-driven automation.
</itunes:summary>
      <itunes:subtitle>Stellar Cyber unveiled their human-augmented autonomous SOC platform at Black Hat 2025, transforming security operations by reducing thousands of alerts to manageable dozens while empowering analysts through AI-driven automation.
</itunes:subtitle>
      <itunes:keywords>cyberdefense, socautomation, aipoweredsecurity, itdr, enterprisesecurity, zerotrust, identitysecurity, securityoperations, siem, danny jenkins, incidentresponse, sean martin, infosec, cybersecurity, threatdetection, blackhat2025, securityanalytics, blackhat, blackhatusa, threathunting, agenticai, edr, cyberresilience, securityautomation, mssp</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>149</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7e1484a6-2dbb-470f-92b1-650ae47f0904</guid>
      <title>Simplifying CyberSecurity Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins</title>
      <description><![CDATA[<p>At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn’t have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse organizations.</p><p>Jenkins emphasizes that the industry has moved beyond selling “magic” solutions that promise to find every threat. Instead, customers are demanding tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. ThreatLocker’s platform is built on this premise, enabling over 54,000 organizations worldwide to maintain a secure environment without slowing business operations.</p><p>A highlight from the event is ThreatLocker’s Defense Against Configurations (DAC) module. This feature performs 170 daily checks on every endpoint, aligning them with compliance frameworks like NIST and FedRAMP. It not only detects misconfigurations but also explains why they matter and how to fix them. Jenkins admits the tool even revealed gaps in ThreatLocker’s own environment—issues that were resolved in minutes—proving its practical value.</p><p>The discussion also touches on the company’s recent FedRAMP authorization process, a rigorous journey that validates both the product’s and the company’s security maturity. For federal agencies and contractors, this means faster compliance with CMMC and NIST requirements. For commercial clients, it’s an assurance that they’re working with a partner whose internal security practices meet some of the highest standards in the industry.</p><p>As ThreatLocker expands its integrations and modules, Jenkins stresses that simplicity remains the guiding principle. This is achieved through constant engagement with customers—at trade shows, in the field, and within the company’s own managed services operations. By actively using their own products at scale, the team identifies friction points and smooths them out before customers encounter them.</p><p>In short, the message from the booth at Black Hat is clear: effective security comes from strong fundamentals, simplified management, and a relentless focus on the user experience.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Danny Jenkins</strong>, CEO of ThreatLocker | On LinkedIn | <a href="https://www.linkedin.com/in/dannyjenkinscyber/">https://www.linkedin.com/in/dannyjenkinscyber/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 11 Aug 2025 21:27:08 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Danny Jenkins, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/simplifying-security-without-sacrificing-control-a-threatlocker-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-danny-jenkins-7laClasy</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn’t have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse organizations.</p><p>Jenkins emphasizes that the industry has moved beyond selling “magic” solutions that promise to find every threat. Instead, customers are demanding tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. ThreatLocker’s platform is built on this premise, enabling over 54,000 organizations worldwide to maintain a secure environment without slowing business operations.</p><p>A highlight from the event is ThreatLocker’s Defense Against Configurations (DAC) module. This feature performs 170 daily checks on every endpoint, aligning them with compliance frameworks like NIST and FedRAMP. It not only detects misconfigurations but also explains why they matter and how to fix them. Jenkins admits the tool even revealed gaps in ThreatLocker’s own environment—issues that were resolved in minutes—proving its practical value.</p><p>The discussion also touches on the company’s recent FedRAMP authorization process, a rigorous journey that validates both the product’s and the company’s security maturity. For federal agencies and contractors, this means faster compliance with CMMC and NIST requirements. For commercial clients, it’s an assurance that they’re working with a partner whose internal security practices meet some of the highest standards in the industry.</p><p>As ThreatLocker expands its integrations and modules, Jenkins stresses that simplicity remains the guiding principle. This is achieved through constant engagement with customers—at trade shows, in the field, and within the company’s own managed services operations. By actively using their own products at scale, the team identifies friction points and smooths them out before customers encounter them.</p><p>In short, the message from the booth at Black Hat is clear: effective security comes from strong fundamentals, simplified management, and a relentless focus on the user experience.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Danny Jenkins</strong>, CEO of ThreatLocker | On LinkedIn | <a href="https://www.linkedin.com/in/dannyjenkinscyber/">https://www.linkedin.com/in/dannyjenkinscyber/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from our Black Hat USA 2025 coverage: <a href="https://www.itspmagazine.com/bhusa25" target="_blank">https://www.itspmagazine.com/bhusa25</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18653627" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c3b68694-6237-45f7-9e39-8f7f0f0fa47c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c3b68694-6237-45f7-9e39-8f7f0f0fa47c&amp;feed=kDNbmF_B"/>
      <itunes:title>Simplifying CyberSecurity Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Danny Jenkins, Marco Ciappelli</itunes:author>
      <itunes:duration>00:19:25</itunes:duration>
      <itunes:summary>CyberSecurity doesn’t have to be complicated to be effective. This conversation reveals how practical controls, simplified processes, and continuous customer engagement are helping organizations achieve strong security without slowing down business.</itunes:summary>
      <itunes:subtitle>CyberSecurity doesn’t have to be complicated to be effective. This conversation reveals how practical controls, simplified processes, and continuous customer engagement are helping organizations achieve strong security without slowing down business.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, danny jenkins, sean martin, cybersecurity, threatlocker, fedramp, endpoint, misconfiguration, brand marketing, configuration, brand story podcast, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>148</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">47ee1865-e712-4a68-a0e6-99223ea8934f</guid>
      <title>From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson</title>
      <description><![CDATA[<p>In today’s connected world, corporate executives and board members live in a digital space that extends far beyond their company’s networks. Chris Pierson, CEO and Founder of BlackCloak, explains how protecting leaders requires more than traditional enterprise security—it calls for securing their personal digital lives.</p><p>The threat landscape for high-profile individuals includes everything from compromised personal email accounts and hacked home networks to deepfake attacks and targeted identity theft. These risks not only threaten the individual but can cause significant financial and reputational damage to the companies they represent.</p><p>BlackCloak addresses this by providing digital executive protection—securing executives, their families, and their homes with a blend of technology, privacy measures, and concierge-level service. This includes monitoring and removing data from brokers, detecting threats in the dark web, safeguarding home IoT devices, and even protecting yachts, jets, and vacation properties. The company also acts as an on-call cybersecurity and privacy advisor 24/7/365.</p><p>A key component is the BlackCloak app, which serves as a security dashboard and communication hub. Through it, clients can see privacy risks being addressed in real time, receive alerts, and contact their dedicated concierge team. Behind the scenes, deception networks and active monitoring provide an extra layer of defense.</p><p>Pierson highlights the growing convergence of cyber and physical threats. High-profile attacks and incidents in recent years underscore the importance of integrating cybersecurity with physical security, particularly for executives who are constantly in the public eye. With AI accelerating both the speed and sophistication of attacks, organizations need to consider a holistic approach—protecting not only networks and devices but the digital personas of their people.</p><p>Ultimately, Pierson sees this as part of a broader shift toward making security a lifestyle component for executives, much like comprehensive healthcare benefits. It’s about creating an always-on layer of protection that travels with them—whether they’re in the office, at home, or halfway around the world.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 11 Aug 2025 20:23:21 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, Chris Pierson, Marco Ciappelli, BlackCloak, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-boardroom-to-living-room-securing-the-modern-executive-a-blackcloak-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-chris-pierson-_xmkSpmL</link>
      <content:encoded><![CDATA[<p>In today’s connected world, corporate executives and board members live in a digital space that extends far beyond their company’s networks. Chris Pierson, CEO and Founder of BlackCloak, explains how protecting leaders requires more than traditional enterprise security—it calls for securing their personal digital lives.</p><p>The threat landscape for high-profile individuals includes everything from compromised personal email accounts and hacked home networks to deepfake attacks and targeted identity theft. These risks not only threaten the individual but can cause significant financial and reputational damage to the companies they represent.</p><p>BlackCloak addresses this by providing digital executive protection—securing executives, their families, and their homes with a blend of technology, privacy measures, and concierge-level service. This includes monitoring and removing data from brokers, detecting threats in the dark web, safeguarding home IoT devices, and even protecting yachts, jets, and vacation properties. The company also acts as an on-call cybersecurity and privacy advisor 24/7/365.</p><p>A key component is the BlackCloak app, which serves as a security dashboard and communication hub. Through it, clients can see privacy risks being addressed in real time, receive alerts, and contact their dedicated concierge team. Behind the scenes, deception networks and active monitoring provide an extra layer of defense.</p><p>Pierson highlights the growing convergence of cyber and physical threats. High-profile attacks and incidents in recent years underscore the importance of integrating cybersecurity with physical security, particularly for executives who are constantly in the public eye. With AI accelerating both the speed and sophistication of attacks, organizations need to consider a holistic approach—protecting not only networks and devices but the digital personas of their people.</p><p>Ultimately, Pierson sees this as part of a broader shift toward making security a lifestyle component for executives, much like comprehensive healthcare benefits. It’s about creating an always-on layer of protection that travels with them—whether they’re in the office, at home, or halfway around the world.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21744433" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/972bea7d-1be0-4031-a452-43e555a50bbd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=972bea7d-1be0-4031-a452-43e555a50bbd&amp;feed=kDNbmF_B"/>
      <itunes:title>From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson</itunes:title>
      <itunes:author>Sean Martin, Chris Pierson, Marco Ciappelli, BlackCloak, ITSPmagazine</itunes:author>
      <itunes:duration>00:22:38</itunes:duration>
      <itunes:summary>High-profile corporate leaders face digital risks that extend far beyond company networks, from personal email compromises to deepfake attacks. This episode explores how combining advanced technology, privacy safeguards, and concierge-level service creates an always-on shield for executives and their families.</itunes:summary>
      <itunes:subtitle>High-profile corporate leaders face digital risks that extend far beyond company networks, from personal email compromises to deepfake attacks. This episode explores how combining advanced technology, privacy safeguards, and concierge-level service creates an always-on shield for executives and their families.</itunes:subtitle>
      <itunes:keywords>chris pierson, marketing podcast, marco ciappelli, black hat, cybersecurity, concierge, brand marketing, executives, identity, threat, ai, privacy, brand story podcast, brand story, protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>147</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1aa8c219-7699-4a6a-a52b-bdb008003e51</guid>
      <title>When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi</title>
      <description><![CDATA[<p>At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.</p><p>AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.</p><p>One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.</p><p>This is not just a security problem; it’s a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.</p><p>Akamai’s response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.</p><p>Chokshi’s call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 11 Aug 2025 15:26:42 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, Akamai, Sean Martin, ITSPmagazine, Rupesh Chokshi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-bots-rewrite-the-buyers-journey-protecting-brand-value-in-the-age-of-ai-agents-an-akamai-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-rupesh-chokshi-GI8iBq36</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine’s Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.</p><p>AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.</p><p>One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.</p><p>This is not just a security problem; it’s a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.</p><p>Akamai’s response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.</p><p>Chokshi’s call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19183175" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e421bb3e-e098-4f15-89b6-6d882b92f46b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e421bb3e-e098-4f15-89b6-6d882b92f46b&amp;feed=kDNbmF_B"/>
      <itunes:title>When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi</itunes:title>
      <itunes:author>Marco Ciappelli, Akamai, Sean Martin, ITSPmagazine, Rupesh Chokshi</itunes:author>
      <itunes:duration>00:19:58</itunes:duration>
      <itunes:summary>AI innovation is advancing faster than security integration, leaving enterprises vulnerable to threats ranging from AI bot scraping to compromised conversational agents. This discussion explores how organizations can protect both their data and business models while embracing AI-driven growth.</itunes:summary>
      <itunes:subtitle>AI innovation is advancing faster than security integration, leaving enterprises vulnerable to threats ranging from AI bot scraping to compromised conversational agents. This discussion explores how organizations can protect both their data and business models while embracing AI-driven growth.</itunes:subtitle>
      <itunes:keywords>content, bots, marketing podcast, sean martin, akamai, innovation, firewall, security, brand marketing, ai, brand story podcast, brand story, rupesh chokshi, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>146</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c19bf71e-5505-4244-a57c-1222d401fa2b</guid>
      <title>Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Origin Story with Anders Søborg, Co-Founder of Eve, and Mark Humphrey</title>
      <description><![CDATA[<p>Governance, risk, and compliance (GRC) has long been burdened by heavy manual processes, slow assessments, and limited visibility. In this Brand Story episode, Sean Martin and Marco Ciappelli are joined by Anders Søborg, Co-Founder of Eve, and Mark Humphrey, who brings two decades of fraud and cybersecurity experience to the team. Together, they unpack how Eve is challenging traditional GRC tools by offering something entirely different: automation with evidence-based intelligence at its core.</p><p>Anders shares how his experience as Chief Risk Officer and partner at major firms like Ernst & Young and PwC shaped Eve’s mission. He describes a world where compliance doesn’t have to mean complexity. Eve’s AI engine evaluates more than a thousand controls in under 15 minutes—surpassing manual reviews that could take weeks—and goes a step further by offering recommendations, not just red flags.</p><p>This isn’t about replacing people. It’s about helping overwhelmed compliance, risk, and audit teams regain control. Mark emphasizes how Eve operates like a true partner, delivering support with no ego and full transparency. Their approach combines deep regulatory knowledge, contextual AI agents trained on real-world frameworks, and a clear respect for data sovereignty and privacy—an essential requirement for global pharma, financial, and consulting clients already relying on the platform.</p><p>More than a dashboard, Eve acts as an intelligent engine embedded into existing workflows via API, making it a natural complement—not a competitor—to existing GRC platforms. The platform is customizable, evidence-driven, and built with firsthand knowledge of what compliance professionals actually need: clear guidance, real-time answers, and fewer repetitive tasks.</p><p>The episode leaves listeners with a compelling question: what if your compliance program could coach your team, reduce audit costs, and provide instant visibility—without sacrificing accuracy or control?</p><p>Learn more about E-V-E GRC: <a href="https://itspm.ag/eve-grc-99" target="_blank">https://itspm.ag/eve-grc-99</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Anders Søborg</strong>, Co-founder, Director at E-V-E GRC | On LinkedIn: <a href="https://www.linkedin.com/in/anders-s%C3%B8borg-3826702/" target="_blank">https://www.linkedin.com/in/anders-s%C3%B8borg-3826702/</a></p><p><strong>Mark Humphrey</strong>, Senior Sales and Channel Director EMEA at E-V-E GRC | On LinkedIn: <a href="https://www.linkedin.com/in/m-humphrey-mba-0020192b1/" target="_blank">https://www.linkedin.com/in/m-humphrey-mba-0020192b1/</a></p><p><strong>Resources</strong></p><p>Redefine Compliance. Unleash Your Potential with E-V-E GRC. <a href="https://itspm.ag/e-v-e-i1ml" target="_blank">Command Compliance</a>: <a href="https://itspm.ag/e-v-e-i1ml" target="_blank">https://itspm.ag/e-v-e-i1ml</a></p><p>Learn more and catch more stories from E-V-E GRC: <a href="https://www.itspmagazine.com/directory/evegrc" target="_blank">https://www.itspmagazine.com/directory/evegrc</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 5 Aug 2025 14:35:21 +0000</pubDate>
      <author>contact@itspmagazine.com (Anders Søborg, E-V-E GRC, Mark Humphrey, Marco Ciappelli, Sean Martin, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/solving-grc-fatigue-how-ai-is-helping-compliance-teams-do-more-with-less-an-e-v-e-grc-brand-origin-story-with-anders-sborg-co-founder-of-eve-and-mark-humphrey-lt_GoRye</link>
      <content:encoded><![CDATA[<p>Governance, risk, and compliance (GRC) has long been burdened by heavy manual processes, slow assessments, and limited visibility. In this Brand Story episode, Sean Martin and Marco Ciappelli are joined by Anders Søborg, Co-Founder of Eve, and Mark Humphrey, who brings two decades of fraud and cybersecurity experience to the team. Together, they unpack how Eve is challenging traditional GRC tools by offering something entirely different: automation with evidence-based intelligence at its core.</p><p>Anders shares how his experience as Chief Risk Officer and partner at major firms like Ernst & Young and PwC shaped Eve’s mission. He describes a world where compliance doesn’t have to mean complexity. Eve’s AI engine evaluates more than a thousand controls in under 15 minutes—surpassing manual reviews that could take weeks—and goes a step further by offering recommendations, not just red flags.</p><p>This isn’t about replacing people. It’s about helping overwhelmed compliance, risk, and audit teams regain control. Mark emphasizes how Eve operates like a true partner, delivering support with no ego and full transparency. Their approach combines deep regulatory knowledge, contextual AI agents trained on real-world frameworks, and a clear respect for data sovereignty and privacy—an essential requirement for global pharma, financial, and consulting clients already relying on the platform.</p><p>More than a dashboard, Eve acts as an intelligent engine embedded into existing workflows via API, making it a natural complement—not a competitor—to existing GRC platforms. The platform is customizable, evidence-driven, and built with firsthand knowledge of what compliance professionals actually need: clear guidance, real-time answers, and fewer repetitive tasks.</p><p>The episode leaves listeners with a compelling question: what if your compliance program could coach your team, reduce audit costs, and provide instant visibility—without sacrificing accuracy or control?</p><p>Learn more about E-V-E GRC: <a href="https://itspm.ag/eve-grc-99" target="_blank">https://itspm.ag/eve-grc-99</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Anders Søborg</strong>, Co-founder, Director at E-V-E GRC | On LinkedIn: <a href="https://www.linkedin.com/in/anders-s%C3%B8borg-3826702/" target="_blank">https://www.linkedin.com/in/anders-s%C3%B8borg-3826702/</a></p><p><strong>Mark Humphrey</strong>, Senior Sales and Channel Director EMEA at E-V-E GRC | On LinkedIn: <a href="https://www.linkedin.com/in/m-humphrey-mba-0020192b1/" target="_blank">https://www.linkedin.com/in/m-humphrey-mba-0020192b1/</a></p><p><strong>Resources</strong></p><p>Redefine Compliance. Unleash Your Potential with E-V-E GRC. <a href="https://itspm.ag/e-v-e-i1ml" target="_blank">Command Compliance</a>: <a href="https://itspm.ag/e-v-e-i1ml" target="_blank">https://itspm.ag/e-v-e-i1ml</a></p><p>Learn more and catch more stories from E-V-E GRC: <a href="https://www.itspmagazine.com/directory/evegrc" target="_blank">https://www.itspmagazine.com/directory/evegrc</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="40112887" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/4a5067b6-ffaf-4e87-a53f-ad28647c7384/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=4a5067b6-ffaf-4e87-a53f-ad28647c7384&amp;feed=kDNbmF_B"/>
      <itunes:title>Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Origin Story with Anders Søborg, Co-Founder of Eve, and Mark Humphrey</itunes:title>
      <itunes:author>Anders Søborg, E-V-E GRC, Mark Humphrey, Marco Ciappelli, Sean Martin, ITSPmagazine</itunes:author>
      <itunes:duration>00:41:47</itunes:duration>
      <itunes:summary>This episode explores how AI is reshaping governance, risk, and compliance by eliminating manual drudgery and delivering evidence-based, automated recommendations. Hear how Eve’s purpose-built AI platform is already transforming how organizations approach third-party risk, compliance audits, and ESG reporting.</itunes:summary>
      <itunes:subtitle>This episode explores how AI is reshaping governance, risk, and compliance by eliminating manual drudgery and delivering evidence-based, automated recommendations. Hear how Eve’s purpose-built AI platform is already transforming how organizations approach third-party risk, compliance audits, and ESG reporting.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, grc, sean martin, automation, mark humphrey, e-v-e, brand marketing, ai, risk, brand story podcast, audit, brand story, anders søborg, eve, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>145</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8419dc52-ec29-4361-aba9-2090f763964d</guid>
      <title>When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson</title>
      <description><![CDATA[<p>Digital risk is no longer confined to the enterprise perimeter. Executives and board members—along with their families—are increasingly targeted outside of work, in personal settings, and online. Dr. Chris Pierson, Founder and CEO of BlackCloak, joins Sean Martin and Marco Ciappelli to discuss the current state of digital executive protection and why a piecemeal approach is insufficient.</p><p>Chris outlines how threats to privacy, cybersecurity, and physical safety intersect across personal and professional domains. A breached home network, a deepfake circulating online, or a targeted social engineering campaign could all become entry points back into a company’s infrastructure—or lead to reputational or financial fallout. That’s why BlackCloak takes a holistic view, combining identity protection, device hardening, social listening, concierge response, and physical risk monitoring into a single service.</p><p>One of the key resources discussed is the vendor-agnostic Digital Executive Protection Framework. Free to download and use, it offers CISOs and CSOs a 14-point checklist covering areas like financial data protection, social media monitoring, physical threats, and personal cyber hygiene. According to Chris, it’s designed to be practical, actionable, and easy to integrate into quarterly reviews and budget planning cycles.</p><p>While many security vendors promise protection through tools alone, BlackCloak emphasizes relationships—human connection is built into the service. The platform includes real-time threat response and one-on-one interaction, going far beyond 1-800 numbers or chatbots.</p><p>Whether you’re managing executive risk for a Fortune 500 company or navigating new board-level cyber obligations, this conversation outlines the real gaps in current corporate protections—and a solution that meets executives where they are.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 4 Aug 2025 20:42:59 +0000</pubDate>
      <author>contact@itspmagazine.com (BlackCloak, Marco Ciappelli, Chris Pierson, ITSPmagazine, Sean Martin)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-the-c-suite-becomes-the-attack-surface-a-blackcloak-pre-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-chris-pierson-TF4i4zwI</link>
      <content:encoded><![CDATA[<p>Digital risk is no longer confined to the enterprise perimeter. Executives and board members—along with their families—are increasingly targeted outside of work, in personal settings, and online. Dr. Chris Pierson, Founder and CEO of BlackCloak, joins Sean Martin and Marco Ciappelli to discuss the current state of digital executive protection and why a piecemeal approach is insufficient.</p><p>Chris outlines how threats to privacy, cybersecurity, and physical safety intersect across personal and professional domains. A breached home network, a deepfake circulating online, or a targeted social engineering campaign could all become entry points back into a company’s infrastructure—or lead to reputational or financial fallout. That’s why BlackCloak takes a holistic view, combining identity protection, device hardening, social listening, concierge response, and physical risk monitoring into a single service.</p><p>One of the key resources discussed is the vendor-agnostic Digital Executive Protection Framework. Free to download and use, it offers CISOs and CSOs a 14-point checklist covering areas like financial data protection, social media monitoring, physical threats, and personal cyber hygiene. According to Chris, it’s designed to be practical, actionable, and easy to integrate into quarterly reviews and budget planning cycles.</p><p>While many security vendors promise protection through tools alone, BlackCloak emphasizes relationships—human connection is built into the service. The platform includes real-time threat response and one-on-one interaction, going far beyond 1-800 numbers or chatbots.</p><p>Whether you’re managing executive risk for a Fortune 500 company or navigating new board-level cyber obligations, this conversation outlines the real gaps in current corporate protections—and a solution that meets executives where they are.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guest:</strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17296550" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/97586fbf-d728-47d3-a610-fc7bad1e354c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=97586fbf-d728-47d3-a610-fc7bad1e354c&amp;feed=kDNbmF_B"/>
      <itunes:title>When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson</itunes:title>
      <itunes:author>BlackCloak, Marco Ciappelli, Chris Pierson, ITSPmagazine, Sean Martin</itunes:author>
      <itunes:duration>00:18:01</itunes:duration>
      <itunes:summary>Executives and their families face growing digital risks that blur the lines between personal and professional. This episode explores a proactive and human-driven approach to executive protection that blends cybersecurity, privacy, and concierge-level response into a cohesive solution.</itunes:summary>
      <itunes:subtitle>Executives and their families face growing digital risks that blur the lines between personal and professional. This episode explores a proactive and human-driven approach to executive protection that blends cybersecurity, privacy, and concierge-level response into a cohesive solution.</itunes:subtitle>
      <itunes:keywords>concierge security, chris pierson, marketing podcast, marco ciappelli, black hat 	•	brand story, sean martin, cybersecurity, risk management, executive protection, brand marketing, privacy, brand story podcast, deepfake</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>144</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bfb966fa-3964-46e0-ba0b-365fa1eff841</guid>
      <title>Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Story with Theresa Lanowitz</title>
      <description><![CDATA[<p>As digital infrastructure becomes increasingly interwoven with third-party code, APIs, and AI-generated components, organizations are realizing they can’t ignore the origins—or the risks—of their software. Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Sean Martin and Marco Ciappelli to unpack why software supply chain visibility has become a top concern not just for CISOs, but for CEOs as well.</p><p>Drawing from LevelBlue’s Data and AI Accelerator Report, part of their annual Futures Report series, Theresa highlights a striking correlation: 80% of organizations with low software supply chain visibility experienced a breach in the past year, while only 6% with high visibility did. That data underscores the critical role visibility plays in reducing business risk and maintaining operational resilience.</p><p>More than a technical concern, software supply chain risk is now a boardroom topic. According to the report, CEOs have the highest awareness of this risk—even more than CIOs and CISOs—because of the direct impact on brand reputation, stock value, and partner trust. As Theresa puts it, software has become the “last mile” of digital business, and that makes it everyone’s problem.</p><p>The conversation explores why now is the time to act. Government regulations are increasing, adversarial attacks are intensifying, and organizations are finally beginning to connect software vulnerabilities with business outcomes. Theresa outlines four critical actions: leverage CEO awareness, understand and prioritize vulnerabilities, invest in modern security technologies, and demand transparency from third-party providers.</p><p>Importantly, cybersecurity culture is emerging as a key differentiator. Companies that embed security KPIs across all business units—and align security with business priorities—are not only more secure, they’re also more agile. As software creation moves faster and more modular, the organizations that prioritize visibility and responsibility throughout the supply chain will be best positioned to adapt, grow, and protect their operations.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>To learn more, download the complete findings of the LevelBlue Threat Trends Report here: <a href="https://itspm.ag/levelbyqdp" target="_blank">https://itspm.ag/levelbyqdp</a></p><p>To download the 2025 LevelBlue Data Accelerator: Software Supply Chain and Cybersecurity report, visit:<strong> </strong><a href="https://itspm.ag/lbdaf6i" target="_blank">https://itspm.ag/lbdaf6i</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 29 Jul 2025 12:59:36 +0000</pubDate>
      <author>contact@itspmagazine.com (Sean Martin, ITSPmagazine, Theresa Lanowitz, LevelBlue, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/supply-chain-transparency-isnt-just-technicalits-a-business-imperative-a-levelblue-brand-story-with-theresa-lanowitz-Zv3QZaWd</link>
      <content:encoded><![CDATA[<p>As digital infrastructure becomes increasingly interwoven with third-party code, APIs, and AI-generated components, organizations are realizing they can’t ignore the origins—or the risks—of their software. Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Sean Martin and Marco Ciappelli to unpack why software supply chain visibility has become a top concern not just for CISOs, but for CEOs as well.</p><p>Drawing from LevelBlue’s Data and AI Accelerator Report, part of their annual Futures Report series, Theresa highlights a striking correlation: 80% of organizations with low software supply chain visibility experienced a breach in the past year, while only 6% with high visibility did. That data underscores the critical role visibility plays in reducing business risk and maintaining operational resilience.</p><p>More than a technical concern, software supply chain risk is now a boardroom topic. According to the report, CEOs have the highest awareness of this risk—even more than CIOs and CISOs—because of the direct impact on brand reputation, stock value, and partner trust. As Theresa puts it, software has become the “last mile” of digital business, and that makes it everyone’s problem.</p><p>The conversation explores why now is the time to act. Government regulations are increasing, adversarial attacks are intensifying, and organizations are finally beginning to connect software vulnerabilities with business outcomes. Theresa outlines four critical actions: leverage CEO awareness, understand and prioritize vulnerabilities, invest in modern security technologies, and demand transparency from third-party providers.</p><p>Importantly, cybersecurity culture is emerging as a key differentiator. Companies that embed security KPIs across all business units—and align security with business priorities—are not only more secure, they’re also more agile. As software creation moves faster and more modular, the organizations that prioritize visibility and responsibility throughout the supply chain will be best positioned to adapt, grow, and protect their operations.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>To learn more, download the complete findings of the LevelBlue Threat Trends Report here: <a href="https://itspm.ag/levelbyqdp" target="_blank">https://itspm.ag/levelbyqdp</a></p><p>To download the 2025 LevelBlue Data Accelerator: Software Supply Chain and Cybersecurity report, visit:<strong> </strong><a href="https://itspm.ag/lbdaf6i" target="_blank">https://itspm.ag/lbdaf6i</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34862125" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/2c1a9ff6-b79f-42b8-a58b-d81dfd48c402/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=2c1a9ff6-b79f-42b8-a58b-d81dfd48c402&amp;feed=kDNbmF_B"/>
      <itunes:title>Supply Chain Transparency Isn’t Just Technical—It’s a Business Imperative | A LevelBlue Brand Story with Theresa Lanowitz</itunes:title>
      <itunes:author>Sean Martin, ITSPmagazine, Theresa Lanowitz, LevelBlue, Marco Ciappelli</itunes:author>
      <itunes:duration>00:36:18</itunes:duration>
      <itunes:summary>Software supply chain visibility has moved from a technical issue to a boardroom mandate, with CEOs taking notice of the business risks tied to insecure code. In this episode, Theresa Lanowitz of LevelBlue shares why visibility matters, who owns it, and how companies can act now to reduce risk and build resilience.</itunes:summary>
      <itunes:subtitle>Software supply chain visibility has moved from a technical issue to a boardroom mandate, with CEOs taking notice of the business risks tied to insecure code. In this episode, Theresa Lanowitz of LevelBlue shares why visibility matters, who owns it, and how companies can act now to reduce risk and build resilience.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, supply chain, cybersecurity, software, breach brand story, brand marketing, theresa lanowitz, visibility, devsecops, brand story podcast, ceo</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>143</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3766246b-8d18-4791-bd70-4e1ecd1381c5</guid>
      <title>ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston</title>
      <description><![CDATA[<p><strong>ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston</strong></p><p>Join ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.</p><p>As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.</p><p>ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."</p><p>The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.</p><p>At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.</p><p>Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.</p><p>ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.</p><p>The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.</p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations<br /><br />Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>John Lilliston</strong><br />Cybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | <a href="https://www.linkedin.com/in/john-lilliston-4725217b/" target="_blank">https://www.linkedin.com/in/john-lilliston-4725217b/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a><br /><br /><strong>ThreatLocker® Welcome Reception | </strong>Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! <br />‍<br />‍<strong>Time</strong>: 7PM - 10PM | <strong>Location:</strong> Mandalay Bay Complex <br />RSVP below and we'll send you a confirmation email with all the details.</p><p><a href="https://www.threatlocker.com/resources/black-hat-2025?utm_source=itsp&utm_medium=sponsor&utm_campaign=john_l_black_hat_25_q3_25&utm_content=john_l_black_hat_25&utm_term=podcast" target="_blank">[ Welcome Reception RSVP ]</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 29 Jul 2025 06:54:58 +0000</pubDate>
      <author>contact@itspmagazine.com (John Lilliston, Threatlocker, Sean Martin, ITSPmagazine, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/threatlocker-to-unveil-game-changing-zero-trust-innovations-at-black-hat-2025-visit-them-at-booth-1933-a-threatlocker-pre-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-john-lilliston-OfmbQBqV</link>
      <content:encoded><![CDATA[<p><strong>ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston</strong></p><p>Join ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.</p><p>As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.</p><p>ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."</p><p>The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.</p><p>At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.</p><p>Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.</p><p>ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.</p><p>The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.</p><p><strong>Keywords: </strong>Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations<br /><br />Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content.</i><a href="https://www.itspmagazine.com/their-infosec-story"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>John Lilliston</strong><br />Cybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | <a href="https://www.linkedin.com/in/john-lilliston-4725217b/" target="_blank">https://www.linkedin.com/in/john-lilliston-4725217b/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a><br /><br /><strong>ThreatLocker® Welcome Reception | </strong>Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! <br />‍<br />‍<strong>Time</strong>: 7PM - 10PM | <strong>Location:</strong> Mandalay Bay Complex <br />RSVP below and we'll send you a confirmation email with all the details.</p><p><a href="https://www.threatlocker.com/resources/black-hat-2025?utm_source=itsp&utm_medium=sponsor&utm_campaign=john_l_black_hat_25_q3_25&utm_content=john_l_black_hat_25&utm_term=podcast" target="_blank">[ Welcome Reception RSVP ]</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17141851" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5f19991c-eae3-4b35-a2b7-b703f5da8e9f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5f19991c-eae3-4b35-a2b7-b703f5da8e9f&amp;feed=kDNbmF_B"/>
      <itunes:title>ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston</itunes:title>
      <itunes:author>John Lilliston, Threatlocker, Sean Martin, ITSPmagazine, Marco Ciappelli</itunes:author>
      <itunes:duration>00:17:51</itunes:duration>
      <itunes:summary>Join ITSP Magazine&apos;s Marco Ciappelli and Sean Martin as they preview ThreatLocker&apos;s exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker&apos;s default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.</itunes:summary>
      <itunes:subtitle>Join ITSP Magazine&apos;s Marco Ciappelli and Sean Martin as they preview ThreatLocker&apos;s exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker&apos;s default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.</itunes:subtitle>
      <itunes:keywords>cybersecurity solutions, marketing podcast, marco ciappelli, network security, sean martin, threat detection, security platform, endpoint protection, cybersecurity, enterprise security, threatlocker, blackhat, information security, cybersecurity conference, application control, zero trust security, managed detection response, black hat usa, brand marketing, security automation, ai, cybersecurity innovation, default deny strategy, malware prevention, brand story podcast, black hat 2025, brand story, cyber threats, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>142</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">593a77c8-28d9-4b29-a7a2-ae075343b3ce</guid>
      <title>Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi</title>
      <description><![CDATA[<p>Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year’s security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.</p><p>Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.</p><p>While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren’t enough—because these threats don’t behave like yesterday’s attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.</p><p>This brings the focus to the runtime. Akamai’s newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It’s not just about defense—it’s about building trust as AI moves deeper into decision-making and workflow automation.</p><p>CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 25 Jul 2025 01:59:19 +0000</pubDate>
      <author>contact@itspmagazine.com (Akamai, Rupesh Chokshi, ITSPmagazine, Marco Ciappelli, Sean Martin)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/bots-apis-and-runtime-risk-what-exposures-are-driving-ai-security-innovation-in-2025-an-akamai-pre-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-rupesh-chokshi-pXhNZwq8</link>
      <content:encoded><![CDATA[<p>Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year’s security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.</p><p>Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.</p><p>While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren’t enough—because these threats don’t behave like yesterday’s attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.</p><p>This brings the focus to the runtime. Akamai’s newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It’s not just about defense—it’s about building trust as AI moves deeper into decision-making and workflow automation.</p><p>CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20923175" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/87474194-2761-4466-a606-3eb2c94d0a28/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=87474194-2761-4466-a606-3eb2c94d0a28&amp;feed=kDNbmF_B"/>
      <itunes:title>Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi</itunes:title>
      <itunes:author>Akamai, Rupesh Chokshi, ITSPmagazine, Marco Ciappelli, Sean Martin</itunes:author>
      <itunes:duration>00:21:47</itunes:duration>
      <itunes:summary>AI is transforming how businesses operate—but the security gaps it introduces are just as profound. In this episode, Rupesh Chokshi outlines the rising risks of agentic AI, API exposure, and bot-driven scraping—and what security teams can do about it today.</itunes:summary>
      <itunes:subtitle>AI is transforming how businesses operate—but the security gaps it introduces are just as profound. In this episode, Rupesh Chokshi outlines the rising risks of agentic AI, API exposure, and bot-driven scraping—and what security teams can do about it today.</itunes:subtitle>
      <itunes:keywords>bots, marketing podcast, marco ciappelli, sean martin, cybersecurity, blackhat, api, firewall, brand marketing, runtime, ai, brand story podcast, brand story, rupesh chokshi</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>141</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">830422db-1770-433c-98c7-77207b026e26</guid>
      <title>Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI</title>
      <description><![CDATA[<p>As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).</p><p>Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That’s where Dropzone comes in—offering an AI-powered security analyst that doesn’t just detect threats, but investigates, correlates, and takes action.</p><p>During a recent pre-event chat with ITSPmagazine’s Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.</p><p>The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don’t have to be.</p><p>The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.</p><p>With conversations at Black Hat expected to revolve around the <i>reality</i> of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.</p><p>Whether you’re building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn’t selling buzzwords. They’re delivering results. Visit them at <strong>Startup City, booth #6427</strong>, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time.<br /> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Edward Wu</strong>, Founder/CEO at Dropzone AI <br />On LinkedIn: <a href="https://www.linkedin.com/in/edwardxwu/" target="_blank">https://www.linkedin.com/in/edwardxwu/</a><br />DROPZONE AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>Hosts:</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the DROPZONE Website to learn more: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Learn more and catch more stories from Dropzone on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/dropzoneai" target="_blank">https://www.itspmagazine.com/directory/dropzoneai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Jul 2025 06:30:39 +0000</pubDate>
      <author>contact@itspmagazine.com (Dropzone AI, Edward Wu, Marco Ciappelli, Sean Martin, ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/dropzone-ai-brings-agentic-automation-to-black-hat-usa-2025-a-drop-zone-ai-pre-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-edward-wu-founder-ceo-at-dropzone-ai-Re3s3Q_c</link>
      <content:encoded><![CDATA[<p>As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).</p><p>Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That’s where Dropzone comes in—offering an AI-powered security analyst that doesn’t just detect threats, but investigates, correlates, and takes action.</p><p>During a recent pre-event chat with ITSPmagazine’s Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.</p><p>The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don’t have to be.</p><p>The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.</p><p>With conversations at Black Hat expected to revolve around the <i>reality</i> of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.</p><p>Whether you’re building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn’t selling buzzwords. They’re delivering results. Visit them at <strong>Startup City, booth #6427</strong>, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time.<br /> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Edward Wu</strong>, Founder/CEO at Dropzone AI <br />On LinkedIn: <a href="https://www.linkedin.com/in/edwardxwu/" target="_blank">https://www.linkedin.com/in/edwardxwu/</a><br />DROPZONE AI: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p><strong>Hosts:</strong><br /><br /><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.seanmartin.com" target="_blank">https://www.seanmartin.com</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine | Website: <a href="https://www.marcociappelli.com" target="_blank">https://www.marcociappelli.com</a></p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the DROPZONE Website to learn more: <a href="https://itspm.ag/dropzoneai-641" target="_blank">https://itspm.ag/dropzoneai-641</a></p><p>Learn more and catch more stories from Dropzone on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/dropzoneai" target="_blank">https://www.itspmagazine.com/directory/dropzoneai</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19328205" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/751b9805-53f0-40f0-a775-937c9f015e9e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=751b9805-53f0-40f0-a775-937c9f015e9e&amp;feed=kDNbmF_B"/>
      <itunes:title>Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI</itunes:title>
      <itunes:author>Dropzone AI, Edward Wu, Marco Ciappelli, Sean Martin, ITSPmagazine</itunes:author>
      <itunes:duration>00:20:07</itunes:duration>
      <itunes:summary>As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).</itunes:summary>
      <itunes:subtitle>As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).</itunes:subtitle>
      <itunes:keywords>bsides las vegas, soc efficiency, marketing podcast, cybersecurity podcast, sean martin, security innovation, dropzone ai, cybersecurity, human-in-the-loop, cybersecurity automation, alert fatigue, black hat ai summit, incident response automation, security orchestration, startup city, ai threat triage, ai security analyst, edward wu, autonomous soc, ai in cybersecurity, itspmagazine, agentic ai, black hat 2025, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>140</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2dccd5b3-ca28-4afa-93f2-538041e626e5</guid>
      <title>The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with Bimal Sheth and Vincent Bennekers</title>
      <description><![CDATA[<p>The <a href="https://itspm.ag/hitrusz49c" target="_blank">HITRUST 2025 Trust Report</a> sheds light on a critical question organizations continue to ask: can you <i>really</i> rely on a certification to mean what it says? According to Vincent Bennekers, Vice President of Quality, and Bimal Sheth, Executive Vice President of Standards Development and Assurance Operations at HITRUST, the answer comes down to one word: reliability.</p><p>The conversation highlights how HITRUST goes beyond a simple checklist by layering in both threat intelligence and maturity modeling. Their framework isn’t just built on abstract risk—it incorporates real-world attack techniques, aligning controls to the MITRE ATT&CK framework. This means that the certification reflects actual adversarial tactics rather than hypothetical risk scenarios.</p><p>Bennekers shares that 99.41% of HITRUST-certified organizations did not report a breach in the last year, and that consistency over two annual reports points to meaningful outcomes—not just marketing claims. Sheth explains how each certification is reviewed in full by HITRUST, not just sampled, and every control is assessed for maturity—not pass/fail. It’s a model that helps companies continuously improve, while also giving relying parties better information.</p><p>For executive teams and boards, the report surfaces where organizations commonly struggle, including access control, vulnerability management, and third-party risk. It also highlights a growing use of external inheritance—leveraging cloud service providers’ security posture—as a strategic move for organizations with tighter budgets.</p><p>Looking ahead, the conversation points to continuous assurance and the evolving role of AI—both as a source of new risks and a tool to enhance security operations. HITRUST is already exploring certification models that reduce drift and increase visibility year-round.</p><p>For organizations wanting to build more than just a paper shield, this episode unpacks how certification—done right—can be a strategic, measurable advantage.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Bimal Sheth</strong>, Executive Vice President of Standards Development and Assurance Operations at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/bimal-sheth-248219130/" target="_blank">https://www.linkedin.com/in/bimal-sheth-248219130/</a></p><p><strong>Vincent Bennekers</strong>, Vice President of Quality at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/vincent-bennekers-a0b3201/" target="_blank">https://www.linkedin.com/in/vincent-bennekers-a0b3201/</a></p><p><strong>Host:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast" target="_blank">Redefining CyberSecurity Podcast</a> | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, bimal sheth, vincent bennekers, hitrust, trust report, cybersecurity, compliance, certification, quality assurance, risk management, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p>Webinar: <a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust">Beyond the Checkbox: Rethinking SOC 2, Cybersecurity, and Third-Party Risk in 2025 — An ITSPmagazine Webinar with HITRUST (</a><a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust" target="_blank">https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust</a><a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust">)</a></p><p>Visit the HITRUST Website to learn more: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more and catch more stories from HITRUST on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 22 Jul 2025 00:08:29 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, HITRUST, Sean Martin, ITSPmagazine, Vincent Bennekers, Bimal Sheth)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-proof-is-in-the-posture-what-real-security-maturity-looks-like-a-hitrust-brand-story-with-bimal-sheth-and-vincent-bennekers-zHZnjghL</link>
      <content:encoded><![CDATA[<p>The <a href="https://itspm.ag/hitrusz49c" target="_blank">HITRUST 2025 Trust Report</a> sheds light on a critical question organizations continue to ask: can you <i>really</i> rely on a certification to mean what it says? According to Vincent Bennekers, Vice President of Quality, and Bimal Sheth, Executive Vice President of Standards Development and Assurance Operations at HITRUST, the answer comes down to one word: reliability.</p><p>The conversation highlights how HITRUST goes beyond a simple checklist by layering in both threat intelligence and maturity modeling. Their framework isn’t just built on abstract risk—it incorporates real-world attack techniques, aligning controls to the MITRE ATT&CK framework. This means that the certification reflects actual adversarial tactics rather than hypothetical risk scenarios.</p><p>Bennekers shares that 99.41% of HITRUST-certified organizations did not report a breach in the last year, and that consistency over two annual reports points to meaningful outcomes—not just marketing claims. Sheth explains how each certification is reviewed in full by HITRUST, not just sampled, and every control is assessed for maturity—not pass/fail. It’s a model that helps companies continuously improve, while also giving relying parties better information.</p><p>For executive teams and boards, the report surfaces where organizations commonly struggle, including access control, vulnerability management, and third-party risk. It also highlights a growing use of external inheritance—leveraging cloud service providers’ security posture—as a strategic move for organizations with tighter budgets.</p><p>Looking ahead, the conversation points to continuous assurance and the evolving role of AI—both as a source of new risks and a tool to enhance security operations. HITRUST is already exploring certification models that reduce drift and increase visibility year-round.</p><p>For organizations wanting to build more than just a paper shield, this episode unpacks how certification—done right—can be a strategic, measurable advantage.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Bimal Sheth</strong>, Executive Vice President of Standards Development and Assurance Operations at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/bimal-sheth-248219130/" target="_blank">https://www.linkedin.com/in/bimal-sheth-248219130/</a></p><p><strong>Vincent Bennekers</strong>, Vice President of Quality at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/vincent-bennekers-a0b3201/" target="_blank">https://www.linkedin.com/in/vincent-bennekers-a0b3201/</a></p><p><strong>Host:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast" target="_blank">Redefining CyberSecurity Podcast</a> | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, bimal sheth, vincent bennekers, hitrust, trust report, cybersecurity, compliance, certification, quality assurance, risk management, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p>Webinar: <a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust">Beyond the Checkbox: Rethinking SOC 2, Cybersecurity, and Third-Party Risk in 2025 — An ITSPmagazine Webinar with HITRUST (</a><a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust" target="_blank">https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust</a><a href="https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust">)</a></p><p>Visit the HITRUST Website to learn more: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more and catch more stories from HITRUST on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="44179239" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/453892d0-f5f2-4853-b052-4698f86d784f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=453892d0-f5f2-4853-b052-4698f86d784f&amp;feed=kDNbmF_B"/>
      <itunes:title>The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with Bimal Sheth and Vincent Bennekers</itunes:title>
      <itunes:author>Marco Ciappelli, HITRUST, Sean Martin, ITSPmagazine, Vincent Bennekers, Bimal Sheth</itunes:author>
      <itunes:duration>00:46:01</itunes:duration>
      <itunes:summary>What makes a security certification actually reliable—and how do you measure that value over time? In this episode, HITRUST shares findings from their 2025 Trust Report, revealing how real-world threat data, quality assurance, and continuous validation are reshaping the way organizations—and their partners—view risk, resilience, and trust.</itunes:summary>
      <itunes:subtitle>What makes a security certification actually reliable—and how do you measure that value over time? In this episode, HITRUST shares findings from their 2025 Trust Report, revealing how real-world threat data, quality assurance, and continuous validation are reshaping the way organizations—and their partners—view risk, resilience, and trust.</itunes:subtitle>
      <itunes:keywords>compliance, vincent bennekers, marketing podcast, sean martin, hitrust, trust report, cybersecurity, risk management, quality assurance, brand marketing, certification, bimal sheth, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>139</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ab999b1a-4b41-45b5-8ce7-4eae820b7abe</guid>
      <title>Hands-On, Job-Ready: A Fresh Approach to Building the Next Generation of Pen Testers | A White Knight Labs Brand Story With John Stigerwalt And Greg Hatcher</title>
      <description><![CDATA[<p>Getting a start in cybersecurity has never been easy — but for today’s aspiring pen testers, the entry barriers are even higher than they were a decade ago. In this conversation, Sean Martin and Marco Ciappelli sit down with Greg Hatcher and John Stigerwalt from White Knight Labs to unpack why they decided to flip the script on entry-level offensive security training.</p><p>Greg, a former Army Special Operations communicator, and John, who got his break as a self-taught hacker, agree that the traditional path — expensive certifications and theoretical labs — doesn’t reflect the reality of the work. That’s why White Knight Labs is launching the Entry Level Pen Tester (ELPT) program. The idea is straightforward: make high-quality, practical training accessible to anyone, anywhere.</p><p>Unlike other courses that focus purely on the technical side, the ELPT emphasizes the full skill set a junior pen tester needs. This means not just breaking into systems, but learning how to write clear reports, communicate effectively with clients, and operate as part of a real engagement team. John explains that even the best technical find is worthless if it’s not explained properly or delivered with clear guidance for fixing the issue.</p><p>Greg points out that the team culture at White Knight Labs borrows from his Special Forces days — small, specialized teams where each individual goes deep on a specific domain but works in tight coordination with others. Their goal for trainees mirrors this: to develop focused, practical skills while understanding how their piece fits into bigger, complex attack scenarios.</p><p>Affordability and global access are key parts of the mission. The team wants the ELPT to open doors for people who might not have thousands to spend on training. By combining hands-on labs, in-depth modules, real-world scenarios, and a tough final exam, they aim to ensure that passing the ELPT means you’re truly job-ready.</p><p>For anyone considering a start in offensive security, this episode is a glimpse into a program designed to create more than just hackers — it’s building adaptable, communicative professionals ready to hit the ground running.</p><p>Learn more about White Knight Labs: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p><strong>Guests:</strong></p><p><strong>John Stigerwalt</strong> | Founder at White Knight Labs | Red Team Operations Leader | <a href="https://www.linkedin.com/in/john-stigerwalt-90a9b4110/" target="_blank">https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p><p><strong>Greg Hatcher</strong> | Founder at White Knight Labs | SOF veteran | Red Team | <a href="https://www.linkedin.com/in/gregoryhatcher2/" target="_blank">https://www.linkedin.com/in/gregoryhatcher2/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, marco ciappelli, greg hatcher, john stigerwalt, cybersecurity, pentesting, training, certification, whiteknightlabs, hacking, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the White Knight Labs Website to learn more: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p>Learn more and catch more stories from White Knight Labs on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/white-knight-labs" target="_blank">https://www.itspmagazine.com/directory/white-knight-labs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 30 Jun 2025 22:34:35 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, John Stigerwalt, Greg Hatcher, White Knight Labs)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/hands-on-job-ready-a-fresh-approach-to-building-the-next-generation-of-pen-testers-a-white-knight-labs-brand-story-with-john-stigerwalt-and-greg-hatcher-ln6sqqWz</link>
      <content:encoded><![CDATA[<p>Getting a start in cybersecurity has never been easy — but for today’s aspiring pen testers, the entry barriers are even higher than they were a decade ago. In this conversation, Sean Martin and Marco Ciappelli sit down with Greg Hatcher and John Stigerwalt from White Knight Labs to unpack why they decided to flip the script on entry-level offensive security training.</p><p>Greg, a former Army Special Operations communicator, and John, who got his break as a self-taught hacker, agree that the traditional path — expensive certifications and theoretical labs — doesn’t reflect the reality of the work. That’s why White Knight Labs is launching the Entry Level Pen Tester (ELPT) program. The idea is straightforward: make high-quality, practical training accessible to anyone, anywhere.</p><p>Unlike other courses that focus purely on the technical side, the ELPT emphasizes the full skill set a junior pen tester needs. This means not just breaking into systems, but learning how to write clear reports, communicate effectively with clients, and operate as part of a real engagement team. John explains that even the best technical find is worthless if it’s not explained properly or delivered with clear guidance for fixing the issue.</p><p>Greg points out that the team culture at White Knight Labs borrows from his Special Forces days — small, specialized teams where each individual goes deep on a specific domain but works in tight coordination with others. Their goal for trainees mirrors this: to develop focused, practical skills while understanding how their piece fits into bigger, complex attack scenarios.</p><p>Affordability and global access are key parts of the mission. The team wants the ELPT to open doors for people who might not have thousands to spend on training. By combining hands-on labs, in-depth modules, real-world scenarios, and a tough final exam, they aim to ensure that passing the ELPT means you’re truly job-ready.</p><p>For anyone considering a start in offensive security, this episode is a glimpse into a program designed to create more than just hackers — it’s building adaptable, communicative professionals ready to hit the ground running.</p><p>Learn more about White Knight Labs: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p><strong>Guests:</strong></p><p><strong>John Stigerwalt</strong> | Founder at White Knight Labs | Red Team Operations Leader | <a href="https://www.linkedin.com/in/john-stigerwalt-90a9b4110/" target="_blank">https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p><p><strong>Greg Hatcher</strong> | Founder at White Knight Labs | SOF veteran | Red Team | <a href="https://www.linkedin.com/in/gregoryhatcher2/" target="_blank">https://www.linkedin.com/in/gregoryhatcher2/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, marco ciappelli, greg hatcher, john stigerwalt, cybersecurity, pentesting, training, certification, whiteknightlabs, hacking, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the White Knight Labs Website to learn more: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p>Learn more and catch more stories from White Knight Labs on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/white-knight-labs" target="_blank">https://www.itspmagazine.com/directory/white-knight-labs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38805144" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/22dbce6b-a86d-40dc-9d9b-f8b26e3319e2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=22dbce6b-a86d-40dc-9d9b-f8b26e3319e2&amp;feed=kDNbmF_B"/>
      <itunes:title>Hands-On, Job-Ready: A Fresh Approach to Building the Next Generation of Pen Testers | A White Knight Labs Brand Story With John Stigerwalt And Greg Hatcher</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, John Stigerwalt, Greg Hatcher, White Knight Labs</itunes:author>
      <itunes:duration>00:40:25</itunes:duration>
      <itunes:summary>This Brand Story episode explores how practical, accessible training can bridge the gap for aspiring penetration testers facing high barriers to entry. White Knight Labs explains how their new ELPT program prepares trainees to handle real-world engagements, not just lab simulations.</itunes:summary>
      <itunes:subtitle>This Brand Story episode explores how practical, accessible training can bridge the gap for aspiring penetration testers facing high barriers to entry. White Knight Labs explains how their new ELPT program prepares trainees to handle real-world engagements, not just lab simulations.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, hacking, sean martin, cybersecurity, pentesting, whiteknightlabs, brand marketing, certification, greg hatcher, brand story podcast, john stigerwalt, brand story, training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>138</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">79795e5c-2fb6-4db9-a07a-1f534ffb27b9</guid>
      <title>Building a Dynamic Framework for Cyber Risk and Control Alignment: A Threat-Adaptive Approach to Cybersecurity Readiness | A HITRUST Brand Story with Michael Moore</title>
      <description><![CDATA[<p>Cyber threats are not static—and HITRUST knows assurance can’t be either. That’s why HITRUST's Michael Moore is leading efforts to ensure the HITRUST framework evolves in step with the threat environment, business needs, and the technologies teams are using to respond.</p><p>In this episode, Moore outlines how the HITRUST Cyber Threat Adaptive (CTA) program transforms traditional assessment models into something far more dynamic. Instead of relying on outdated frameworks or conducting audits that only capture a point-in-time view, HITRUST is using real-time threat intelligence, breach data, and frameworks like MITRE ATT&CK and MITRE ATLAS to continuously evaluate and update its assessment requirements.</p><p>The E1 and I1 assessments—designed for organizations at different points in their security maturity—serve as flexible baselines that shift with current risk. Moore explains that by leveraging CTA, HITRUST can add or update controls in response to rising attack patterns, such as the resurgence of phishing or the emergence of AI-driven exploits. These updates are informed by a broad ecosystem of signals, including insurance claims data and AI-parsed breach reports, offering both frequency and impact context.</p><p>One of the key advantages Moore highlights is the ability for security teams to benefit from these updates without having to conduct their own exhaustive analysis. As Moore puts it, “You get it by proxy of using our frameworks.” In addition to streamlining how teams manage and demonstrate compliance, the evolving assessments also support conversations with business leaders and boards—giving them visibility into how well the organization is prepared for the threats that matter most right now.</p><p>HITRUST is also planning to bring more of this intelligence into its assessment platform and reports, including showing how individual assessments align with the top threats at the time of certification. This not only strengthens third-party assurance but also enables more confident internal decision-making—whether that’s about improving phishing defenses or updating incident response playbooks.</p><p>From AI-enabled moderation of threats to proactive regulatory mapping, HITRUST is building the connective tissue between risk intelligence and real-world action.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Moore</strong>, Senior Manager, Digital Innovation at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/mhmoore04/" target="_blank">https://www.linkedin.com/in/mhmoore04/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast" target="_blank">Redefining CyberSecurity Podcast</a> | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine and Host of Redefining Society Podcast & Audio Signals Podcast | <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, marco ciappelli, michael moore, hitrust, cybersecurity, threat intelligence, risk management, compliance, assurance, ai security, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the HITRUST Website to learn more: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more and catch more stories from HITRUST on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 25 Jun 2025 20:04:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Michael Moore, HITRUST)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/building-a-dynamic-framework-for-cyber-risk-and-control-alignment-a-threat-adaptive-approach-to-cybersecurity-readiness-a-hitrust-brand-story-with-michael-moore-7bPgelsh</link>
      <content:encoded><![CDATA[<p>Cyber threats are not static—and HITRUST knows assurance can’t be either. That’s why HITRUST's Michael Moore is leading efforts to ensure the HITRUST framework evolves in step with the threat environment, business needs, and the technologies teams are using to respond.</p><p>In this episode, Moore outlines how the HITRUST Cyber Threat Adaptive (CTA) program transforms traditional assessment models into something far more dynamic. Instead of relying on outdated frameworks or conducting audits that only capture a point-in-time view, HITRUST is using real-time threat intelligence, breach data, and frameworks like MITRE ATT&CK and MITRE ATLAS to continuously evaluate and update its assessment requirements.</p><p>The E1 and I1 assessments—designed for organizations at different points in their security maturity—serve as flexible baselines that shift with current risk. Moore explains that by leveraging CTA, HITRUST can add or update controls in response to rising attack patterns, such as the resurgence of phishing or the emergence of AI-driven exploits. These updates are informed by a broad ecosystem of signals, including insurance claims data and AI-parsed breach reports, offering both frequency and impact context.</p><p>One of the key advantages Moore highlights is the ability for security teams to benefit from these updates without having to conduct their own exhaustive analysis. As Moore puts it, “You get it by proxy of using our frameworks.” In addition to streamlining how teams manage and demonstrate compliance, the evolving assessments also support conversations with business leaders and boards—giving them visibility into how well the organization is prepared for the threats that matter most right now.</p><p>HITRUST is also planning to bring more of this intelligence into its assessment platform and reports, including showing how individual assessments align with the top threats at the time of certification. This not only strengthens third-party assurance but also enables more confident internal decision-making—whether that’s about improving phishing defenses or updating incident response playbooks.</p><p>From AI-enabled moderation of threats to proactive regulatory mapping, HITRUST is building the connective tissue between risk intelligence and real-world action.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Moore</strong>, Senior Manager, Digital Innovation at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/mhmoore04/" target="_blank">https://www.linkedin.com/in/mhmoore04/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine and Host of <a href="https://www.seanmartin.com/redefining-cybersecurity-podcast" target="_blank">Redefining CyberSecurity Podcast</a> | <a href="https://www.seanmartin.com/" target="_blank">https://www.seanmartin.com/</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine and Host of Redefining Society Podcast & Audio Signals Podcast | <a href="https://www.marcociappelli.com/" target="_blank">https://www.marcociappelli.com/</a></p><p><strong>______________________</strong></p><p>Keywords: sean martin, marco ciappelli, michael moore, hitrust, cybersecurity, threat intelligence, risk management, compliance, assurance, ai security, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the HITRUST Website to learn more: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more and catch more stories from HITRUST on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34264847" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/887a4157-dca6-4909-9c55-9fc39f31d0c3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=887a4157-dca6-4909-9c55-9fc39f31d0c3&amp;feed=kDNbmF_B"/>
      <itunes:title>Building a Dynamic Framework for Cyber Risk and Control Alignment: A Threat-Adaptive Approach to Cybersecurity Readiness | A HITRUST Brand Story with Michael Moore</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Michael Moore, HITRUST</itunes:author>
      <itunes:duration>00:35:41</itunes:duration>
      <itunes:summary>Cybersecurity assessments can’t be one-and-done—and they can’t rely on outdated frameworks. This episode explores how a threat-adaptive model helps organizations stay in sync with real-world attacks by aligning assessments to live data, enabling more accurate control scoping, better boardroom conversations, and stronger third-party assurance.</itunes:summary>
      <itunes:subtitle>Cybersecurity assessments can’t be one-and-done—and they can’t rely on outdated frameworks. This episode explores how a threat-adaptive model helps organizations stay in sync with real-world attacks by aligning assessments to live data, enabling more accurate control scoping, better boardroom conversations, and stronger third-party assurance.</itunes:subtitle>
      <itunes:keywords>compliance, assurance, marketing podcast, marco ciappelli, ai security, sean martin, hitrust, cybersecurity, risk management, threat intelligence, brand marketing, michael moore, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>137</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">34701291-36fc-49b3-8ec4-60e6371a5eb2</guid>
      <title>From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An Infosecurity Europe 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President of Security Research at runZero, joins host Sean Martin at InfoSec Europe 2025 to challenge how organizations use these scoring systems and to explain why context is everything when it comes to exposure management.</p><p>Beardsley shares his experience navigating the limitations of vulnerability scoring. He explains why common outputs—like a CVSS score of 7.8—often leave teams with too many “priorities,” forcing them into ineffective, binary patch-or-don’t-patch decisions. By contrast, he highlights the real value in understanding factors like access vectors and environmental fit, which help security teams focus on what’s relevant to their specific networks and business-critical systems.</p><p>The conversation also explores SSVC’s ability to drive action through decision-tree logic rather than abstract scores, enabling defenders to justify priorities to leadership based on mission impact. This context-centric approach requires a deep understanding of both the asset and its role in the business—something Beardsley notes can be hard to achieve without support.</p><p>That’s where runZero steps in. Beardsley outlines how the platform identifies unmanaged or forgotten devices—including IoT, legacy systems, and third-party gear—without needing credentials or agents. From uncovering multi-homed light bulbs that straddle segmented networks to scanning for default passwords and misconfigurations, RunZero shines a light into the forgotten corners of corporate infrastructure.</p><p>The episode closes with a look at merger and acquisition use cases, where runZero helps acquiring companies understand the actual tech debt and exposure risk in the environments they’re buying. As Beardsley puts it, the goal is simple: give defenders the visibility and context they need to act now—not after something breaks.</p><p>Whether you’re tracking vulnerabilities, uncovering shadow assets, or preparing for your next acquisition, this episode invites you to rethink what visibility really means—and how you can stop chasing scores and start reducing risk.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Tod Beardsley, Vice President of Security Research at runZero | On Linkedin: <a href="https://www.linkedin.com/in/todb/" target="_blank">https://www.linkedin.com/in/todb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: sean martin, tod beardsley, runzero, exposure, vulnerability, asset, risk, ssdc, cvss, iot, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Jun 2025 07:47:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tod Beardsley, runZero)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-vulnerability-to-visibility-rethinking-exposure-management-a-brand-story-with-tod-beardsley-from-runzero-an-infosecurity-europe-2025-conference-on-location-brand-story-9szA6kBc</link>
      <content:encoded><![CDATA[<p>Security teams often rely on scoring systems like Common Vulnerability Scoring System (CVSS), Exploit Prediction Scoring System (EPSS), and Stakeholder-Specific Vulnerability Categorization (SSVC) to make sense of vulnerability data—but these frameworks don’t always deliver the clarity needed to act. In this episode, Tod Beardsley, Vice President of Security Research at runZero, joins host Sean Martin at InfoSec Europe 2025 to challenge how organizations use these scoring systems and to explain why context is everything when it comes to exposure management.</p><p>Beardsley shares his experience navigating the limitations of vulnerability scoring. He explains why common outputs—like a CVSS score of 7.8—often leave teams with too many “priorities,” forcing them into ineffective, binary patch-or-don’t-patch decisions. By contrast, he highlights the real value in understanding factors like access vectors and environmental fit, which help security teams focus on what’s relevant to their specific networks and business-critical systems.</p><p>The conversation also explores SSVC’s ability to drive action through decision-tree logic rather than abstract scores, enabling defenders to justify priorities to leadership based on mission impact. This context-centric approach requires a deep understanding of both the asset and its role in the business—something Beardsley notes can be hard to achieve without support.</p><p>That’s where runZero steps in. Beardsley outlines how the platform identifies unmanaged or forgotten devices—including IoT, legacy systems, and third-party gear—without needing credentials or agents. From uncovering multi-homed light bulbs that straddle segmented networks to scanning for default passwords and misconfigurations, RunZero shines a light into the forgotten corners of corporate infrastructure.</p><p>The episode closes with a look at merger and acquisition use cases, where runZero helps acquiring companies understand the actual tech debt and exposure risk in the environments they’re buying. As Beardsley puts it, the goal is simple: give defenders the visibility and context they need to act now—not after something breaks.</p><p>Whether you’re tracking vulnerabilities, uncovering shadow assets, or preparing for your next acquisition, this episode invites you to rethink what visibility really means—and how you can stop chasing scores and start reducing risk.</p><p>Learn more about runZero: <a href="https://itspm.ag/runzero-5733" target="_blank">https://itspm.ag/runzero-5733</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong>Tod Beardsley, Vice President of Security Research at runZero | On Linkedin: <a href="https://www.linkedin.com/in/todb/" target="_blank">https://www.linkedin.com/in/todb/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from runZero: <a href="https://www.itspmagazine.com/directory/runzero" target="_blank">https://www.itspmagazine.com/directory/runzero</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: sean martin, tod beardsley, runzero, exposure, vulnerability, asset, risk, ssdc, cvss, iot, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26249172" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/81a01ea2-dafe-4d46-afb5-d75de165902a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=81a01ea2-dafe-4d46-afb5-d75de165902a&amp;feed=kDNbmF_B"/>
      <itunes:title>From Vulnerability to Visibility: Rethinking Exposure Management | A Brand Story with Tod Beardsley from runZero | An Infosecurity Europe 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tod Beardsley, runZero</itunes:author>
      <itunes:duration>00:27:20</itunes:duration>
      <itunes:summary>When vulnerability scores alone can’t tell you what truly matters, what do you do? In this episode, Tod Beardsley of RunZero reveals how security teams can uncover hidden risks and prioritize action based on real-world exposure—not just numbers.</itunes:summary>
      <itunes:subtitle>When vulnerability scores alone can’t tell you what truly matters, what do you do? In this episode, Tod Beardsley of RunZero reveals how security teams can uncover hidden risks and prioritize action based on real-world exposure—not just numbers.</itunes:subtitle>
      <itunes:keywords>marketing podcast, sean martin, vulnerability, exposure, tod beardsley, cvss, asset, brand marketing, runzero, iot, risk, brand story podcast, brand story, ssdc</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>136</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2f386eab-3b17-4510-b6ee-e94f6187ff85</guid>
      <title>Reaching Human Equivalency with Agentic AI: A Real-World Look at Security Outcomes | An eSentire Brand Story With Dustin Hillard</title>
      <description><![CDATA[<p>As Chief Technology Officer at eSentire, Dustin Hillard brings a deeply rooted background in AI and machine learning—going back over 15 years—to the practical challenges of cybersecurity. In this episode, Hillard discusses how his team is using agentic AI not for the sake of hype, but to augment real human workflows and achieve measurable, high-impact outcomes for clients.</p><p>The conversation begins with a critical point: AI should be an enabler, not a shiny object. Hillard contrasts the superficial marketing claims that dominate vendor messaging with the grounded, transparent approach his team takes—an approach that fuses technology with hands-on human expertise to deliver results.</p><p>eSentire’s focus is on containment and control. In over 99% of intrusion cases, their platform successfully stops threats at the first host. That is the benchmark by which Hillard wants AI judged—not by its novelty or buzz, but by whether it helps security teams stop attacks before damage spreads.</p><p>Key to achieving this is the way automation is used to supercharge analysts. Instead of running just three or five high-value queries in a 15-minute response window, eSentire’s AI framework runs 30. This allows the system to comb through a customer’s historical data, generate hypotheses based on broader knowledge bases, and deliver structured, contextual findings. Analysts can then focus on judgment and decision-making, not searching logs or assembling fragments.</p><p>Three pillars underpin this approach: direct telemetry gathering from tools like CrowdStrike and Microsoft, threat intelligence correlation, and contextual data from the customer environment. These layers combine to offer rich insights, fast. And importantly, the AI doesn’t operate in a black box. Hillard stresses explainability and auditability—every recommendation must be traceable back to concrete evidence, not just LLM-generated summaries.</p><p>He also touches on the eight assessment areas his team uses to evaluate AI readiness and safety: from autonomy and guardrails to data privacy, effectiveness metrics, and adversarial resilience. The point isn’t to convince customers with buzzwords, but to earn trust by demonstrating measurable results and opening the door to real conversations.</p><p>By encoding the investigative playbooks of seasoned analysts and executing them dynamically, agentic AI at eSentire isn’t replacing humans—it’s empowering them to respond faster and more accurately. That’s the difference between checking a marketing box and actually making a difference when every second counts.</p><p><strong>Guest: Dustin Hillard</strong> | CTO, eSentire | <a href="https://www.linkedin.com/in/dustinhillard/" target="_blank">https://www.linkedin.com/in/dustinhillard/</a></p><p><strong>RESOURCES</strong></p><p>Sorry We’re So Good: An Open Letter: <a href="https://itspm.ag/esentire-sorry4ek" target="_blank">https://itspm.ag/esentire-sorry4ek</a></p><p>Visit the eSentire Website to learn more: <a href="https://itspm.ag/esentire-594149" target="_blank">https://itspm.ag/esentire-594149</a></p><p>Learn more and catch more stories from eSentire on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/esentire" target="_blank">https://www.itspmagazine.com/directory/esentire</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>______________________</strong></p><p>Keywords: dustin hillard, sean martin, marco ciappelli, cybersecurity, ai, machine learning, automation, investigation, containment, transparency, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 2 Jun 2025 12:02:37 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, Dustin Hillard, eSentire)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/reaching-human-equivalency-with-agentic-ai-a-real-world-look-at-security-outcomes-an-esentire-brand-story-with-dustin-hillard-R4Rvu1kY</link>
      <content:encoded><![CDATA[<p>As Chief Technology Officer at eSentire, Dustin Hillard brings a deeply rooted background in AI and machine learning—going back over 15 years—to the practical challenges of cybersecurity. In this episode, Hillard discusses how his team is using agentic AI not for the sake of hype, but to augment real human workflows and achieve measurable, high-impact outcomes for clients.</p><p>The conversation begins with a critical point: AI should be an enabler, not a shiny object. Hillard contrasts the superficial marketing claims that dominate vendor messaging with the grounded, transparent approach his team takes—an approach that fuses technology with hands-on human expertise to deliver results.</p><p>eSentire’s focus is on containment and control. In over 99% of intrusion cases, their platform successfully stops threats at the first host. That is the benchmark by which Hillard wants AI judged—not by its novelty or buzz, but by whether it helps security teams stop attacks before damage spreads.</p><p>Key to achieving this is the way automation is used to supercharge analysts. Instead of running just three or five high-value queries in a 15-minute response window, eSentire’s AI framework runs 30. This allows the system to comb through a customer’s historical data, generate hypotheses based on broader knowledge bases, and deliver structured, contextual findings. Analysts can then focus on judgment and decision-making, not searching logs or assembling fragments.</p><p>Three pillars underpin this approach: direct telemetry gathering from tools like CrowdStrike and Microsoft, threat intelligence correlation, and contextual data from the customer environment. These layers combine to offer rich insights, fast. And importantly, the AI doesn’t operate in a black box. Hillard stresses explainability and auditability—every recommendation must be traceable back to concrete evidence, not just LLM-generated summaries.</p><p>He also touches on the eight assessment areas his team uses to evaluate AI readiness and safety: from autonomy and guardrails to data privacy, effectiveness metrics, and adversarial resilience. The point isn’t to convince customers with buzzwords, but to earn trust by demonstrating measurable results and opening the door to real conversations.</p><p>By encoding the investigative playbooks of seasoned analysts and executing them dynamically, agentic AI at eSentire isn’t replacing humans—it’s empowering them to respond faster and more accurately. That’s the difference between checking a marketing box and actually making a difference when every second counts.</p><p><strong>Guest: Dustin Hillard</strong> | CTO, eSentire | <a href="https://www.linkedin.com/in/dustinhillard/" target="_blank">https://www.linkedin.com/in/dustinhillard/</a></p><p><strong>RESOURCES</strong></p><p>Sorry We’re So Good: An Open Letter: <a href="https://itspm.ag/esentire-sorry4ek" target="_blank">https://itspm.ag/esentire-sorry4ek</a></p><p>Visit the eSentire Website to learn more: <a href="https://itspm.ag/esentire-594149" target="_blank">https://itspm.ag/esentire-594149</a></p><p>Learn more and catch more stories from eSentire on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/esentire" target="_blank">https://www.itspmagazine.com/directory/esentire</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p><strong>______________________</strong></p><p>Keywords: dustin hillard, sean martin, marco ciappelli, cybersecurity, ai, machine learning, automation, investigation, containment, transparency, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="43596216" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5ee33f45-a978-4072-88c6-4d75c92467e4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5ee33f45-a978-4072-88c6-4d75c92467e4&amp;feed=kDNbmF_B"/>
      <itunes:title>Reaching Human Equivalency with Agentic AI: A Real-World Look at Security Outcomes | An eSentire Brand Story With Dustin Hillard</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, Dustin Hillard, eSentire</itunes:author>
      <itunes:duration>00:45:24</itunes:duration>
      <itunes:summary>What does it really take to stop a cyberattack before it spreads—and can AI truly help without sidelining human judgment? In this episode, eSentire CTO Dustin Hillard shares how his team has spent years applying machine learning, artificial intelligence, and now agentic AI to supercharge security investigations, helping analysts contain threats faster while maintaining transparency, control, and trust.</itunes:summary>
      <itunes:subtitle>What does it really take to stop a cyberattack before it spreads—and can AI truly help without sidelining human judgment? In this episode, eSentire CTO Dustin Hillard shares how his team has spent years applying machine learning, artificial intelligence, and now agentic AI to supercharge security investigations, helping analysts contain threats faster while maintaining transparency, control, and trust.</itunes:subtitle>
      <itunes:keywords>transparency, investigation, marketing podcast, marco ciappelli, sean martin, automation, cybersecurity, containment, brand marketing, machine learning, ai, brand story podcast, dustin hillard, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>135</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f56f5bfb-3cad-4556-8723-50bb6682e582</guid>
      <title>When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.</p><p>Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren’t hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.</p><p>Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren’t traditional security practitioners.</p><p>Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there’s a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.</p><p>Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That’s why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it’s a path to protection that doesn’t require breaking the budget.</p><p>Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.</p><p>This episode is a reminder that effective cybersecurity isn’t only about innovation; it’s about inclusion, practicality, and trust... both in your tools and your team.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 30 May 2025 05:02:13 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Object First, Sterling Wilson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-simplicity-meets-strategy-making-immutability-accessible-for-all-a-brand-story-with-sterling-wilson-from-object-first-an-rsac-conference-2025-post-event-brand-story-QdgAqIxh</link>
      <content:encoded><![CDATA[<p>When it comes to data protection, the word “immutability” often feels like it belongs in the realm of enterprise giants with complex infrastructure and massive budgets. But during this RSAC Conference conversation, Sterling Wilson, Field CTO at Object First, makes a strong case that immutability should be, and can be, for everyone.</p><p>Wilson brings a grounded perspective shaped by his experience on the floor at RSAC, where Object First made its debut as a sponsor. The energy, he notes, was contagious: not just among vendors, but also from practitioners expressing serious concerns about their ability to recover data post-incident. These conversations weren’t hypothetical; they were real worries tied to rising insurance premiums, regulatory compliance, and operational survivability. And at the core of all this? Trust in the data backup process.</p><p>Agentic AI, AI capable of making decisions independently, is one of the trends Wilson flags as both promising and risky. It offers potential for improving preparedness and accelerating recovery. But it also raises concerns around access and control of sensitive data, particularly if exploited by adversaries. For Sterling, the opportunity lies in combining proactive readiness with simplicity and control, especially for those who aren’t traditional security practitioners.</p><p>Object First is doing just that through OOTBI: Out of the Box Immutability. And yes, there’s a mascot: OOTBI. More than just a marketing hook, OOTBI represents a shift toward making backup and recovery systems approachable, usable, and, importantly, accessible. According to Wilson, the product gets users from “box to backup” in 15 minutes... with encrypted, immutable storage that meets critical requirements for cyber insurance coverage.</p><p>Cost, Wilson adds, is a key barrier that often prevents organizations from reaching data protection best practices. That’s why Object First now offers consumption-based pricing models. Whether a business is cloud-first or scaling fast, it’s a path to protection that doesn’t require breaking the budget.</p><p>Ultimately, Wilson emphasizes education and community as critical drivers of progress. From field labs where teams can configure their own Opi, to on-location conference conversations, the company is building awareness, and reducing fear, by making secure storage not just a feature, but a foundation.</p><p>This episode is a reminder that effective cybersecurity isn’t only about innovation; it’s about inclusion, practicality, and trust... both in your tools and your team.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, sterling wilson, immutability, agentic, ai, backup, recovery, cybersecurity, insurance, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14015935" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c69159e2-8f02-4ac4-90ac-62861bbec256/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c69159e2-8f02-4ac4-90ac-62861bbec256&amp;feed=kDNbmF_B"/>
      <itunes:title>When Simplicity Meets Strategy: Making Immutability Accessible for All | A Brand Story with Sterling Wilson from Object First | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Object First, Sterling Wilson</itunes:author>
      <itunes:duration>00:14:35</itunes:duration>
      <itunes:summary>Sterling Wilson joins us to unpack why immutability isn’t just for large enterprises and how Object First is making secure backup accessible, fast, and budget-friendly — all with a little help from their mascot, OOTBI. From agentic AI to cyber insurance pressures, this conversation breaks down the critical role of proactive, simple data protection in today’s security strategy.</itunes:summary>
      <itunes:subtitle>Sterling Wilson joins us to unpack why immutability isn’t just for large enterprises and how Object First is making secure backup accessible, fast, and budget-friendly — all with a little help from their mascot, OOTBI. From agentic AI to cyber insurance pressures, this conversation breaks down the critical role of proactive, simple data protection in today’s security strategy.</itunes:subtitle>
      <itunes:keywords>sterling wilson, immutability, marketing podcast, marco ciappelli, agentic, insurance, sean martin, cybersecurity, brand marketing, ai, brand story podcast, recovery, brand story, backup</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>134</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b8d913f3-8cbe-4a18-a7b4-28884ee16432</guid>
      <title>From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story</title>
      <description><![CDATA[<p>Jim Manico’s passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.</p><p>While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can’t easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.</p><p>Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That’s where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.</p><p>Beyond teaching, he’s building. With 200 volunteers, he’s leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.</p><p>For Manico, this isn’t just a technical evolution—it’s a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he’s just getting started.</p><p>This episode isn’t just about where AppSec is going. It’s a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Jim's OWASP Session: <a href="https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering" target="_blank">https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering</a></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 29 May 2025 12:07:01 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Manicode Security, Jim Manico)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-appsec-training-to-ai-standards-teaching-ai-to-code-securely-a-brand-story-with-jim-manico-from-manicode-security-an-owasp-global-appsec-eu-2025-conference-on-location-brand-story-B1qo0i9S</link>
      <content:encoded><![CDATA[<p>Jim Manico’s passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.</p><p>While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can’t easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.</p><p>Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That’s where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.</p><p>Beyond teaching, he’s building. With 200 volunteers, he’s leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.</p><p>For Manico, this isn’t just a technical evolution—it’s a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he’s just getting started.</p><p>This episode isn’t just about where AppSec is going. It’s a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Jim's OWASP Session: <a href="https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering" target="_blank">https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineering</a></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><p>Keywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast</p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17449880" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/49c4421d-a9a3-4e88-a970-1c81f4b99166/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=49c4421d-a9a3-4e88-a970-1c81f4b99166&amp;feed=kDNbmF_B"/>
      <itunes:title>From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Manicode Security, Jim Manico</itunes:author>
      <itunes:duration>00:18:10</itunes:duration>
      <itunes:summary>Jim Manico shares how his decades of secure coding experience are shaping a new era of AI-assisted development, revealing both the risks of insecure code generation and the potential to teach AI to do better. From developer training to launching the AISVS project, this episode highlights a personal and professional journey at the forefront of application security innovation.</itunes:summary>
      <itunes:subtitle>Jim Manico shares how his decades of secure coding experience are shaping a new era of AI-assisted development, revealing both the risks of insecure code generation and the potential to teach AI to do better. From developer training to launching the AISVS project, this episode highlights a personal and professional journey at the forefront of application security innovation.</itunes:subtitle>
      <itunes:keywords>marketing podcast, react, sean martin, jim manico, developers, appsec, brand marketing, owasp, aisvs, ai, securecoding, brand story podcast, brand story, training</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>133</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5d6877bf-6835-4a2a-974e-5b4960bc5bfc</guid>
      <title>What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story</title>
      <description><![CDATA[<p>As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.</p><p>ThreatLocker’s mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia’s Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what’s working and where they need help.</p><p><strong>Why Being There Matters</strong></p><p>Different regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it’s conversations about Cyber Essentials that shape booth discussions. Regulations aren’t just compliance checklists; they’re also conversation starters that change how organizations prioritize security.</p><p>The ThreatLocker team doesn’t rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what’s necessary, and blocking what isn’t.</p><p><strong>Booth D90 and Beyond</strong></p><p>Rob Allen invites anyone—whether they’re new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It’s not just about showcasing technology; it’s about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.</p><p>If you’re at InfoSecurity Europe, stop by. If you’re not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Cyber Essentials Guide: <a href="https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast">https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast</a></p><p>Australia's Essential Eight Guide: <a href="https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi">https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi</a></p><p>Learn more and catch more event coverage stories from Infosecurity Europe 2025 in London: <a href="https://www.itspmagazine.com/infosec25 ">https://www.itspmagazine.com/infosec25 </a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 22 May 2025 23:31:05 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/what-helps-you-sleep-better-at-night-a-practical-take-on-zero-trust-a-brand-story-with-rob-allen-from-threatlocker-an-infosecurity-europe-2025-pre-event-brand-story-KFQ1YaF3</link>
      <content:encoded><![CDATA[<p>As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn’t frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.</p><p>ThreatLocker’s mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia’s Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what’s working and where they need help.</p><p><strong>Why Being There Matters</strong></p><p>Different regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it’s conversations about Cyber Essentials that shape booth discussions. Regulations aren’t just compliance checklists; they’re also conversation starters that change how organizations prioritize security.</p><p>The ThreatLocker team doesn’t rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what’s necessary, and blocking what isn’t.</p><p><strong>Booth D90 and Beyond</strong></p><p>Rob Allen invites anyone—whether they’re new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It’s not just about showcasing technology; it’s about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.</p><p>If you’re at InfoSecurity Europe, stop by. If you’re not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Cyber Essentials Guide: <a href="https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast">https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcast</a></p><p>Australia's Essential Eight Guide: <a href="https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi">https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_intervi</a></p><p>Learn more and catch more event coverage stories from Infosecurity Europe 2025 in London: <a href="https://www.itspmagazine.com/infosec25 ">https://www.itspmagazine.com/infosec25 </a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22141127" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d0e0dd1b-ec94-4d6b-b3fc-d4618e430d1e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d0e0dd1b-ec94-4d6b-b3fc-d4618e430d1e&amp;feed=kDNbmF_B"/>
      <itunes:title>What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen</itunes:author>
      <itunes:duration>00:23:03</itunes:duration>
      <itunes:summary>Rob Allen, Chief Product Officer at ThreatLocker, shares how their proactive, Zero Trust-driven approach is helping organizations around the world secure their environments—without unnecessary complexity. From region-specific regulations to universal security gaps, this episode explores what really drives meaningful conversations at events like InfoSecurity Europe.</itunes:summary>
      <itunes:subtitle>Rob Allen, Chief Product Officer at ThreatLocker, shares how their proactive, Zero Trust-driven approach is helping organizations around the world secure their environments—without unnecessary complexity. From region-specific regulations to universal security gaps, this episode explores what really drives meaningful conversations at events like InfoSecurity Europe.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, sean martin, infosec, rob allen, cybersecurity, endpoint, ransomware, brand marketing, regulation, brand story podcast, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>132</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a67d0a19-1e75-4884-bf8a-a6c52d1fa7b9</guid>
      <title>Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable.</p><p>During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-to-face conversations with customers and prospects. Their booth was an open, no-frills space—designed for real dialogue, not distractions. What caught people’s attention, though, wasn’t the booth layout—it was a live demonstration of a PowerShell-based attack using a rubber ducky device. It visually captured how traditional tools often miss malicious scripts and how ThreatLocker’s controls shut it down immediately. That kind of simplicity, Rob explains, is the real differentiator.</p><p><strong>Zero Trust Is a Journey—But It Doesn’t Have to Be Complicated</strong></p><p>One key message Rob emphasizes is that true security doesn’t come from piling on more tools. Too many organizations rely on overlapping detection and response solutions, which leads to confusion and technical debt. “If you have five different jackets and they’re all winter coats, you’re not prepared for summer,” Sean Martin jokes, reinforcing Rob’s point that layers should be distinct, not redundant.</p><p>ThreatLocker’s approach simplifies Zero Trust by focusing on proactive control—limiting what can execute or communicate in the first place. Rob also points to the importance of vendor consolidation—not just from a purchasing standpoint but from an operational one. With ThreatLocker, multiple security capabilities are built natively into a single platform with one agent and one portal, avoiding the chaos of disjointed systems.</p><p><strong>From Technical Wins to Human Connections</strong></p><p>The conversation wraps with a reminder that cybersecurity isn’t just about tools—it’s about the people and community that make the work worthwhile. Rob, Marco Ciappelli, and Sean Martin reflect on their shared experiences around the event and even the lessons learned over a slice of Detroit-style pizza. While the crust may have been debatable, the camaraderie and commitment to doing security better were not.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, threat prevention, powerShell, vendor consolidation, rsac2025, endpoint security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 20:17:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/why-simplicity-might-be-the-missing-ingredient-in-your-zero-trust-strategy-a-brand-story-with-rob-allen-from-threatlocker-an-rsac-conference-2025-post-event-brand-story-CTI0jXhe</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable.</p><p>During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-to-face conversations with customers and prospects. Their booth was an open, no-frills space—designed for real dialogue, not distractions. What caught people’s attention, though, wasn’t the booth layout—it was a live demonstration of a PowerShell-based attack using a rubber ducky device. It visually captured how traditional tools often miss malicious scripts and how ThreatLocker’s controls shut it down immediately. That kind of simplicity, Rob explains, is the real differentiator.</p><p><strong>Zero Trust Is a Journey—But It Doesn’t Have to Be Complicated</strong></p><p>One key message Rob emphasizes is that true security doesn’t come from piling on more tools. Too many organizations rely on overlapping detection and response solutions, which leads to confusion and technical debt. “If you have five different jackets and they’re all winter coats, you’re not prepared for summer,” Sean Martin jokes, reinforcing Rob’s point that layers should be distinct, not redundant.</p><p>ThreatLocker’s approach simplifies Zero Trust by focusing on proactive control—limiting what can execute or communicate in the first place. Rob also points to the importance of vendor consolidation—not just from a purchasing standpoint but from an operational one. With ThreatLocker, multiple security capabilities are built natively into a single platform with one agent and one portal, avoiding the chaos of disjointed systems.</p><p><strong>From Technical Wins to Human Connections</strong></p><p>The conversation wraps with a reminder that cybersecurity isn’t just about tools—it’s about the people and community that make the work worthwhile. Rob, Marco Ciappelli, and Sean Martin reflect on their shared experiences around the event and even the lessons learned over a slice of Detroit-style pizza. While the crust may have been debatable, the camaraderie and commitment to doing security better were not.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, threat prevention, powerShell, vendor consolidation, rsac2025, endpoint security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16791238" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/eb33ea4f-c4ad-4318-810f-ba60447a6614/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=eb33ea4f-c4ad-4318-810f-ba60447a6614&amp;feed=kDNbmF_B"/>
      <itunes:title>Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, ThreatLocker, Rob Allen</itunes:author>
      <itunes:duration>00:17:29</itunes:duration>
      <itunes:summary>This episode explores how ThreatLocker is reshaping Zero Trust by focusing on proactive control, operational simplicity, and the elimination of redundant security layers. Rob Allen shares real-world examples from RSAC 2025, including live attack demos and candid feedback from customers, to highlight why manageability is the true key to effective cybersecurity.</itunes:summary>
      <itunes:subtitle>This episode explores how ThreatLocker is reshaping Zero Trust by focusing on proactive control, operational simplicity, and the elimination of redundant security layers. Rob Allen shares real-world examples from RSAC 2025, including live attack demos and candid feedback from customers, to highlight why manageability is the true key to effective cybersecurity.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, rob allen, cybersecurity, endpoint security, vendor consolidation, rsac2025, powershell, threat prevention, brand marketing, brand story podcast, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>131</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">f53b1933-24d0-47e6-ad22-e0cba8a89012</guid>
      <title>Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.</p><p><strong>More Than a Job: Why Community Matters</strong></p><p>Rob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It’s not just about certifications—though Clyde notes that employers often value them more than degrees—it’s also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.</p><p>Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It’s your career,” he says. “Take back control.”</p><p><strong>Facing Burnout and Legal Risk Head-On</strong></p><p>The group also addresses a growing issue: burnout. ISACA’s latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.</p><p>To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.</p><p><strong>The Silent Threat of Quantum</strong></p><p>While AI dominated RSAC’s headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don’t know when.”</p><p>From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn’t just a technology issue—it’s a people issue. Listen to the full episode to hear what else we’re missing.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Clyde</strong>, Board Director, Chair, Past Chair of the Board Directors at ISACA | <a href="https://www.linkedin.com/in/robclyde/">https://www.linkedin.com/in/robclyde/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Stay tuned for an upcoming ITSPmagazine Webinar with ISACA: <a href="https://www.itspmagazine.com/webinars">https://www.itspmagazine.com/webinars</a></p><p>ISACA Quantum Pulse Poll 2025 and related resources: <a href="https://www.isaca.org/quantum-pulse-poll">https://www.isaca.org/quantum-pulse-poll</a></p><p>ISACA State of Cybersecurity 2024 survey report: <a href="https://www.isaca.org/resources/reports/state-of-cybersecurity-2024">https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 18:56:38 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Clyde, ISACA)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/why-community-could-be-the-strongest-defense-in-cybersecurity-a-brand-story-with-rob-clyde-from-isaca-an-rsac-conference-2025-post-event-brand-story-1kTeEl17</link>
      <content:encoded><![CDATA[<p>At RSAC 2025, the most urgent signals weren’t necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it’s clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.</p><p><strong>More Than a Job: Why Community Matters</strong></p><p>Rob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It’s not just about certifications—though Clyde notes that employers often value them more than degrees—it’s also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.</p><p>Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It’s your career,” he says. “Take back control.”</p><p><strong>Facing Burnout and Legal Risk Head-On</strong></p><p>The group also addresses a growing issue: burnout. ISACA’s latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.</p><p>To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.</p><p><strong>The Silent Threat of Quantum</strong></p><p>While AI dominated RSAC’s headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don’t know when.”</p><p>From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn’t just a technology issue—it’s a people issue. Listen to the full episode to hear what else we’re missing.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Rob Clyde</strong>, Board Director, Chair, Past Chair of the Board Directors at ISACA | <a href="https://www.linkedin.com/in/robclyde/">https://www.linkedin.com/in/robclyde/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Stay tuned for an upcoming ITSPmagazine Webinar with ISACA: <a href="https://www.itspmagazine.com/webinars">https://www.itspmagazine.com/webinars</a></p><p>ISACA Quantum Pulse Poll 2025 and related resources: <a href="https://www.isaca.org/quantum-pulse-poll">https://www.isaca.org/quantum-pulse-poll</a></p><p>ISACA State of Cybersecurity 2024 survey report: <a href="https://www.isaca.org/resources/reports/state-of-cybersecurity-2024">https://www.isaca.org/resources/reports/state-of-cybersecurity-2024</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25" target="_blank">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22739208" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a5583223-e795-439d-965d-d7edd248df94/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a5583223-e795-439d-965d-d7edd248df94&amp;feed=kDNbmF_B"/>
      <itunes:title>Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Clyde, ISACA</itunes:author>
      <itunes:duration>00:23:41</itunes:duration>
      <itunes:summary>This episode explores why cybersecurity must be more than just tools and tactics, highlighting the importance of community, continuous learning, and mental health in sustaining the profession. Rob Clyde joins Sean Martin and Marco Ciappelli to unpack the personal and industry-wide stakes of quantum risk, burnout, and the true value of professional connection.</itunes:summary>
      <itunes:subtitle>This episode explores why cybersecurity must be more than just tools and tactics, highlighting the importance of community, continuous learning, and mental health in sustaining the profession. Rob Clyde joins Sean Martin and Marco Ciappelli to unpack the personal and industry-wide stakes of quantum risk, burnout, and the true value of professional connection.</itunes:subtitle>
      <itunes:keywords>burnout, rob clyde, marketing podcast, marco ciappelli, sean martin, cybersecurity, isaca, cryptography, rsac2025, brand marketing, certification, quantum, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>130</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5f64b5ea-fdd8-4ac6-88ba-cc05a5b428bb</guid>
      <title>Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story</title>
      <description><![CDATA[<p>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.</p><p><strong>Not All AI Is Created Equal: The Archer Approach</strong></p><p>RSAC 2025 was buzzing with innovation, but for Steve Schlarman and the Archer team, it wasn’t about showing off shiny new toys—it was about proving that AI, when used with purpose and context, can truly enhance the risk and compliance function.</p><p>Steve, <strong>Senior Director of Product Management at Archer</strong>, breaks down how Archer Evolve and the recent integration of Compliance.ai are helping organizations address regulatory change in a more holistic, automated, and scalable way. With silos still slowing down many companies, the need for tools that actually <i>do</i> something is more urgent than ever.</p><p><strong>From Policy Generation to Risk Narratives</strong></p><p>One of the most practical applications discussed? Using AI not just to detect risk, but to help write better risk statements, control documentation, and even policy language that actually communicates clearly. Steve explains how Archer is focused on closing the loop between data and business impact—translating technical risk outputs into narratives the business can actually act on.</p><p><strong>AI with a Human Touch</strong></p><p>As Marco notes, AI in cybersecurity has moved from hype to hesitation to strategy. Steve is candid: some customers are still on the fence. But when AI is delivered in a contextual way, backed by customer-driven innovation, it becomes a bridge—not a wedge—between people and process. The key is not AI for the sake of AI, but for solving real, grounded problems.</p><p><strong>What’s Next in Risk? Better Conversations</strong></p><p>Looking ahead, Schlarman sees a shift from “no, we can’t” to “yes, and here’s how.” With a better grasp on loss exposure and control costs, the business conversation is changing. AI-powered storytelling and smart interfaces might just help risk teams have their most effective conversations yet.</p><p>From regulatory change to real-time translation of risk data, this is where tech meets trust.</p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>steve schlarman, marco ciappelli, rsac2025, archer evolve, compliance.ai, regulatory change, grc, risk management, ai storytelling, cybersecurity, compliance, brand story, rsa conference, cybersecurity strategy, risk communication, ai in compliance, automation, contextual ai, integrated risk management, business risk narrative, itspmagazine</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 21 May 2025 01:31:08 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/why-ai-needs-context-not-just-hype-a-conversation-with-steve-schlarman-senior-director-product-management-at-archer-an-rsac-conference-2025-post-event-brand-story-L02VRAQm</link>
      <content:encoded><![CDATA[<p>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.</p><p><strong>Not All AI Is Created Equal: The Archer Approach</strong></p><p>RSAC 2025 was buzzing with innovation, but for Steve Schlarman and the Archer team, it wasn’t about showing off shiny new toys—it was about proving that AI, when used with purpose and context, can truly enhance the risk and compliance function.</p><p>Steve, <strong>Senior Director of Product Management at Archer</strong>, breaks down how Archer Evolve and the recent integration of Compliance.ai are helping organizations address regulatory change in a more holistic, automated, and scalable way. With silos still slowing down many companies, the need for tools that actually <i>do</i> something is more urgent than ever.</p><p><strong>From Policy Generation to Risk Narratives</strong></p><p>One of the most practical applications discussed? Using AI not just to detect risk, but to help write better risk statements, control documentation, and even policy language that actually communicates clearly. Steve explains how Archer is focused on closing the loop between data and business impact—translating technical risk outputs into narratives the business can actually act on.</p><p><strong>AI with a Human Touch</strong></p><p>As Marco notes, AI in cybersecurity has moved from hype to hesitation to strategy. Steve is candid: some customers are still on the fence. But when AI is delivered in a contextual way, backed by customer-driven innovation, it becomes a bridge—not a wedge—between people and process. The key is not AI for the sake of AI, but for solving real, grounded problems.</p><p><strong>What’s Next in Risk? Better Conversations</strong></p><p>Looking ahead, Schlarman sees a shift from “no, we can’t” to “yes, and here’s how.” With a better grasp on loss exposure and control costs, the business conversation is changing. AI-powered storytelling and smart interfaces might just help risk teams have their most effective conversations yet.</p><p>From regulatory change to real-time translation of risk data, this is where tech meets trust.</p><p>⸻</p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>steve schlarman, marco ciappelli, rsac2025, archer evolve, compliance.ai, regulatory change, grc, risk management, ai storytelling, cybersecurity, compliance, brand story, rsa conference, cybersecurity strategy, risk communication, ai in compliance, automation, contextual ai, integrated risk management, business risk narrative, itspmagazine</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7217857" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1b90c374-ba50-48e1-b76f-6c4a3112aca7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1b90c374-ba50-48e1-b76f-6c4a3112aca7&amp;feed=kDNbmF_B"/>
      <itunes:title>Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer</itunes:author>
      <itunes:duration>00:07:31</itunes:duration>
      <itunes:summary>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.
</itunes:summary>
      <itunes:subtitle>In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.
</itunes:subtitle>
      <itunes:keywords>compliance, compliance.ai, marketing podcast, marco ciappelli, controls, rsa conference, archer evolve, grc, contextual ai, sean martin, automation, cybersecurity, business risk narrative, risk management, ai in compliance, integrated risk management, cybersecurity strategy, regulatory change, rsac2025, quantification, steve schlarman, brand marketing, ai storytelling, risk communication, ai, risk, itspmagazine, brand story podcast, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>129</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ce500e6-2e3d-4bd0-b126-4833fb8810aa</guid>
      <title>Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity’s detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?</p><p>The Detecteam founders challenge the industry’s obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.</p><p>At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It’s about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.</p><p>Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they’ve built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.</p><p>Fred explains the benefit in terms any CISO can understand: this isn’t just detection—it’s readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That’s a tangible advantage, especially when operating with limited personnel.</p><p>This conversation isn’t about a silver bullet or more noise—it’s about clarity. What’s working? What’s not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that’s faster, smarter, and grounded in reality.</p><p>Learn more about Detecteam: <a href="https://itspm.ag/detecteam-21686">https://itspm.ag/detecteam-21686</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Fred Wilmot</strong>, Co-Founder & CEO, Detecteam | <a href="https://www.linkedin.com/in/fredwilmot/">https://www.linkedin.com/in/fredwilmot/</a></p><p><strong>Sebastien Tricaud</strong>, Co-Founder & CTO, Detecteam | <a href="https://www.linkedin.com/in/tricaud/">https://www.linkedin.com/in/tricaud/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Detecteam: <a href="https://www.itspmagazine.com/directory/detecteam">https://www.itspmagazine.com/directory/detecteam</a></p><p>Webinar: Rethink, Don’t Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | <a href="https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634">https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 04:28:55 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Detecteam, Sebastien Tricaud, Fred Wilmot)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/fixing-the-detection-disconnect-and-rethinking-detection-from-static-rules-to-living-signals-a-brand-story-with-fred-wilmot-from-detecteam-an-on-location-rsac-conference-2025-brand-story-b2vVAlVs</link>
      <content:encoded><![CDATA[<p>Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity’s detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?</p><p>The Detecteam founders challenge the industry’s obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.</p><p>At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It’s about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.</p><p>Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they’ve built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.</p><p>Fred explains the benefit in terms any CISO can understand: this isn’t just detection—it’s readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That’s a tangible advantage, especially when operating with limited personnel.</p><p>This conversation isn’t about a silver bullet or more noise—it’s about clarity. What’s working? What’s not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that’s faster, smarter, and grounded in reality.</p><p>Learn more about Detecteam: <a href="https://itspm.ag/detecteam-21686">https://itspm.ag/detecteam-21686</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Fred Wilmot</strong>, Co-Founder & CEO, Detecteam | <a href="https://www.linkedin.com/in/fredwilmot/">https://www.linkedin.com/in/fredwilmot/</a></p><p><strong>Sebastien Tricaud</strong>, Co-Founder & CTO, Detecteam | <a href="https://www.linkedin.com/in/tricaud/">https://www.linkedin.com/in/tricaud/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Detecteam: <a href="https://www.itspmagazine.com/directory/detecteam">https://www.itspmagazine.com/directory/detecteam</a></p><p>Webinar: Rethink, Don’t Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | <a href="https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634">https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20699512" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a62f9381-99e6-4bb2-aab7-e22f1305060c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a62f9381-99e6-4bb2-aab7-e22f1305060c&amp;feed=kDNbmF_B"/>
      <itunes:title>Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Detecteam, Sebastien Tricaud, Fred Wilmot</itunes:author>
      <itunes:duration>00:21:33</itunes:duration>
      <itunes:summary>Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay ahead of adversaries, this conversation is for you.</itunes:summary>
      <itunes:subtitle>Fred Wilmot and Sebastien Tricaud challenge traditional detection models by introducing a faster, behavior-based approach that continuously generates and validates detections tailored to real-world threats. If you’re tired of optimizing broken processes and want to hear how teams can actually stay ahead of adversaries, this conversation is for you.</itunes:subtitle>
      <itunes:keywords>behavior, blue team, marketing podcast, marco ciappelli, sean martin, automation, cybersecurity, detection, detecteam, fred wilmot, brand marketing, sebastien tricaud, red team, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>128</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">272c6b68-7097-4b54-b4a4-1ba868d30e81</guid>
      <title>Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this episode, Subo Guha, Senior Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber’s mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.</p><p>Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform’s modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.</p><p>One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.</p><p>The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber’s strong commitment to ecosystem support and customer-centric growth.</p><p>Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It’s a clear statement: powerful security doesn’t need to be out of reach for smaller teams or companies.</p><p>This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.</p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 03:12:09 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Subo Guha, Stellar Cyber)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/simplifying-cybersecurity-operations-at-scale-automation-with-a-human-touch-a-brand-story-with-subo-guha-from-stellar-cyber-an-on-location-rsac-conference-2025-brand-story-Lwj_xCmA</link>
      <content:encoded><![CDATA[<p>In this episode, Subo Guha, Senior Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber’s mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.</p><p>Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform’s modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.</p><p>One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.</p><p>The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber’s strong commitment to ecosystem support and customer-centric growth.</p><p>Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It’s a clear statement: powerful security doesn’t need to be out of reach for smaller teams or companies.</p><p>This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.</p><p>Learn more about Stellar Cyber: <a href="https://itspm.ag/stellar-cyber--inc--357947">https://itspm.ag/stellar-cyber--inc--357947</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Subo Guha</strong>, Senior Vice President Product, Stellar Cyber | <a href="https://www.linkedin.com/in/suboguha/">https://www.linkedin.com/in/suboguha/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Stellar Cyber: <a href="https://www.itspmagazine.com/directory/stellarcyber">https://www.itspmagazine.com/directory/stellarcyber</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18863838" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/aef11972-83f9-4c3d-bc23-2b84b6d8f50d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=aef11972-83f9-4c3d-bc23-2b84b6d8f50d&amp;feed=kDNbmF_B"/>
      <itunes:title>Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Subo Guha, Stellar Cyber</itunes:author>
      <itunes:duration>00:19:38</itunes:duration>
      <itunes:summary>Stellar Cyber’s Subo Guha outlines how their open XDR platform and new autonomous SOC features are making enterprise-grade cybersecurity achievable for MSSPs and the organizations they support. By combining flexible integrations, case-based alerting, and hyper automation, Stellar Cyber is redefining how security operations can scale without overwhelming human teams.</itunes:summary>
      <itunes:subtitle>Stellar Cyber’s Subo Guha outlines how their open XDR platform and new autonomous SOC features are making enterprise-grade cybersecurity achievable for MSSPs and the organizations they support. By combining flexible integrations, case-based alerting, and hyper automation, Stellar Cyber is redefining how security operations can scale without overwhelming human teams.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, automation, threat detection, subo guha, cybersecurity, ot, soc, brand marketing, ai, brand story podcast, brand story, mssp, xdr</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>127</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e3871e18-9b4a-4aaa-87c1-17d63a2ba7d2</guid>
      <title>From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes.</p><p>ManageEngine, a division of Zoho Corporation, now offers a suite of over 60 products that span identity and access management, SIEM, endpoint protection, service management, and analytics. These components don’t just coexist—they interact contextually. Vivin outlines a real-world example from the healthcare sector, where a SIM tool detects abnormal login behavior, triggers an identity system to challenge access, and then logs the incident for IT service resolution. This integrated chain reflects a philosophy where response is not just fast, but connected and accountable.</p><p>At the heart of the platform’s effectiveness is contextual intelligence—layered between artificial intelligence and business insights—to power decision-making that aligns with enterprise risk and compliance needs. Whether it’s SOC analysts triaging events, CIS admins handling system hygiene, or CISOs aligning actions with corporate goals, the tools are tailored to fit roles, not just generic functions. According to Vivin, this role-based approach is critical to eliminating silos and ensuring teams speak the same operational and risk language.</p><p>AI continues to play a role in enhancing that coordination, but ManageEngine is cautious not to follow hype for its own sake. The company has invested in its own AI and ML capabilities since 2012, and recently launched an agent studio—but only after evaluating how new models can meaningfully add value. Vivin points out that enterprise use cases often benefit more from small, purpose-built language models than from massive general-purpose ones.</p><p>Perhaps most compelling is ManageEngine’s global-first strategy. With operations in nearly 190 countries and 18+ of its own data centers, the company prioritizes proximity to customers—not just for technical support, but for cultural understanding and local compliance. That closeness informs both product design and customer trust, especially as regulations around data sovereignty intensify.</p><p>This episode challenges listeners to consider whether their tools are merely present—or actually connected. Are you enabling collaboration through context, or just stitching systems together and calling it a platform?</p><p>Learn more about ManageEngine: <a href="https://itspm.ag/manageen-631623">https://itspm.ag/manageen-631623</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Vivin Sathyan</strong>, Senior Technology Evangelist, ManageEngine | https://www.linkedin.com/in/vivin-sathyan/</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ManageEngine: <a href="https://www.itspmagazine.com/directory/manageengine">https://www.itspmagazine.com/directory/manageengine</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, vivin sathyan, cybersecurity, ai, siem, identity, analytics, integration, platform, risk, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 7 May 2025 02:37:38 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivin Sathyan, ManageEngine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-tools-to-trust-why-integration-beats-innovation-hype-in-cybersecurity-a-brand-story-with-vivin-sathyan-from-manageengine-an-on-location-rsac-conference-2025-brand-story-PJ6fJc5z</link>
      <content:encoded><![CDATA[<p>Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes.</p><p>ManageEngine, a division of Zoho Corporation, now offers a suite of over 60 products that span identity and access management, SIEM, endpoint protection, service management, and analytics. These components don’t just coexist—they interact contextually. Vivin outlines a real-world example from the healthcare sector, where a SIM tool detects abnormal login behavior, triggers an identity system to challenge access, and then logs the incident for IT service resolution. This integrated chain reflects a philosophy where response is not just fast, but connected and accountable.</p><p>At the heart of the platform’s effectiveness is contextual intelligence—layered between artificial intelligence and business insights—to power decision-making that aligns with enterprise risk and compliance needs. Whether it’s SOC analysts triaging events, CIS admins handling system hygiene, or CISOs aligning actions with corporate goals, the tools are tailored to fit roles, not just generic functions. According to Vivin, this role-based approach is critical to eliminating silos and ensuring teams speak the same operational and risk language.</p><p>AI continues to play a role in enhancing that coordination, but ManageEngine is cautious not to follow hype for its own sake. The company has invested in its own AI and ML capabilities since 2012, and recently launched an agent studio—but only after evaluating how new models can meaningfully add value. Vivin points out that enterprise use cases often benefit more from small, purpose-built language models than from massive general-purpose ones.</p><p>Perhaps most compelling is ManageEngine’s global-first strategy. With operations in nearly 190 countries and 18+ of its own data centers, the company prioritizes proximity to customers—not just for technical support, but for cultural understanding and local compliance. That closeness informs both product design and customer trust, especially as regulations around data sovereignty intensify.</p><p>This episode challenges listeners to consider whether their tools are merely present—or actually connected. Are you enabling collaboration through context, or just stitching systems together and calling it a platform?</p><p>Learn more about ManageEngine: <a href="https://itspm.ag/manageen-631623">https://itspm.ag/manageen-631623</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Vivin Sathyan</strong>, Senior Technology Evangelist, ManageEngine | https://www.linkedin.com/in/vivin-sathyan/</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ManageEngine: <a href="https://www.itspmagazine.com/directory/manageengine">https://www.itspmagazine.com/directory/manageengine</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, vivin sathyan, cybersecurity, ai, siem, identity, analytics, integration, platform, risk, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19293090" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0f394d3c-0b33-4b57-a4dc-71a64f3f3c88/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0f394d3c-0b33-4b57-a4dc-71a64f3f3c88&amp;feed=kDNbmF_B"/>
      <itunes:title>From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivin Sathyan, ManageEngine</itunes:author>
      <itunes:duration>00:20:05</itunes:duration>
      <itunes:summary>In this episode, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how contextual integration across IT management tools is reshaping how organizations respond to threats, align with business goals, and deliver measurable value. He also explains why thoughtful AI adoption, role-specific functionality, and global proximity to customers are essential to building trust and delivering results.</itunes:summary>
      <itunes:subtitle>In this episode, Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how contextual integration across IT management tools is reshaping how organizations respond to threats, align with business goals, and deliver measurable value. He also explains why thoughtful AI adoption, role-specific functionality, and global proximity to customers are essential to building trust and delivering results.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, siem, sean martin, cybersecurity, vivin sathyan, analytics, platform, integration, brand marketing, identity, ai, risk, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>126</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">25b1adcc-87af-4c82-abdb-5ed9ff548abf</guid>
      <title>From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management together with defensive services and managed offerings to address full-spectrum cybersecurity needs. The focus isn’t on commoditized services—it’s on what actually makes a difference.</p><p>At the heart of the conversation is the idea that cybersecurity is a team sport. Henderson draws parallels between the improvisation of music and the tactics of both attackers and defenders. Both require rhythm, creativity, and cohesion. The myth of the lone hero doesn’t hold up anymore—effective cybersecurity programs are driven by collaboration across specialties and by combining services in ways that amplify their value.</p><p>Coalfire’s evolution reflects this shift. It’s not just about running a penetration test or red team operation in isolation. It’s about integrating those efforts into a broader mission-focused program, tailored to real threats and measured against what matters most. Henderson emphasizes that CISOs are no longer content with piecemeal assessments; they’re seeking simplified, strategic programs with measurable outcomes.</p><p>The conversation also touches on the importance of storytelling in cybersecurity reporting. Henderson underscores the need for findings to be communicated in ways that resonate with technical teams, security leaders, and the board. It’s about enabling CISOs to own the narrative, armed with context, clarity, and confidence.</p><p>Henderson’s reflections on the early days of hacker culture—when gatherings like HoCon and early Def Cons were more about curiosity and camaraderie than business—bring a human dimension to the discussion. That same passion still fuels many practitioners today, and Coalfire is committed to nurturing it through talent development and internships, helping the next generation find their voice, their challenge, and yes, even their hacker handle.</p><p>This episode offers a look at how to build programs, teams, and mindsets that are ready to lead—not follow—on the cybersecurity front.</p><p>Learn more about Coalfire: <a href="https://itspm.ag/coalfire-yj4w">https://itspm.ag/coalfire-yj4w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Charles Henderson</strong>, Executive Vice President of Cyber Security Services, Coalfire | <a href="https://www.linkedin.com/in/angustx/">https://www.linkedin.com/in/angustx/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Coalfire: <a href="https://www.itspmagazine.com/directory/coalfire">https://www.itspmagazine.com/directory/coalfire</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>charles henderson, sean martin, coalfire, red teaming, penetration testing, cybersecurity services, exposure management, ciso, threat intelligence, hacker culture, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 23:47:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Charles Henderson, Coalfire)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-red-teams-to-real-impact-bringing-artistry-and-precision-to-cybersecurity-programs-a-brand-story-with-charles-henderson-from-coalfire-an-on-location-rsac-conference-2025-brand-story-hpZ_jUud</link>
      <content:encoded><![CDATA[<p>Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management together with defensive services and managed offerings to address full-spectrum cybersecurity needs. The focus isn’t on commoditized services—it’s on what actually makes a difference.</p><p>At the heart of the conversation is the idea that cybersecurity is a team sport. Henderson draws parallels between the improvisation of music and the tactics of both attackers and defenders. Both require rhythm, creativity, and cohesion. The myth of the lone hero doesn’t hold up anymore—effective cybersecurity programs are driven by collaboration across specialties and by combining services in ways that amplify their value.</p><p>Coalfire’s evolution reflects this shift. It’s not just about running a penetration test or red team operation in isolation. It’s about integrating those efforts into a broader mission-focused program, tailored to real threats and measured against what matters most. Henderson emphasizes that CISOs are no longer content with piecemeal assessments; they’re seeking simplified, strategic programs with measurable outcomes.</p><p>The conversation also touches on the importance of storytelling in cybersecurity reporting. Henderson underscores the need for findings to be communicated in ways that resonate with technical teams, security leaders, and the board. It’s about enabling CISOs to own the narrative, armed with context, clarity, and confidence.</p><p>Henderson’s reflections on the early days of hacker culture—when gatherings like HoCon and early Def Cons were more about curiosity and camaraderie than business—bring a human dimension to the discussion. That same passion still fuels many practitioners today, and Coalfire is committed to nurturing it through talent development and internships, helping the next generation find their voice, their challenge, and yes, even their hacker handle.</p><p>This episode offers a look at how to build programs, teams, and mindsets that are ready to lead—not follow—on the cybersecurity front.</p><p>Learn more about Coalfire: <a href="https://itspm.ag/coalfire-yj4w">https://itspm.ag/coalfire-yj4w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Charles Henderson</strong>, Executive Vice President of Cyber Security Services, Coalfire | <a href="https://www.linkedin.com/in/angustx/">https://www.linkedin.com/in/angustx/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Coalfire: <a href="https://www.itspmagazine.com/directory/coalfire">https://www.itspmagazine.com/directory/coalfire</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>charles henderson, sean martin, coalfire, red teaming, penetration testing, cybersecurity services, exposure management, ciso, threat intelligence, hacker culture, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27232213" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/13b29bb6-b222-45f1-91f6-9cd4771235db/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=13b29bb6-b222-45f1-91f6-9cd4771235db&amp;feed=kDNbmF_B"/>
      <itunes:title>From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Charles Henderson, Coalfire</itunes:author>
      <itunes:duration>00:28:21</itunes:duration>
      <itunes:summary>Charles Henderson of Coalfire shares how cybersecurity programs can become more impactful by moving beyond tactical testing and toward coordinated, threat-driven operations that tell a complete story—from red teaming to executive reporting. He also reflects on the human side of the industry, from musical creativity to hacker culture, and why nurturing talent is key to long-term success.</itunes:summary>
      <itunes:subtitle>Charles Henderson of Coalfire shares how cybersecurity programs can become more impactful by moving beyond tactical testing and toward coordinated, threat-driven operations that tell a complete story—from red teaming to executive reporting. He also reflects on the human side of the industry, from musical creativity to hacker culture, and why nurturing talent is key to long-term success.</itunes:subtitle>
      <itunes:keywords>exposure management, marketing podcast, marco ciappelli, hacker culture, ciso, sean martin, cybersecurity, cybersecurity services, penetration testing, threat intelligence, red teaming, coalfire, brand marketing, charles henderson, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>125</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">10a239e8-00bd-4623-9d49-a9515501a7cf</guid>
      <title>Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate software delivery has now left security and infrastructure teams scrambling to contain risks that were never part of Kubernetes’ original design.</p><p>Emily outlines a critical flaw: Kubernetes wasn’t built for multi-tenancy. As a result, shared kernels across workloads—whether across customers or internal environments—introduce lateral movement risks. In her words, “A container isn’t real—it’s just a set of processes.” And when containers share a kernel, a single exploit can become a system-wide threat.</p><p>Edera addresses this gap by rethinking how containers are run—not rebuilt. Drawing from hypervisor tech like Xen and modernizing it with memory-safe Rust, Edera creates isolated “zones” for containers that enforce true separation without the overhead and complexity of traditional virtual machines. This isolation doesn’t disrupt developer workflows, integrates easily at the infrastructure layer, and doesn’t require retraining or restructuring CI/CD pipelines. It’s secure by design, without compromising performance or portability.</p><p>The impact is significant. Infrastructure teams gain the ability to enforce security policies without sacrificing cost efficiency. Developers keep their flow. And security professionals get something rare in today’s ecosystem: true prevention. Instead of chasing billions of alerts and layering multiple observability tools in hopes of finding the needle in the haystack, teams using Edera can reduce the noise and gain context that actually matters.</p><p>Emily also touches on the future—including the role of AI and “vibe coding,” and why true infrastructure-level security is essential as code generation becomes more automated and complex. With GPU security on their radar and a hardware-agnostic architecture, Edera is preparing not just for today’s container sprawl, but tomorrow’s AI-powered compute environments.</p><p>This is more than a product pitch—it’s a reframing of how we define and implement security at the container level. The full conversation reveals what’s possible when performance, portability, and protection are no longer at odds.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, emily long, containers, kubernetes, hypervisor, multi-tenancy, devsecops, infrastructure, virtualization, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 21:55:27 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Emily Long, Edera)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/not-so-contained-when-container-isolation-is-just-an-illusion-a-brand-story-with-emily-long-from-edera-an-on-location-rsac-conference-2025-brand-story-7vkshvLf</link>
      <content:encoded><![CDATA[<p>Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate software delivery has now left security and infrastructure teams scrambling to contain risks that were never part of Kubernetes’ original design.</p><p>Emily outlines a critical flaw: Kubernetes wasn’t built for multi-tenancy. As a result, shared kernels across workloads—whether across customers or internal environments—introduce lateral movement risks. In her words, “A container isn’t real—it’s just a set of processes.” And when containers share a kernel, a single exploit can become a system-wide threat.</p><p>Edera addresses this gap by rethinking how containers are run—not rebuilt. Drawing from hypervisor tech like Xen and modernizing it with memory-safe Rust, Edera creates isolated “zones” for containers that enforce true separation without the overhead and complexity of traditional virtual machines. This isolation doesn’t disrupt developer workflows, integrates easily at the infrastructure layer, and doesn’t require retraining or restructuring CI/CD pipelines. It’s secure by design, without compromising performance or portability.</p><p>The impact is significant. Infrastructure teams gain the ability to enforce security policies without sacrificing cost efficiency. Developers keep their flow. And security professionals get something rare in today’s ecosystem: true prevention. Instead of chasing billions of alerts and layering multiple observability tools in hopes of finding the needle in the haystack, teams using Edera can reduce the noise and gain context that actually matters.</p><p>Emily also touches on the future—including the role of AI and “vibe coding,” and why true infrastructure-level security is essential as code generation becomes more automated and complex. With GPU security on their radar and a hardware-agnostic architecture, Edera is preparing not just for today’s container sprawl, but tomorrow’s AI-powered compute environments.</p><p>This is more than a product pitch—it’s a reframing of how we define and implement security at the container level. The full conversation reveals what’s possible when performance, portability, and protection are no longer at odds.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, emily long, containers, kubernetes, hypervisor, multi-tenancy, devsecops, infrastructure, virtualization, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28673333" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/69ceffe0-da7e-46e9-86b5-47777aba46b5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=69ceffe0-da7e-46e9-86b5-47777aba46b5&amp;feed=kDNbmF_B"/>
      <itunes:title>Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Emily Long, Edera</itunes:author>
      <itunes:duration>00:29:52</itunes:duration>
      <itunes:summary>Containerization transformed development speed—but at what cost to security? In this episode, Emily Long, co-founder and CEO of Edera, explains how rethinking infrastructure from the kernel up is making true container isolation possible without sacrificing developer velocity or platform flexibility.</itunes:summary>
      <itunes:subtitle>Containerization transformed development speed—but at what cost to security? In this episode, Emily Long, co-founder and CEO of Edera, explains how rethinking infrastructure from the kernel up is making true container isolation possible without sacrificing developer velocity or platform flexibility.</itunes:subtitle>
      <itunes:keywords>kubernetes, marketing podcast, marco ciappelli, hypervisor, sean martin, containers, emily long, cybersecurity, virtualization, brand marketing, multi-tenancy, infrastructure, devsecops, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>124</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">88454a43-c04e-4bf7-9e28-f11d603b8a0c</guid>
      <title>This is What Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this episode, Sean Martin speaks with Richard Seiersen, Chief Risk Technology Officer at Qualys, about a new way to think about cybersecurity—one that puts value and business resilience at the center, not just threats.</p><p>Richard shares the thinking behind Qualys’ Risk Operations Center, a new approach that responds directly to a common pain point: organizations struggling to manage vast amounts of telemetry from dozens of security tools without clear direction on how to act. Instead of forcing companies to build and maintain massive internal platforms just to piece together asset, vulnerability, and threat data, Qualys is creating a system to operationalize risk as a real-time, measurable business function.</p><p>With a background that includes serving as Chief Risk Officer at a cyber insurance firm and co-authoring foundational books like How to Measure Anything in Cybersecurity Risk and The Metrics Manifesto, Richard frames the conversation in practical business terms. He emphasizes that success is not just about detecting threats, but about understanding where value exists in the business, and how to protect it efficiently.</p><p><strong>From Security Operations to Risk Operations</strong></p><p>While a traditional SOC focuses on attack surface and compromise detection, the Risk Operations Center is designed to understand, prioritize, and mitigate value at risk. Richard describes how this involves normalizing data across environments, connecting asset identities—including ephemeral and composite digital assets—and aligning technical activity to business impact.</p><p>The Risk Operations Center enables teams to think in terms of risk surface, not just threat surface, by giving security leaders visibility into what matters most—and the tools to act accordingly. And importantly, it does so without increasing headcount.</p><p><strong>A CISO’s Role in the Business of Risk</strong></p><p>Richard challenges security leaders to break away from purely tactical work and lean into business alignment. He argues that boards want CISOs who think strategically—who can talk about capital reserves, residual risk, and how mitigation and transfer can be measured against business outcomes. In his words, “A successful business is in the business of exposing more value to more people… security must understand and support that mission.”</p><p>This episode is packed with ideas worth listening to and sharing. What would your version of a Risk Operations Center look like?</p><p>Learn more about Qualys: <a href="https://itspm.ag/qualys-908446">https://itspm.ag/qualys-908446</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rich Seiersen</strong>, Chief Risk Technology Officer, Qualys | <a href="https://www.linkedin.com/in/richardseiersen/">https://www.linkedin.com/in/richardseiersen/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Qualys: <a href="https://www.itspmagazine.com/directory/qualys">https://www.itspmagazine.com/directory/qualys</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, richard seiersen, risk, cybersecurity, data, resilience, telemetry, automation, ciso, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 19:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rich Seiersen, Qualys)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/this-is-what-happens-when-security-stops-chasing-threats-and-starts-managing-risk-a-brand-story-with-rich-seiersen-from-qualys-an-on-location-rsac-conference-2025-brand-story-Y17HWLOn</link>
      <content:encoded><![CDATA[<p>In this episode, Sean Martin speaks with Richard Seiersen, Chief Risk Technology Officer at Qualys, about a new way to think about cybersecurity—one that puts value and business resilience at the center, not just threats.</p><p>Richard shares the thinking behind Qualys’ Risk Operations Center, a new approach that responds directly to a common pain point: organizations struggling to manage vast amounts of telemetry from dozens of security tools without clear direction on how to act. Instead of forcing companies to build and maintain massive internal platforms just to piece together asset, vulnerability, and threat data, Qualys is creating a system to operationalize risk as a real-time, measurable business function.</p><p>With a background that includes serving as Chief Risk Officer at a cyber insurance firm and co-authoring foundational books like How to Measure Anything in Cybersecurity Risk and The Metrics Manifesto, Richard frames the conversation in practical business terms. He emphasizes that success is not just about detecting threats, but about understanding where value exists in the business, and how to protect it efficiently.</p><p><strong>From Security Operations to Risk Operations</strong></p><p>While a traditional SOC focuses on attack surface and compromise detection, the Risk Operations Center is designed to understand, prioritize, and mitigate value at risk. Richard describes how this involves normalizing data across environments, connecting asset identities—including ephemeral and composite digital assets—and aligning technical activity to business impact.</p><p>The Risk Operations Center enables teams to think in terms of risk surface, not just threat surface, by giving security leaders visibility into what matters most—and the tools to act accordingly. And importantly, it does so without increasing headcount.</p><p><strong>A CISO’s Role in the Business of Risk</strong></p><p>Richard challenges security leaders to break away from purely tactical work and lean into business alignment. He argues that boards want CISOs who think strategically—who can talk about capital reserves, residual risk, and how mitigation and transfer can be measured against business outcomes. In his words, “A successful business is in the business of exposing more value to more people… security must understand and support that mission.”</p><p>This episode is packed with ideas worth listening to and sharing. What would your version of a Risk Operations Center look like?</p><p>Learn more about Qualys: <a href="https://itspm.ag/qualys-908446">https://itspm.ag/qualys-908446</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rich Seiersen</strong>, Chief Risk Technology Officer, Qualys | <a href="https://www.linkedin.com/in/richardseiersen/">https://www.linkedin.com/in/richardseiersen/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Qualys: <a href="https://www.itspmagazine.com/directory/qualys">https://www.itspmagazine.com/directory/qualys</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, richard seiersen, risk, cybersecurity, data, resilience, telemetry, automation, ciso, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23975055" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/be2f18af-ce4a-4e50-951c-ca9e4c19d97e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=be2f18af-ce4a-4e50-951c-ca9e4c19d97e&amp;feed=kDNbmF_B"/>
      <itunes:title>This is What Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rich Seiersen, Qualys</itunes:author>
      <itunes:duration>00:24:58</itunes:duration>
      <itunes:summary>Richard Seiersen, Chief Risk Technology Officer at Qualys, introduces the concept of a Risk Operations Center—a transformative shift from traditional threat-focused security operations to a model centered on managing business value and reducing risk at scale. In this episode, he explains how organizations can move beyond detection to strategic risk mitigation, automation, and board-level alignment.</itunes:summary>
      <itunes:subtitle>Richard Seiersen, Chief Risk Technology Officer at Qualys, introduces the concept of a Risk Operations Center—a transformative shift from traditional threat-focused security operations to a model centered on managing business value and reducing risk at scale. In this episode, he explains how organizations can move beyond detection to strategic risk mitigation, automation, and board-level alignment.</itunes:subtitle>
      <itunes:keywords>data, marketing podcast, marco ciappelli, ciso, sean martin, automation, cybersecurity, resilience, telemetry, soc, richard seiersen, brand marketing, risk, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>123</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a5e90f02-883f-443f-b9e2-c378b839be15</guid>
      <title>From Term Sheets to Trust: What Mergers &amp; Acquisitions Trends Reveal About Cybersecurity’s Future | An On Location RSAC Conference 2025 Conversation with Yair Geva</title>
      <description><![CDATA[<p>In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.</p><p>More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.</p><p><strong>AI Acceleration and M&A Hesitation</strong></p><p>According to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks’ move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.</p><p><strong>Cyber Due Diligence Is Now Table Stakes</strong></p><p>Across all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.</p><p><strong>From Global Hubs to Human Connections</strong></p><p>While San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.</p><p>With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.</p><p>Listen to the full conversation to hear what’s shaping the deals behind tomorrow’s cybersecurity innovations.<i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Yair Geva</strong>, Attorney and Investor | <a href="https://www.linkedin.com/in/yairgeva/">https://www.linkedin.com/in/yairgeva/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 May 2025 18:14:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Yair Geva)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-term-sheets-to-trust-what-ma-trends-reveal-about-cybersecuritys-future-an-on-location-rsac-conference-2025-conversation-with-yair-geva-iT8PrLQ5</link>
      <content:encoded><![CDATA[<p>In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.</p><p>More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.</p><p><strong>AI Acceleration and M&A Hesitation</strong></p><p>According to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks’ move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.</p><p><strong>Cyber Due Diligence Is Now Table Stakes</strong></p><p>Across all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.</p><p><strong>From Global Hubs to Human Connections</strong></p><p>While San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.</p><p>With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.</p><p>Listen to the full conversation to hear what’s shaping the deals behind tomorrow’s cybersecurity innovations.<i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Yair Geva</strong>, Attorney and Investor | <a href="https://www.linkedin.com/in/yairgeva/">https://www.linkedin.com/in/yairgeva/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19493711" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/744e809b-335a-4962-8807-5d8297328b41/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=744e809b-335a-4962-8807-5d8297328b41&amp;feed=kDNbmF_B"/>
      <itunes:title>From Term Sheets to Trust: What Mergers &amp; Acquisitions Trends Reveal About Cybersecurity’s Future | An On Location RSAC Conference 2025 Conversation with Yair Geva</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Yair Geva</itunes:author>
      <itunes:duration>00:20:18</itunes:duration>
      <itunes:summary>Yair Geva joins us to unpack how cybersecurity, AI, and M&amp;A are converging—and what that means for startups, investors, and global deal flow. From the rise of cyber due diligence to the shifting confidence of VCs in the age of AI, this episode offers a rare view into the business side of cyber innovation.</itunes:summary>
      <itunes:subtitle>Yair Geva joins us to unpack how cybersecurity, AI, and M&amp;A are converging—and what that means for startups, investors, and global deal flow. From the rise of cyber due diligence to the shifting confidence of VCs in the age of AI, this episode offers a rare view into the business side of cyber innovation.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, cybersecurity, venture, innovation, resilience, yair geva, m&amp;a, brand marketing, investment, ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>122</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0811074f-e589-4835-b864-90cf4111fbda</guid>
      <title>From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this on-location episode recorded at the RSAC Conference, Sean Martin and Marco Ciappelli sit down once again with Rob Allen, Chief Product Officer at ThreatLocker, to unpack what Zero Trust really looks like in practice—and how organizations can actually get started without feeling buried by complexity.</p><p>Rather than focusing on theory or buzzwords, Rob lays out a clear path that begins with visibility. “You can’t control what you can’t see,” he explains. The first step toward Zero Trust is deploying lightweight agents that automatically build a view of the software running across your environment. From there, policies can be crafted to default-deny unknown applications, while still enabling legitimate business needs through controlled exceptions.</p><p><strong>The Zero Trust Mindset: Assume Breach, Limit Access</strong></p><p>Rob echoes the federal mandate definition of Zero Trust: assume a breach has already occurred and limit access to only what is needed. This assumption flips the defensive posture from reactive to proactive. It’s not about waiting to detect bad behavior—it’s about blocking the behavior before it starts.</p><p>The ThreatLocker approach stands out because it focuses on removing the traditional “heavy lift” often associated with Zero Trust implementations. Rob highlights how some organizations have spent years trying (and failing) to activate overly complex systems, only to end up stuck with unused tools and endless false positives. ThreatLocker’s automation is designed to lower that barrier and get organizations to meaningful control faster.</p><p><strong>Modern Threats, Simplified Defenses</strong></p><p>As AI accelerates the creation of polymorphic malware and low-code attack scripts, Zero Trust offers a counterweight. Deny-by-default policies don’t require knowing every new threat—just clear guardrails that prevent unauthorized activity, no matter how it’s created. Whether it’s PowerShell scripts exfiltrating data or AI-generated exploits, proactive controls make it harder for attackers to operate undetected.</p><p>This episode reframes Zero Trust from an overwhelming project into a series of achievable, common-sense steps. If you’re ready to hear what it takes to stop chasing false positives and start building a safer, more controlled environment, this conversation is for you.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, zero trust, cybersecurity, visibility, access control, proactive defense, ai threats, policy automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 19:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-reactive-to-proactive-building-guardrails-that-actually-protect-a-brand-story-with-rob-allen-from-threatlocker-an-on-location-rsac-conference-2025-brand-story-CtpkJHcT</link>
      <content:encoded><![CDATA[<p>In this on-location episode recorded at the RSAC Conference, Sean Martin and Marco Ciappelli sit down once again with Rob Allen, Chief Product Officer at ThreatLocker, to unpack what Zero Trust really looks like in practice—and how organizations can actually get started without feeling buried by complexity.</p><p>Rather than focusing on theory or buzzwords, Rob lays out a clear path that begins with visibility. “You can’t control what you can’t see,” he explains. The first step toward Zero Trust is deploying lightweight agents that automatically build a view of the software running across your environment. From there, policies can be crafted to default-deny unknown applications, while still enabling legitimate business needs through controlled exceptions.</p><p><strong>The Zero Trust Mindset: Assume Breach, Limit Access</strong></p><p>Rob echoes the federal mandate definition of Zero Trust: assume a breach has already occurred and limit access to only what is needed. This assumption flips the defensive posture from reactive to proactive. It’s not about waiting to detect bad behavior—it’s about blocking the behavior before it starts.</p><p>The ThreatLocker approach stands out because it focuses on removing the traditional “heavy lift” often associated with Zero Trust implementations. Rob highlights how some organizations have spent years trying (and failing) to activate overly complex systems, only to end up stuck with unused tools and endless false positives. ThreatLocker’s automation is designed to lower that barrier and get organizations to meaningful control faster.</p><p><strong>Modern Threats, Simplified Defenses</strong></p><p>As AI accelerates the creation of polymorphic malware and low-code attack scripts, Zero Trust offers a counterweight. Deny-by-default policies don’t require knowing every new threat—just clear guardrails that prevent unauthorized activity, no matter how it’s created. Whether it’s PowerShell scripts exfiltrating data or AI-generated exploits, proactive controls make it harder for attackers to operate undetected.</p><p>This episode reframes Zero Trust from an overwhelming project into a series of achievable, common-sense steps. If you’re ready to hear what it takes to stop chasing false positives and start building a safer, more controlled environment, this conversation is for you.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, rob allen, zero trust, cybersecurity, visibility, access control, proactive defense, ai threats, policy automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20253553" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/749d53d6-29ae-4859-a158-dbf7b6f16775/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=749d53d6-29ae-4859-a158-dbf7b6f16775&amp;feed=kDNbmF_B"/>
      <itunes:title>From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen, ThreatLocker</itunes:author>
      <itunes:duration>00:21:05</itunes:duration>
      <itunes:summary>Rob Allen, Chief Product Officer at ThreatLocker, shares how organizations can move from theory to action with Zero Trust by starting with visibility and enforcing practical controls that actually work. This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder—without making yours more complex.</itunes:summary>
      <itunes:subtitle>Rob Allen, Chief Product Officer at ThreatLocker, shares how organizations can move from theory to action with Zero Trust by starting with visibility and enforcing practical controls that actually work. This episode cuts through the noise to show how deny-by-default strategies can simplify defenses and make attackers’ jobs much harder—without making yours more complex.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, policy automation, proactive defense, sean martin, rob allen, cybersecurity, brand marketing, visibility, access control, brand story podcast, zero trust, ai threats, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>121</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c34dd86b-96f7-4222-96af-e26c3f41e913</guid>
      <title>Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Quantum computing and AI are no longer theoretical concepts for tomorrow—they’re shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.</p><p>SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.</p><p><strong>Post-Quantum Migration and Cryptographic Agility</strong></p><p>Manzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It’s not just about surviving the post-quantum era—it’s about staying ready for whatever comes next.</p><p><strong>Taming the Complexity of AI Agents and Non-Human Identities</strong></p><p>The second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ’s platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.</p><p><strong>Real Use Cases with Measurable Impact</strong></p><p>Manzano shares practical examples of how SandboxAQ’s technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.</p><p>Whether it’s quantum cryptography, AI risk, or identity control—this isn’t a vision for 2030. It’s a call to action for today.</p><p>Learn more about SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en">https://itspm.ag/sandboxaq-j2en</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Marc Manzano</strong>, General Manager of Cybersecurity at SandboxAQ | <a href="https://www.linkedin.com/in/marcmanzano/">https://www.linkedin.com/in/marcmanzano/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SandboxAQ: <a href="https://www.itspmagazine.com/directory/sandboxaq">https://www.itspmagazine.com/directory/sandboxaq</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 18:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, SandboxAQ, Marc Manzano)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/security-at-the-edge-of-change-preparing-for-the-cryptographic-and-ai-tipping-point-a-brand-story-with-marc-manzano-from-sandboxaq-an-on-location-rsac-conference-2025-brand-story-0NrJl6WF</link>
      <content:encoded><![CDATA[<p>Quantum computing and AI are no longer theoretical concepts for tomorrow—they’re shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.</p><p>SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.</p><p><strong>Post-Quantum Migration and Cryptographic Agility</strong></p><p>Manzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It’s not just about surviving the post-quantum era—it’s about staying ready for whatever comes next.</p><p><strong>Taming the Complexity of AI Agents and Non-Human Identities</strong></p><p>The second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ’s platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.</p><p><strong>Real Use Cases with Measurable Impact</strong></p><p>Manzano shares practical examples of how SandboxAQ’s technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.</p><p>Whether it’s quantum cryptography, AI risk, or identity control—this isn’t a vision for 2030. It’s a call to action for today.</p><p>Learn more about SandboxAQ: <a href="https://itspm.ag/sandboxaq-j2en">https://itspm.ag/sandboxaq-j2en</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Marc Manzano</strong>, General Manager of Cybersecurity at SandboxAQ | <a href="https://www.linkedin.com/in/marcmanzano/">https://www.linkedin.com/in/marcmanzano/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SandboxAQ: <a href="https://www.itspmagazine.com/directory/sandboxaq">https://www.itspmagazine.com/directory/sandboxaq</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19376671" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/512e684e-d2e1-4cf6-9919-bb6c0c21a855/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=512e684e-d2e1-4cf6-9919-bb6c0c21a855&amp;feed=kDNbmF_B"/>
      <itunes:title>Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, SandboxAQ, Marc Manzano</itunes:author>
      <itunes:duration>00:20:11</itunes:duration>
      <itunes:summary>Marc Manzano, General Manager of Cybersecurity at SandboxAQ, shares how his team is tackling the urgent challenges of quantum-era cryptography and the explosion of AI agents across enterprise environments. From real-time cryptographic agility to continuous non-human identity management, this episode reveals how organizations can modernize security before it’s too late.</itunes:summary>
      <itunes:subtitle>Marc Manzano, General Manager of Cybersecurity at SandboxAQ, shares how his team is tackling the urgent challenges of quantum-era cryptography and the explosion of AI agents across enterprise environments. From real-time cryptographic agility to continuous non-human identity management, this episode reveals how organizations can modernize security before it’s too late.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, marc manzano, sean martin, cybersecurity, keymanagement, cryptography, rsac2025, brand marketing, quantum, nonhuman, ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>120</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ddd886d-cea9-4d57-83e7-810107a95bf7</guid>
      <title>When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In today’s threat environment, it’s not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That’s the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.</p><p>Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.</p><p><strong>Immutability as a Foundation—Not a Feature</strong></p><p>The conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn’t enough. Backup policies, storage access, and data workflows must be segmented and secured.</p><p><strong>Zero Trust for Backup Infrastructure</strong></p><p>Zero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can’t alter storage configurations.</p><p><strong>A Real-World Test: Marysville School District</strong></p><p>When Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn’t access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can’t be assumed; it must be enforced by design.</p><p><strong>Meeting Customers Where They Are</strong></p><p>To support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-ransomware-strikes-will-your-backups-hold-the-line-a-brand-story-with-sterling-wilson-from-object-first-an-on-location-rsac-conference-2025-brand-story-rZM5LDU9</link>
      <content:encoded><![CDATA[<p>In today’s threat environment, it’s not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That’s the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.</p><p>Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.</p><p><strong>Immutability as a Foundation—Not a Feature</strong></p><p>The conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn’t enough. Backup policies, storage access, and data workflows must be segmented and secured.</p><p><strong>Zero Trust for Backup Infrastructure</strong></p><p>Zero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can’t alter storage configurations.</p><p><strong>A Real-World Test: Marysville School District</strong></p><p>When Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn’t access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can’t be assumed; it must be enforced by design.</p><p><strong>Meeting Customers Where They Are</strong></p><p>To support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Sterling Wilson</strong>, Field CTO, Object First | <a href="https://www.linkedin.com/in/sterling-wilson/">https://www.linkedin.com/in/sterling-wilson/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17237141" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/87e6f891-43ad-416c-b477-fe8a0773ba78/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=87e6f891-43ad-416c-b477-fe8a0773ba78&amp;feed=kDNbmF_B"/>
      <itunes:title>When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First</itunes:author>
      <itunes:duration>00:17:57</itunes:duration>
      <itunes:summary>In this episode from RSAC Conference 2025, Sterling Wilson, Field CTO at Object First, explains why true immutability and zero trust principles must be built into your backup architecture—not just your network. He shares real-world insights, including how one school district was able to recover from a ransomware attack because their immutable backups were untouchable.</itunes:summary>
      <itunes:subtitle>In this episode from RSAC Conference 2025, Sterling Wilson, Field CTO at Object First, explains why true immutability and zero trust principles must be built into your backup architecture—not just your network. He shares real-world insights, including how one school district was able to recover from a ransomware attack because their immutable backups were untouchable.</itunes:subtitle>
      <itunes:keywords>sterling wilson, immutability, marketing podcast, marco ciappelli, backups, sean martin, cybersecurity, data protection, veeam, ransomware, brand marketing, brand story podcast, recovery, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>119</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cab30a64-9793-4f7b-9d60-b776850c66ef</guid>
      <title>From Overhead to Advantage: Turning Compliance into a Strategic Asset | A Brand Story with Steve Schlarman from Archer | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this RSAC 2025 episode, Sean Martin sits down with Steve Schlarman, Senior Director of Product Management at Archer, to explore how organizations are rethinking compliance and risk—not just as a box to check, but as a business enabler.</p><p>At the center of the conversation is Archer Evolv, a new platform intentionally designed to move beyond legacy GRC workflows. Built on years of insight from customers and aligned with the company’s post-RSA independence, Evolv aims to modernize how compliance and risk teams operate. That includes automating burdensome regulatory processes, surfacing business-relevant risk insights, and supporting more strategic decision-making.</p><p>Leveraging technology developed by Compliance.ai, acquired by Archer last year, Archer applies AI tuned specifically for the language of compliance, helping customers reduce review time per regulatory obligation from 100 hours to just a few. That’s more than a productivity gain—it’s a structural shift in how companies adapt to nonstop regulatory change.</p><p>Another critical area is quantifying risk. Rather than relying on subjective heat maps, Archer enables organizations to calculate loss exposure in real terms. This creates a foundation for executive conversations rooted in financial and operational impact, not just abstract threat levels. That same quantitative view can be applied to understanding the cost of controls—ensuring that investments align with real business risk, rather than piling on complexity for the sake of coverage.</p><p>The conversation closes on a powerful shift: risk and compliance teams freeing up time and brainpower to collaborate directly with the business. With the manual grunt work automated and controls mapped more intelligently, these teams can help shape new services and strategic initiatives—safely and confidently.</p><p>This episode isn’t just about software or frameworks. It’s about what happens when governance becomes a driver of value, not just a reaction to fear.</p><p>Listen in to hear how Archer is helping turn risk and compliance from operational drag into business advantage.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb">https://itspm.ag/rsaarchweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer Integrated Risk Management: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, steve schlarman, risk, compliance, ai, governance, grc, quantification, controls, automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 16:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-overhead-to-advantage-turning-compliance-into-a-strategic-asset-a-brand-story-with-steve-schlarman-from-archer-an-on-location-rsac-conference-2025-brand-story-WGP6KoPS</link>
      <content:encoded><![CDATA[<p>In this RSAC 2025 episode, Sean Martin sits down with Steve Schlarman, Senior Director of Product Management at Archer, to explore how organizations are rethinking compliance and risk—not just as a box to check, but as a business enabler.</p><p>At the center of the conversation is Archer Evolv, a new platform intentionally designed to move beyond legacy GRC workflows. Built on years of insight from customers and aligned with the company’s post-RSA independence, Evolv aims to modernize how compliance and risk teams operate. That includes automating burdensome regulatory processes, surfacing business-relevant risk insights, and supporting more strategic decision-making.</p><p>Leveraging technology developed by Compliance.ai, acquired by Archer last year, Archer applies AI tuned specifically for the language of compliance, helping customers reduce review time per regulatory obligation from 100 hours to just a few. That’s more than a productivity gain—it’s a structural shift in how companies adapt to nonstop regulatory change.</p><p>Another critical area is quantifying risk. Rather than relying on subjective heat maps, Archer enables organizations to calculate loss exposure in real terms. This creates a foundation for executive conversations rooted in financial and operational impact, not just abstract threat levels. That same quantitative view can be applied to understanding the cost of controls—ensuring that investments align with real business risk, rather than piling on complexity for the sake of coverage.</p><p>The conversation closes on a powerful shift: risk and compliance teams freeing up time and brainpower to collaborate directly with the business. With the manual grunt work automated and controls mapped more intelligently, these teams can help shape new services and strategic initiatives—safely and confidently.</p><p>This episode isn’t just about software or frameworks. It’s about what happens when governance becomes a driver of value, not just a reaction to fear.</p><p>Listen in to hear how Archer is helping turn risk and compliance from operational drag into business advantage.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb">https://itspm.ag/rsaarchweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Steve Schlarman</strong>, Senior Director, Product Management, Archert | <a href="https://www.linkedin.com/in/steveschlarman/">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer Integrated Risk Management: <a href="https://www.itspmagazine.com/directory/archer">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, steve schlarman, risk, compliance, ai, governance, grc, quantification, controls, automation, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="14941703" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e8168b7e-9600-422e-90f4-dbce62a500e5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e8168b7e-9600-422e-90f4-dbce62a500e5&amp;feed=kDNbmF_B"/>
      <itunes:title>From Overhead to Advantage: Turning Compliance into a Strategic Asset | A Brand Story with Steve Schlarman from Archer | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman, Archer</itunes:author>
      <itunes:duration>00:15:33</itunes:duration>
      <itunes:summary>Steve Schlarman, Senior Director of Product Management at Archer, shares how the new Archer Evolve platform is transforming compliance and risk management from a manual, reactive burden into a streamlined, AI-enhanced business enabler. Discover how quantifying risk and automating regulatory processes empowers teams to make smarter decisions and drive real business impact.</itunes:summary>
      <itunes:subtitle>Steve Schlarman, Senior Director of Product Management at Archer, shares how the new Archer Evolve platform is transforming compliance and risk management from a manual, reactive burden into a streamlined, AI-enhanced business enabler. Discover how quantifying risk and automating regulatory processes empowers teams to make smarter decisions and drive real business impact.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, controls, grc, sean martin, automation, cybersecurity, quantification, steve schlarman, brand marketing, ai, risk, brand story podcast, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>118</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6927d343-e17d-4dd7-91ce-48103362282b</guid>
      <title>The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.</p><p>Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it’s also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.</p><p><strong>The API and Web Application Threat Surge</strong></p><p>Referencing Akamai’s latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they’re exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.</p><p>Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren’t actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.</p><p><strong>Introducing Akamai’s Firewall for AI</strong></p><p>Akamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.</p><p>In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.</p><p><strong>Enabling Security Leadership</strong></p><p>Chokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai’s goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 5 May 2025 15:40:05 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Akamai, Rupesh Chokshi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-new-front-line-runtime-protection-for-ai-and-api-driven-attacks-a-brand-story-with-rupesh-chokshi-from-akamai-an-on-location-rsac-conference-2025-brand-story-rKtwtgcd</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.</p><p>Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it’s also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.</p><p><strong>The API and Web Application Threat Surge</strong></p><p>Referencing Akamai’s latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they’re exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.</p><p>Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren’t actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.</p><p><strong>Introducing Akamai’s Firewall for AI</strong></p><p>Akamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.</p><p>In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.</p><p><strong>Enabling Security Leadership</strong></p><p>Chokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai’s goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamailbwc">https://itspm.ag/akamailbwc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai | <a href="https://www.linkedin.com/in/rupeshchokshi/">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16797860" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/dad3ef4c-8ece-4cd6-a2ff-185807e3a767/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=dad3ef4c-8ece-4cd6-a2ff-185807e3a767&amp;feed=kDNbmF_B"/>
      <itunes:title>The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Akamai, Rupesh Chokshi</itunes:author>
      <itunes:duration>00:17:29</itunes:duration>
      <itunes:summary>In this episode, Rupesh Chokshi of Akamai breaks down the surge in API and AI-driven threats and explains how Akamai’s new Firewall for AI helps CISOs manage risk without slowing innovation. With real-world data, sharp insights, and practical solutions, this episode is a must-listen.</itunes:summary>
      <itunes:subtitle>In this episode, Rupesh Chokshi of Akamai breaks down the surge in API and AI-driven threats and explains how Akamai’s new Firewall for AI helps CISOs manage risk without slowing innovation. With real-world data, sharp insights, and practical solutions, this episode is a must-listen.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, akamai, cybersecurity, rsac, api, firewall, security, brand marketing, ai, cisos, brand story podcast, llm, brand story, rupesh chokshi</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>117</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bd251f09-ff70-4efd-85a0-f0e2f99e6547</guid>
      <title>From Certification to Confidence: The Future of Cybersecurity Starts with the First Job | A Brand Story with Jamie Norton from ISACA | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>The cybersecurity workforce shortage isn’t a new problem—but according to Jamie Norton, Board Director at ISACA, it’s one that’s getting worse. In this on-location conversation during RSAC Conference 2025, Norton shares how ISACA is not only acknowledging this persistent gap but actively building pathways to close it, especially for early-career professionals.</p><p>While many know ISACA for its certifications and events, Norton emphasizes that the organization’s mission goes much deeper—supporting digital trust through education, community, and career development. One key area of focus: helping individuals navigate every phase of their professional journey, from new graduates to seasoned leaders. That includes new offerings like the Certified Cyber Operations Analyst (CCOA) credential, designed specifically to meet the growing demand for technical, hands-on skills in security operations roles.</p><p>What’s driving this shift? Norton points to employer demand for candidates who can walk into SOC and technical analyst roles with practical experience. The CCOA was created based on feedback from ISACA’s 185,000+ global members and a wide network of hiring organizations, all highlighting the same pain point: early-stage roles are difficult to fill, not because people aren’t interested, but because too many can’t prove their skills in ways hiring managers understand.</p><p>ISACA’s response is both strategic and community-driven. Certification development is rooted in large-scale data analysis and enhanced by input from members around the world, ensuring each program reflects real-world needs. At the same time, ISACA recognizes that certifications alone don’t create confidence. Community and mentorship matter—especially for those struggling with imposter syndrome or breaking into the field from non-traditional backgrounds.</p><p>Looking ahead, ISACA is investing in career journey tools, AI-focused certifications, and guidance for post-quantum readiness—all while continuing to support members through local chapters and global programs.</p><p>For those hiring, job-seeking, or guiding others into the field, this episode offers a grounded, forward-looking view into how one organization is equipping the cybersecurity workforce for the work that matters now—and what’s coming next.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Jamie Norton</strong>, Director Board of Directors, ISACA | <a href="https://www.linkedin.com/in/jamienorton/">https://www.linkedin.com/in/jamienorton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>jamie norton, sean martin, marco ciappelli, cybersecurity, certifications, workforce, skills, governance, community, careers, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 15:43:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jamie Norton, ISACA)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-certification-to-confidence-the-future-of-cybersecurity-starts-with-the-first-job-a-brand-story-with-jamie-norton-from-isaca-an-on-location-rsac-conference-2025-brand-story-aNOSo93z</link>
      <content:encoded><![CDATA[<p>The cybersecurity workforce shortage isn’t a new problem—but according to Jamie Norton, Board Director at ISACA, it’s one that’s getting worse. In this on-location conversation during RSAC Conference 2025, Norton shares how ISACA is not only acknowledging this persistent gap but actively building pathways to close it, especially for early-career professionals.</p><p>While many know ISACA for its certifications and events, Norton emphasizes that the organization’s mission goes much deeper—supporting digital trust through education, community, and career development. One key area of focus: helping individuals navigate every phase of their professional journey, from new graduates to seasoned leaders. That includes new offerings like the Certified Cyber Operations Analyst (CCOA) credential, designed specifically to meet the growing demand for technical, hands-on skills in security operations roles.</p><p>What’s driving this shift? Norton points to employer demand for candidates who can walk into SOC and technical analyst roles with practical experience. The CCOA was created based on feedback from ISACA’s 185,000+ global members and a wide network of hiring organizations, all highlighting the same pain point: early-stage roles are difficult to fill, not because people aren’t interested, but because too many can’t prove their skills in ways hiring managers understand.</p><p>ISACA’s response is both strategic and community-driven. Certification development is rooted in large-scale data analysis and enhanced by input from members around the world, ensuring each program reflects real-world needs. At the same time, ISACA recognizes that certifications alone don’t create confidence. Community and mentorship matter—especially for those struggling with imposter syndrome or breaking into the field from non-traditional backgrounds.</p><p>Looking ahead, ISACA is investing in career journey tools, AI-focused certifications, and guidance for post-quantum readiness—all while continuing to support members through local chapters and global programs.</p><p>For those hiring, job-seeking, or guiding others into the field, this episode offers a grounded, forward-looking view into how one organization is equipping the cybersecurity workforce for the work that matters now—and what’s coming next.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808">https://itspm.ag/isaca-96808</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Jamie Norton</strong>, Director Board of Directors, ISACA | <a href="https://www.linkedin.com/in/jamienorton/">https://www.linkedin.com/in/jamienorton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>jamie norton, sean martin, marco ciappelli, cybersecurity, certifications, workforce, skills, governance, community, careers, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20517703" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/11eb74e6-0c68-47d2-82ff-3b8ace0428ad/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=11eb74e6-0c68-47d2-82ff-3b8ace0428ad&amp;feed=kDNbmF_B"/>
      <itunes:title>From Certification to Confidence: The Future of Cybersecurity Starts with the First Job | A Brand Story with Jamie Norton from ISACA | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jamie Norton, ISACA</itunes:author>
      <itunes:duration>00:21:22</itunes:duration>
      <itunes:summary>Jamie Norton, Board Director at ISACA, shares how the organization is tackling the cybersecurity skills gap by focusing on career development, hands-on certifications, and community support for professionals at every stage. This episode explores how ISACA is aligning real-world workforce needs with practical solutions to help individuals enter, grow, and thrive in the field.</itunes:summary>
      <itunes:subtitle>Jamie Norton, Board Director at ISACA, shares how the organization is tackling the cybersecurity skills gap by focusing on career development, hands-on certifications, and community support for professionals at every stage. This episode explores how ISACA is aligning real-world workforce needs with practical solutions to help individuals enter, grow, and thrive in the field.</itunes:subtitle>
      <itunes:keywords>workforce, marketing podcast, marco ciappelli, sean martin, skills, cybersecurity, jamie norton, brand marketing, certifications, careers, community, brand story podcast, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>116</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e7b89463-93da-4210-9896-289628a7ef0f</guid>
      <title>Home Is Where the Threat Is: Protecting Executives in Their Personal Lives | A Brand Story with Chris Pierson from BlackCloak | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>When it comes to cybersecurity, corporate executives are often the most targeted individuals—but their greatest vulnerabilities may lie beyond the office walls. In this episode recorded live at RSAC Conference 2025, Dr. Chris Pierson, Founder and CEO of BlackCloak, joins hosts Sean Martin and Marco Ciappelli to unpack why digital executive protection is now a business necessity, not a luxury.</p><p>Dr. Pierson—a former two-time CISO, DHS cybersecurity advisor, and chief privacy officer—explains how BlackCloak addresses a long-ignored problem: the personal digital exposure of high-profile individuals and their families. From compromised home networks and identity theft to impersonation scams powered by deepfake technology, today’s cyber threats easily bypass corporate defenses by exploiting softer targets at home.</p><p>Digital Protection That Mirrors Physical Security</p><p>Just as companies rely on third-party providers for health insurance or physical executive protection, Dr. Pierson advocates for a dedicated, privacy-conscious solution for securing personal digital lives. BlackCloak functions as a concierge-style service, guiding individuals through essential steps like securing high-risk accounts, managing privacy settings, shrinking their attack surface, and implementing a modern, multifactor verification system to prevent impersonation attacks.</p><p>A Framework for Action</p><p>At RSAC, Dr. Pierson unveiled BlackCloak’s Digital Executive Protection Framework—a practical tool that includes 14 tenets and over 100 specific actions to assess and improve personal digital security maturity. The goal: help organizations prioritize what matters most. Instead of trying to secure every account or device equally, the framework focuses attention on high-value targets like banking credentials, communication platforms, and personal data exposed via data brokers.</p><p>From Deepfakes to Real-World Consequences</p><p>Pierson also highlights the alarming growth of AI-powered impersonation attacks. With 42% of surveyed CISOs reporting executive-targeted deepfake incidents, and financial losses climbing, companies must think differently. It’s not just about technology—it’s about trust, relationships, and verification at every level of communication.</p><p>This episode sheds light on how executive protection is evolving—and why your organization should consider extending its security strategy beyond the boardroom. To see how BlackCloak is redefining protection for the C-suite and their families, listen to the full episode.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/ ">https://www.linkedin.com/in/drchristopherpierson/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, chris pierson, cybersecurity, privacy, deepfakes, identity, executives, framework, protection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 1 May 2025 14:31:58 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, BlackCloak, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/home-is-where-the-threat-is-protecting-executives-in-their-personal-lives-a-brand-story-with-chris-pierson-from-blackcloak-an-on-location-rsac-conference-2025-brand-story-_7w24xkH</link>
      <content:encoded><![CDATA[<p>When it comes to cybersecurity, corporate executives are often the most targeted individuals—but their greatest vulnerabilities may lie beyond the office walls. In this episode recorded live at RSAC Conference 2025, Dr. Chris Pierson, Founder and CEO of BlackCloak, joins hosts Sean Martin and Marco Ciappelli to unpack why digital executive protection is now a business necessity, not a luxury.</p><p>Dr. Pierson—a former two-time CISO, DHS cybersecurity advisor, and chief privacy officer—explains how BlackCloak addresses a long-ignored problem: the personal digital exposure of high-profile individuals and their families. From compromised home networks and identity theft to impersonation scams powered by deepfake technology, today’s cyber threats easily bypass corporate defenses by exploiting softer targets at home.</p><p>Digital Protection That Mirrors Physical Security</p><p>Just as companies rely on third-party providers for health insurance or physical executive protection, Dr. Pierson advocates for a dedicated, privacy-conscious solution for securing personal digital lives. BlackCloak functions as a concierge-style service, guiding individuals through essential steps like securing high-risk accounts, managing privacy settings, shrinking their attack surface, and implementing a modern, multifactor verification system to prevent impersonation attacks.</p><p>A Framework for Action</p><p>At RSAC, Dr. Pierson unveiled BlackCloak’s Digital Executive Protection Framework—a practical tool that includes 14 tenets and over 100 specific actions to assess and improve personal digital security maturity. The goal: help organizations prioritize what matters most. Instead of trying to secure every account or device equally, the framework focuses attention on high-value targets like banking credentials, communication platforms, and personal data exposed via data brokers.</p><p>From Deepfakes to Real-World Consequences</p><p>Pierson also highlights the alarming growth of AI-powered impersonation attacks. With 42% of surveyed CISOs reporting executive-targeted deepfake incidents, and financial losses climbing, companies must think differently. It’s not just about technology—it’s about trust, relationships, and verification at every level of communication.</p><p>This episode sheds light on how executive protection is evolving—and why your organization should consider extending its security strategy beyond the boardroom. To see how BlackCloak is redefining protection for the C-suite and their families, listen to the full episode.</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Chris Pierson</strong>, Founder & CEO, BlackCloak | <a href="https://www.linkedin.com/in/drchristopherpierson/ ">https://www.linkedin.com/in/drchristopherpierson/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, marco ciappelli, chris pierson, cybersecurity, privacy, deepfakes, identity, executives, framework, protection, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23277909" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/3852ba39-c437-4139-b074-31bf78b2414a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=3852ba39-c437-4139-b074-31bf78b2414a&amp;feed=kDNbmF_B"/>
      <itunes:title>Home Is Where the Threat Is: Protecting Executives in Their Personal Lives | A Brand Story with Chris Pierson from BlackCloak | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, BlackCloak, Chris Pierson</itunes:author>
      <itunes:duration>00:24:14</itunes:duration>
      <itunes:summary>Corporate cybersecurity doesn’t stop at the office door—Dr. Chris Pierson, CEO of BlackCloak, reveals how personal digital exposure is becoming one of the biggest threats to executives and their families. In this episode, discover why protecting high-profile individuals at home requires a new framework, new thinking, and a trusted partner.</itunes:summary>
      <itunes:subtitle>Corporate cybersecurity doesn’t stop at the office door—Dr. Chris Pierson, CEO of BlackCloak, reveals how personal digital exposure is becoming one of the biggest threats to executives and their families. In this episode, discover why protecting high-profile individuals at home requires a new framework, new thinking, and a trusted partner.</itunes:subtitle>
      <itunes:keywords>chris pierson, marketing podcast, marco ciappelli, sean martin, framework, cybersecurity, deepfakes, brand marketing, executives, identity, privacy, brand story podcast, brand story, protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>115</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2c532165-2742-4973-86cc-e02d1cd098ef</guid>
      <title>From Overwhelmed to Informed: The Future of Threat Detection Isn’t Just Faster—It’s Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>In this On Location Brand Story episode, Sean Martin speaks with Hugh Njemanze, President and Founder at Anomali, who has been at the center of cybersecurity operations since the early days of SIEM. Known for his prior work at ArcSight and now leading Anomali, Hugh shares what’s driving a dramatic shift in how security teams access, analyze, and act on data.</p><p>Anomali’s latest offering—a native cloud-based next-generation SIEM—goes beyond traditional detection. It combines high-performance threat intelligence with agentic AI to deliver answers and take action in ways that legacy platforms simply cannot. Rather than querying data manually or relying on slow pipelines, the system dynamically spins up thousands of cloud resources to answer complex security questions in seconds.</p><p><strong>Agentic AI Meets Threat Intelligence</strong></p><p>Hugh walks through how agentic AI, purpose-built for security, breaks new ground. Unlike general-purpose models, Anomali’s AI operates within a secure, bounded dataset tailored to the customer’s environment. It can ingest a hundred-page threat briefing, extract references to actors and tactics, map those to the MITRE ATT&CK framework, and assess the organization’s specific exposure—all in moments. Then it goes a step further: evaluating past events, checking defenses, and recommending mitigations. This isn’t just contextual awareness—it’s operational intelligence at speed and scale.</p><p><strong>Making Security More Human-Centric</strong></p><p>One clear theme emerges: the democratization of security tools. With Anomali’s design, teams no longer need to rely on a few highly trained specialists. Broader teams can engage directly with the platform, reducing burnout and turnover, and increasing organizational resilience. Managers and security leaders now shift focus to prioritization, strategic decision-making, and meaningful business conversations—like aligning defenses to M&A activity or reporting to the board with clarity on risk.</p><p><strong>Real-World Results and Risk Insights</strong></p><p>Customers are already seeing measurable benefits: an 88% reduction in incidents and an increase in team-wide tool adoption. Anomali’s system doesn’t just detect—it correlates attack surface data with threat activity to highlight what’s both vulnerable and actively targeted. This enables targeted response, cost-effective scaling, and better use of resources.</p><p>Learn more about Anomali: <a href="https://itspm.ag/anomali-bdz393">https://itspm.ag/anomali-bdz393</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Hugh Njemanze</strong>, President and Founder at Anomali | <a href="https://www.linkedin.com/in/hugh-njemanze-603721/">https://www.linkedin.com/in/hugh-njemanze-603721/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Anomali: <a href="https://www.itspmagazine.com/directory/anomali">https://www.itspmagazine.com/directory/anomali</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, hugh njemanze, siem, cybersecurity, ai, threat intelligence, agentic ai, risk management, soc, cloud security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 20:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Hugh Njemanze, Anomali)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-overwhelmed-to-informed-the-future-of-threat-detection-isnt-just-fasterits-strategic-a-brand-story-with-hugh-njemanze-from-anomali-an-on-location-rsac-conference-2025-brand-story-mJjjQYk6</link>
      <content:encoded><![CDATA[<p>In this On Location Brand Story episode, Sean Martin speaks with Hugh Njemanze, President and Founder at Anomali, who has been at the center of cybersecurity operations since the early days of SIEM. Known for his prior work at ArcSight and now leading Anomali, Hugh shares what’s driving a dramatic shift in how security teams access, analyze, and act on data.</p><p>Anomali’s latest offering—a native cloud-based next-generation SIEM—goes beyond traditional detection. It combines high-performance threat intelligence with agentic AI to deliver answers and take action in ways that legacy platforms simply cannot. Rather than querying data manually or relying on slow pipelines, the system dynamically spins up thousands of cloud resources to answer complex security questions in seconds.</p><p><strong>Agentic AI Meets Threat Intelligence</strong></p><p>Hugh walks through how agentic AI, purpose-built for security, breaks new ground. Unlike general-purpose models, Anomali’s AI operates within a secure, bounded dataset tailored to the customer’s environment. It can ingest a hundred-page threat briefing, extract references to actors and tactics, map those to the MITRE ATT&CK framework, and assess the organization’s specific exposure—all in moments. Then it goes a step further: evaluating past events, checking defenses, and recommending mitigations. This isn’t just contextual awareness—it’s operational intelligence at speed and scale.</p><p><strong>Making Security More Human-Centric</strong></p><p>One clear theme emerges: the democratization of security tools. With Anomali’s design, teams no longer need to rely on a few highly trained specialists. Broader teams can engage directly with the platform, reducing burnout and turnover, and increasing organizational resilience. Managers and security leaders now shift focus to prioritization, strategic decision-making, and meaningful business conversations—like aligning defenses to M&A activity or reporting to the board with clarity on risk.</p><p><strong>Real-World Results and Risk Insights</strong></p><p>Customers are already seeing measurable benefits: an 88% reduction in incidents and an increase in team-wide tool adoption. Anomali’s system doesn’t just detect—it correlates attack surface data with threat activity to highlight what’s both vulnerable and actively targeted. This enables targeted response, cost-effective scaling, and better use of resources.</p><p>Learn more about Anomali: <a href="https://itspm.ag/anomali-bdz393">https://itspm.ag/anomali-bdz393</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Hugh Njemanze</strong>, President and Founder at Anomali | <a href="https://www.linkedin.com/in/hugh-njemanze-603721/">https://www.linkedin.com/in/hugh-njemanze-603721/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Anomali: <a href="https://www.itspmagazine.com/directory/anomali">https://www.itspmagazine.com/directory/anomali</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, hugh njemanze, siem, cybersecurity, ai, threat intelligence, agentic ai, risk management, soc, cloud security, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20317495" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/36051775-c7e6-445a-aba5-ba977be3908d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=36051775-c7e6-445a-aba5-ba977be3908d&amp;feed=kDNbmF_B"/>
      <itunes:title>From Overwhelmed to Informed: The Future of Threat Detection Isn’t Just Faster—It’s Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Hugh Njemanze, Anomali</itunes:author>
      <itunes:duration>00:21:09</itunes:duration>
      <itunes:summary>Hugh Njemanze, President and Founder at Anomali, reveals how a purpose-built, cloud-native SIEM infused with agentic AI is transforming how security teams detect threats, reduce incidents, and prioritize risk. From faster investigations to board-ready insights, this conversation challenges outdated assumptions and showcases what modern security operations can truly achieve.</itunes:summary>
      <itunes:subtitle>Hugh Njemanze, President and Founder at Anomali, reveals how a purpose-built, cloud-native SIEM infused with agentic AI is transforming how security teams detect threats, reduce incidents, and prioritize risk. From faster investigations to board-ready insights, this conversation challenges outdated assumptions and showcases what modern security operations can truly achieve.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, siem, sean martin, hugh njemanze, cybersecurity, risk management, threat intelligence, soc, cloud security, brand marketing, ai, agentic ai, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>114</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d819c759-4914-4533-bbb4-64c77627b876</guid>
      <title>When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.</p><p><strong>Cyber Resilience, Not Just Storage</strong></p><p>According to Herzog, today’s enterprise buyers—especially those in the Global Fortune 2000—aren’t just asking how to store data. They’re asking how to protect it when things go wrong. That’s why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.</p><p><strong>Built-In Defense and Blazing-Fast Recovery</strong></p><p>The integration isn’t cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.</p><p><strong>Real-World Scenarios, Real Business Outcomes</strong></p><p>Herzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.</p><p><strong>Simplified Operations, Smarter Security</strong></p><p>The message is clear: storage can’t be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Eric Herzog</strong>, Chief Marketing Officer, Infinidat | <a href="https://www.linkedin.com/in/erherzog/">https://www.linkedin.com/in/erherzog/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat">https://www.itspmagazine.com/directory/infinidat</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 19:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Eric Herzog, Infinidat)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/when-every-second-counts-building-cyber-resilience-through-a-smarter-approach-to-data-protection-a-brand-story-with-eric-herzog-from-infinidat-an-on-location-rsac-conference-2025-brand-story-o2D1b4LH</link>
      <content:encoded><![CDATA[<p>Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.</p><p><strong>Cyber Resilience, Not Just Storage</strong></p><p>According to Herzog, today’s enterprise buyers—especially those in the Global Fortune 2000—aren’t just asking how to store data. They’re asking how to protect it when things go wrong. That’s why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.</p><p><strong>Built-In Defense and Blazing-Fast Recovery</strong></p><p>The integration isn’t cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.</p><p><strong>Real-World Scenarios, Real Business Outcomes</strong></p><p>Herzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.</p><p><strong>Simplified Operations, Smarter Security</strong></p><p>The message is clear: storage can’t be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p><strong>Eric Herzog</strong>, Chief Marketing Officer, Infinidat | <a href="https://www.linkedin.com/in/erherzog/">https://www.linkedin.com/in/erherzog/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat">https://www.itspmagazine.com/directory/infinidat</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18324668" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5ab2eba1-49a4-4f78-ae14-2ca0ba6ad1e2/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5ab2eba1-49a4-4f78-ae14-2ca0ba6ad1e2&amp;feed=kDNbmF_B"/>
      <itunes:title>When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Eric Herzog, Infinidat</itunes:author>
      <itunes:duration>00:19:05</itunes:duration>
      <itunes:summary>In this episode, Infinidat CMO Eric Herzog breaks down how storage can be a frontline player in cybersecurity—automating threat response, integrating with SOC tools, and guaranteeing ultra-fast data recovery. If you’re still treating storage as passive infrastructure, this conversation will change your perspective.</itunes:summary>
      <itunes:subtitle>In this episode, Infinidat CMO Eric Herzog breaks down how storage can be a frontline player in cybersecurity—automating threat response, integrating with SOC tools, and guaranteeing ultra-fast data recovery. If you’re still treating storage as passive infrastructure, this conversation will change your perspective.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, automation, storage, cybersecurity, eric herzog, resilience, soc, enterprise, ransomware, brand marketing, brand story podcast, recovery, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>113</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b6136d2-88d4-41e8-b58d-94eeac77aee9</guid>
      <title>What Endpoint Security Isn’t Catching: Why Network Visibility Still Matters | A Brand Story with Brian Dye from Corelight | An On Location RSAC Conference 2025 Brand Story</title>
      <description><![CDATA[<p>At RSAC Conference 2025, Sean Martin catches up with Brian Dye, CEO of Corelight, to explore a recurring truth in cybersecurity: attackers adapt, and defenders must follow suit. In this episode, Dye lays out why traditional perimeter defenses and endpoint controls alone are no longer sufficient—and why it’s time for security teams to look back toward the network for answers.</p><p>Beyond the Perimeter: Visibility as a Force Multiplier</p><p>According to Dye, many organizations are still relying on security architectures that were top-of-the-line a decade ago. But attackers have already moved on. They’re bypassing endpoint detection and response (EDR) tools, exploiting unmanaged devices, IoT, and edge vulnerabilities. What’s left exposed is the network itself—and that’s where Corelight positions itself: providing what Dye calls “ground truth” through network-based visibility.</p><p>Rather than rearchitecting environments or pushing intrusive solutions, Corelight integrates passively through out-of-line methods like packet brokers or traffic mirroring. The goal? Rich, contextual, retrospective visibility—without disrupting the network. This capability has proven essential for responding to advanced threats, including lateral movement and ransomware campaigns where knowing exactly what happened and when can mean the difference between paying a ransom or proving there’s no real damage.</p><p>Three Layers of Network Insight</p><p>Dye outlines a layered approach to detection:</p><p>1. Baseline Network Activity – High-fidelity summaries of what’s happening.</p><p>2. Raw Detections – Behavioral rules, signatures, and machine learning.</p><p>3. Anomaly Detection – Identifying “new and unusual” activity with clustering math that filters out noise and highlights what truly matters.</p><p>This model supports teams who need to correlate signals across endpoints, identities, and cloud environments—especially as AI-driven operations expand the attack surface with non-human behavior patterns.</p><p>The Metrics That Matter</p><p>Dye points to three critical success metrics for teams:</p><p>• Visibility coverage over time.</p><p>• MITRE ATT&CK coverage, especially around lateral movement.</p><p>• The percentage of unresolved cases—those embarrassing unknowns that drain time and confidence.</p><p>As Dye shares, organizations that prioritize network-level visibility not only reduce uncertainty, but also strengthen every other layer of their detection and response strategy.</p><p>Learn more about Corelight: <a href="https://itspm.ag/coreligh-954270">https://itspm.ag/coreligh-954270</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p>Brian Dye, Chief Executive Officer, Corelight | <a href="https://www.linkedin.com/in/brdye/">https://www.linkedin.com/in/brdye/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Corelight: <a href="https://www.itspmagazine.com/directory/corelight">https://www.itspmagazine.com/directory/corelight</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, brian dye, network, visibility, ransomware, detection, cybersecurity, soc, anomalies, baselining, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 30 Apr 2025 17:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Dye, Corelight)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/what-endpoint-security-isnt-catching-why-network-visibility-still-matters-a-brand-story-with-brian-dye-from-corelight-an-on-location-rsac-conference-2025-brand-story-4egkuzfb-AsRtHm45</link>
      <content:encoded><![CDATA[<p>At RSAC Conference 2025, Sean Martin catches up with Brian Dye, CEO of Corelight, to explore a recurring truth in cybersecurity: attackers adapt, and defenders must follow suit. In this episode, Dye lays out why traditional perimeter defenses and endpoint controls alone are no longer sufficient—and why it’s time for security teams to look back toward the network for answers.</p><p>Beyond the Perimeter: Visibility as a Force Multiplier</p><p>According to Dye, many organizations are still relying on security architectures that were top-of-the-line a decade ago. But attackers have already moved on. They’re bypassing endpoint detection and response (EDR) tools, exploiting unmanaged devices, IoT, and edge vulnerabilities. What’s left exposed is the network itself—and that’s where Corelight positions itself: providing what Dye calls “ground truth” through network-based visibility.</p><p>Rather than rearchitecting environments or pushing intrusive solutions, Corelight integrates passively through out-of-line methods like packet brokers or traffic mirroring. The goal? Rich, contextual, retrospective visibility—without disrupting the network. This capability has proven essential for responding to advanced threats, including lateral movement and ransomware campaigns where knowing exactly what happened and when can mean the difference between paying a ransom or proving there’s no real damage.</p><p>Three Layers of Network Insight</p><p>Dye outlines a layered approach to detection:</p><p>1. Baseline Network Activity – High-fidelity summaries of what’s happening.</p><p>2. Raw Detections – Behavioral rules, signatures, and machine learning.</p><p>3. Anomaly Detection – Identifying “new and unusual” activity with clustering math that filters out noise and highlights what truly matters.</p><p>This model supports teams who need to correlate signals across endpoints, identities, and cloud environments—especially as AI-driven operations expand the attack surface with non-human behavior patterns.</p><p>The Metrics That Matter</p><p>Dye points to three critical success metrics for teams:</p><p>• Visibility coverage over time.</p><p>• MITRE ATT&CK coverage, especially around lateral movement.</p><p>• The percentage of unresolved cases—those embarrassing unknowns that drain time and confidence.</p><p>As Dye shares, organizations that prioritize network-level visibility not only reduce uncertainty, but also strengthen every other layer of their detection and response strategy.</p><p>Learn more about Corelight: <a href="https://itspm.ag/coreligh-954270">https://itspm.ag/coreligh-954270</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: </strong></p><p>Brian Dye, Chief Executive Officer, Corelight | <a href="https://www.linkedin.com/in/brdye/">https://www.linkedin.com/in/brdye/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Corelight: <a href="https://www.itspmagazine.com/directory/corelight">https://www.itspmagazine.com/directory/corelight</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>sean martin, brian dye, network, visibility, ransomware, detection, cybersecurity, soc, anomalies, baselining, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18073905" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0fa2b57c-ba27-4e35-802c-05ac3870958e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0fa2b57c-ba27-4e35-802c-05ac3870958e&amp;feed=kDNbmF_B"/>
      <itunes:title>What Endpoint Security Isn’t Catching: Why Network Visibility Still Matters | A Brand Story with Brian Dye from Corelight | An On Location RSAC Conference 2025 Brand Story</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brian Dye, Corelight</itunes:author>
      <itunes:duration>00:18:49</itunes:duration>
      <itunes:summary>In this On Location Brand Story episode, Corelight CEO Brian Dye explains why network visibility is becoming the most critical—and often overlooked—layer in modern cybersecurity defense. He breaks down how organizations can detect what endpoint tools miss, measure success more effectively, and avoid costly blind spots during attacks like ransomware.</itunes:summary>
      <itunes:subtitle>In this On Location Brand Story episode, Corelight CEO Brian Dye explains why network visibility is becoming the most critical—and often overlooked—layer in modern cybersecurity defense. He breaks down how organizations can detect what endpoint tools miss, measure success more effectively, and avoid costly blind spots during attacks like ransomware.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, network, cybersecurity, detection, brian dye, soc, ransomware, brand marketing, anomalies, visibility, baselining, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>112</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6c28cd44-1190-437b-b60b-e0f6bf6503a5</guid>
      <title>Rethinking Container Security from the Kernel Up | A Brand Story with Emily Long and Kaylin Trychon from Edera | An RSAC Conference 2025 Pre-Event Conversation</title>
      <description><![CDATA[<p>In this pre-event Brand Story On Location conversation recorded live from RSAC Conference 2025, Emily Long, Co-Founder and CEO of Edera, and Kaylin Trychon, Head of Communications, introduce a new approach to container security—one that doesn’t just patch problems, but prevents them entirely.</p><p>Edera, just over a year old, is focused on reimagining how containers are built and run by taking a hardware-up approach rather than layering security on from the top down. Their system eliminates lateral movement and living-off-the-land attacks from the outset by operating below the kernel, resulting in simplified, proactive protection across cloud and on-premises environments.</p><p>What’s notable is not just the technology, but the philosophy behind it. As Emily explains, organizations have grown accustomed to the limitations of containerization and the technical debt that comes with it. Edera challenges this assumption by revisiting foundational virtualization principles, drawing inspiration from technologies like Xen hypervisors, and applying them in modern ways to support today’s use cases, including AI and GPU-driven environments.</p><p>Kaylin adds that this design-first approach means security isn’t bolted on later—it’s embedded from the start. And yet, it’s done without disruption. Teams don’t need to scrap what they have or undertake complex rebuilds. The system works with existing environments to reduce complexity and ease compliance burdens like FedRAMP.</p><p>For those grappling with infrastructure pain points—whether you’re in product security, DevOps, or infrastructure—this conversation is worth a listen. Edera’s vision is bold, but their delivery is practical. And yes, you’ll find them roaming the show floor in bold pink—“mobile booth,” zero fluff.</p><p>Listen to the episode to hear what it really means to be “secure by design” in the age of AI and container sprawl.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Kaylin Trychon</strong>, Head of Communications, Edera | <a href="https://www.linkedin.com/in/kaylintrychon/">https://www.linkedin.com/in/kaylintrychon/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>emily long, kaylin trychon, sean martin, marco ciappelli, containers, virtualization, cloud, infrastructure, security, fedramp, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 29 Apr 2025 20:37:55 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Edera, Kaylin Trychon, Emily Long)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/rethinking-container-security-from-the-kernel-up-a-brand-story-with-emily-long-and-kaylin-trychon-from-edera-an-rsac-conference-2025-pre-event-conversation-zyTiS0dY</link>
      <content:encoded><![CDATA[<p>In this pre-event Brand Story On Location conversation recorded live from RSAC Conference 2025, Emily Long, Co-Founder and CEO of Edera, and Kaylin Trychon, Head of Communications, introduce a new approach to container security—one that doesn’t just patch problems, but prevents them entirely.</p><p>Edera, just over a year old, is focused on reimagining how containers are built and run by taking a hardware-up approach rather than layering security on from the top down. Their system eliminates lateral movement and living-off-the-land attacks from the outset by operating below the kernel, resulting in simplified, proactive protection across cloud and on-premises environments.</p><p>What’s notable is not just the technology, but the philosophy behind it. As Emily explains, organizations have grown accustomed to the limitations of containerization and the technical debt that comes with it. Edera challenges this assumption by revisiting foundational virtualization principles, drawing inspiration from technologies like Xen hypervisors, and applying them in modern ways to support today’s use cases, including AI and GPU-driven environments.</p><p>Kaylin adds that this design-first approach means security isn’t bolted on later—it’s embedded from the start. And yet, it’s done without disruption. Teams don’t need to scrap what they have or undertake complex rebuilds. The system works with existing environments to reduce complexity and ease compliance burdens like FedRAMP.</p><p>For those grappling with infrastructure pain points—whether you’re in product security, DevOps, or infrastructure—this conversation is worth a listen. Edera’s vision is bold, but their delivery is practical. And yes, you’ll find them roaming the show floor in bold pink—“mobile booth,” zero fluff.</p><p>Listen to the episode to hear what it really means to be “secure by design” in the age of AI and container sprawl.</p><p>Learn more about Edera: <a href="https://itspm.ag/edera-434868">https://itspm.ag/edera-434868</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Emily Long</strong>, Founder and CEO, Edera | <a href="https://www.linkedin.com/in/emily-long-7a194b4/">https://www.linkedin.com/in/emily-long-7a194b4/</a></p><p><strong>Kaylin Trychon</strong>, Head of Communications, Edera | <a href="https://www.linkedin.com/in/kaylintrychon/">https://www.linkedin.com/in/kaylintrychon/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Edera: <a href="https://www.itspmagazine.com/directory/edera">https://www.itspmagazine.com/directory/edera</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsac25">https://www.itspmagazine.com/rsac25</a></p><p>______________________</p><p>Keywords:</p><p>emily long, kaylin trychon, sean martin, marco ciappelli, containers, virtualization, cloud, infrastructure, security, fedramp, brand story, brand marketing, marketing podcast, brand story podcast</p><p>______________________</p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? Let Us Know 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="11030925" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a68b89ef-b62e-4789-812e-8204ae791035/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a68b89ef-b62e-4789-812e-8204ae791035&amp;feed=kDNbmF_B"/>
      <itunes:title>Rethinking Container Security from the Kernel Up | A Brand Story with Emily Long and Kaylin Trychon from Edera | An RSAC Conference 2025 Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Edera, Kaylin Trychon, Emily Long</itunes:author>
      <itunes:duration>00:11:29</itunes:duration>
      <itunes:summary>What if container security didn’t just detect problems—but stopped them before they ever happened? In this episode, Edera’s Emily Long and Kaylin Trychon share how they’re flipping the traditional container model by building from the hardware up to deliver true security by design.</itunes:summary>
      <itunes:subtitle>What if container security didn’t just detect problems—but stopped them before they ever happened? In this episode, Edera’s Emily Long and Kaylin Trychon share how they’re flipping the traditional container model by building from the hardware up to deliver true security by design.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, containers, emily long, cybersecurity, kaylin trychon, virtualization, fedramp, cloud, security, brand marketing, infrastructure, brand story podcast, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>111</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fb42c9ec-e498-4aad-a443-d8ce48f06638</guid>
      <title>From Backup Challenges to Zero Trust Data Resilience: Meet Object First at RSAC 2025 | A Brand Story With Sterling Wilson from Object First | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>When you feel the energy of RSAC week starting to build, you know it’s going to be a memorable one. Conversations, collaborations, learning, connecting—it’s what this community thrives on. And ahead of the big week, we had a chance to catch up with Sterling Wilson, Field CTO at Object First, to talk about their vision for data resilience and why backup security can’t be an afterthought anymore.</p><p>Sterling’s career path reads like a masterclass in data protection. After working deep in the trenches as a Microsoft and virtualization architect for both government and private sectors, he transitioned into the vendor space—eventually joining Veeam Software, where he became immersed in the world of backups and data resilience. That journey eventually brought him to Object First, and it’s clear that passion for simplifying security while strengthening infrastructure hasn’t faded.</p><p>One of the major shifts we talked about is how the world of cybersecurity is now fundamentally interconnected. Sterling emphasized what we’ve said many times ourselves: it’s no longer about isolated tools or technologies. It’s about how everything fits together. And at the center of it all? Data.</p><p>Object First is hitting RSAC with a mission: making backup security radically simple without compromising strength. Their “Ootbi”—short for <i>Out Of The Box Immutability</i>—makes protecting backup data straightforward, automatic, and resilient. No special configuration needed. No extra security knowledge required. Just plug it in and let the design do the work.</p><p>We loved hearing how Object First applies core Zero Trust principles—like assuming breach and strict segmentation—not to networks or apps, but directly to backup storage. It’s a philosophy Sterling calls “Zero Trust Data Resilience.” Especially in a world where admins are juggling multiple roles, budgets are tighter, and attacks are getting smarter (yes, AI is helping the bad actors too), reducing complexity while increasing protection is a game-changer.</p><p>Sterling also shared a hard truth that many organizations are realizing too late: a lot of backup storage solutions weren’t built for today’s threat landscape. They weren’t designed with security-first thinking. Object First aims to fix that by focusing on simplicity, immutability, and speed—not just in backup, but in recovery when it matters most.</p><p>If you’re heading to RSAC 2025, make sure you swing by Booth S260 to check out Object First in person. There’ll be demos, trivia, swag, and a few surprise announcements. Plus, Sterling will be speaking at the Insights Theater (South Expo Booth 2151) on April 30 at 10:30 AM. He’ll dive deeper into what Zero Trust Data Resilience really means—and why it’s time to rethink how we secure our most valuable digital assets.</p><p>And if you can’t make it to San Francisco? Don’t worry—we’ll be recording another conversation with Sterling <i>on location</i> during the conference, going even deeper into these critical topics. Be sure to follow our On Location coverage to stay connected with everything happening during RSAC 2025.</p><p>The future of security isn’t just about new firewalls, AI-driven analytics, or policy updates. It’s about protecting what matters most—our data—with approaches that are built for the challenges of today, not yesterday. And with companies like Object First pushing the boundaries, we think the conversation around data resilience is about to get a whole lot louder.</p><p><strong>Guests:</strong><br /><br /><a href="https://www.linkedin.com/in/sterling-wilson/overlay/about-this-profile/">Sterling Wilson</a> | Field CTO | Data Resilience Strategist | ZTDR Advocate<br /><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/sterling-wilson-007" target="_blank">https://www.linkedin.com/in/sterling-wilson-007</a><br /><br /><strong>______________________________</strong><br /><br /><strong>Resources:</strong><br /><br />Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a><br /><br />Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first" target="_blank">https://www.itspmagazine.com/directory/object-first</a></p><p>Immutable Storage for Everyone.<br />Ransomware-proof and immutable out-of-the-box, Ootbi delivers secure, simple, and powerful backup storage: <a href="https://itspm.ag/objectzlju" target="_blank">https://itspm.ag/objectzlju</a><br /><br />____________________________</p><p><strong>Keywords:</strong></p><p>RSAC 2025, backup security, data resilience, immutable storage, zero trust, object first, ootbi, zero trust data resilience, cybersecurity conference, backup protection, Veeam, ransomware, disaster recovery, storage security, simple cybersecurity, RSAC, securing backups, infosec, infosecurity<br /><br />_______________________</p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 28 Apr 2025 05:15:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-backup-challenges-to-zero-trust-data-resilience-meet-object-first-at-rsac-2025-a-brand-story-with-sterling-wilson-from-object-first-a-rsac-conference-2025-brand-story-pre-event-conversation-YvNAvPbF</link>
      <content:encoded><![CDATA[<p>When you feel the energy of RSAC week starting to build, you know it’s going to be a memorable one. Conversations, collaborations, learning, connecting—it’s what this community thrives on. And ahead of the big week, we had a chance to catch up with Sterling Wilson, Field CTO at Object First, to talk about their vision for data resilience and why backup security can’t be an afterthought anymore.</p><p>Sterling’s career path reads like a masterclass in data protection. After working deep in the trenches as a Microsoft and virtualization architect for both government and private sectors, he transitioned into the vendor space—eventually joining Veeam Software, where he became immersed in the world of backups and data resilience. That journey eventually brought him to Object First, and it’s clear that passion for simplifying security while strengthening infrastructure hasn’t faded.</p><p>One of the major shifts we talked about is how the world of cybersecurity is now fundamentally interconnected. Sterling emphasized what we’ve said many times ourselves: it’s no longer about isolated tools or technologies. It’s about how everything fits together. And at the center of it all? Data.</p><p>Object First is hitting RSAC with a mission: making backup security radically simple without compromising strength. Their “Ootbi”—short for <i>Out Of The Box Immutability</i>—makes protecting backup data straightforward, automatic, and resilient. No special configuration needed. No extra security knowledge required. Just plug it in and let the design do the work.</p><p>We loved hearing how Object First applies core Zero Trust principles—like assuming breach and strict segmentation—not to networks or apps, but directly to backup storage. It’s a philosophy Sterling calls “Zero Trust Data Resilience.” Especially in a world where admins are juggling multiple roles, budgets are tighter, and attacks are getting smarter (yes, AI is helping the bad actors too), reducing complexity while increasing protection is a game-changer.</p><p>Sterling also shared a hard truth that many organizations are realizing too late: a lot of backup storage solutions weren’t built for today’s threat landscape. They weren’t designed with security-first thinking. Object First aims to fix that by focusing on simplicity, immutability, and speed—not just in backup, but in recovery when it matters most.</p><p>If you’re heading to RSAC 2025, make sure you swing by Booth S260 to check out Object First in person. There’ll be demos, trivia, swag, and a few surprise announcements. Plus, Sterling will be speaking at the Insights Theater (South Expo Booth 2151) on April 30 at 10:30 AM. He’ll dive deeper into what Zero Trust Data Resilience really means—and why it’s time to rethink how we secure our most valuable digital assets.</p><p>And if you can’t make it to San Francisco? Don’t worry—we’ll be recording another conversation with Sterling <i>on location</i> during the conference, going even deeper into these critical topics. Be sure to follow our On Location coverage to stay connected with everything happening during RSAC 2025.</p><p>The future of security isn’t just about new firewalls, AI-driven analytics, or policy updates. It’s about protecting what matters most—our data—with approaches that are built for the challenges of today, not yesterday. And with companies like Object First pushing the boundaries, we think the conversation around data resilience is about to get a whole lot louder.</p><p><strong>Guests:</strong><br /><br /><a href="https://www.linkedin.com/in/sterling-wilson/overlay/about-this-profile/">Sterling Wilson</a> | Field CTO | Data Resilience Strategist | ZTDR Advocate<br /><strong>LinkedIn:</strong> <a href="https://www.linkedin.com/in/sterling-wilson-007" target="_blank">https://www.linkedin.com/in/sterling-wilson-007</a><br /><br /><strong>______________________________</strong><br /><br /><strong>Resources:</strong><br /><br />Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl" target="_blank">https://itspm.ag/object-first-2gjl</a><br /><br />Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first" target="_blank">https://www.itspmagazine.com/directory/object-first</a></p><p>Immutable Storage for Everyone.<br />Ransomware-proof and immutable out-of-the-box, Ootbi delivers secure, simple, and powerful backup storage: <a href="https://itspm.ag/objectzlju" target="_blank">https://itspm.ag/objectzlju</a><br /><br />____________________________</p><p><strong>Keywords:</strong></p><p>RSAC 2025, backup security, data resilience, immutable storage, zero trust, object first, ootbi, zero trust data resilience, cybersecurity conference, backup protection, Veeam, ransomware, disaster recovery, storage security, simple cybersecurity, RSAC, securing backups, infosec, infosecurity<br /><br />_______________________</p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16886482" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/70871b75-a324-4a87-956c-1f6ebf391b9c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=70871b75-a324-4a87-956c-1f6ebf391b9c&amp;feed=kDNbmF_B"/>
      <itunes:title>From Backup Challenges to Zero Trust Data Resilience: Meet Object First at RSAC 2025 | A Brand Story With Sterling Wilson from Object First | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sterling Wilson, Object First</itunes:author>
      <itunes:duration>00:17:35</itunes:duration>
      <itunes:summary>Ahead of RSAC 2025, we chat with Sterling Wilson from Object First about immutability, resilience, and simplifying security for backups. Find out why protecting your data is no longer just a backend issue—it’s a frontline defense.
</itunes:summary>
      <itunes:subtitle>Ahead of RSAC 2025, we chat with Sterling Wilson from Object First about immutability, resilience, and simplifying security for backups. Find out why protecting your data is no longer just a backend issue—it’s a frontline defense.
</itunes:subtitle>
      <itunes:keywords>ootbi, marco ciappelli, rsac 2025, sean martin, rsa, skills, education, infosec, infosecurity, cybersecurity, third-party, immutable storage, data resilience, rsac, cybersecurity conference, storage security, zero trust data resilience, securing backups, veeam, simple cybersecurity, ransomware, backup protection, disaster recovery, object first, zero trust, backup security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>110</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d9e7806a-0568-4353-a092-e7673a24da2d</guid>
      <title>No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs | A White Knight Labs Brand Story With Co-Founders John Stigerwalt And Greg Hatcher</title>
      <description><![CDATA[<p>We’ve been in enough conversations to know when something clicks. This one did — and it did from the very first moment.</p><p>In our debut Brand Story with <strong>White Knight Labs</strong>, we sat down with co-founders <strong>John Stigerwalt</strong> and <strong>Greg Hatcher</strong>, and what unfolded was more than a company intro — it was a behind-the-scenes look at what offensive security <i>should</i> be.</p><p>John’s journey is the kind that earns your respect quickly: he started at the help desk and worked his way to CISO, before pivoting into red teaming and co-founding WKL. Greg’s path was more unconventional — from orchestral musician to Green Beret to cybersecurity leader. Two very different stories, but a shared philosophy: learn by doing, adapt without a manual, and never take the easy route when something meaningful is on the table.</p><p>That mindset now defines how White Knight Labs works with clients. They don’t sell cookie-cutter pen tests. Instead, they ask the right question up front: <strong>How does your business make money?</strong> Because if you can answer that, you can identify what a real-world attacker would go after. Then they simulate it — not in theory, but in practice.</p><p>Their <strong>ransomware simulation service</strong> is a perfect example. They don’t just show up with a scanner. They emulate modern adversaries using Cobalt Strike, bypassing endpoint defenses with in-house payloads, encrypting and exfiltrating data like it’s just another Tuesday. Most clients fail the test — not because they’re careless, but because <i>most simulations aren’t this real</i>.</p><p>And that’s the point.</p><p>White Knight Labs isn’t here to help companies check a box. They’re here to expose the gaps and raise the bar — because real threats don’t play fair, and security shouldn’t pretend they do.</p><p>What makes them different is what they <i>don’t</i> do. They’re not an all-in-one shop, and they’re proud of that. They won’t touch IR for major breaches — they’ve got partners for that. They only resell hardware and software they’ve personally vetted. That honesty builds credibility. That kind of focus builds trust.</p><p>Their <strong>training programs</strong> are just as intense. Between live DEF CON courses and their online platform, they’re giving both new and experienced professionals a chance to train the way they operate: no shortcuts, no watered-down certs, just hard-earned skills that translate into real-world readiness.</p><p>Pass their ODPC certification, and you’ll probably get a call — not because they need to check a hiring box, but because it proves you’re serious. And if you can write loaders that bypass real defenses? You’re speaking their language.</p><p>This first conversation with John and Greg reminded us why we started this series in the first place. It’s not just about product features or service offerings — it’s about people who live and breathe what they do, and who bring that passion into every test, every client call, and every training they offer.</p><p>We’ve got more stories with them on the way. But if this first one is any sign of what’s to come, we’re in for something special.</p><p>⸻</p><p>Learn more about White Knight Labs: </p><p><strong>Guests:</strong></p><p><strong>John Stigerwalt</strong> | Founder at White Knight Labs | Red Team Operations Leader | <a href="https://www.linkedin.com/in/john-stigerwalt-90a9b4110/" target="_blank">https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p><p><strong>Greg Hatcher</strong> | Founder at White Knight Labs | SOF veteran | Red Team | <a href="https://www.linkedin.com/in/gregoryhatcher2/" target="_blank">https://www.linkedin.com/in/gregoryhatcher2/</a></p><p><strong>White Knight Labs Website</strong> | <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p><strong>______________________</strong></p><p>Keywords: penetration testing, red team, ransomware simulation, offensive security, EDR bypass, cybersecurity training, White Knight Labs, advanced persistent threat, cybersecurity startup, DEF CON training, security partnerships, cybersecurity services</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the White Knight Labs Website to learn more: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p>Learn more and catch more stories from White Knight Labs on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/white-knight-labs" target="_blank">https://www.itspmagazine.com/directory/white-knight-labs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 25 Apr 2025 00:25:45 +0000</pubDate>
      <author>contact@itspmagazine.com (Marco Ciappelli, ITSPmagazine, Sean Martin, John Stigerwalt, Greg Hatcher)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/no-manuals-no-shortcuts-inside-the-offensive-security-mindset-at-white-knight-labs-a-white-knight-labs-brand-story-with-co-founders-john-stigerwalt-and-greg-hatcher-OHsX8DYM</link>
      <content:encoded><![CDATA[<p>We’ve been in enough conversations to know when something clicks. This one did — and it did from the very first moment.</p><p>In our debut Brand Story with <strong>White Knight Labs</strong>, we sat down with co-founders <strong>John Stigerwalt</strong> and <strong>Greg Hatcher</strong>, and what unfolded was more than a company intro — it was a behind-the-scenes look at what offensive security <i>should</i> be.</p><p>John’s journey is the kind that earns your respect quickly: he started at the help desk and worked his way to CISO, before pivoting into red teaming and co-founding WKL. Greg’s path was more unconventional — from orchestral musician to Green Beret to cybersecurity leader. Two very different stories, but a shared philosophy: learn by doing, adapt without a manual, and never take the easy route when something meaningful is on the table.</p><p>That mindset now defines how White Knight Labs works with clients. They don’t sell cookie-cutter pen tests. Instead, they ask the right question up front: <strong>How does your business make money?</strong> Because if you can answer that, you can identify what a real-world attacker would go after. Then they simulate it — not in theory, but in practice.</p><p>Their <strong>ransomware simulation service</strong> is a perfect example. They don’t just show up with a scanner. They emulate modern adversaries using Cobalt Strike, bypassing endpoint defenses with in-house payloads, encrypting and exfiltrating data like it’s just another Tuesday. Most clients fail the test — not because they’re careless, but because <i>most simulations aren’t this real</i>.</p><p>And that’s the point.</p><p>White Knight Labs isn’t here to help companies check a box. They’re here to expose the gaps and raise the bar — because real threats don’t play fair, and security shouldn’t pretend they do.</p><p>What makes them different is what they <i>don’t</i> do. They’re not an all-in-one shop, and they’re proud of that. They won’t touch IR for major breaches — they’ve got partners for that. They only resell hardware and software they’ve personally vetted. That honesty builds credibility. That kind of focus builds trust.</p><p>Their <strong>training programs</strong> are just as intense. Between live DEF CON courses and their online platform, they’re giving both new and experienced professionals a chance to train the way they operate: no shortcuts, no watered-down certs, just hard-earned skills that translate into real-world readiness.</p><p>Pass their ODPC certification, and you’ll probably get a call — not because they need to check a hiring box, but because it proves you’re serious. And if you can write loaders that bypass real defenses? You’re speaking their language.</p><p>This first conversation with John and Greg reminded us why we started this series in the first place. It’s not just about product features or service offerings — it’s about people who live and breathe what they do, and who bring that passion into every test, every client call, and every training they offer.</p><p>We’ve got more stories with them on the way. But if this first one is any sign of what’s to come, we’re in for something special.</p><p>⸻</p><p>Learn more about White Knight Labs: </p><p><strong>Guests:</strong></p><p><strong>John Stigerwalt</strong> | Founder at White Knight Labs | Red Team Operations Leader | <a href="https://www.linkedin.com/in/john-stigerwalt-90a9b4110/" target="_blank">https://www.linkedin.com/in/john-stigerwalt-90a9b4110/</a></p><p><strong>Greg Hatcher</strong> | Founder at White Knight Labs | SOF veteran | Red Team | <a href="https://www.linkedin.com/in/gregoryhatcher2/" target="_blank">https://www.linkedin.com/in/gregoryhatcher2/</a></p><p><strong>White Knight Labs Website</strong> | <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p><strong>______________________</strong></p><p>Keywords: penetration testing, red team, ransomware simulation, offensive security, EDR bypass, cybersecurity training, White Knight Labs, advanced persistent threat, cybersecurity startup, DEF CON training, security partnerships, cybersecurity services</p><p><strong>______________________</strong></p><p><strong>Resources</strong></p><p>Visit the White Knight Labs Website to learn more: <a href="https://itspm.ag/white-knight-labs-vukr" target="_blank">https://itspm.ag/white-knight-labs-vukr</a></p><p>Learn more and catch more stories from White Knight Labs on ITSPmagazine: <a href="https://www.itspmagazine.com/directory/white-knight-labs" target="_blank">https://www.itspmagazine.com/directory/white-knight-labs</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="45992755" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a50dbf8d-9606-4753-8eed-7e2b82544808/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a50dbf8d-9606-4753-8eed-7e2b82544808&amp;feed=kDNbmF_B"/>
      <itunes:title>No Manuals, No Shortcuts: Inside the Offensive Security Mindset at White Knight Labs | A White Knight Labs Brand Story With Co-Founders John Stigerwalt And Greg Hatcher</itunes:title>
      <itunes:author>Marco Ciappelli, ITSPmagazine, Sean Martin, John Stigerwalt, Greg Hatcher</itunes:author>
      <itunes:duration>00:47:54</itunes:duration>
      <itunes:summary>Some companies follow the rules. Others write their own playbook. In our first brand story with White Knight Labs, we met two security leaders who’ve lived every angle of cyber—from army ops and red teams to startup chaos and real-world breaches. Forget the checkbox test—this is passion, precision, and purpose in the offensive security world.
</itunes:summary>
      <itunes:subtitle>Some companies follow the rules. Others write their own playbook. In our first brand story with White Knight Labs, we met two security leaders who’ve lived every angle of cyber—from army ops and red teams to startup chaos and real-world breaches. Forget the checkbox test—this is passion, precision, and purpose in the offensive security world.
</itunes:subtitle>
      <itunes:keywords>advanced persistent threat, white knight labs, cybersecurity startup, infosec, edr bypass, cybersecurity, offensive security, cybersecurity services, penetration testing, ransomware simulation, def con training, security partnerships, cybersecurity training, red team</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>109</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6252e978-16a2-40f4-ad55-4efdb61a50d5</guid>
      <title>Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo’Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.</p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she’s co-presenting with Dooshima Dabo’Adzuana: <i>Third-Party AI: What Are You Really Buying?</i> Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.</p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.</p><p>Alongside the AI focus, visitors to the booth can explore results from ISACA’s Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.</p><p>The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.</p><p>This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.</p><p>Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p><strong>Guests:</strong></p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter | <a href="https://www.linkedin.com/in/carmichaelmary/" target="_blank">https://www.linkedin.com/in/carmichaelmary/</a></p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter | <a href="https://www.linkedin.com/in/dooshima-dabo-adzuana/" target="_blank">https://www.linkedin.com/in/dooshima-dabo-adzuana/</a></p><p><strong>Resources</strong></p><p>Mary and Dooshima's session at RSA Conference: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq</a></p><p>Learn more about ISACA's AI resources: <a href="https://www.isaca.org/resources/artificial-intelligence">https://www.isaca.org/resources/artificial-intelligence</a></p><p>Learn more about ISACA's credentials: <a href="https://www.isaca.org/credentialing">https://www.isaca.org/credentialing</a></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca" target="_blank">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Apr 2025 05:32:12 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Carmichael, Dooshima Dabo’Adzuana)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/community-certification-and-the-questions-that-matter-most-in-quantum-readiness-and-ai-governance-a-brand-story-with-mary-carmichael-and-dooshima-daboadzuana-from-isaca-a-rsac-conference-2025-brand-story-pre-event-conversation-MIBhWDu8</link>
      <content:encoded><![CDATA[<p>As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.</p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she’s co-presenting with Dooshima Dabo’Adzuana: <i>Third-Party AI: What Are You Really Buying?</i> Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.</p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.</p><p>Alongside the AI focus, visitors to the booth can explore results from ISACA’s Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.</p><p>The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.</p><p>This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.</p><p>Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.</p><p>Learn more about ISACA: <a href="https://itspm.ag/isaca-96808" target="_blank">https://itspm.ag/isaca-96808</a></p><p><strong>Guests:</strong></p><p>Mary Carmichael, President of ISACA’s Vancouver Chapter | <a href="https://www.linkedin.com/in/carmichaelmary/" target="_blank">https://www.linkedin.com/in/carmichaelmary/</a></p><p>Dooshima Dabo’Adzuana, a researcher at Boise State University and leader from ISACA’s Abuja Chapter | <a href="https://www.linkedin.com/in/dooshima-dabo-adzuana/" target="_blank">https://www.linkedin.com/in/dooshima-dabo-adzuana/</a></p><p><strong>Resources</strong></p><p>Mary and Dooshima's session at RSA Conference: <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyq</a></p><p>Learn more about ISACA's AI resources: <a href="https://www.isaca.org/resources/artificial-intelligence">https://www.isaca.org/resources/artificial-intelligence</a></p><p>Learn more about ISACA's credentials: <a href="https://www.isaca.org/credentialing">https://www.isaca.org/credentialing</a></p><p>Learn more and catch more stories from ISACA: <a href="https://www.itspmagazine.com/directory/isaca" target="_blank">https://www.itspmagazine.com/directory/isaca</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22506827" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1ddc27c4-f360-46c9-8ce6-3f36a614a214/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1ddc27c4-f360-46c9-8ce6-3f36a614a214&amp;feed=kDNbmF_B"/>
      <itunes:title>Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo’Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mary Carmichael, Dooshima Dabo’Adzuana</itunes:author>
      <itunes:duration>00:23:26</itunes:duration>
      <itunes:summary>How do you evaluate the risks of third-party AI solutions—and what does quantum readiness really look like? In this episode, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana share practical guidance, global perspectives, and a vision for building a stronger cybersecurity community through education, conversation, and connection.</itunes:summary>
      <itunes:subtitle>How do you evaluate the risks of third-party AI solutions—and what does quantum readiness really look like? In this episode, ISACA leaders Mary Carmichael and Dooshima Dabo’Adzuana share practical guidance, global perspectives, and a vision for building a stronger cybersecurity community through education, conversation, and connection.</itunes:subtitle>
      <itunes:keywords>career, compliance, marketing podcast, marco ciappelli, dooshima dabo’adzuana, sean martin, rsa, skills, education, cybersecurity, third-party, rsac, brand marketing, certification, quantum, encryption, ai, risk, mary carmichael, community, brand story podcast, audit, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>108</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0b5138c0-124a-44e2-bc4e-294e95d18eca</guid>
      <title>What’s Driving the Next Generation of Risk Management? | A Brand Story with Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>Ahead of the RSAC Conference, Sean Martin and Marco Ciappelli sit down with Steve Schlarman, Director of Product Management at Archer, to talk risk, regulation, and where governance fits into the broader cybersecurity conversation.</p><p>Steve represents a company that’s been at the center of governance, risk, and compliance (GRC) for nearly 25 years. But don’t mistake tenure for inertia—Archer is actively reshaping how organizations think about integrated risk management, especially through its latest platform, Archer Evolv. Steve shares how his team is focused on rethinking compliance not as a checkbox, but as a foundation for smarter, more strategic business decisions.</p><p>What sets Archer Evolv apart? For one, the platform doesn’t just cater to full-time risk professionals. It’s built for anyone in the organization who touches compliance—even occasionally. Steve explains how the user experience has been redesigned to make it easier for non-experts to contribute, pulling in relevant data without bogging down daily operations.</p><p>AI also plays a major role. After acquiring Compliance.AI, Archer has embedded large language models and automation into its compliance workflows—cutting down the time it takes to process regulatory updates and map controls. This means compliance professionals can spend less time scanning documents and more time advising the business.</p><p>But this isn’t about technology for technology’s sake. Steve underscores the bigger question facing companies today: how much risk are they truly willing to accept? Regulation might kickstart the conversation, but it’s risk management that sustains it—and that requires clarity, context, and collaboration across the business.</p><p>Archer’s team will be on site at RSAC, ready to demo the platform and share stories from the field. With over 1,200 customers worldwide, the company has no shortage of real-world examples to pull from. From frontline vulnerability assessments to strategic compliance mapping, Archer’s approach is centered on enabling better decisions—not just better dashboards.</p><p>Stop by booth 3117 (<a href="https://itspm.ag/archervn5f" target="_blank">https://itspm.ag/archervn5f</a>) to see how they’re turning compliance into an engine for risk-aware growth—and how your team might benefit from a more purposeful approach to GRC.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p><strong>Guest: Steve Schlarman</strong>, Senior Director, Product Management at Archer Integrated Risk Management | <a href="https://www.linkedin.com/in/steveschlarman/" target="_blank">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer" target="_blank">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: risk, compliance, governance, cybersecurity, ai, automation, regulation, grc, audit, resilience, controls, workflow, data, business continuity, product management, rsa, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 23:55:28 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/whats-driving-the-next-generation-of-risk-management-a-brand-story-with-steve-schlarman-senior-director-product-management-at-archer-integrated-risk-management-a-rsac-conference-2025-brand-story-pre-event-conversation-nE3_ivMp</link>
      <content:encoded><![CDATA[<p>Ahead of the RSAC Conference, Sean Martin and Marco Ciappelli sit down with Steve Schlarman, Director of Product Management at Archer, to talk risk, regulation, and where governance fits into the broader cybersecurity conversation.</p><p>Steve represents a company that’s been at the center of governance, risk, and compliance (GRC) for nearly 25 years. But don’t mistake tenure for inertia—Archer is actively reshaping how organizations think about integrated risk management, especially through its latest platform, Archer Evolv. Steve shares how his team is focused on rethinking compliance not as a checkbox, but as a foundation for smarter, more strategic business decisions.</p><p>What sets Archer Evolv apart? For one, the platform doesn’t just cater to full-time risk professionals. It’s built for anyone in the organization who touches compliance—even occasionally. Steve explains how the user experience has been redesigned to make it easier for non-experts to contribute, pulling in relevant data without bogging down daily operations.</p><p>AI also plays a major role. After acquiring Compliance.AI, Archer has embedded large language models and automation into its compliance workflows—cutting down the time it takes to process regulatory updates and map controls. This means compliance professionals can spend less time scanning documents and more time advising the business.</p><p>But this isn’t about technology for technology’s sake. Steve underscores the bigger question facing companies today: how much risk are they truly willing to accept? Regulation might kickstart the conversation, but it’s risk management that sustains it—and that requires clarity, context, and collaboration across the business.</p><p>Archer’s team will be on site at RSAC, ready to demo the platform and share stories from the field. With over 1,200 customers worldwide, the company has no shortage of real-world examples to pull from. From frontline vulnerability assessments to strategic compliance mapping, Archer’s approach is centered on enabling better decisions—not just better dashboards.</p><p>Stop by booth 3117 (<a href="https://itspm.ag/archervn5f" target="_blank">https://itspm.ag/archervn5f</a>) to see how they’re turning compliance into an engine for risk-aware growth—and how your team might benefit from a more purposeful approach to GRC.</p><p>Learn more about Archer: <a href="https://itspm.ag/rsaarchweb" target="_blank">https://itspm.ag/rsaarchweb</a></p><p><strong>Guest: Steve Schlarman</strong>, Senior Director, Product Management at Archer Integrated Risk Management | <a href="https://www.linkedin.com/in/steveschlarman/" target="_blank">https://www.linkedin.com/in/steveschlarman/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Archer: <a href="https://www.itspmagazine.com/directory/archer" target="_blank">https://www.itspmagazine.com/directory/archer</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: risk, compliance, governance, cybersecurity, ai, automation, regulation, grc, audit, resilience, controls, workflow, data, business continuity, product management, rsa, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast</p><p><strong>______________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21283467" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/bcb1f6e2-5686-49b9-970a-6f58b1beab20/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=bcb1f6e2-5686-49b9-970a-6f58b1beab20&amp;feed=kDNbmF_B"/>
      <itunes:title>What’s Driving the Next Generation of Risk Management? | A Brand Story with Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Steve Schlarman</itunes:author>
      <itunes:duration>00:22:10</itunes:duration>
      <itunes:summary>Steve Schlarman, Director of Product Management at Archer, joins the conversation to explore how risk and compliance programs can become business enablers rather than check-the-box obligations. From AI-powered regulatory intelligence to redesigned user experiences, he shares how Archer is helping organizations manage risk with clarity, purpose, and impact.</itunes:summary>
      <itunes:subtitle>Steve Schlarman, Director of Product Management at Archer, joins the conversation to explore how risk and compliance programs can become business enablers rather than check-the-box obligations. From AI-powered regulatory intelligence to redesigned user experiences, he shares how Archer is helping organizations manage risk with clarity, purpose, and impact.</itunes:subtitle>
      <itunes:keywords>workflow, compliance, data, marketing podcast, marco ciappelli, controls, grc, sean martin, rsa, automation, cybersecurity, resilience, rsac2025, steve schlarman, brand marketing, regulation, ai, risk, business continuity, product management, brand story podcast, audit, brand story, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>107</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b009dc9c-c757-444c-a68c-4bf90405de36</guid>
      <title>Why “Permit by Exception” Might Be the Key to Business Resilience | A Brand Story with Rob Allen, Chief Product Officer at ThreatLocker | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>At this year’s RSAC Conference, the team from ThreatLocker isn’t just bringing tech—they’re bringing a challenge. Rob Allen, Chief Product Officer at ThreatLocker, joins Sean Martin and Marco Ciappelli for a lively pre-conference episode that previews what attendees can expect at booth #854 in the South Expo Hall.</p><p>From rubber ducky hacks to reframing how we think about Zero Trust, the conversation highlights the ways ThreatLocker moves beyond the industry’s typical focus on reactive detection. Allen shares how most cybersecurity approaches still default to allowing access unless a threat is known, and why that mindset continues to leave organizations vulnerable. Instead, ThreatLocker’s philosophy is to “deny by default and permit by exception”—a strategy that, when managed effectively, provides maximum protection without slowing down business operations.</p><p>ThreatLocker’s presence at the conference will feature live demos, short presentations, and hands-on challenges—including their popular Ducky Challenge, where participants test whether their endpoint defenses can prevent a rogue USB (disguised as a keyboard) from stealing their data. If your system passes, you win the rubber ducky. If it doesn’t? They (temporarily) get your data. It’s a simple but powerful reminder that what you think is secure might not be.</p><p>The booth won’t just be about tech. The team is focused on conversations—reconnecting with customers, engaging new audiences, and exploring how the community is responding to a threat landscape that’s growing more sophisticated by the day. Allen emphasizes the importance of in-person dialogue, not only to share what ThreatLocker is building but to learn how security leaders are adapting and where gaps still exist.</p><p>And yes, there will be merch—high-quality socks, t-shirts, and even a few surprise giveaways dropped at hotel doors (if you resist the temptation to open the envelope before visiting the booth).</p><p>For those looking to rethink endpoint protection or better understand how proactive controls can complement detection-based tools, this episode is your preview into a very different kind of cybersecurity conversation—one that starts with a challenge and ends with community.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: rsac conference, cybersecurity, endpoint, zero trust, rubber ducky, threat detection, data exfiltration, security strategy, deny by default, permit by exception, proactive security, security demos, usb attack, cyber resilience, network control, security mindset, rsac 2025, event coverage, on location, conference</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 18:04:14 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/why-permit-by-exception-might-be-the-key-to-business-resilience-a-brand-story-with-rob-allen-chief-product-officer-at-threatlocker-a-rsac-conference-2025-brand-story-pre-event-conversation-iN2V4rQ9</link>
      <content:encoded><![CDATA[<p>At this year’s RSAC Conference, the team from ThreatLocker isn’t just bringing tech—they’re bringing a challenge. Rob Allen, Chief Product Officer at ThreatLocker, joins Sean Martin and Marco Ciappelli for a lively pre-conference episode that previews what attendees can expect at booth #854 in the South Expo Hall.</p><p>From rubber ducky hacks to reframing how we think about Zero Trust, the conversation highlights the ways ThreatLocker moves beyond the industry’s typical focus on reactive detection. Allen shares how most cybersecurity approaches still default to allowing access unless a threat is known, and why that mindset continues to leave organizations vulnerable. Instead, ThreatLocker’s philosophy is to “deny by default and permit by exception”—a strategy that, when managed effectively, provides maximum protection without slowing down business operations.</p><p>ThreatLocker’s presence at the conference will feature live demos, short presentations, and hands-on challenges—including their popular Ducky Challenge, where participants test whether their endpoint defenses can prevent a rogue USB (disguised as a keyboard) from stealing their data. If your system passes, you win the rubber ducky. If it doesn’t? They (temporarily) get your data. It’s a simple but powerful reminder that what you think is secure might not be.</p><p>The booth won’t just be about tech. The team is focused on conversations—reconnecting with customers, engaging new audiences, and exploring how the community is responding to a threat landscape that’s growing more sophisticated by the day. Allen emphasizes the importance of in-person dialogue, not only to share what ThreatLocker is building but to learn how security leaders are adapting and where gaps still exist.</p><p>And yes, there will be merch—high-quality socks, t-shirts, and even a few surprise giveaways dropped at hotel doors (if you resist the temptation to open the envelope before visiting the booth).</p><p>For those looking to rethink endpoint protection or better understand how proactive controls can complement detection-based tools, this episode is your preview into a very different kind of cybersecurity conversation—one that starts with a challenge and ends with community.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer, ThreatLocker | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>______________________</strong></p><p>Keywords: rsac conference, cybersecurity, endpoint, zero trust, rubber ducky, threat detection, data exfiltration, security strategy, deny by default, permit by exception, proactive security, security demos, usb attack, cyber resilience, network control, security mindset, rsac 2025, event coverage, on location, conference</p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18213974" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/f7e0a8f3-9ce6-469a-b131-19121e3e4c10/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=f7e0a8f3-9ce6-469a-b131-19121e3e4c10&amp;feed=kDNbmF_B"/>
      <itunes:title>Why “Permit by Exception” Might Be the Key to Business Resilience | A Brand Story with Rob Allen, Chief Product Officer at ThreatLocker | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:duration>00:18:58</itunes:duration>
      <itunes:summary>What if your endpoint defenses aren’t as strong as you think they are? In this episode, ThreatLocker Chief Product Officer Rob Allen challenges conventional security thinking and invites RSA attendees to test their systems in real-time—with a rubber ducky and a radically different approach to Zero Trust.</itunes:summary>
      <itunes:subtitle>What if your endpoint defenses aren’t as strong as you think they are? In this episode, ThreatLocker Chief Product Officer Rob Allen challenges conventional security thinking and invites RSA attendees to test their systems in real-time—with a rubber ducky and a radically different approach to Zero Trust.</itunes:subtitle>
      <itunes:keywords>compliance, digital protection, marco ciappelli, ai security, rsa conference, rsac 2025, web attacks, grc, supply chain risk, sean martin, supply chain security, llm scraping, infosec, akamai, cybersecurity, enterprise resilience, application security, risk management, generative ai, data protection, threat intelligence, hybrid digital world, guardicore, executive protection, data privacy, rsac2025, third-party risk, cybersecurity community, state of the internet report, cybersecurity awareness, prompt injection, cisos, api protection, brand story podcast, zero trust, vulnerability management, brand story, device control, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>106</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3ccfd6fe-2079-42dd-8a78-4f17afa88949</guid>
      <title>Quantum Security, Real Problems, and the Unifying Layer Behind It All | A Brand Story Conversation with Marc Manzano, General Manager of the Cybersecurity Group at SandboxAQ | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>We’re on the road to RSAC 2025 — or maybe on a quantum-powered highway — and this time, Sean and I had the pleasure of chatting with someone who’s not just riding the future wave, but actually building it.</p><p>Marc Manzano, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong>, joined us for this Brand Story conversation ahead of the big conference in San Francisco. For those who haven’t heard of SandboxAQ yet, here’s a quick headline: they’re a spin-out from Google, operating at the intersection of <strong>AI and quantum technologies</strong>. Yes — that intersection.</p><p>But let’s keep our feet on the ground for a second, because this story isn’t just about tech that sounds cool. It’s about solving the very real, very painful problems that security teams face every day.</p><p>Marc laid out their mission clearly: <strong>Active Guard</strong>, their flagship platform, is built to simplify and modernize two massive pain points in enterprise security — <strong>cryptographic asset management</strong> and <strong>non-human identity management</strong>. Think: rotating certificates without manual effort. Managing secrets and keys across cloud-native infrastructure. Automating compliance reporting for quantum-readiness. No fluff — just value, right out of the box.</p><p>And it’s not just about plugging a new tool into your already overloaded stack. What impressed us is how SandboxAQ sees themselves as the <strong>unifying layer</strong> — enhancing <strong>interoperability</strong> across existing systems, extracting more intelligence from the tools you already use, and giving teams a unified view through a single pane of glass.</p><p>And yes, we also touched on <strong>AI SecOps</strong> — because as AI becomes a standard part of infrastructure, so must security for it. Active Guard is already poised to give security teams visibility and control over this evolving layer.</p><p>Want to see it in action? <strong>Booth 6578, North Expo Hall.</strong> Swag will be there. Demos will be live. Conversations will be real.</p><p>We’ll be there too — recording a deeper Brand Story episode On Location during the event.</p><p>Until then, enjoy this preview — and get ready to meet the future of cybersecurity.</p><p>⸻</p><p><strong>Keywords:</strong></p><p>sandboxaq, active guard, rsa conference 2025, quantum cybersecurity, ai secops, cryptographic asset management, non-human identity, cybersecurity automation, security compliance, rsa 2025, cybersecurity innovation, certificate lifecycle management, secrets management, security operations, quantum readiness, rsa sandbox, cybersecurity saas, devsecops, interoperability, digital transformation</p><p><strong>______________________</strong><br /><br /><strong>Guest: Marc Manzano,</strong>, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong></p><p><a href="https://www.linkedin.com/in/marcmanzano/">Marc Manzano on LinkedIn</a></p><p>🌐 <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">SandboxAQ Website</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>SandboxAQ:<br /><a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Apr 2025 17:39:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Marc Manzano)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/quantum-security-real-problems-and-the-unifying-layer-behind-it-all-a-brand-story-conversation-with-marc-manzano-general-manager-of-the-cybersecurity-group-at-sandboxaq-a-rsac-conference-2025-brand-story-pre-event-conversation-igAnvqlI</link>
      <content:encoded><![CDATA[<p>We’re on the road to RSAC 2025 — or maybe on a quantum-powered highway — and this time, Sean and I had the pleasure of chatting with someone who’s not just riding the future wave, but actually building it.</p><p>Marc Manzano, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong>, joined us for this Brand Story conversation ahead of the big conference in San Francisco. For those who haven’t heard of SandboxAQ yet, here’s a quick headline: they’re a spin-out from Google, operating at the intersection of <strong>AI and quantum technologies</strong>. Yes — that intersection.</p><p>But let’s keep our feet on the ground for a second, because this story isn’t just about tech that sounds cool. It’s about solving the very real, very painful problems that security teams face every day.</p><p>Marc laid out their mission clearly: <strong>Active Guard</strong>, their flagship platform, is built to simplify and modernize two massive pain points in enterprise security — <strong>cryptographic asset management</strong> and <strong>non-human identity management</strong>. Think: rotating certificates without manual effort. Managing secrets and keys across cloud-native infrastructure. Automating compliance reporting for quantum-readiness. No fluff — just value, right out of the box.</p><p>And it’s not just about plugging a new tool into your already overloaded stack. What impressed us is how SandboxAQ sees themselves as the <strong>unifying layer</strong> — enhancing <strong>interoperability</strong> across existing systems, extracting more intelligence from the tools you already use, and giving teams a unified view through a single pane of glass.</p><p>And yes, we also touched on <strong>AI SecOps</strong> — because as AI becomes a standard part of infrastructure, so must security for it. Active Guard is already poised to give security teams visibility and control over this evolving layer.</p><p>Want to see it in action? <strong>Booth 6578, North Expo Hall.</strong> Swag will be there. Demos will be live. Conversations will be real.</p><p>We’ll be there too — recording a deeper Brand Story episode On Location during the event.</p><p>Until then, enjoy this preview — and get ready to meet the future of cybersecurity.</p><p>⸻</p><p><strong>Keywords:</strong></p><p>sandboxaq, active guard, rsa conference 2025, quantum cybersecurity, ai secops, cryptographic asset management, non-human identity, cybersecurity automation, security compliance, rsa 2025, cybersecurity innovation, certificate lifecycle management, secrets management, security operations, quantum readiness, rsa sandbox, cybersecurity saas, devsecops, interoperability, digital transformation</p><p><strong>______________________</strong><br /><br /><strong>Guest: Marc Manzano,</strong>, General Manager of the Cybersecurity Group at <strong>SandboxAQ</strong></p><p><a href="https://www.linkedin.com/in/marcmanzano/">Marc Manzano on LinkedIn</a></p><p>🌐 <a href="https://itspm.ag/sandboxaq-j2en" target="_blank">SandboxAQ Website</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>SandboxAQ:<br /><a href="https://itspm.ag/sandboxaq-j2en" target="_blank">https://itspm.ag/sandboxaq-j2en</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="9137117" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/3b7742e7-b588-4698-ad03-bd77d8125d2c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=3b7742e7-b588-4698-ad03-bd77d8125d2c&amp;feed=kDNbmF_B"/>
      <itunes:title>Quantum Security, Real Problems, and the Unifying Layer Behind It All | A Brand Story Conversation with Marc Manzano, General Manager of the Cybersecurity Group at SandboxAQ | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Marc Manzano</itunes:author>
      <itunes:duration>00:09:31</itunes:duration>
      <itunes:summary>Quantum meets reality at RSAC 2025. In this Brand Story preview, we speak with SandboxAQ about Active Guard — a SaaS platform designed to be the unifying layer across cryptographic and identity management systems. Marc Manzano joins us to share how they’re solving real problems, enabling automation, and redefining how security teams prepare for the future.
</itunes:summary>
      <itunes:subtitle>Quantum meets reality at RSAC 2025. In this Brand Story preview, we speak with SandboxAQ about Active Guard — a SaaS platform designed to be the unifying layer across cryptographic and identity management systems. Marc Manzano joins us to share how they’re solving real problems, enabling automation, and redefining how security teams prepare for the future.
</itunes:subtitle>
      <itunes:keywords>rsa conference 2025, certificate lifecycle management, compliance, digital protection, cybersecurity saas, marco ciappelli, ai security, rsa conference, ai secops, rsac 2025, web attacks, grc, supply chain risk, sean martin, supply chain security, non-human identity, sandboxaq, infosec, rsa sandbox, cybersecurity, enterprise resilience, cybersecurity automation, risk management, generative ai, data protection, secrets management, threat intelligence, quantum cybersecurity, cryptographic asset management, hybrid digital world, data privacy, rsac2025, third-party risk, security compliance, cybersecurity awareness, rsa 2025, quantum readiness, active guard, cybersecurity innovation, digital transformation, devsecops, cisos, brand story podcast, zero trust, brand story, security operations, interoperability, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3e4d0896-ad19-49ed-9205-bb9d7b38688b</guid>
      <title>AI, Security, and the Hybrid World: Akamai’s Vision for RSAC 2025 With Rupesh Chokshi, SVP &amp; GM Application Security Akamai | A RSAC Conference 2025 Brand Story Pre-Event Conversation</title>
      <description><![CDATA[<p>The RSA Conference has long served as a meeting point for innovation and collaboration in cybersecurity—and in this pre-RSAC episode, ITSPmagazine co-founders Marco Ciappelli and Sean Martin welcome Akamai’s Rupesh Chokshi to the conversation. With RSAC 2025 on the horizon, they discuss Akamai’s presence at the event and dig into the challenges and opportunities surrounding AI, threat intelligence, and enterprise security.</p><p>Chokshi, who leads Akamai’s Application Security business, describes a landscape marked by explosive growth in web and API attacks—and a parallel shift as enterprises embrace generative AI. The double-edged nature of AI is central to the discussion: while it offers breakthrough productivity and automation, it also creates new vulnerabilities. Akamai’s dual focus, says Chokshi, is both using AI to strengthen defenses and securing AI-powered applications themselves.</p><p>The conversation touches on the scale and sophistication of modern threats, including an eye-opening stat: Akamai is now tracking over 500 million large language model (LLM)-driven scraping requests per day. As these threats extend from e-commerce to healthcare and beyond, Chokshi emphasizes the need for layered defense strategies and real-time adaptability.</p><p>Ciappelli brings a sociological lens to the AI discussion, noting the hype-to-reality shift the industry is experiencing. “We’re no longer asking if AI will change the game,” he suggests. “We’re asking how to implement it responsibly—and how to protect it.”</p><p>At RSAC 2025, Akamai will showcase a range of innovations, including updates to its Guardicore platform and new App & API Protection Hybrid solutions. Their booth (6245) will feature interactive demos, theater sessions, and one-on-one briefings. The Akamai team will also release a new edition of their State of the Internet report, packed with actionable threat data and insights.</p><p>The episode closes with a reminder: in a world that’s both accelerating and fragmenting, cybersecurity must serve not just as a barrier—but as a catalyst. “Security,” says Chokshi, “has to enable innovation, not hinder it.”</p><p>⸻</p><p>Keywords: RSAC 2025, Akamai, cybersecurity, generative AI, API protection, web attacks, application security, LLM scraping, Guardicore, State of the Internet report, Zero Trust, hybrid digital world, enterprise resilience, AI security, threat intelligence, prompt injection, data privacy, RSA Conference, Sean Martin, Marco Ciappelli</p><p><strong>______________________</strong><br /><br /><strong>Guest: </strong><a href="https://www.linkedin.com/in/rupeshchokshi/overlay/about-this-profile/">Rupesh Chokshi</a>, SVP & GM, Akamai <br /><a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>AKAMAI:<br /><a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Rupesh Chokshi Session at RSAC 2025<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737648101765001Ekkq">The New Attack Frontier: Research Shows Apps & APIs Are the Targets - [<i>PART1-W09</i>]</a></p><p> </p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 18 Apr 2025 06:54:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/ai-security-and-the-hybrid-world-akamais-vision-for-rsac-2025-with-rupesh-chokshi-svp-gm-application-security-akamai-a-rsac-conference-2025-brand-story-pre-event-conversation-gwhDUTAh</link>
      <content:encoded><![CDATA[<p>The RSA Conference has long served as a meeting point for innovation and collaboration in cybersecurity—and in this pre-RSAC episode, ITSPmagazine co-founders Marco Ciappelli and Sean Martin welcome Akamai’s Rupesh Chokshi to the conversation. With RSAC 2025 on the horizon, they discuss Akamai’s presence at the event and dig into the challenges and opportunities surrounding AI, threat intelligence, and enterprise security.</p><p>Chokshi, who leads Akamai’s Application Security business, describes a landscape marked by explosive growth in web and API attacks—and a parallel shift as enterprises embrace generative AI. The double-edged nature of AI is central to the discussion: while it offers breakthrough productivity and automation, it also creates new vulnerabilities. Akamai’s dual focus, says Chokshi, is both using AI to strengthen defenses and securing AI-powered applications themselves.</p><p>The conversation touches on the scale and sophistication of modern threats, including an eye-opening stat: Akamai is now tracking over 500 million large language model (LLM)-driven scraping requests per day. As these threats extend from e-commerce to healthcare and beyond, Chokshi emphasizes the need for layered defense strategies and real-time adaptability.</p><p>Ciappelli brings a sociological lens to the AI discussion, noting the hype-to-reality shift the industry is experiencing. “We’re no longer asking if AI will change the game,” he suggests. “We’re asking how to implement it responsibly—and how to protect it.”</p><p>At RSAC 2025, Akamai will showcase a range of innovations, including updates to its Guardicore platform and new App & API Protection Hybrid solutions. Their booth (6245) will feature interactive demos, theater sessions, and one-on-one briefings. The Akamai team will also release a new edition of their State of the Internet report, packed with actionable threat data and insights.</p><p>The episode closes with a reminder: in a world that’s both accelerating and fragmenting, cybersecurity must serve not just as a barrier—but as a catalyst. “Security,” says Chokshi, “has to enable innovation, not hinder it.”</p><p>⸻</p><p>Keywords: RSAC 2025, Akamai, cybersecurity, generative AI, API protection, web attacks, application security, LLM scraping, Guardicore, State of the Internet report, Zero Trust, hybrid digital world, enterprise resilience, AI security, threat intelligence, prompt injection, data privacy, RSA Conference, Sean Martin, Marco Ciappelli</p><p><strong>______________________</strong><br /><br /><strong>Guest: </strong><a href="https://www.linkedin.com/in/rupeshchokshi/overlay/about-this-profile/">Rupesh Chokshi</a>, SVP & GM, Akamai <br /><a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>AKAMAI:<br /><a href="https://itspm.ag/akamailbwc" target="_blank">https://itspm.ag/akamailbwc</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Rupesh Chokshi Session at RSAC 2025<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737648101765001Ekkq">The New Attack Frontier: Research Shows Apps & APIs Are the Targets - [<i>PART1-W09</i>]</a></p><p> </p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20972909" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/bd10677d-1ea1-45a4-be8d-c5b727778042/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=bd10677d-1ea1-45a4-be8d-c5b727778042&amp;feed=kDNbmF_B"/>
      <itunes:title>AI, Security, and the Hybrid World: Akamai’s Vision for RSAC 2025 With Rupesh Chokshi, SVP &amp; GM Application Security Akamai | A RSAC Conference 2025 Brand Story Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:duration>00:21:50</itunes:duration>
      <itunes:summary>In this pre-RSAC 2025 episode, Akamai’s Rupesh Chokshi joins Sean Martin and Marco Ciappelli to explore the evolving intersection of cybersecurity, AI, and enterprise resilience. From API protection to LLM-driven threats, they preview what Akamai is bringing to San Francisco—and why security must become an enabler in the hybrid digital world.
</itunes:summary>
      <itunes:subtitle>In this pre-RSAC 2025 episode, Akamai’s Rupesh Chokshi joins Sean Martin and Marco Ciappelli to explore the evolving intersection of cybersecurity, AI, and enterprise resilience. From API protection to LLM-driven threats, they preview what Akamai is bringing to San Francisco—and why security must become an enabler in the hybrid digital world.
</itunes:subtitle>
      <itunes:keywords>compliance, digital protection, marco ciappelli, ai security, rsa conference, rsac 2025, web attacks, grc, supply chain risk, sean martin, supply chain security, llm scraping, infosec, akamai, cybersecurity, enterprise resilience, application security, risk management, generative ai, data protection, threat intelligence, hybrid digital world, guardicore, executive protection, data privacy, rsac2025, third-party risk, cybersecurity community, state of the internet report, cybersecurity awareness, prompt injection, cisos, api protection, brand story podcast, zero trust, vulnerability management, brand story, device control, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>105</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c0f8e268-542d-4b8b-8a65-656633d43226</guid>
      <title>From Phishing to Full Compromise in Under an Hour: Automation Is Fueling the Next Wave of Cyber Threats | A LevelBlue Brand Story with Kenneth Ng</title>
      <description><![CDATA[<p>LevelBlue’s latest Threat Trends Report pulls no punches: phishing, malware, and ransomware attacks are not just continuing—they’re accelerating. In this episode of ITSPmagazine’s Brand Story podcast, hosts Sean Martin and Marco Ciappelli are joined by Kenneth Ng, a threat hunter and lead incident responder on LevelBlue’s Managed Detection and Response (MDR) team, to unpack the findings and recommendations from the report.</p><p><strong>Phishing as a Service and the Surge in Email Compromises</strong></p><p>One of the most alarming trends highlighted by Kenneth is the widespread availability of Phishing-as-a-Service (PhaaS) kits, including names like RaccoonO365, Mamba 2FA, and Greatness. These kits allow attackers with little to no technical skill to launch sophisticated campaigns that bypass multi-factor authentication (MFA) by hijacking session tokens. With phishing attacks now leading to full enterprise compromises, often through seemingly innocuous Microsoft 365 access, the threat is more serious than ever.</p><p><strong>Malware Is Smarter, Simpler—and It’s Spreading Fast</strong></p><p>Malware, particularly fake browser updates and credential stealers like Lumma Stealer, is also seeing a rise in usage. Kenneth points out the troubling trend of malware campaigns that rely on basic user interactions—like copying and pasting text—leading to full compromise through PowerShell or command prompt access. Basic group policy configurations (like blocking script execution for non-admin users) are still underutilized defenses.</p><p><strong>Ransomware: Faster and More Automated Than Ever</strong></p><p>The speed of ransomware attacks has increased dramatically. Kenneth shares real-world examples where attackers go from initial access to full domain control in under an hour—sometimes in as little as ten minutes—thanks to automation, remote access tools, and credential harvesting. This rapid escalation leaves defenders with very little room to respond unless robust detection and prevention measures are in place ahead of time.</p><p><strong>Why This Report Matters</strong></p><p>Rather than presenting raw data, LevelBlue focuses on actionable insights. Each major finding comes with recommendations that can be implemented regardless of company size or maturity level. The report is a resource not just for LevelBlue customers, but for any organization looking to strengthen its defenses.</p><p>Be sure to check out the full conversation and grab the first edition of the <a href="https://itspm.ag/levelbyqdp" target="_blank">Threat Trends Report</a> ahead of LevelBlue’s next release this August—and stay tuned for their updated Futures Report launching at RSA Conference on April 28.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kenneth Ng</strong>, threat hunter and lead incident responder on LevelBlue’s Managed Detection and Response (MDR) team | On LinkedIn: <a href="https://www.linkedin.com/in/ngkencyber/" target="_blank">https://www.linkedin.com/in/ngkencyber/</a></p><p><strong>Resources</strong></p><p>Download the LevelBlue Threat Trends Report | Edition One: <a href="https://itspm.ag/levelbyqdp" target="_blank">https://itspm.ag/levelbyqdp</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 18 Apr 2025 02:42:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Kenneth Ng, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-phishing-to-full-compromise-in-under-an-hour-automation-is-fueling-the-next-wave-of-cyber-threats-a-levelblue-brand-story-with-kenneth-ng-1xYBc38e</link>
      <content:encoded><![CDATA[<p>LevelBlue’s latest Threat Trends Report pulls no punches: phishing, malware, and ransomware attacks are not just continuing—they’re accelerating. In this episode of ITSPmagazine’s Brand Story podcast, hosts Sean Martin and Marco Ciappelli are joined by Kenneth Ng, a threat hunter and lead incident responder on LevelBlue’s Managed Detection and Response (MDR) team, to unpack the findings and recommendations from the report.</p><p><strong>Phishing as a Service and the Surge in Email Compromises</strong></p><p>One of the most alarming trends highlighted by Kenneth is the widespread availability of Phishing-as-a-Service (PhaaS) kits, including names like RaccoonO365, Mamba 2FA, and Greatness. These kits allow attackers with little to no technical skill to launch sophisticated campaigns that bypass multi-factor authentication (MFA) by hijacking session tokens. With phishing attacks now leading to full enterprise compromises, often through seemingly innocuous Microsoft 365 access, the threat is more serious than ever.</p><p><strong>Malware Is Smarter, Simpler—and It’s Spreading Fast</strong></p><p>Malware, particularly fake browser updates and credential stealers like Lumma Stealer, is also seeing a rise in usage. Kenneth points out the troubling trend of malware campaigns that rely on basic user interactions—like copying and pasting text—leading to full compromise through PowerShell or command prompt access. Basic group policy configurations (like blocking script execution for non-admin users) are still underutilized defenses.</p><p><strong>Ransomware: Faster and More Automated Than Ever</strong></p><p>The speed of ransomware attacks has increased dramatically. Kenneth shares real-world examples where attackers go from initial access to full domain control in under an hour—sometimes in as little as ten minutes—thanks to automation, remote access tools, and credential harvesting. This rapid escalation leaves defenders with very little room to respond unless robust detection and prevention measures are in place ahead of time.</p><p><strong>Why This Report Matters</strong></p><p>Rather than presenting raw data, LevelBlue focuses on actionable insights. Each major finding comes with recommendations that can be implemented regardless of company size or maturity level. The report is a resource not just for LevelBlue customers, but for any organization looking to strengthen its defenses.</p><p>Be sure to check out the full conversation and grab the first edition of the <a href="https://itspm.ag/levelbyqdp" target="_blank">Threat Trends Report</a> ahead of LevelBlue’s next release this August—and stay tuned for their updated Futures Report launching at RSA Conference on April 28.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kenneth Ng</strong>, threat hunter and lead incident responder on LevelBlue’s Managed Detection and Response (MDR) team | On LinkedIn: <a href="https://www.linkedin.com/in/ngkencyber/" target="_blank">https://www.linkedin.com/in/ngkencyber/</a></p><p><strong>Resources</strong></p><p>Download the LevelBlue Threat Trends Report | Edition One: <a href="https://itspm.ag/levelbyqdp" target="_blank">https://itspm.ag/levelbyqdp</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="34599653" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e50a6657-5b58-4d11-8bd6-b9560dc693db/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e50a6657-5b58-4d11-8bd6-b9560dc693db&amp;feed=kDNbmF_B"/>
      <itunes:title>From Phishing to Full Compromise in Under an Hour: Automation Is Fueling the Next Wave of Cyber Threats | A LevelBlue Brand Story with Kenneth Ng</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Kenneth Ng, Marco Ciappelli</itunes:author>
      <itunes:duration>00:36:02</itunes:duration>
      <itunes:summary>Phishing, malware, and ransomware attacks are becoming faster, easier, and more damaging—and Kenneth Ng from LevelBlue breaks down exactly how and why. This episode reveals the latest threat trends and what organizations can do right now to defend against them.</itunes:summary>
      <itunes:subtitle>Phishing, malware, and ransomware attacks are becoming faster, easier, and more damaging—and Kenneth Ng from LevelBlue breaks down exactly how and why. This episode reveals the latest threat trends and what organizations can do right now to defend against them.</itunes:subtitle>
      <itunes:keywords>marketing podcast, marco ciappelli, sean martin, reconnaissance, automation, cybersecurity, email security, lateral movement, phishing kits, malware, kenneth ng, threat intelligence, microsoft 365, soc, edr, breach detection, ransomware, gpo, brand marketing, mdr, incident response, session tokens, brand story podcast, phishing, brand story, security operations, cobalt strike</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>104</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">60f5efaa-b118-4dce-afd1-65c60514b5f7</guid>
      <title>From Chaos to Control: What If Your Cyber Program Helped You Sleep at Night? | A ThreatLocker Brand Story with Rob Allen</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin and Marco Ciappelli sit down with Rob Allen, Chief Product Officer at ThreatLocker, to unpack how the company is reshaping endpoint security through a unique, control-first approach. Rob shares how ThreatLocker is challenging long-held assumptions about trust, visibility, and control in enterprise environments—and why the traditional “trust but verify” model is no longer good enough.</p><p><strong>From Default Permit to Default Deny</strong></p><p>ThreatLocker’s philosophy centers on a fundamental shift: moving from a default permit posture to a default deny stance. This approach, according to Rob, doesn’t hinder operations—it creates boundaries that allow organizations to function safely and efficiently. It’s not about locking systems down; it’s about granting permissions with precision, so users can operate without even noticing security is present.</p><p><strong>Product Innovation Driven by Real Feedback</strong></p><p>The conversation highlights how customer input—and CEO Danny Jenkins’ relentless presence at industry events—drives product development. New solutions like Web Control and Patch Management are designed as logical extensions of existing tools, allowing security teams to reduce risk without creating friction for end users. The addition of a software store, suggested by enterprise customers, gives users clarity on what’s approved while reducing IT support tickets.</p><p><strong>Insights and the Detect Dashboard</strong></p><p>Rob also explains how ThreatLocker is unlocking the value of big data. With billions of data points collected every hour, their new Insights platform aggregates and analyzes cross-customer trends to better inform security decisions. Combined with the Detect Dashboard, teams now gain not only visibility but actionable intelligence—supported by polished visuals and streamlined workflows.</p><p><strong>More Than Just Tech—It’s Peace of Mind</strong></p><p>While the technology is impressive, Rob says the most rewarding feedback is simple: “ThreatLocker helps me sleep at night.” For many customers, that level of confidence is priceless. And in unexpected situations—like a blue-screen incident caused by third-party software—ThreatLocker has even been used to mitigate impacts in creative ways.</p><p>Whether you’re leading a global IT team or managing a growing MSP, this episode will make you think differently about how security fits into your operational strategy. Tune in to hear how ThreatLocker is turning bold ideas into real-world control.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer at ThreatLocker</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 15 Apr 2025 01:20:41 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-chaos-to-control-what-if-your-cyber-program-helped-you-sleep-at-night-a-threatlocker-brand-story-with-rob-allen-_DOFlyuT</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin and Marco Ciappelli sit down with Rob Allen, Chief Product Officer at ThreatLocker, to unpack how the company is reshaping endpoint security through a unique, control-first approach. Rob shares how ThreatLocker is challenging long-held assumptions about trust, visibility, and control in enterprise environments—and why the traditional “trust but verify” model is no longer good enough.</p><p><strong>From Default Permit to Default Deny</strong></p><p>ThreatLocker’s philosophy centers on a fundamental shift: moving from a default permit posture to a default deny stance. This approach, according to Rob, doesn’t hinder operations—it creates boundaries that allow organizations to function safely and efficiently. It’s not about locking systems down; it’s about granting permissions with precision, so users can operate without even noticing security is present.</p><p><strong>Product Innovation Driven by Real Feedback</strong></p><p>The conversation highlights how customer input—and CEO Danny Jenkins’ relentless presence at industry events—drives product development. New solutions like Web Control and Patch Management are designed as logical extensions of existing tools, allowing security teams to reduce risk without creating friction for end users. The addition of a software store, suggested by enterprise customers, gives users clarity on what’s approved while reducing IT support tickets.</p><p><strong>Insights and the Detect Dashboard</strong></p><p>Rob also explains how ThreatLocker is unlocking the value of big data. With billions of data points collected every hour, their new Insights platform aggregates and analyzes cross-customer trends to better inform security decisions. Combined with the Detect Dashboard, teams now gain not only visibility but actionable intelligence—supported by polished visuals and streamlined workflows.</p><p><strong>More Than Just Tech—It’s Peace of Mind</strong></p><p>While the technology is impressive, Rob says the most rewarding feedback is simple: “ThreatLocker helps me sleep at night.” For many customers, that level of confidence is priceless. And in unexpected situations—like a blue-screen incident caused by third-party software—ThreatLocker has even been used to mitigate impacts in creative ways.</p><p>Whether you’re leading a global IT team or managing a growing MSP, this episode will make you think differently about how security fits into your operational strategy. Tune in to hear how ThreatLocker is turning bold ideas into real-world control.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rob Allen</strong>, Chief Product Officer at ThreatLocker</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/threatlockerrob/" target="_blank">https://www.linkedin.com/in/threatlockerrob/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37429630" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/bef91b04-ae2c-4be2-9658-7c38165eec55/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=bef91b04-ae2c-4be2-9658-7c38165eec55&amp;feed=kDNbmF_B"/>
      <itunes:title>From Chaos to Control: What If Your Cyber Program Helped You Sleep at Night? | A ThreatLocker Brand Story with Rob Allen</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rob Allen</itunes:author>
      <itunes:duration>00:38:59</itunes:duration>
      <itunes:summary>In this Brand Story episode, Rob Allen, Chief Product Officer at ThreatLocker, shares how the company is transforming cybersecurity by prioritizing control and visibility without disrupting user experience. This episode explores why moving from “trust but verify” to “block by default” is not just possible—it’s essential for modern security programs.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode, Rob Allen, Chief Product Officer at ThreatLocker, shares how the company is transforming cybersecurity by prioritizing control and visibility without disrupting user experience. This episode explores why moving from “trust but verify” to “block by default” is not just possible—it’s essential for modern security programs.</itunes:subtitle>
      <itunes:keywords>user experience, marketing podcast, marco ciappelli, security posture, msp, sean martin, threat detection, rob allen, cybersecurity, patch management, application security, endpoint security, data insights, enterprise it, digital risk, brand marketing, web control, cyber hygiene, access control, software policies, brand story podcast, zero trust, it operations, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>103</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6ccc46f8-ef70-4cbe-a07a-68cfdfe5db13</guid>
      <title>Protecting What Matters, With Chris Pierson of BlackCloak | A RSAC Conference 2025 Pre-Event Conversation</title>
      <description><![CDATA[<p>As the cybersecurity world gears up for RSAC 2025 in San Francisco, we hit the road again—this time with Chris Pierson, Founder and CEO of BlackCloak, for a pre-event chat packed with insight, community spirit, and some big news.</p><p>Chris is no stranger to the RSA stage—this year marks his 21st year presenting—and he’s bringing his energy to two powerful sessions. The first, titled “Protecting What Matters: Your Family and Home,” kicks off bright and early on Monday, April 28. It’s not about blinky lights or enterprise networks—it’s about us. The cybersecurity community often talks about protecting organizations, but what about protecting ourselves and our families? Chris will explore how security pros can apply their skills at home, covering identity theft, scams, and home network safety. It’s a refreshing and much-needed call to action that connects the personal and professional.</p><p>On Wednesday, Chris returns with co-presenter James Shreve for a two-hour Learning Lab, “When Things Go Boom: Supply Chain Risk.” This Chatham House Rule session dives deep into one of today’s most complex challenges: managing third-party risk without stopping the business in its tracks. Participants will step into different roles—board members, CISOs, legal, finance—to engage in a live, collaborative scenario that pushes them to think beyond checklists. Real talk. Real collaboration. And practical takeaways.</p><p>But that’s not all. BlackCloak is also unveiling its new Digital Executive Protection Framework, designed to help organizations assess and strengthen protections for executives and their families. Chris teases that this framework includes 14 essential tenets that blend physical, digital, and organizational awareness—and he’ll be sitting down with us again at the event to go deeper.</p><p>With 15–20 BlackCloak team members on site, a full schedule of meetings, events, and community conversations, this year is shaping up to be a milestone for BlackCloak at RSAC. If you’re attending, keep an eye on their LinkedIn page for updates, booking links, and suite details.</p><p>As Chris says, it’s about lifting our heads, scanning the horizon, and showing up for our community—and our families.</p><p>Keywords: RSAC2025, Chris Pierson, BlackCloak, cybersecurity, RSA Conference, digital protection, executive protection, supply chain risk, identity theft, privacy, home network security, third-party risk, CISOs, cybersecurity community, digital executive protection framework, GRC, threat intelligence, infosec, personal security, cybersecurity awareness</p><p><strong>______________________</strong><br /><br /><strong>Guest: Chris Pierson</strong>, Founder & CEO of BLACKCLOAK | Digital Executive Protection | Concierge Cybersecurity & Privacy Protection . . . in their Personal Lives | On LinkedIn: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>BLACKCLOAK:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>Chris Sessions</strong><br />Protecting What Matters—Your Family & Home <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU</a></p><p>When Things Go Boom! Your Supply Chain Risk<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM</a></p><p>BLACKCLOAK WEBSITE:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 9 Apr 2025 06:38:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/protecting-what-matters-with-chris-pierson-of-blackcloak-a-rsac-conference-2025-pre-event-conversation-KalvQ1pM</link>
      <content:encoded><![CDATA[<p>As the cybersecurity world gears up for RSAC 2025 in San Francisco, we hit the road again—this time with Chris Pierson, Founder and CEO of BlackCloak, for a pre-event chat packed with insight, community spirit, and some big news.</p><p>Chris is no stranger to the RSA stage—this year marks his 21st year presenting—and he’s bringing his energy to two powerful sessions. The first, titled “Protecting What Matters: Your Family and Home,” kicks off bright and early on Monday, April 28. It’s not about blinky lights or enterprise networks—it’s about us. The cybersecurity community often talks about protecting organizations, but what about protecting ourselves and our families? Chris will explore how security pros can apply their skills at home, covering identity theft, scams, and home network safety. It’s a refreshing and much-needed call to action that connects the personal and professional.</p><p>On Wednesday, Chris returns with co-presenter James Shreve for a two-hour Learning Lab, “When Things Go Boom: Supply Chain Risk.” This Chatham House Rule session dives deep into one of today’s most complex challenges: managing third-party risk without stopping the business in its tracks. Participants will step into different roles—board members, CISOs, legal, finance—to engage in a live, collaborative scenario that pushes them to think beyond checklists. Real talk. Real collaboration. And practical takeaways.</p><p>But that’s not all. BlackCloak is also unveiling its new Digital Executive Protection Framework, designed to help organizations assess and strengthen protections for executives and their families. Chris teases that this framework includes 14 essential tenets that blend physical, digital, and organizational awareness—and he’ll be sitting down with us again at the event to go deeper.</p><p>With 15–20 BlackCloak team members on site, a full schedule of meetings, events, and community conversations, this year is shaping up to be a milestone for BlackCloak at RSAC. If you’re attending, keep an eye on their LinkedIn page for updates, booking links, and suite details.</p><p>As Chris says, it’s about lifting our heads, scanning the horizon, and showing up for our community—and our families.</p><p>Keywords: RSAC2025, Chris Pierson, BlackCloak, cybersecurity, RSA Conference, digital protection, executive protection, supply chain risk, identity theft, privacy, home network security, third-party risk, CISOs, cybersecurity community, digital executive protection framework, GRC, threat intelligence, infosec, personal security, cybersecurity awareness</p><p><strong>______________________</strong><br /><br /><strong>Guest: Chris Pierson</strong>, Founder & CEO of BLACKCLOAK | Digital Executive Protection | Concierge Cybersecurity & Privacy Protection . . . in their Personal Lives | On LinkedIn: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>BLACKCLOAK:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RSA Conference 2025 coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage" target="_blank">https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p><strong>Chris Sessions</strong><br />Protecting What Matters—Your Family & Home <a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1739369849404001eWtU</a></p><p>When Things Go Boom! Your Supply Chain Risk<br /><a href="https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM" target="_blank">https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1727434586212001yGwM</a></p><p>BLACKCLOAK WEBSITE:<br /><a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="16886928" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6eeb8000-e84f-4b36-ab73-89e98a74af8b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6eeb8000-e84f-4b36-ab73-89e98a74af8b&amp;feed=kDNbmF_B"/>
      <itunes:title>Protecting What Matters, With Chris Pierson of BlackCloak | A RSAC Conference 2025 Pre-Event Conversation</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson</itunes:author>
      <itunes:duration>00:17:35</itunes:duration>
      <itunes:summary>Ahead of RSAC 2025, we hit the road with BlackCloak’s founder Chris Pierson to explore how cybersecurity pros can protect what matters most—at work and at home. From supply chain risk to executive protection, it’s a powerful conversation about community, leadership, and digital safety.
</itunes:summary>
      <itunes:subtitle>Ahead of RSAC 2025, we hit the road with BlackCloak’s founder Chris Pierson to explore how cybersecurity pros can protect what matters most—at work and at home. From supply chain risk to executive protection, it’s a powerful conversation about community, leadership, and digital safety.
</itunes:subtitle>
      <itunes:keywords>compliance, digital protection, chris pierson, marco ciappelli, rsa conference, grc, supply chain risk, sean martin, supply chain security, infosec, blackcloak, personal security, identity theft, home network security, cybersecurity, nist, risk management, data protection, threat intelligence, executive protection, rsac2025, third-party risk, cybersecurity community, digital executive protection framework, cybersecurity awareness, cisos, privacy, brand story podcast, zero trust, vulnerability management, brand story, device control, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>102</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">cb62065f-e7bf-467c-a75b-7256f4977eb3</guid>
      <title>From Military-Grade Security to Everyday Protection: A Beachhead Solutions Brand Story with Cam Roberson</title>
      <description><![CDATA[<p>🎙️✨ From Military-Grade Security to Everyday Protection: A Beachhead Solutions Brand Story</p><p>How does a military-born cybersecurity solution empower MSPs and SMBs in today’s compliance-driven world? Here’s the Beachhead Solutions story.</p><p>When it comes to cybersecurity, one thing is clear: the Wild West may have lost a “wild,” but it’s still lawless out there. In this ITSPmagazine Brand Story, Sean Martin and Marco Ciappelli sit down with Cam Roberson of Beachhead Solutions—a company with deep roots in military-grade data protection and a forward-thinking approach to endpoint security.</p><p>Cam shares how Beachhead Solutions began two decades ago, solving a very real problem for the military: how to instantly and securely destroy sensitive data on compromised devices like laptops in Humvees. Today, that same secure mindset powers a solution designed not just for high-risk environments, but also for businesses of all sizes that need to manage device security and compliance without locking down operations.</p><p>What sets Beachhead apart? Their philosophy of “trust but verify.” Unlike rigid zero trust models that can frustrate users and slow productivity, Beachhead enables granular access control based on real-time risk conditions—automated and scalable. Their “Risk Responder” technology evaluates behavior and environment to enforce adaptive policies, ensuring protection without constant human oversight.</p><p>Whether you’re a small business or an enterprise MSP, compliance is no longer optional. Cam discusses the increasing pressure from frameworks like NIST, HIPAA, CMMC, and the FTC Safeguards Rule—regulations that apply across industries and sizes. Beachhead’s cloud-native platform helps companies prepare, adapt, and prove compliance through detailed reporting and control over data access.</p><p>What’s more, their MSP-first model isn’t just a reseller program. Partners get concierge onboarding, flexible monthly billing, and free internal use of the platform—because they’re part of the supply chain too. With Beachhead, MSPs aren’t just meeting regulatory checkboxes; they’re showing value to clients and securing new business opportunities in a rapidly evolving threat landscape.</p><p>From USB-stolen “startup kits” to porch-tossed medical laptops, Cam’s anecdotes highlight the real-world chaos that their solution brings order to.</p><p>Ready to move from wild to wise? Beachhead Solutions has your back.</p><p>⸻</p><p>Keywords:</p><p>endpoint security, data protection, zero trust, risk responder, MSP, SMB security, device control, cybersecurity, compliance, NIST, HIPAA, FTC safeguards, CMMC, supply chain security, secure data wipe, remote access control, encryption, managed services, cloud-native security, Beachhead Solutions, adaptive security</p><p>Learn more about BeachHead Solutions : <a href="https://itspm.ag/beachhead-solutions-r49e" target="_blank">https://itspm.ag/beachhead-solutions-r49e</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i><br /><br /><i>_______________________________________</i></p><p><strong>Guest: Cam Roberson </strong><br /><br />🔗 Cam Roberson on LinkedIn: <a href="https://www.linkedin.com/in/camroberson/" target="_blank">https://www.linkedin.com/in/camroberson/</a><br /> </p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Beachhead Solutions: <a href="https://www.itspmagazine.com/directory/beach-head-solutions" target="_blank">https://www.itspmagazine.com/directory/beach-head-solutions</a></p><p>____________________________<br /><br />Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sun, 6 Apr 2025 00:44:57 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Cam Roberson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-military-grade-security-to-everyday-protection-a-beachhead-solutions-brand-story-with-cam-roberson-yhd6DDxc</link>
      <content:encoded><![CDATA[<p>🎙️✨ From Military-Grade Security to Everyday Protection: A Beachhead Solutions Brand Story</p><p>How does a military-born cybersecurity solution empower MSPs and SMBs in today’s compliance-driven world? Here’s the Beachhead Solutions story.</p><p>When it comes to cybersecurity, one thing is clear: the Wild West may have lost a “wild,” but it’s still lawless out there. In this ITSPmagazine Brand Story, Sean Martin and Marco Ciappelli sit down with Cam Roberson of Beachhead Solutions—a company with deep roots in military-grade data protection and a forward-thinking approach to endpoint security.</p><p>Cam shares how Beachhead Solutions began two decades ago, solving a very real problem for the military: how to instantly and securely destroy sensitive data on compromised devices like laptops in Humvees. Today, that same secure mindset powers a solution designed not just for high-risk environments, but also for businesses of all sizes that need to manage device security and compliance without locking down operations.</p><p>What sets Beachhead apart? Their philosophy of “trust but verify.” Unlike rigid zero trust models that can frustrate users and slow productivity, Beachhead enables granular access control based on real-time risk conditions—automated and scalable. Their “Risk Responder” technology evaluates behavior and environment to enforce adaptive policies, ensuring protection without constant human oversight.</p><p>Whether you’re a small business or an enterprise MSP, compliance is no longer optional. Cam discusses the increasing pressure from frameworks like NIST, HIPAA, CMMC, and the FTC Safeguards Rule—regulations that apply across industries and sizes. Beachhead’s cloud-native platform helps companies prepare, adapt, and prove compliance through detailed reporting and control over data access.</p><p>What’s more, their MSP-first model isn’t just a reseller program. Partners get concierge onboarding, flexible monthly billing, and free internal use of the platform—because they’re part of the supply chain too. With Beachhead, MSPs aren’t just meeting regulatory checkboxes; they’re showing value to clients and securing new business opportunities in a rapidly evolving threat landscape.</p><p>From USB-stolen “startup kits” to porch-tossed medical laptops, Cam’s anecdotes highlight the real-world chaos that their solution brings order to.</p><p>Ready to move from wild to wise? Beachhead Solutions has your back.</p><p>⸻</p><p>Keywords:</p><p>endpoint security, data protection, zero trust, risk responder, MSP, SMB security, device control, cybersecurity, compliance, NIST, HIPAA, FTC safeguards, CMMC, supply chain security, secure data wipe, remote access control, encryption, managed services, cloud-native security, Beachhead Solutions, adaptive security</p><p>Learn more about BeachHead Solutions : <a href="https://itspm.ag/beachhead-solutions-r49e" target="_blank">https://itspm.ag/beachhead-solutions-r49e</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i><br /><br /><i>_______________________________________</i></p><p><strong>Guest: Cam Roberson </strong><br /><br />🔗 Cam Roberson on LinkedIn: <a href="https://www.linkedin.com/in/camroberson/" target="_blank">https://www.linkedin.com/in/camroberson/</a><br /> </p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Beachhead Solutions: <a href="https://www.itspmagazine.com/directory/beach-head-solutions" target="_blank">https://www.itspmagazine.com/directory/beach-head-solutions</a></p><p>____________________________<br /><br />Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="26965566" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/cb8333bd-3718-49bb-af01-337f81f117e0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=cb8333bd-3718-49bb-af01-337f81f117e0&amp;feed=kDNbmF_B"/>
      <itunes:title>From Military-Grade Security to Everyday Protection: A Beachhead Solutions Brand Story with Cam Roberson</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Cam Roberson</itunes:author>
      <itunes:duration>00:28:05</itunes:duration>
      <itunes:summary>How does a military-born cybersecurity solution empower MSPs and SMBs in today’s compliance-driven world? Here’s the Beachhead Solutions story.</itunes:summary>
      <itunes:subtitle>How does a military-born cybersecurity solution empower MSPs and SMBs in today’s compliance-driven world? Here’s the Beachhead Solutions story.</itunes:subtitle>
      <itunes:keywords>compliance, managed services, marketing podcast, marco ciappelli, smb security, developer training, software security, remote access control, msp, sean martin, supply chain security, hipaa, cloud-native security, cybersecurity, authentication, nist, risk management, secure data wipe, endpoint security, adaptive security, data protection, risk responder, ftc safeguards, encryption, cmmc, beachhead solutions, brand story podcast, zero trust, vulnerability management, brand story, device control, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>101</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8d344b63-0756-4031-ac02-95316d941ccf</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Nerdio Brand Story with Will Ominsky</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how Nerdio helps MSPs and IT teams simplify Microsoft cloud management while keeping security front and center. Learn how their platform supports a Zero Trust mindset by making it easier to manage infrastructure, policies, and Microsoft 365 environments in a rapidly changing cloud landscape.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Nerdio: <a href="https://www.itspmagazine.com/directory/nerdio" target="_blank">https://www.itspmagazine.com/directory/nerdio</a></p><p><strong>Guest: Will Ominsky,</strong> VP MSP Sales at Nerdio | On LinkedIn: <a href="https://www.linkedin.com/in/will-ominsky/" target="_blank">https://www.linkedin.com/in/will-ominsky/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 28 Mar 2025 01:29:37 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Will Ominsky)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-nerdio-brand-story-with-will-ominsky-F7r1l3SS</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how Nerdio helps MSPs and IT teams simplify Microsoft cloud management while keeping security front and center. Learn how their platform supports a Zero Trust mindset by making it easier to manage infrastructure, policies, and Microsoft 365 environments in a rapidly changing cloud landscape.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Nerdio: <a href="https://www.itspmagazine.com/directory/nerdio" target="_blank">https://www.itspmagazine.com/directory/nerdio</a></p><p><strong>Guest: Will Ominsky,</strong> VP MSP Sales at Nerdio | On LinkedIn: <a href="https://www.linkedin.com/in/will-ominsky/" target="_blank">https://www.linkedin.com/in/will-ominsky/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1416146" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7ebc945a-2ccb-4413-bc94-83ef35560788/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7ebc945a-2ccb-4413-bc94-83ef35560788&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Nerdio Brand Story with Will Ominsky</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Will Ominsky</itunes:author>
      <itunes:duration>00:01:28</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how Nerdio helps MSPs and IT teams simplify Microsoft cloud management while keeping security front and center. Learn how their platform supports a Zero Trust mindset by making it easier to manage infrastructure, policies, and Microsoft 365 environments in a rapidly changing cloud landscape.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how Nerdio helps MSPs and IT teams simplify Microsoft cloud management while keeping security front and center. Learn how their platform supports a Zero Trust mindset by making it easier to manage infrastructure, policies, and Microsoft 365 environments in a rapidly changing cloud landscape.</itunes:subtitle>
      <itunes:keywords>compliance, network security, secure communication, zero trust world, nerdio, automation, endpoint protection, cybersecurity, will ominsky, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, it management, ztw, identity verification, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>100</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bfa2cdea-2580-4588-b301-051759556630</guid>
      <title>Turning Developers into Security Champions: The Business Case for Secure Development | A Manicode Brand Story with Jim Manico</title>
      <description><![CDATA[<p>Organizations build and deploy applications at an unprecedented pace, but security is often an afterthought. This episode of <i>ITSPmagazine’s Brand Story</i> features Jim Manico, founder of Manicode Security, in conversation with hosts Sean Martin and Marco Ciappelli. The discussion explores the current state of application security, the importance of developer training, and how organizations can integrate security from the ground up to drive better business outcomes.</p><p><strong>The Foundation of Secure Development</strong></p><p>Jim Manico has spent decades helping engineers and architects understand and implement secure coding practices. His work with the Open Web Application Security Project (OWASP), including contributions to the OWASP Top 10 and the OWASP Cheat Sheet Series, has influenced how security is approached in software development. He emphasizes that security should not be an afterthought but a fundamental part of the development process.</p><p>He highlights OWASP’s role in providing documentation, security tools, and standards like the Application Security Verification Standard (ASVS), which is now in its 5.0 release. These resources help organizations build secure applications, but Manico points out that simply having the guidance available isn’t enough—engineers need the right training to apply security principles effectively.</p><p><strong>Why Training Matters</strong></p><p>Manico has trained thousands of engineers worldwide and sees firsthand the impact of hands-on education. He explains that developers often lack formal security training, which leads to common mistakes such as insecure authentication, improper data handling, and vulnerabilities in third-party dependencies. His training programs focus on practical, real-world applications, allowing developers to immediately integrate security into their work.</p><p>Security training also helps businesses beyond just compliance. While some companies initially engage in training to meet regulatory requirements, many realize the long-term value of security in reducing risk, improving product quality, and building customer trust. Manico shares an example of a startup that embedded security from the beginning, investing heavily in training early on. That approach helped differentiate them in the market and contributed to their success as a multi-billion-dollar company.</p><p><strong>The Role of AI and Continuous Learning</strong></p><p>Manico acknowledges that the speed of technological change presents challenges for security training. Frameworks, programming languages, and attack techniques evolve constantly, requiring continuous learning. He has integrated AI tools into his training workflow to help answer complex questions, identify knowledge gaps, and refine content. AI serves as an augmentation tool, not a replacement, and he encourages developers to use it as an assistant to strengthen their understanding of security concepts.</p><p><strong>Security as a Business Enabler</strong></p><p>The conversation reinforces that secure coding is not just about avoiding breaches—it is about building better software. Organizations that prioritize security early can reduce costs, improve reliability, and increase customer confidence. Manico’s approach to education is about empowering developers to think beyond compliance and see security as a critical component of software quality and business success.</p><p>For organizations looking to enhance their security posture, developer training is an investment that pays off. Manicode Security offers customized training programs to meet the specific needs of teams, covering topics from secure coding fundamentals to advanced application security techniques. To learn more or schedule a session, Jim Manico can be reached at <a href="mailto:Jim@manicode.com">Jim@manicode.com</a>.</p><p>Tune in to the full episode to hear more insights from Jim Manico on how security training is shaping the future of application security.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 6 Mar 2025 16:54:06 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Manico)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/turning-developers-into-security-champions-the-business-case-for-secure-development-a-manicode-brand-story-with-jim-manico-_xuWXIly</link>
      <content:encoded><![CDATA[<p>Organizations build and deploy applications at an unprecedented pace, but security is often an afterthought. This episode of <i>ITSPmagazine’s Brand Story</i> features Jim Manico, founder of Manicode Security, in conversation with hosts Sean Martin and Marco Ciappelli. The discussion explores the current state of application security, the importance of developer training, and how organizations can integrate security from the ground up to drive better business outcomes.</p><p><strong>The Foundation of Secure Development</strong></p><p>Jim Manico has spent decades helping engineers and architects understand and implement secure coding practices. His work with the Open Web Application Security Project (OWASP), including contributions to the OWASP Top 10 and the OWASP Cheat Sheet Series, has influenced how security is approached in software development. He emphasizes that security should not be an afterthought but a fundamental part of the development process.</p><p>He highlights OWASP’s role in providing documentation, security tools, and standards like the Application Security Verification Standard (ASVS), which is now in its 5.0 release. These resources help organizations build secure applications, but Manico points out that simply having the guidance available isn’t enough—engineers need the right training to apply security principles effectively.</p><p><strong>Why Training Matters</strong></p><p>Manico has trained thousands of engineers worldwide and sees firsthand the impact of hands-on education. He explains that developers often lack formal security training, which leads to common mistakes such as insecure authentication, improper data handling, and vulnerabilities in third-party dependencies. His training programs focus on practical, real-world applications, allowing developers to immediately integrate security into their work.</p><p>Security training also helps businesses beyond just compliance. While some companies initially engage in training to meet regulatory requirements, many realize the long-term value of security in reducing risk, improving product quality, and building customer trust. Manico shares an example of a startup that embedded security from the beginning, investing heavily in training early on. That approach helped differentiate them in the market and contributed to their success as a multi-billion-dollar company.</p><p><strong>The Role of AI and Continuous Learning</strong></p><p>Manico acknowledges that the speed of technological change presents challenges for security training. Frameworks, programming languages, and attack techniques evolve constantly, requiring continuous learning. He has integrated AI tools into his training workflow to help answer complex questions, identify knowledge gaps, and refine content. AI serves as an augmentation tool, not a replacement, and he encourages developers to use it as an assistant to strengthen their understanding of security concepts.</p><p><strong>Security as a Business Enabler</strong></p><p>The conversation reinforces that secure coding is not just about avoiding breaches—it is about building better software. Organizations that prioritize security early can reduce costs, improve reliability, and increase customer confidence. Manico’s approach to education is about empowering developers to think beyond compliance and see security as a critical component of software quality and business success.</p><p>For organizations looking to enhance their security posture, developer training is an investment that pays off. Manicode Security offers customized training programs to meet the specific needs of teams, covering topics from secure coding fundamentals to advanced application security techniques. To learn more or schedule a session, Jim Manico can be reached at <a href="mailto:Jim@manicode.com">Jim@manicode.com</a>.</p><p>Tune in to the full episode to hear more insights from Jim Manico on how security training is shaping the future of application security.</p><p>Learn more about Manicode: <a href="https://itspm.ag/manicode-security-7q8i" target="_blank">https://itspm.ag/manicode-security-7q8i</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Manico</strong>, Founder and Secure Coding Educator at Manicode Security | On Linkedin: <a href="https://www.linkedin.com/in/jmanico/" target="_blank">https://www.linkedin.com/in/jmanico/</a></p><p><strong>Resources</strong></p><p>Download the Course Catalog: <a href="https://itspm.ag/manicode-x684" target="_blank">https://itspm.ag/manicode-x684</a></p><p>Learn more and catch more stories from Manicode Security: <a href="https://www.itspmagazine.com/directory/manicode-security" target="_blank">https://www.itspmagazine.com/directory/manicode-security</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="40731993" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/278375a5-8662-4ffc-b9f1-3bbec6b3a75b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=278375a5-8662-4ffc-b9f1-3bbec6b3a75b&amp;feed=kDNbmF_B"/>
      <itunes:title>Turning Developers into Security Champions: The Business Case for Secure Development | A Manicode Brand Story with Jim Manico</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Manico</itunes:author>
      <itunes:duration>00:42:25</itunes:duration>
      <itunes:summary>In this Brand Story episode, Jim Manico, founder of Manicode Security, shares how developer training, community-driven security initiatives like OWASP, and a proactive approach to secure coding can transform both engineers and businesses. From real-world success stories to the role of AI in security education, this conversation reveals why embedding security early is not just necessary—it’s a competitive advantage.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode, Jim Manico, founder of Manicode Security, shares how developer training, community-driven security initiatives like OWASP, and a proactive approach to secure coding can transform both engineers and businesses. From real-world success stories to the role of AI in security education, this conversation reveals why embedding security early is not just necessary—it’s a competitive advantage.</itunes:subtitle>
      <itunes:keywords>compliance, marketing podcast, marco ciappelli, developer training, software security, sean martin, cybersecurity, authentication, secure development, jim manico, application security, secure coding, software engineering, risk management, security education, appsec, brand marketing, owasp, devsecops, brand story podcast, vulnerability management, software architecture, brand story, threat modeling</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>99</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7aa69bec-8229-4f62-b490-a63d05939bf4</guid>
      <title>Bridging Digital and Physical Security: Protecting Executives in an Evolving Threat Landscape | A BlackCloak Brand Story with Chris Pierson</title>
      <description><![CDATA[<p>In an era where personal and professional lives are increasingly intertwined in the digital realm, the security of high-profile individuals extends far beyond corporate firewalls. Executives, board members, and high-net-worth individuals face growing threats not just to their businesses but also to their families and personal lives. The convergence of cybersecurity and physical security has never been more evident, and BlackCloak is at the forefront of addressing this modern challenge.</p><p>In this episode of ITSPmagazine’s Brand Story series, hosts Marco Ciappelli and Sean Martin sit down with Dr. Chris Pierson, CEO and Founder of BlackCloak, to explore the increasing risks posed by cybercriminals, data brokers, and even nation-state actors, all of whom exploit publicly available information to orchestrate real-world threats. With the rise of doxing, swatting, and targeted attacks on corporate leadership, it is clear that safeguarding digital identities is no longer optional—it is essential.</p><p>Dr. Pierson shares insights on how BlackCloak’s concierge approach blends cutting-edge technology with a personalized human touch, ensuring that executives and their families can navigate the digital world securely. From removing personal information from data broker websites to mitigating deep web threats, BlackCloak’s unique approach focuses on proactive protection rather than reactive crisis management. The conversation also touches on recent high-profile security breaches and their implications, highlighting the urgent need for businesses to extend cybersecurity measures beyond the enterprise network.</p><p>As digital and physical threats continue to merge, organizations must rethink their approach to executive security. This episode is a wake-up call for leaders who may underestimate the exposure they and their families face. Tune in to learn why digital executive protection is no longer a luxury but a necessity, and how BlackCloak is setting the standard for safeguarding the modern executive.</p><p>For those looking to take control of their digital privacy and security, visit BlackCloak.io and connect with Dr. Chris Pierson on LinkedIn. The intersection of cybersecurity and personal safety is here—how prepared are you?</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak | On Linkedin: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Resources</strong></p><p>Download the Whitepaper | Executive Protection at Home is the Major Gap in Cybersecurity: <a href="https://itspm.ag/blackcue74" target="_blank">https://itspm.ag/blackcue74</a></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 5 Mar 2025 17:30:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/bridging-digital-and-physical-security-protecting-executives-in-an-evolving-threat-landscape-a-blackcloak-brand-story-with-chris-pierson-gBMppt9O</link>
      <content:encoded><![CDATA[<p>In an era where personal and professional lives are increasingly intertwined in the digital realm, the security of high-profile individuals extends far beyond corporate firewalls. Executives, board members, and high-net-worth individuals face growing threats not just to their businesses but also to their families and personal lives. The convergence of cybersecurity and physical security has never been more evident, and BlackCloak is at the forefront of addressing this modern challenge.</p><p>In this episode of ITSPmagazine’s Brand Story series, hosts Marco Ciappelli and Sean Martin sit down with Dr. Chris Pierson, CEO and Founder of BlackCloak, to explore the increasing risks posed by cybercriminals, data brokers, and even nation-state actors, all of whom exploit publicly available information to orchestrate real-world threats. With the rise of doxing, swatting, and targeted attacks on corporate leadership, it is clear that safeguarding digital identities is no longer optional—it is essential.</p><p>Dr. Pierson shares insights on how BlackCloak’s concierge approach blends cutting-edge technology with a personalized human touch, ensuring that executives and their families can navigate the digital world securely. From removing personal information from data broker websites to mitigating deep web threats, BlackCloak’s unique approach focuses on proactive protection rather than reactive crisis management. The conversation also touches on recent high-profile security breaches and their implications, highlighting the urgent need for businesses to extend cybersecurity measures beyond the enterprise network.</p><p>As digital and physical threats continue to merge, organizations must rethink their approach to executive security. This episode is a wake-up call for leaders who may underestimate the exposure they and their families face. Tune in to learn why digital executive protection is no longer a luxury but a necessity, and how BlackCloak is setting the standard for safeguarding the modern executive.</p><p>For those looking to take control of their digital privacy and security, visit BlackCloak.io and connect with Dr. Chris Pierson on LinkedIn. The intersection of cybersecurity and personal safety is here—how prepared are you?</p><p>Learn more about BlackCloak: <a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak | On Linkedin: <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p><strong>Resources</strong></p><p>Download the Whitepaper | Executive Protection at Home is the Major Gap in Cybersecurity: <a href="https://itspm.ag/blackcue74" target="_blank">https://itspm.ag/blackcue74</a></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="28427593" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/09d3154a-ba77-4f53-866c-71d317fc426a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=09d3154a-ba77-4f53-866c-71d317fc426a&amp;feed=kDNbmF_B"/>
      <itunes:title>Bridging Digital and Physical Security: Protecting Executives in an Evolving Threat Landscape | A BlackCloak Brand Story with Chris Pierson</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson</itunes:author>
      <itunes:duration>00:29:36</itunes:duration>
      <itunes:summary>Cyber and physical threats are merging, putting executives and their families at risk. BlackCloak provides elite protection, blending digital security with real-world safeguards. Dr. Chris Pierson reveals how technology and human expertise combine to secure high-profile individuals in an interconnected world.</itunes:summary>
      <itunes:subtitle>Cyber and physical threats are merging, putting executives and their families at risk. BlackCloak provides elite protection, blending digital security with real-world safeguards. Dr. Chris Pierson reveals how technology and human expertise combine to secure high-profile individuals in an interconnected world.</itunes:subtitle>
      <itunes:keywords>securityleadership, cyberstrategy, highnetworth, ciso, cyberawareness, swatting, cybersecurity, digitalrisk, personalsecurity, threatintelligence, cybercrime, onlineprivacy, doxing, cyberresilience, datasecurity, cyberthreats, executiveprotection, cyberprotection, privacy, digitalidentity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>98</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">42e72892-4a78-40f8-aeed-3642934ab80d</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A The Tech Degenerates Brand Story with Martin Perkins</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how to address security, efficiency, and innovation, focusing on improving operational effectiveness and solving key challenges for businesses and/or MSPs. The conversation highlights an approach designed to enhance security, streamline processes, and help organizations better manage and protect their technology environments.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about The Tech Degenerates: <a href="https://www.itspmagazine.com/directory/the-tech-degenerates" target="_blank">https://www.itspmagazine.com/directory/the-tech-degenerates</a></p><p><strong>Guest: Martin Perkins,</strong> Co-Founder at The Tech Degenerates | On LinkedIn: <a href="https://www.linkedin.com/in/martinjperkins/" target="_blank">https://www.linkedin.com/in/martinjperkins/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:23:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Martin Perkins)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-the-tech-degenerates-brand-story-with-martin-perkins-XjVkommb</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how to address security, efficiency, and innovation, focusing on improving operational effectiveness and solving key challenges for businesses and/or MSPs. The conversation highlights an approach designed to enhance security, streamline processes, and help organizations better manage and protect their technology environments.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about The Tech Degenerates: <a href="https://www.itspmagazine.com/directory/the-tech-degenerates" target="_blank">https://www.itspmagazine.com/directory/the-tech-degenerates</a></p><p><strong>Guest: Martin Perkins,</strong> Co-Founder at The Tech Degenerates | On LinkedIn: <a href="https://www.linkedin.com/in/martinjperkins/" target="_blank">https://www.linkedin.com/in/martinjperkins/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1947382" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9a862faf-3732-4a7f-9a8d-ba10ff29ff41/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9a862faf-3732-4a7f-9a8d-ba10ff29ff41&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A The Tech Degenerates Brand Story with Martin Perkins</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Martin Perkins</itunes:author>
      <itunes:duration>00:02:01</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how to address security, efficiency, and innovation, focusing on improving operational effectiveness and solving key challenges for businesses and/or MSPs. The conversation highlights an approach designed to enhance security, streamline processes, and help organizations better manage and protect their technology environments.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how to address security, efficiency, and innovation, focusing on improving operational effectiveness and solving key challenges for businesses and/or MSPs. The conversation highlights an approach designed to enhance security, streamline processes, and help organizations better manage and protect their technology environments.</itunes:subtitle>
      <itunes:keywords>compliance, network security, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, martin perkins, it management, ztw, identity verification, the tech degenerates, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>97</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ac00a58d-026b-4fe9-a8a5-f52c05932736</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A FirmGuard by Phoenix Technologies Brand Story with Rob Inman</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how FirmGuard by Phoenix Technologies is revolutionizing BIOS security management for MSPs and IT teams. Learn how their remote BIOS management platform enhances security, ensures compliance, and simplifies critical updates without disrupting business operations.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about FirmGuard by Phoenix Technologies: <a href="https://www.itspmagazine.com/directory/phoenix-technologies" target="_blank">https://www.itspmagazine.com/directory/phoenix-technologies</a></p><p><strong>Guest: Rob Inman,</strong> Director of Products at FirmGuard by Phoenix Technologies | On LinkedIn: <a href="https://www.linkedin.com/in/robert-inman/" target="_blank">https://www.linkedin.com/in/robert-inman/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:20:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Rob Inman)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-firmguard-by-phoenix-technologies-brand-story-with-rob-inman-PKZx_NM_</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how FirmGuard by Phoenix Technologies is revolutionizing BIOS security management for MSPs and IT teams. Learn how their remote BIOS management platform enhances security, ensures compliance, and simplifies critical updates without disrupting business operations.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about FirmGuard by Phoenix Technologies: <a href="https://www.itspmagazine.com/directory/phoenix-technologies" target="_blank">https://www.itspmagazine.com/directory/phoenix-technologies</a></p><p><strong>Guest: Rob Inman,</strong> Director of Products at FirmGuard by Phoenix Technologies | On LinkedIn: <a href="https://www.linkedin.com/in/robert-inman/" target="_blank">https://www.linkedin.com/in/robert-inman/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2308910" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/2f9c1aab-996a-45a6-9d2e-b351e0f59309/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=2f9c1aab-996a-45a6-9d2e-b351e0f59309&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A FirmGuard by Phoenix Technologies Brand Story with Rob Inman</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Rob Inman</itunes:author>
      <itunes:duration>00:02:24</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how FirmGuard by Phoenix Technologies is revolutionizing BIOS security management for MSPs and IT teams. Learn how their remote BIOS management platform enhances security, ensures compliance, and simplifies critical updates without disrupting business operations.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how FirmGuard by Phoenix Technologies is revolutionizing BIOS security management for MSPs and IT teams. Learn how their remote BIOS management platform enhances security, ensures compliance, and simplifies critical updates without disrupting business operations.</itunes:subtitle>
      <itunes:keywords>compliance, network security, secure communication, zero trust world, rob inman, automation, endpoint protection, cybersecurity, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, firmguard by phoenix technologies, it management, ztw, identity verification, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>96</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a5db4225-28fa-4065-9f4d-0cf5436f0b9c</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | An inforcer Brand Story with Rachel Harris</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how inforcer helps MSPs simplify and strengthen Microsoft 365 security management across multiple tenants. Learn how their platform reduces complexity, minimizes human error, and ensures organizations effectively enforce security policies at scale.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about inforcer: <a href="https://www.itspmagazine.com/directory/inforcer" target="_blank">https://www.itspmagazine.com/directory/inforcer</a></p><p><strong>Guest: Rachel Harris,</strong> Senior Account Manager at inforcer | On LinkedIn: <a href="https://www.linkedin.com/in/rachel-harris-6b3173188/" target="_blank">https://www.linkedin.com/in/rachel-harris-6b3173188/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:18:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Rachel Harris)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-an-inforcer-brand-story-with-rachel-harris-3ac24Ep9</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how inforcer helps MSPs simplify and strengthen Microsoft 365 security management across multiple tenants. Learn how their platform reduces complexity, minimizes human error, and ensures organizations effectively enforce security policies at scale.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about inforcer: <a href="https://www.itspmagazine.com/directory/inforcer" target="_blank">https://www.itspmagazine.com/directory/inforcer</a></p><p><strong>Guest: Rachel Harris,</strong> Senior Account Manager at inforcer | On LinkedIn: <a href="https://www.linkedin.com/in/rachel-harris-6b3173188/" target="_blank">https://www.linkedin.com/in/rachel-harris-6b3173188/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2112886" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/933ed7b8-a895-466c-8cd7-ca2d8b76a401/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=933ed7b8-a895-466c-8cd7-ca2d8b76a401&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | An inforcer Brand Story with Rachel Harris</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Rachel Harris</itunes:author>
      <itunes:duration>00:02:12</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how inforcer helps MSPs simplify and strengthen Microsoft 365 security management across multiple tenants. Learn how their platform reduces complexity, minimizes human error, and ensures organizations effectively enforce security policies at scale.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how inforcer helps MSPs simplify and strengthen Microsoft 365 security management across multiple tenants. Learn how their platform reduces complexity, minimizes human error, and ensures organizations effectively enforce security policies at scale.</itunes:subtitle>
      <itunes:keywords>compliance, network security, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, rachel harris, security awareness, msp security, cloud security, it management, ztw, identity verification, zero trust, inforcer</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>95</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">faa4ff29-819c-462e-958b-96ffdd8c8e70</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A bvoip Brand Story with Ryan Denning</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how 1Stream Powered by bvoip is enhancing MSP communications with an integrated platform designed to improve security and operational efficiency. Learn how their solutions, including pin code verification, support a Zero Trust approach to authentication and customer interactions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about bvoip: <a href="https://www.itspmagazine.com/directory/bvoip" target="_blank">https://www.itspmagazine.com/directory/bvoip</a></p><p><strong>Guest: Ryan Denning,</strong> Vice President of Sales at bvoip | On LinkedIn: <a href="https://www.linkedin.com/in/ryandenning/">https://www.linkedin.com/in/ryandenning/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:07:21 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ryan Denning)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-bvoip-brand-story-with-ryan-denning-0m_GN6HY</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how 1Stream Powered by bvoip is enhancing MSP communications with an integrated platform designed to improve security and operational efficiency. Learn how their solutions, including pin code verification, support a Zero Trust approach to authentication and customer interactions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about bvoip: <a href="https://www.itspmagazine.com/directory/bvoip" target="_blank">https://www.itspmagazine.com/directory/bvoip</a></p><p><strong>Guest: Ryan Denning,</strong> Vice President of Sales at bvoip | On LinkedIn: <a href="https://www.linkedin.com/in/ryandenning/">https://www.linkedin.com/in/ryandenning/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1609673" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d0accd5a-2594-4655-9634-c206e42e887c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d0accd5a-2594-4655-9634-c206e42e887c&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A bvoip Brand Story with Ryan Denning</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ryan Denning</itunes:author>
      <itunes:duration>00:01:40</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how 1Stream Powered by bvoip is enhancing MSP communications with an integrated platform designed to improve security and operational efficiency. Learn how their solutions, including pin code verification, support a Zero Trust approach to authentication and customer interactions.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how 1Stream Powered by bvoip is enhancing MSP communications with an integrated platform designed to improve security and operational efficiency. Learn how their solutions, including pin code verification, support a Zero Trust approach to authentication and customer interactions.</itunes:subtitle>
      <itunes:keywords>compliance, network security, bvoip, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, ryan denning, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, it management, ztw, identity verification, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>94</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">36fbf243-3da9-40ce-b53e-0515a79681be</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | An INFIMA Security Brand Story with Isabelle Jacob</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how INFIMA Security is making security awareness training effortless and effective for businesses and MSPs. Learn how their automated, API-driven platform delivers phishing simulations and training without compromising security, helping organizations build a stronger human defense against cyber threats.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about INFIMA Security: <a href="https://itspmagazine.com/directory/infima-security" target="_blank">https://itspmagazine.com/directory/infima-security</a></p><p><strong>Guest: Isabelle Jacob,</strong> Channel Events Specialist at INFIMA Security | On LinkedIn: <a href="https://www.linkedin.com/in/isabelle-jacob/" target="_blank">https://www.linkedin.com/in/isabelle-jacob/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:04:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Isabelle Jacob)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-an-infima-security-brand-story-with-isabelle-jacob-JqvvwoFt</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how INFIMA Security is making security awareness training effortless and effective for businesses and MSPs. Learn how their automated, API-driven platform delivers phishing simulations and training without compromising security, helping organizations build a stronger human defense against cyber threats.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about INFIMA Security: <a href="https://itspmagazine.com/directory/infima-security" target="_blank">https://itspmagazine.com/directory/infima-security</a></p><p><strong>Guest: Isabelle Jacob,</strong> Channel Events Specialist at INFIMA Security | On LinkedIn: <a href="https://www.linkedin.com/in/isabelle-jacob/" target="_blank">https://www.linkedin.com/in/isabelle-jacob/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1592107" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c0e6cea4-f000-4db4-ba5a-bf70ad45a1c8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c0e6cea4-f000-4db4-ba5a-bf70ad45a1c8&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | An INFIMA Security Brand Story with Isabelle Jacob</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Isabelle Jacob</itunes:author>
      <itunes:duration>00:01:39</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how INFIMA Security is making security awareness training effortless and effective for businesses and MSPs. Learn how their automated, API-driven platform delivers phishing simulations and training without compromising security, helping organizations build a stronger human defense against cyber threats.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how INFIMA Security is making security awareness training effortless and effective for businesses and MSPs. Learn how their automated, API-driven platform delivers phishing simulations and training without compromising security, helping organizations build a stronger human defense against cyber threats.</itunes:subtitle>
      <itunes:keywords>compliance, network security, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, infima security, cloud security, it management, ztw, identity verification, zero trust, isabelle jacob</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>93</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">09b4210f-c14e-4053-b172-0b7ceb3c4bee</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Vasion Brand Story with Michael Bennett</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how Vasion is transforming document management and secure printing with a cloud-first approach. Learn how their solutions help organizations eliminate legacy processes, enhance security, and align with Zero Trust principles for greater compliance and efficiency.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Vasion: <a href="https://itspmagazine.com/directory/vasion" target="_blank">https://itspmagazine.com/directory/vasion</a></p><p><strong>Guest: Michael Bennett,</strong> Business Development Manager at Vasion AI | On LinkedIn: <a href="https://www.linkedin.com/in/%F0%9F%96%A8%EF%B8%8F-michael-bennett-9a52478/" target="_blank">https://www.linkedin.com/in/%F0%9F%96%A8%EF%B8%8F-michael-bennett-9a52478/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 21:02:18 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Michael Bennett)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-vasion-brand-story-with-michael-bennett-0XQ8Y_Va</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how Vasion is transforming document management and secure printing with a cloud-first approach. Learn how their solutions help organizations eliminate legacy processes, enhance security, and align with Zero Trust principles for greater compliance and efficiency.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Vasion: <a href="https://itspmagazine.com/directory/vasion" target="_blank">https://itspmagazine.com/directory/vasion</a></p><p><strong>Guest: Michael Bennett,</strong> Business Development Manager at Vasion AI | On LinkedIn: <a href="https://www.linkedin.com/in/%F0%9F%96%A8%EF%B8%8F-michael-bennett-9a52478/" target="_blank">https://www.linkedin.com/in/%F0%9F%96%A8%EF%B8%8F-michael-bennett-9a52478/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2081537" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5a71c4b3-e2d2-4c6f-bade-40ffd9860fcf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5a71c4b3-e2d2-4c6f-bade-40ffd9860fcf&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Vasion Brand Story with Michael Bennett</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Michael Bennett</itunes:author>
      <itunes:duration>00:02:10</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how Vasion is transforming document management and secure printing with a cloud-first approach. Learn how their solutions help organizations eliminate legacy processes, enhance security, and align with Zero Trust principles for greater compliance and efficiency.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how Vasion is transforming document management and secure printing with a cloud-first approach. Learn how their solutions help organizations eliminate legacy processes, enhance security, and align with Zero Trust principles for greater compliance and efficiency.</itunes:subtitle>
      <itunes:keywords>compliance, vasion, network security, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, michael bennett, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, it management, ztw, identity verification, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>92</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e315b4b9-678c-4943-86fa-3fa4e64a7f71</guid>
      <title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Hatz AI Brand Story with Mark Leeper</title>
      <description><![CDATA[<p>In this Short Brand Story episode, we explore how HatzAI is helping MSPs harness the power of AI securely, ensuring sensitive data remains protected while leveraging the latest AI advancements. Learn how their approach to zero retention and read-only formats keeps intellectual property safe, preventing unintended data exposure to AI training models.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Hatz AI: <a href="https://itspmagazine.com/directory/hatz-ai" target="_blank">https://itspmagazine.com/directory/hatz-ai</a></p><p><strong>Guest: Mark Leeper,</strong> Sr. Manager, AI Adoption at Hatz AI | On LinkedIn: <a href="https://www.linkedin.com/in/mark-leeper-09612aa3/" target="_blank">https://www.linkedin.com/in/mark-leeper-09612aa3/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Mar 2025 20:59:49 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Mark Leeper)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-short-brand-story-conversation-from-threatlocker-zero-trust-world-2025-a-hatz-ai-brand-story-with-mark-leeper-oCkyl__F</link>
      <content:encoded><![CDATA[<p>In this Short Brand Story episode, we explore how HatzAI is helping MSPs harness the power of AI securely, ensuring sensitive data remains protected while leveraging the latest AI advancements. Learn how their approach to zero retention and read-only formats keeps intellectual property safe, preventing unintended data exposure to AI training models.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p>Learn more about Hatz AI: <a href="https://itspmagazine.com/directory/hatz-ai" target="_blank">https://itspmagazine.com/directory/hatz-ai</a></p><p><strong>Guest: Mark Leeper,</strong> Sr. Manager, AI Adoption at Hatz AI | On LinkedIn: <a href="https://www.linkedin.com/in/mark-leeper-09612aa3/" target="_blank">https://www.linkedin.com/in/mark-leeper-09612aa3/</a></p><p><strong>RESOURCES</strong></p><p>Learn more and catch more stories from ThreatLocker Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p>Catch all of our event coverage on ITSPmagazine: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="3508032" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0995fb7d-c539-438e-a931-a13a2f4c3fe8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0995fb7d-c539-438e-a931-a13a2f4c3fe8&amp;feed=kDNbmF_B"/>
      <itunes:title>A Short Brand Story Conversation From ThreatLocker Zero Trust World 2025 | A Hatz AI Brand Story with Mark Leeper</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Mark Leeper</itunes:author>
      <itunes:duration>00:03:39</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, we explore how HatzAI is helping MSPs harness the power of AI securely, ensuring sensitive data remains protected while leveraging the latest AI advancements. Learn how their approach to zero retention and read-only formats keeps intellectual property safe, preventing unintended data exposure to AI training models.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, we explore how HatzAI is helping MSPs harness the power of AI securely, ensuring sensitive data remains protected while leveraging the latest AI advancements. Learn how their approach to zero retention and read-only formats keeps intellectual property safe, preventing unintended data exposure to AI training models.</itunes:subtitle>
      <itunes:keywords>mark leeper, compliance, network security, secure communication, zero trust world, automation, endpoint protection, cybersecurity, technology innovation, operational efficiency, risk management, ztw25, threat protection, data protection, security awareness, msp security, cloud security, it management, hatz ai, ztw, identity verification, zero trust</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>91</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ee799c44-e66d-44f0-abd1-98246df5ae42</guid>
      <title>How Healthcare Organizations Can Achieve a Near-Zero Breach Rate | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</title>
      <description><![CDATA[<p>During the HIMSS Global Conference 2025 in Las Vegas, Sean Martin and Marco Ciappelli sat down with Ryan Patrick, Vice President of Adoption at HITRUST, for an insightful conversation about cybersecurity and risk management in healthcare. Rather than a traditional recap of the conference session, this discussion explores the critical role HITRUST plays in helping healthcare organizations navigate regulatory requirements, manage risk, and ensure patient safety through robust cybersecurity practices.</p><p><strong>Bridging Regulation and Real-World Application</strong></p><p>Ryan Patrick shared that HITRUST has spent over 17 years translating federal healthcare regulations into actionable frameworks for organizations. His role involves educating the market about HITRUST’s initiatives while continuously learning from industry feedback. This bi-directional exchange ensures that HITRUST’s frameworks and controls remain relevant and effective. Patrick emphasized the importance of HITRUST’s dynamic approach, highlighting that their framework is updated quarterly to address the latest cybersecurity threats. This frequency sets HITRUST apart from other frameworks like HIPAA, which, despite being nearly 30 years old, struggles to keep pace with modern challenges.</p><p><strong>Real Results: 2025 Trust Report Highlights</strong></p><p>One of the standout points of the conversation was the 2025 HITRUST Trust Report. The data is compelling—while roughly 45% of organizations reported breaches last year, less than 1% of HITRUST-certified environments experienced incidents. The 2025 report shows this number decreasing even further to 0.59%. According to Patrick, this success is driven by HITRUST’s focus on threat intelligence and its rigorous assurance mechanism, which goes beyond checkbox compliance to ensure controls are effective and actively reducing risk.</p><p><strong>Addressing AI and Emerging Technologies</strong></p><p>With AI being a hot topic at HIMSS, Patrick discussed HITRUST’s proactive approach to managing AI risks. In December 2024, HITRUST introduced an AI security certification designed to help organizations securely integrate AI technologies. This certification follows HITRUST’s established quality assurance model, offering the same level of scrutiny and validation as its other programs. Patrick likened the current AI landscape to the early days of cloud computing—initial uncertainty followed by widespread adoption, underscoring the need for secure practices as the technology matures.</p><p><strong>Listen to the Full Conversation</strong></p><p>This episode offers more than just surface-level insights. Ryan Patrick’s perspectives on risk management, the measurable success of HITRUST frameworks, and the thoughtful approach to AI in healthcare cybersecurity provide valuable takeaways for professionals looking to enhance their security posture. Tune in to the full episode for an in-depth look at how HITRUST is setting new standards in healthcare cybersecurity and what organizations can do to stay ahead of the curve.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 27 Feb 2025 20:32:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/how-healthcare-organizations-can-achieve-a-near-zero-breach-rate-a-brand-story-conversation-from-himss-2025-a-hitrust-brand-story-with-ryan-patrick-kiMcMwy0</link>
      <content:encoded><![CDATA[<p>During the HIMSS Global Conference 2025 in Las Vegas, Sean Martin and Marco Ciappelli sat down with Ryan Patrick, Vice President of Adoption at HITRUST, for an insightful conversation about cybersecurity and risk management in healthcare. Rather than a traditional recap of the conference session, this discussion explores the critical role HITRUST plays in helping healthcare organizations navigate regulatory requirements, manage risk, and ensure patient safety through robust cybersecurity practices.</p><p><strong>Bridging Regulation and Real-World Application</strong></p><p>Ryan Patrick shared that HITRUST has spent over 17 years translating federal healthcare regulations into actionable frameworks for organizations. His role involves educating the market about HITRUST’s initiatives while continuously learning from industry feedback. This bi-directional exchange ensures that HITRUST’s frameworks and controls remain relevant and effective. Patrick emphasized the importance of HITRUST’s dynamic approach, highlighting that their framework is updated quarterly to address the latest cybersecurity threats. This frequency sets HITRUST apart from other frameworks like HIPAA, which, despite being nearly 30 years old, struggles to keep pace with modern challenges.</p><p><strong>Real Results: 2025 Trust Report Highlights</strong></p><p>One of the standout points of the conversation was the 2025 HITRUST Trust Report. The data is compelling—while roughly 45% of organizations reported breaches last year, less than 1% of HITRUST-certified environments experienced incidents. The 2025 report shows this number decreasing even further to 0.59%. According to Patrick, this success is driven by HITRUST’s focus on threat intelligence and its rigorous assurance mechanism, which goes beyond checkbox compliance to ensure controls are effective and actively reducing risk.</p><p><strong>Addressing AI and Emerging Technologies</strong></p><p>With AI being a hot topic at HIMSS, Patrick discussed HITRUST’s proactive approach to managing AI risks. In December 2024, HITRUST introduced an AI security certification designed to help organizations securely integrate AI technologies. This certification follows HITRUST’s established quality assurance model, offering the same level of scrutiny and validation as its other programs. Patrick likened the current AI landscape to the early days of cloud computing—initial uncertainty followed by widespread adoption, underscoring the need for secure practices as the technology matures.</p><p><strong>Listen to the Full Conversation</strong></p><p>This episode offers more than just surface-level insights. Ryan Patrick’s perspectives on risk management, the measurable success of HITRUST frameworks, and the thoughtful approach to AI in healthcare cybersecurity provide valuable takeaways for professionals looking to enhance their security posture. Tune in to the full episode for an in-depth look at how HITRUST is setting new standards in healthcare cybersecurity and what organizations can do to stay ahead of the curve.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Patrick</strong>, Vice President of Adoption at HITRUST | On LinkedIn: <a href="https://www.linkedin.com/in/ryan-patrick-3699117a/" target="_blank">https://www.linkedin.com/in/ryan-patrick-3699117a/</a></p><p><strong>Hosts:</strong></p><p><strong>Sean Martin</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining CyberSecurity Podcast [<a href="https://twitter.com/RedefiningCyber">@RedefiningCyber</a>] | On ITSPmagazine:  <a href="https://www.itspmagazine.com/sean-martin">https://www.itspmagazine.com/sean-martin</a></p><p><strong>Marco Ciappelli</strong>, Co-Founder at ITSPmagazine [<a href="https://twitter.com/ITSPmagazine">@ITSPmagazine</a>] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: <a href="https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli">https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli</a></p><p><strong>____________________________</strong></p><p><strong>This Episode’s Sponsors</strong></p><p>Learn more and catch more stories from <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">HITRUST</a>: <a href="https://itspm.ag/itsphitweb" target="_blank">https://itspm.ag/itsphitweb</a></p><p><strong>____________________________</strong></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HIMSS 2025 coverage: <a href="https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas" target="_blank">https://www.itspmagazine.com/himss-2025-health-technology-and-cybersecurity-event-coverage-las-vegas</a></p><p>HITRUST 2025 Trust Report: <a href="https://itspm.ag/hitrusz49c" target="_blank">https://itspm.ag/hitrusz49c</a></p><p><strong>____________________________</strong></p><p>Catch all of our event coverage: <a href="https://www.itspmagazine.com/on-location" target="_blank">https://www.itspmagazine.com/on-location</a></p><p>To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: <a href="https://www.itspmagazine.com/redefining-cybersecurity-podcast"><strong>https://www.itspmagazine.com/redefining-cybersecurity-podcast</strong></a></p><p>To see and hear more Redefining Society stories on ITSPmagazine, visit:<br /><a href="https://www.itspmagazine.com/redefining-society-podcast">https://www.itspmagazine.com/redefining-society-podcast</a></p><p>Want to tell your Brand Story Briefing as part of our event coverage? <strong>Learn More</strong> 👉 <a href="https://itspm.ag/evtcovbrf">https://itspm.ag/evtcovbrf</a></p><p>Want Sean and Marco to be part of your event or conference? <strong>Let Us Know</strong> 👉 <a href="https://www.itspmagazine.com/contact-us">https://www.itspmagazine.com/contact-us</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23068938" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/62fff186-5c20-4565-aed9-b0bc060f40ad/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=62fff186-5c20-4565-aed9-b0bc060f40ad&amp;feed=kDNbmF_B"/>
      <itunes:title>How Healthcare Organizations Can Achieve a Near-Zero Breach Rate | A Brand Story Conversation From HIMSS 2025 | A HITRUST Brand Story with Ryan Patrick</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Patrick</itunes:author>
      <itunes:duration>00:24:01</itunes:duration>
      <itunes:summary>In this Brand Story episode, Ryan Patrick, Vice President of Adoption at HITRUST, shares how HITRUST’s dynamic approach to cybersecurity and risk management is helping healthcare organizations achieve an industry-leading breach rate of less than 1%. With insights on AI security, threat intelligence, and the power of continuous improvement, this conversation is a must-listen for anyone serious about protecting healthcare data and enhancing risk management strategies.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode, Ryan Patrick, Vice President of Adoption at HITRUST, shares how HITRUST’s dynamic approach to cybersecurity and risk management is helping healthcare organizations achieve an industry-leading breach rate of less than 1%. With insights on AI security, threat intelligence, and the power of continuous improvement, this conversation is a must-listen for anyone serious about protecting healthcare data and enhancing risk management strategies.</itunes:subtitle>
      <itunes:keywords>compliance, assurance, data, technology, marco ciappelli, sean martin, trust, framework, cybersecurity, conference, healthcare security, breach, patient safety, on location, risk management, innovation, event coverage, certification, ryan patrick, regulation, ai, risk, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>90</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">24b7bb6a-10c5-4daf-b21d-ddfa9e0a62fa</guid>
      <title>From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story with Chase Doelling</title>
      <description><![CDATA[<p>IT and security teams are under constant pressure to streamline operations while maintaining strong security and compliance. In this <i>Brand Story</i> episode, Chase Doelling, Principal Strategist at JumpCloud, shares insights from the company's latest <a href="https://itspm.ag/jumpcljqyw" target="_blank">SME IT Trends Report</a>. The discussion highlights key trends, challenges, and opportunities that IT teams face, particularly in small and medium-sized businesses (SMBs).</p><h3>The Role of IT in Business Operations</h3><p>Doelling emphasizes the increasing responsibility placed on IT teams. Historically seen as cost centers, IT and security functions are now recognized as critical to business success. More organizations are merging IT and security efforts, ensuring that security considerations are built into every decision rather than being addressed reactively.</p><p>A major takeaway from the report is the shift toward decentralization in IT decision-making. Departments are increasingly adopting tools independently, leading to an explosion of software-as-a-service (SaaS) applications. While this autonomy can boost efficiency, it also creates risks. Shadow IT—where employees use unauthorized tools—has become a top concern, with 88% of organizations identifying it as a risk.</p><h3>AI, Security, and IT Investment</h3><p>The report also reveals a growing divide in AI adoption. Organizations are either moving aggressively into AI initiatives or staying completely on the sidelines. Those embracing AI often integrate it into security and IT operations, balancing innovation with risk management.</p><p>Budget trends indicate that IT spending is rising, with security tools accounting for a significant portion. The need for robust cybersecurity measures has pushed organizations to prioritize visibility, access management, and compliance. A notable shift is occurring in remote and hybrid work models. While remote work surged in previous years, only 9% of organizations now report being fully remote. This return to office environments introduces new IT challenges, particularly in managing networks and devices across hybrid workplaces.</p><h3>How JumpCloud Supports IT Teams</h3><p>JumpCloud’s platform simplifies IT and security operations by unifying identity and access management, device management, and security policies. One key challenge IT teams face is visibility—knowing who has access to what systems and ensuring compliance with security policies. JumpCloud’s approach allows organizations to manage users and devices from a single platform, reducing complexity and improving security posture.</p><p>An example of JumpCloud’s impact is its ability to detect and manage SaaS usage. If an employee tries to use an unauthorized tool, JumpCloud can guide them toward an approved alternative, preventing security risks without stifling productivity. This balance between security and efficiency is essential, particularly for SMBs that lack dedicated security teams.</p><h3>Looking Ahead: IT and Security Convergence</h3><p>Doelling teases upcoming research that will explore the relationship between IT and security teams. With these functions blending more than ever, organizations need insights into how to align strategies, resources, and budgets effectively.</p><p>For IT and security professionals navigating a landscape of increased threats, shifting work environments, and AI-driven innovation, the insights from JumpCloud’s research provide a valuable benchmark. To gain a deeper understanding of these trends and their implications, listen to the full episode and explore the latest <a href="https://itspm.ag/jumpcljqyw" target="_blank">SME IT Trends Report</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>], On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>To download the SME IT Trends Report: <a href="https://itspm.ag/jumpcljqyw" target="_blank">https://itspm.ag/jumpcljqyw</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 11 Feb 2025 21:08:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-access-to-automation-the-new-playbook-for-it-and-security-teams-a-jumpcloud-brand-story-with-chase-doelling-_qHznKyq</link>
      <content:encoded><![CDATA[<p>IT and security teams are under constant pressure to streamline operations while maintaining strong security and compliance. In this <i>Brand Story</i> episode, Chase Doelling, Principal Strategist at JumpCloud, shares insights from the company's latest <a href="https://itspm.ag/jumpcljqyw" target="_blank">SME IT Trends Report</a>. The discussion highlights key trends, challenges, and opportunities that IT teams face, particularly in small and medium-sized businesses (SMBs).</p><h3>The Role of IT in Business Operations</h3><p>Doelling emphasizes the increasing responsibility placed on IT teams. Historically seen as cost centers, IT and security functions are now recognized as critical to business success. More organizations are merging IT and security efforts, ensuring that security considerations are built into every decision rather than being addressed reactively.</p><p>A major takeaway from the report is the shift toward decentralization in IT decision-making. Departments are increasingly adopting tools independently, leading to an explosion of software-as-a-service (SaaS) applications. While this autonomy can boost efficiency, it also creates risks. Shadow IT—where employees use unauthorized tools—has become a top concern, with 88% of organizations identifying it as a risk.</p><h3>AI, Security, and IT Investment</h3><p>The report also reveals a growing divide in AI adoption. Organizations are either moving aggressively into AI initiatives or staying completely on the sidelines. Those embracing AI often integrate it into security and IT operations, balancing innovation with risk management.</p><p>Budget trends indicate that IT spending is rising, with security tools accounting for a significant portion. The need for robust cybersecurity measures has pushed organizations to prioritize visibility, access management, and compliance. A notable shift is occurring in remote and hybrid work models. While remote work surged in previous years, only 9% of organizations now report being fully remote. This return to office environments introduces new IT challenges, particularly in managing networks and devices across hybrid workplaces.</p><h3>How JumpCloud Supports IT Teams</h3><p>JumpCloud’s platform simplifies IT and security operations by unifying identity and access management, device management, and security policies. One key challenge IT teams face is visibility—knowing who has access to what systems and ensuring compliance with security policies. JumpCloud’s approach allows organizations to manage users and devices from a single platform, reducing complexity and improving security posture.</p><p>An example of JumpCloud’s impact is its ability to detect and manage SaaS usage. If an employee tries to use an unauthorized tool, JumpCloud can guide them toward an approved alternative, preventing security risks without stifling productivity. This balance between security and efficiency is essential, particularly for SMBs that lack dedicated security teams.</p><h3>Looking Ahead: IT and Security Convergence</h3><p>Doelling teases upcoming research that will explore the relationship between IT and security teams. With these functions blending more than ever, organizations need insights into how to align strategies, resources, and budgets effectively.</p><p>For IT and security professionals navigating a landscape of increased threats, shifting work environments, and AI-driven innovation, the insights from JumpCloud’s research provide a valuable benchmark. To gain a deeper understanding of these trends and their implications, listen to the full episode and explore the latest <a href="https://itspm.ag/jumpcljqyw" target="_blank">SME IT Trends Report</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>], On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>To download the SME IT Trends Report: <a href="https://itspm.ag/jumpcljqyw" target="_blank">https://itspm.ag/jumpcljqyw</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41481320" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6480b680-f758-4bf5-98a5-bfbb1b87fe68/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6480b680-f758-4bf5-98a5-bfbb1b87fe68&amp;feed=kDNbmF_B"/>
      <itunes:title>From Access to Automation: The New Playbook for IT and Security Teams | A JumpCloud Brand Story with Chase Doelling</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling</itunes:author>
      <itunes:duration>00:43:12</itunes:duration>
      <itunes:summary>Chase Doelling, Principal Strategist at JumpCloud, shares key insights from the latest IT Admin Report, highlighting how IT and security teams are tackling challenges like shadow IT, AI adoption, and the convergence of IT and security operations. This episode explores the shifting role of IT, the rising importance of visibility and compliance, and how organizations can balance innovation with security to stay ahead.</itunes:summary>
      <itunes:subtitle>Chase Doelling, Principal Strategist at JumpCloud, shares key insights from the latest IT Admin Report, highlighting how IT and security teams are tackling challenges like shadow IT, AI adoption, and the convergence of IT and security operations. This episode explores the shifting role of IT, the rising importance of visibility and compliance, and how organizations can balance innovation with security to stay ahead.</itunes:subtitle>
      <itunes:keywords>access management, compliance, remote work, hybrid work, ai adoption, marketing podcast, marco ciappelli, sean martin, automation, identity management, jumpcloud, cybersecurity, enterprise security, device management, risk management, chase doelling, brand marketing, saas security, shadow it, it budget, brand story podcast, brand story, security operations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>89</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d0c88d69-2ce6-4670-972a-5450d0d1b220</guid>
      <title>Building Resilience: How Businesses Can Align Innovation with Cybersecurity | A LevelBlue Brand Story with Theresa Lanowitz</title>
      <description><![CDATA[<p>In this Brand Story episode, Theresa Lanowitz, recently joined Sean Martin to share valuable insights drawn from LevelBlue's comprehensive 2024 Futures Report, a global study involving over 1,050 executives from C-suite levels across industries. The report offers a unique lens into the critical alignment between innovation, cybersecurity, and resilience. By examining seven key industry verticals—healthcare, retail, finance, manufacturing, transportation, energy, and state/local/higher education—LevelBlue highlights actionable strategies for building a resilient business ecosystem.</p><p><strong>Cyber Resilience: Beyond Technology</strong><br />Lanowitz emphasizes that cyber resilience extends far beyond IT and cybersecurity; it represents the organization’s ability to withstand and recover from disruptions affecting its entire digital and operational footprint. For instance, industries like manufacturing illustrate how sensors and IoT devices on production lines are now vital to efficiency. A single cyber event disrupting these systems could halt production, leading to cascading impacts. Lanowitz underscores the importance of cross-functional collaboration—between cybersecurity, application development, and operations teams—to ensure systems are brought back online effectively and seamlessly.</p><p><strong>Innovation vs. Security: A Delicate Balance</strong><br />One of the most striking findings from the report is that 73% of organizations prioritize innovation over mitigating risk, and 85% are willing to accept security risks in the pursuit of innovation. This trend spans industries, with examples ranging from healthcare’s increased use of robotics in surgeries to transportation companies leveraging AI for optimizing fleet routes. Yet, Lanowitz points out a concerning disconnect: cybersecurity teams are often brought into projects late, treated as an afterthought rather than an integral part of the innovation process. This fragmented approach weakens resilience, leaving organizations vulnerable to threats.</p><p><strong>The Case for Secure by Design</strong><br />Lanowitz stresses the importance of adopting a “secure by design” approach, where security is integrated from the start. Treating security as a core architectural requirement prevents costly redesigns later and supports operational and performance goals. She draws a parallel between neglecting security during development and building a house without planning for heating or cooling systems—essential but often deprioritized elements.</p><p><strong>Trusted Advisors and Cybersecurity as a Service</strong><br />Lanowitz also highlights the growing reliance on cybersecurity-as-a-service (CSaaS) and trusted advisors to bridge gaps in skills and resources. From setting up Security Operations Centers (SOCs) to conducting tabletop exercises and securing IoT networks, organizations increasingly turn to external partners like LevelBlue to fast-track initiatives. By leveraging these advisors, businesses gain industry-specific expertise, enabling tailored and scalable solutions that align security with innovation.</p><p><strong>Looking Ahead to 2025</strong><br />As LevelBlue prepares for its 2025 research, Lanowitz notes an increased focus on software supply chain security and the convergence of IT and operational technology (OT). These areas, coupled with a deeper exploration of how cybersecurity and business functions must align, will shape the next wave of insights into resilience and innovation.</p><p>Theresa Lanowitz’s expertise and LevelBlue’s research underscore that building resilience requires more than just technical fixes—it demands an integrated approach where innovation, security, and business goals coexist seamlessly.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>To learn more, download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail here:</p><p><a href="https://itspm.ag/levelbjk57">https://itspm.ag/levelbjk57</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 29 Jan 2025 15:40:26 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Theresa Lanowitz)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/building-resilience-how-businesses-can-align-innovation-with-cybersecurity-a-levelblue-brand-story-with-theresa-lanowitz-qneMIec9</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Theresa Lanowitz, recently joined Sean Martin to share valuable insights drawn from LevelBlue's comprehensive 2024 Futures Report, a global study involving over 1,050 executives from C-suite levels across industries. The report offers a unique lens into the critical alignment between innovation, cybersecurity, and resilience. By examining seven key industry verticals—healthcare, retail, finance, manufacturing, transportation, energy, and state/local/higher education—LevelBlue highlights actionable strategies for building a resilient business ecosystem.</p><p><strong>Cyber Resilience: Beyond Technology</strong><br />Lanowitz emphasizes that cyber resilience extends far beyond IT and cybersecurity; it represents the organization’s ability to withstand and recover from disruptions affecting its entire digital and operational footprint. For instance, industries like manufacturing illustrate how sensors and IoT devices on production lines are now vital to efficiency. A single cyber event disrupting these systems could halt production, leading to cascading impacts. Lanowitz underscores the importance of cross-functional collaboration—between cybersecurity, application development, and operations teams—to ensure systems are brought back online effectively and seamlessly.</p><p><strong>Innovation vs. Security: A Delicate Balance</strong><br />One of the most striking findings from the report is that 73% of organizations prioritize innovation over mitigating risk, and 85% are willing to accept security risks in the pursuit of innovation. This trend spans industries, with examples ranging from healthcare’s increased use of robotics in surgeries to transportation companies leveraging AI for optimizing fleet routes. Yet, Lanowitz points out a concerning disconnect: cybersecurity teams are often brought into projects late, treated as an afterthought rather than an integral part of the innovation process. This fragmented approach weakens resilience, leaving organizations vulnerable to threats.</p><p><strong>The Case for Secure by Design</strong><br />Lanowitz stresses the importance of adopting a “secure by design” approach, where security is integrated from the start. Treating security as a core architectural requirement prevents costly redesigns later and supports operational and performance goals. She draws a parallel between neglecting security during development and building a house without planning for heating or cooling systems—essential but often deprioritized elements.</p><p><strong>Trusted Advisors and Cybersecurity as a Service</strong><br />Lanowitz also highlights the growing reliance on cybersecurity-as-a-service (CSaaS) and trusted advisors to bridge gaps in skills and resources. From setting up Security Operations Centers (SOCs) to conducting tabletop exercises and securing IoT networks, organizations increasingly turn to external partners like LevelBlue to fast-track initiatives. By leveraging these advisors, businesses gain industry-specific expertise, enabling tailored and scalable solutions that align security with innovation.</p><p><strong>Looking Ahead to 2025</strong><br />As LevelBlue prepares for its 2025 research, Lanowitz notes an increased focus on software supply chain security and the convergence of IT and operational technology (OT). These areas, coupled with a deeper exploration of how cybersecurity and business functions must align, will shape the next wave of insights into resilience and innovation.</p><p>Theresa Lanowitz’s expertise and LevelBlue’s research underscore that building resilience requires more than just technical fixes—it demands an integrated approach where innovation, security, and business goals coexist seamlessly.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c" target="_blank">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>To learn more, download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail here:</p><p><a href="https://itspm.ag/levelbjk57">https://itspm.ag/levelbjk57</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="38262220" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ce5650e8-b308-4aa4-8258-749334950f3f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ce5650e8-b308-4aa4-8258-749334950f3f&amp;feed=kDNbmF_B"/>
      <itunes:title>Building Resilience: How Businesses Can Align Innovation with Cybersecurity | A LevelBlue Brand Story with Theresa Lanowitz</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Theresa Lanowitz</itunes:author>
      <itunes:duration>00:39:51</itunes:duration>
      <itunes:summary>In this episode, Theresa Lanowitz from LevelBlue shares key insights from their 2024 Futures Report, exploring the critical balance between innovation, cybersecurity, and business resilience across seven industries. From the importance of cross-functional collaboration to adopting &quot;secure by design&quot; practices, this conversation offers actionable strategies for navigating today’s interconnected digital and operational challenges.</itunes:summary>
      <itunes:subtitle>In this episode, Theresa Lanowitz from LevelBlue shares key insights from their 2024 Futures Report, exploring the critical balance between innovation, cybersecurity, and business resilience across seven industries. From the importance of cross-functional collaboration to adopting &quot;secure by design&quot; practices, this conversation offers actionable strategies for navigating today’s interconnected digital and operational challenges.</itunes:subtitle>
      <itunes:keywords>collaboration, finance, cybersecurity podcast, ciso, transportation, rsa, cybersecurity, business, ot, redefining cybersecurity, manufacturing, innovation, trusted advisors, data protection, resilience, secure by design, cto, iot, software supply chain, security strategy, redefining cybersecurity podcast, cyber risk, healthcare</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>88</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e97790f7-cfd1-497e-a7c1-ad42362f5c4f</guid>
      <title>Simplifying Cybersecurity for IT Service Providers: A New Era of Cyber Protection for Small and Medium Businesses | A Guardz Brand Story with Sarah Lampert and William Barr</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin and Marco Ciappelli explore how Guardz is transforming cybersecurity for Managed Service Providers (MSPs) and small to medium-sized businesses (SMBs). The discussion features insights from Sarah Lampert, Customer Success Manager, and William Barr, Account Executive at Guardz, who shed light on the company's innovative approach to simplifying and optimizing cybersecurity solutions.</p><p><strong>Bridging the Gap for SMBs</strong></p><p>Small to medium-sized businesses often lack dedicated IT or security teams, leaving them vulnerable to cyber threats. William Barr emphasizes how Guardz fills this gap by providing MSPs with tools tailored for SMBs. These tools simplify security management, offering MSPs a unified platform that addresses complex needs without requiring a patchwork of expensive, disparate solutions.</p><p><strong>Ease of Use and Flexibility</strong></p><p>Guardz stands out by offering a user-friendly, AI-powered platform that integrates seamlessly into MSPs’ existing workflows. Sarah Lampert highlights the platform’s simplicity, enabling even small MSPs to onboard quickly and manage cybersecurity effectively. The product’s flexibility allows MSPs to scale their offerings, catering to clients with varying security needs while keeping costs manageable.</p><p>Key features include:</p><ul><li>Unified detection and response capabilities.</li><li>Customizable security controls for different client environments.</li><li>User-based pricing models that eliminate device-based cost complexities.</li></ul><p><strong>Support Beyond Technology</strong></p><p>Guardz doesn’t stop at providing a robust platform—it empowers MSPs through comprehensive support. Sarah Lampert explains how the Customer Success team aids MSPs with onboarding, marketing materials, and strategic advice, ensuring they position Guardz as a core component of their service stack. The company also facilitates continued learning through webinars, hands-on trials, and direct communication channels.</p><p><strong>Innovative AI Integration</strong></p><p>AI plays a pivotal role in Guardz’s ability to streamline cybersecurity. By analyzing patterns and predicting risks, the platform helps MSPs preempt threats and respond efficiently. William Barr underscores AI’s potential to reduce manual effort while enhancing security accuracy, making advanced protection accessible to smaller organizations.</p><p><strong>Cyber Insurance: A Competitive Edge</strong></p><p>Guardz takes its commitment a step further by integrating cyber insurance into its offerings. Qualified clients can access affordable coverage directly through Guardz, ensuring SMBs meet evolving security and compliance standards. This feature not only protects businesses but also equips MSPs with a unique selling point.</p><p><strong>The Future of Guardz</strong></p><p>As Guardz continues to evolve, its focus remains on simplifying cybersecurity for MSPs while providing scalable, cost-effective solutions for SMBs. The team’s proactive approach, coupled with constant feedback integration, ensures the platform stays relevant in a dynamic cybersecurity landscape.</p><p>MSPs looking to streamline their operations and enhance client security are encouraged to explore how Guardz can help achieve these goals. For more information, connect with the Guardz team or visit their platform for a trial.</p><p>Learn more about Guardz: <a href="https://itspm.ag/guardzrgig">https://itspm.ag/guardzrgig</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Sarah Lampert</strong>, Customer Success Manager, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sarlampert/" target="_blank">https://www.linkedin.com/in/sarlampert/</a></p><p><strong>William Barr</strong>, Account Executive, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/william-barr-a447541ab/" target="_blank">https://www.linkedin.com/in/william-barr-a447541ab/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Guardz: <a href="https://www.itspmagazine.com/directory/guardz">https://www.itspmagazine.com/directory/guardz</a></p><p>For a free 14 day trial of Guardz’s platform please visit <a href="https://itspm.ag/guardzgvu3">https://itspm.ag/guardzgvu3</a> .</p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 20 Dec 2024 02:30:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Sarah Lampert, William Barr)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/simplifying-cybersecurity-for-it-service-providers-a-new-era-of-cyber-protection-for-small-and-medium-businesses-a-guardz-brand-story-with-sarah-lampert-and-william-barr-eUGExOh2</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin and Marco Ciappelli explore how Guardz is transforming cybersecurity for Managed Service Providers (MSPs) and small to medium-sized businesses (SMBs). The discussion features insights from Sarah Lampert, Customer Success Manager, and William Barr, Account Executive at Guardz, who shed light on the company's innovative approach to simplifying and optimizing cybersecurity solutions.</p><p><strong>Bridging the Gap for SMBs</strong></p><p>Small to medium-sized businesses often lack dedicated IT or security teams, leaving them vulnerable to cyber threats. William Barr emphasizes how Guardz fills this gap by providing MSPs with tools tailored for SMBs. These tools simplify security management, offering MSPs a unified platform that addresses complex needs without requiring a patchwork of expensive, disparate solutions.</p><p><strong>Ease of Use and Flexibility</strong></p><p>Guardz stands out by offering a user-friendly, AI-powered platform that integrates seamlessly into MSPs’ existing workflows. Sarah Lampert highlights the platform’s simplicity, enabling even small MSPs to onboard quickly and manage cybersecurity effectively. The product’s flexibility allows MSPs to scale their offerings, catering to clients with varying security needs while keeping costs manageable.</p><p>Key features include:</p><ul><li>Unified detection and response capabilities.</li><li>Customizable security controls for different client environments.</li><li>User-based pricing models that eliminate device-based cost complexities.</li></ul><p><strong>Support Beyond Technology</strong></p><p>Guardz doesn’t stop at providing a robust platform—it empowers MSPs through comprehensive support. Sarah Lampert explains how the Customer Success team aids MSPs with onboarding, marketing materials, and strategic advice, ensuring they position Guardz as a core component of their service stack. The company also facilitates continued learning through webinars, hands-on trials, and direct communication channels.</p><p><strong>Innovative AI Integration</strong></p><p>AI plays a pivotal role in Guardz’s ability to streamline cybersecurity. By analyzing patterns and predicting risks, the platform helps MSPs preempt threats and respond efficiently. William Barr underscores AI’s potential to reduce manual effort while enhancing security accuracy, making advanced protection accessible to smaller organizations.</p><p><strong>Cyber Insurance: A Competitive Edge</strong></p><p>Guardz takes its commitment a step further by integrating cyber insurance into its offerings. Qualified clients can access affordable coverage directly through Guardz, ensuring SMBs meet evolving security and compliance standards. This feature not only protects businesses but also equips MSPs with a unique selling point.</p><p><strong>The Future of Guardz</strong></p><p>As Guardz continues to evolve, its focus remains on simplifying cybersecurity for MSPs while providing scalable, cost-effective solutions for SMBs. The team’s proactive approach, coupled with constant feedback integration, ensures the platform stays relevant in a dynamic cybersecurity landscape.</p><p>MSPs looking to streamline their operations and enhance client security are encouraged to explore how Guardz can help achieve these goals. For more information, connect with the Guardz team or visit their platform for a trial.</p><p>Learn more about Guardz: <a href="https://itspm.ag/guardzrgig">https://itspm.ag/guardzrgig</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Sarah Lampert</strong>, Customer Success Manager, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sarlampert/" target="_blank">https://www.linkedin.com/in/sarlampert/</a></p><p><strong>William Barr</strong>, Account Executive, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/william-barr-a447541ab/" target="_blank">https://www.linkedin.com/in/william-barr-a447541ab/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Guardz: <a href="https://www.itspmagazine.com/directory/guardz">https://www.itspmagazine.com/directory/guardz</a></p><p>For a free 14 day trial of Guardz’s platform please visit <a href="https://itspm.ag/guardzgvu3">https://itspm.ag/guardzgvu3</a> .</p><p>Learn more about ITSPmagazine Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="43115527" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7bdbe0e4-abcb-4614-a3c2-fe586a828a4f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7bdbe0e4-abcb-4614-a3c2-fe586a828a4f&amp;feed=kDNbmF_B"/>
      <itunes:title>Simplifying Cybersecurity for IT Service Providers: A New Era of Cyber Protection for Small and Medium Businesses | A Guardz Brand Story with Sarah Lampert and William Barr</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Sarah Lampert, William Barr</itunes:author>
      <itunes:duration>00:44:54</itunes:duration>
      <itunes:summary>This episode explores how Managed Service Providers can deliver streamlined, scalable cybersecurity solutions tailored to small and medium-sized businesses, addressing their unique challenges with limited resources. Discover how an all-in-one platform simplifies security management, empowers IT providers with tools for growth, and enhances protection while remaining cost-effective.</itunes:summary>
      <itunes:subtitle>This episode explores how Managed Service Providers can deliver streamlined, scalable cybersecurity solutions tailored to small and medium-sized businesses, addressing their unique challenges with limited resources. Discover how an all-in-one platform simplifies security management, empowers IT providers with tools for growth, and enhances protection while remaining cost-effective.</itunes:subtitle>
      <itunes:keywords>managed services, cost-effective, marco ciappelli, msp, security controls, sean martin, endpoint protection, it services, cybersecurity, william barr, risk management, customer success, cyber insurance, smb, unified platform, small business, scalable tools, security solutions, ai, sarah lampert</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>87</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1eeb4a24-5fa7-4817-a496-44f5e276cda1</guid>
      <title>Data Security Posture Management — DSPM. What, why, when, and how: All The Insights You Need To Know | An Imperva Brand Story Conversation with Terry Ray</title>
      <description><![CDATA[<p>In this latest episode of the Imperva Brand Story on ITSP Magazine, Sean Martin and Marco Ciappelli sit down with Terry Ray, CTO for Data Security at Imperva. Together, they discuss the pressing challenges and transformative innovations shaping the future of safeguarding information.</p><p><strong>Unpacking Data Security Posture Management</strong></p><p>Terry Ray introduces Data Security Posture Management (DSPM), comparing it to inspecting a home—where identifying vulnerabilities is just as important as fixing them. He emphasizes that data security requires constant vigilance, urging organizations to develop a deep understanding of their infrastructure while staying agile against emerging threats.</p><p><strong>Moving Beyond Compliance to Real Security</strong></p><p>The conversation highlights the often-misunderstood relationship between compliance and genuine security. While meeting regulatory requirements is necessary, Terry argues that true data protection requires a broader, risk-based approach, addressing vulnerabilities in both regulated and non-regulated systems to prepare for audits and unforeseen breaches.</p><p><strong>The Power of Automation and Machine Learning</strong></p><p>Terry underscores Imperva's dedication to leveraging advanced automation, AI, and machine learning technologies to process vast data sets and detect threats proactively. By adopting innovative strategies, companies can transition from reactive to proactive measures in protecting their digital ecosystems.</p><p><strong>Fostering Collaboration and Security Awareness</strong></p><p>A standout point from the discussion is the importance of collaboration across organizational roles—from compliance officers to database managers and security teams. By fostering a culture of continuous learning and teamwork, businesses can better allocate resources and adapt to evolving security priorities.</p><p><strong>Embracing Security's Ever-Changing Nature</strong></p><p>The conversation concludes with a powerful reflection on the unpredictable nature of cybersecurity. As new threats and technologies emerge, organizations must remain adaptable, forward-thinking, and prepared for the unexpected to stay ahead in an ever-changing security landscape.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Terry Ray, </strong>SVP Data Security GTM, Field CTO and Imperva Fellow [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/terry-ray/" target="_blank">https://www.linkedin.com/in/terry-ray/</a></p><p>On Twitter | <a href="https://twitter.com/TerryRay_Fellow" target="_blank">https://twitter.com/TerryRay_Fellow</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 11 Dec 2024 22:45:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Terry Ray)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/data-security-posture-management-dspm-what-why-when-and-how-all-the-insights-you-need-to-know-an-imperva-brand-story-conversation-with-terry-ray-he5lLBA4</link>
      <content:encoded><![CDATA[<p>In this latest episode of the Imperva Brand Story on ITSP Magazine, Sean Martin and Marco Ciappelli sit down with Terry Ray, CTO for Data Security at Imperva. Together, they discuss the pressing challenges and transformative innovations shaping the future of safeguarding information.</p><p><strong>Unpacking Data Security Posture Management</strong></p><p>Terry Ray introduces Data Security Posture Management (DSPM), comparing it to inspecting a home—where identifying vulnerabilities is just as important as fixing them. He emphasizes that data security requires constant vigilance, urging organizations to develop a deep understanding of their infrastructure while staying agile against emerging threats.</p><p><strong>Moving Beyond Compliance to Real Security</strong></p><p>The conversation highlights the often-misunderstood relationship between compliance and genuine security. While meeting regulatory requirements is necessary, Terry argues that true data protection requires a broader, risk-based approach, addressing vulnerabilities in both regulated and non-regulated systems to prepare for audits and unforeseen breaches.</p><p><strong>The Power of Automation and Machine Learning</strong></p><p>Terry underscores Imperva's dedication to leveraging advanced automation, AI, and machine learning technologies to process vast data sets and detect threats proactively. By adopting innovative strategies, companies can transition from reactive to proactive measures in protecting their digital ecosystems.</p><p><strong>Fostering Collaboration and Security Awareness</strong></p><p>A standout point from the discussion is the importance of collaboration across organizational roles—from compliance officers to database managers and security teams. By fostering a culture of continuous learning and teamwork, businesses can better allocate resources and adapt to evolving security priorities.</p><p><strong>Embracing Security's Ever-Changing Nature</strong></p><p>The conversation concludes with a powerful reflection on the unpredictable nature of cybersecurity. As new threats and technologies emerge, organizations must remain adaptable, forward-thinking, and prepared for the unexpected to stay ahead in an ever-changing security landscape.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Terry Ray, </strong>SVP Data Security GTM, Field CTO and Imperva Fellow [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/terry-ray/" target="_blank">https://www.linkedin.com/in/terry-ray/</a></p><p>On Twitter | <a href="https://twitter.com/TerryRay_Fellow" target="_blank">https://twitter.com/TerryRay_Fellow</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="47633674" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/dc7ecd44-2ce6-4844-acc4-f1632fe80895/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=dc7ecd44-2ce6-4844-acc4-f1632fe80895&amp;feed=kDNbmF_B"/>
      <itunes:title>Data Security Posture Management — DSPM. What, why, when, and how: All The Insights You Need To Know | An Imperva Brand Story Conversation with Terry Ray</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Terry Ray</itunes:author>
      <itunes:duration>00:49:37</itunes:duration>
      <itunes:summary>A fascinating discussion unfolds as Imperva&apos;s CTO for Data Security, Terry Ray, joins ITSP Magazine hosts Sean Martin and Marco Ciappelli to explore the ever-evolving landscape of data security.</itunes:summary>
      <itunes:subtitle>A fascinating discussion unfolds as Imperva&apos;s CTO for Data Security, Terry Ray, joins ITSP Magazine hosts Sean Martin and Marco Ciappelli to explore the ever-evolving landscape of data security.</itunes:subtitle>
      <itunes:keywords>digital assets protection, terry ray, marco ciappelli, automation in cybersecurity, dspm, sean martin, cybersecurity, itsp magazine, data security, risk management, database security, ai in security, breach prevention, innovative it solutions, cloud security, compliance vs security, imperva, machine learning, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>86</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7b1f817e-e674-4867-9a4c-988a53c2cec0</guid>
      <title>Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon Wijckmans</title>
      <description><![CDATA[<p>In a recent episode of Brand Story, Simon Wijckmans, founder and CEO of c/side, discussed the critical need to secure third-party scripts on websites, a frequently overlooked aspect of cybersecurity. Drawing on his experience with companies like Cloudflare and Vercel, Wijckmans outlined why traditional methods fall short in addressing dynamic threats and how c/side is redefining client-side security.</p><p>Third-party scripts—commonly used for analytics, marketing, and chatbots—are vital for website functionality but come with inherent risks. These scripts operate dynamically, allowing malicious actors to inject harmful code under specific conditions, such as targeting particular users or timeframes. Existing security approaches, such as threat feeds or basic web crawlers, fail to detect these threats because they often rely on static assessments. As Wijckmans explained, these limitations result in a false sense of security, leaving businesses exposed to significant risks.</p><p>C/side provides a proactive solution by placing itself between users and third-party script providers. This approach enables real-time analysis and monitoring of script behavior. Using advanced tools, including AI-driven analysis, c/side inspects the JavaScript code and flags malicious activity. Unlike other solutions, it offers complete transparency by delivering the full source code of scripts in a readable format, empowering organizations to investigate and address potential vulnerabilities comprehensively.</p><p>Wijckmans stressed that client-side script security is an essential yet underrepresented aspect of the supply chain. While most security tools focus on protecting server-side dependencies, the browser remains a critical point where sensitive data is often compromised. C/side not only addresses this gap but also helps organizations meet compliance requirements like those outlined in PCI-DSS, which mandate monitoring client-side scripts executed in browsers.</p><p>C/side’s offerings cater to various users, from small businesses using a free tier to enterprises requiring comprehensive solutions. Its tools integrate seamlessly into cybersecurity programs, supporting developers, agencies, and compliance teams. Additionally, c/side enhances performance by optimizing script delivery, ensuring that security does not come at the cost of website functionality.</p><p>With its innovative approach, c/side exemplifies how specialized solutions can tackle complex cybersecurity challenges. As Wijckmans highlighted, the modern web can be made safer with accessible, effective tools, leaving no excuse for neglecting client-side security. Through its commitment to transparency, performance, and comprehensive protection, c/side is shaping a safer digital ecosystem for businesses and users alike.</p><p>Learn more about c/side: <a href="https://itspm.ag/c/side-t0g5">https://itspm.ag/c/side-t0g5</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Simon Wijckmans</strong>, Founder & CEO, c/side [<a href="https://x.com/csideai">@csideai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wijckmans/">https://www.linkedin.com/in/wijckmans/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from c/side: <a href="https://www.itspmagazine.com/directory/c-side">https://www.itspmagazine.com/directory/c-side</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Dec 2024 05:12:23 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Simon Wijckmans)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/breaking-down-the-complexities-of-client-side-threats-and-how-to-stop-them-a-c-side-brand-story-conversation-with-simon-wijckmans-oujq8em1</link>
      <content:encoded><![CDATA[<p>In a recent episode of Brand Story, Simon Wijckmans, founder and CEO of c/side, discussed the critical need to secure third-party scripts on websites, a frequently overlooked aspect of cybersecurity. Drawing on his experience with companies like Cloudflare and Vercel, Wijckmans outlined why traditional methods fall short in addressing dynamic threats and how c/side is redefining client-side security.</p><p>Third-party scripts—commonly used for analytics, marketing, and chatbots—are vital for website functionality but come with inherent risks. These scripts operate dynamically, allowing malicious actors to inject harmful code under specific conditions, such as targeting particular users or timeframes. Existing security approaches, such as threat feeds or basic web crawlers, fail to detect these threats because they often rely on static assessments. As Wijckmans explained, these limitations result in a false sense of security, leaving businesses exposed to significant risks.</p><p>C/side provides a proactive solution by placing itself between users and third-party script providers. This approach enables real-time analysis and monitoring of script behavior. Using advanced tools, including AI-driven analysis, c/side inspects the JavaScript code and flags malicious activity. Unlike other solutions, it offers complete transparency by delivering the full source code of scripts in a readable format, empowering organizations to investigate and address potential vulnerabilities comprehensively.</p><p>Wijckmans stressed that client-side script security is an essential yet underrepresented aspect of the supply chain. While most security tools focus on protecting server-side dependencies, the browser remains a critical point where sensitive data is often compromised. C/side not only addresses this gap but also helps organizations meet compliance requirements like those outlined in PCI-DSS, which mandate monitoring client-side scripts executed in browsers.</p><p>C/side’s offerings cater to various users, from small businesses using a free tier to enterprises requiring comprehensive solutions. Its tools integrate seamlessly into cybersecurity programs, supporting developers, agencies, and compliance teams. Additionally, c/side enhances performance by optimizing script delivery, ensuring that security does not come at the cost of website functionality.</p><p>With its innovative approach, c/side exemplifies how specialized solutions can tackle complex cybersecurity challenges. As Wijckmans highlighted, the modern web can be made safer with accessible, effective tools, leaving no excuse for neglecting client-side security. Through its commitment to transparency, performance, and comprehensive protection, c/side is shaping a safer digital ecosystem for businesses and users alike.</p><p>Learn more about c/side: <a href="https://itspm.ag/c/side-t0g5">https://itspm.ag/c/side-t0g5</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Simon Wijckmans</strong>, Founder & CEO, c/side [<a href="https://x.com/csideai">@csideai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/wijckmans/">https://www.linkedin.com/in/wijckmans/ </a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from c/side: <a href="https://www.itspmagazine.com/directory/c-side">https://www.itspmagazine.com/directory/c-side</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="32024975" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c3faf542-3cd0-415a-9512-66d22b22493e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c3faf542-3cd0-415a-9512-66d22b22493e&amp;feed=kDNbmF_B"/>
      <itunes:title>Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon Wijckmans</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Simon Wijckmans</itunes:author>
      <itunes:duration>00:33:21</itunes:duration>
      <itunes:summary>Discover how Simon Wijckmans, founder and CEO of c/side, is revolutionizing client-side security by tackling the hidden risks of third-party scripts that traditional cybersecurity solutions miss. Learn why dynamic threats in browsers demand innovative monitoring and how c/side empowers organizations to protect sensitive data while enhancing website performance.</itunes:summary>
      <itunes:subtitle>Discover how Simon Wijckmans, founder and CEO of c/side, is revolutionizing client-side security by tackling the hidden risks of third-party scripts that traditional cybersecurity solutions miss. Learn why dynamic threats in browsers demand innovative monitoring and how c/side empowers organizations to protect sensitive data while enhancing website performance.</itunes:subtitle>
      <itunes:keywords>compliance, dynamic threats, marco ciappelli, web performance, sean martin, security innovation, javascript, cybersecurity, browser security, website security, supply chain risks, data protection, simon wijckmans, third-party scripts, client-side security, cside, script monitoring, data theft, pci dss, malware prevention, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>85</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">21253d76-1152-4f7c-9f05-2d1bd509f3a5</guid>
      <title>Building Cyber Resilience Through Global Innovation, Local Community Feedback, and Regional Partnerships | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</title>
      <description><![CDATA[<p>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 19:31:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/building-cyber-resilience-through-global-innovation-local-community-feedback-and-regional-partnerships-a-brand-story-conversation-from-aisa-cyber-con-2024-in-melbourne-a-threatlocker-story-with-jade-wilkie-II_10qvD</link>
      <content:encoded><![CDATA[<p>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17008447" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0c6ad51a-42e3-4336-8287-75d5f9b35d6c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0c6ad51a-42e3-4336-8287-75d5f9b35d6c&amp;feed=kDNbmF_B"/>
      <itunes:title>Building Cyber Resilience Through Global Innovation, Local Community Feedback, and Regional Partnerships | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie</itunes:author>
      <itunes:duration>00:17:42</itunes:duration>
      <itunes:summary>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</itunes:summary>
      <itunes:subtitle>This engaging Brand Story episode comes to you from AISA CyberCon 2024, in Melbourne, where Sean Martin and Marco Ciappelli explore with Jade Wilkie how ThreatLocker empowers organizations to achieve Zero Trust security and Essential Eight compliance through innovative tools and real-time adaptability. Learn how industry insights from the conference are shaping the future of cybersecurity solutions while keeping human-centric strategies at the forefront.</itunes:subtitle>
      <itunes:keywords>jade wilkie, compliance, essential eight, marco ciappelli, industries, marco, sean martin, maturity, trust, aisa, cybersecurity, eight, threatlocker, innovation, sean, resilience, zero, jade, essential, frameworks, wilkie, government, australia, cyber conference, cyber con, brand story, 2024, cybercon</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>84</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0dbd1434-7d42-481d-9d27-152bb39395c7</guid>
      <title>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Brand Story with Robert Booker, Blake Sutherland, Sidney Prasse, Josh Ladeau</title>
      <description><![CDATA[<p>The HITRUST CyberInsurance Webinar unveiled an innovative approach to acquiring cyber insurance, highlighting a streamlined process designed to benefit organizations of all sizes and sectors. Gathering insights from industry leaders including Sean Martin, Josh Ladeau, Sidney Prasse, Robert Booker, and Blake Sutherland, the discussion centered around the HITRUST Shared Risk Facility and its value proposition for organizations seeking robust cyber insurance coverage.</p><p>Josh Ladeau, CEO of Trium, emphasized the importance of reducing volatility in the insurance market. He pointed out the challenges organizations face with traditional insurance processes, including cumbersome questionnaires and inconsistent underwriting requirements. By leveraging HITRUST certifications, the Shared Risk Facility offers a consistent, transparent, and efficient pathway for obtaining coverage, ensuring organizations can focus more on their core operations rather than administrative burdens.</p><p>Sidney Prasse, a cyber specialist at McGill and Partners, highlighted the comprehensive nature of HITRUST certifications, which provide a high level of assurance and a robust framework for organizations. Prasse elaborated on the return on investment (ROI) that organizations gain from this streamlined approach, not only in terms of competitive premiums but also through time and resource efficiencies.</p><p>Robert Booker, Chief Strategy Officer at HITRUST, elaborated on the rigorous processes involved in HITRUST certifications. He explained that these certifications require organizations to demonstrate their security maturity comprehensively, which in turn provides insurers with verified, reliable data. This reliability and transparency in security posture are critical, as they enhance the trust between insurers and insureds, making the underwriting process smoother and more accurate.</p><p>Blake Sutherland, EVP of Market Engagement at HITRUST, emphasized the importance of proactive engagement between IT security teams and finance or risk management teams within organizations. He noted that the HITRUST approach helps bridge gaps between these departments, ensuring a unified and effective strategy towards obtaining and maintaining cyber insurance coverage.</p><p>The webinar underscored that the HITRUST Shared Risk Facility is not just about easier and more efficient insurance processes; it also represents a strategic advantage in the market. Organizations that are HITRUST certified can differentiate themselves, demonstrating a high level of security and compliance that can be pivotal in securing business contracts. This differentiation is particularly crucial as businesses increasingly rely on third-party attestation to verify their security measures.</p><p>Ultimately, the HITRUST CyberInsurance Webinar showcased how strategic partnerships and innovative approaches can transform the traditional cyber insurance landscape, providing organizations with the tools they need to effectively manage risk and achieve better overall security.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Sidney Prasse</strong>, Partner, McGill & Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sidney-prasse-297894aa/">https://www.linkedin.com/in/sidney-prasse-297894aa/</a></p><p><strong>Josh Ladeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships (Session): <a href="https://hitrustalliance.net/webinars/cyber-insurance" target="_blank">https://hitrustalliance.net/webinars/cyber-insurance</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 4 Dec 2024 08:23:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Sidney Prasse, Blake Sutherland, Robert Booker, Josh Ladeau)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/enhancing-cyber-insurance-with-hitrust-streamlining-coverage-through-strategic-partnerships-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-brand-story-with-robert-booker-blake-sutherland-sidney-prasse-josh-ladeau-1It4eZiE</link>
      <content:encoded><![CDATA[<p>The HITRUST CyberInsurance Webinar unveiled an innovative approach to acquiring cyber insurance, highlighting a streamlined process designed to benefit organizations of all sizes and sectors. Gathering insights from industry leaders including Sean Martin, Josh Ladeau, Sidney Prasse, Robert Booker, and Blake Sutherland, the discussion centered around the HITRUST Shared Risk Facility and its value proposition for organizations seeking robust cyber insurance coverage.</p><p>Josh Ladeau, CEO of Trium, emphasized the importance of reducing volatility in the insurance market. He pointed out the challenges organizations face with traditional insurance processes, including cumbersome questionnaires and inconsistent underwriting requirements. By leveraging HITRUST certifications, the Shared Risk Facility offers a consistent, transparent, and efficient pathway for obtaining coverage, ensuring organizations can focus more on their core operations rather than administrative burdens.</p><p>Sidney Prasse, a cyber specialist at McGill and Partners, highlighted the comprehensive nature of HITRUST certifications, which provide a high level of assurance and a robust framework for organizations. Prasse elaborated on the return on investment (ROI) that organizations gain from this streamlined approach, not only in terms of competitive premiums but also through time and resource efficiencies.</p><p>Robert Booker, Chief Strategy Officer at HITRUST, elaborated on the rigorous processes involved in HITRUST certifications. He explained that these certifications require organizations to demonstrate their security maturity comprehensively, which in turn provides insurers with verified, reliable data. This reliability and transparency in security posture are critical, as they enhance the trust between insurers and insureds, making the underwriting process smoother and more accurate.</p><p>Blake Sutherland, EVP of Market Engagement at HITRUST, emphasized the importance of proactive engagement between IT security teams and finance or risk management teams within organizations. He noted that the HITRUST approach helps bridge gaps between these departments, ensuring a unified and effective strategy towards obtaining and maintaining cyber insurance coverage.</p><p>The webinar underscored that the HITRUST Shared Risk Facility is not just about easier and more efficient insurance processes; it also represents a strategic advantage in the market. Organizations that are HITRUST certified can differentiate themselves, demonstrating a high level of security and compliance that can be pivotal in securing business contracts. This differentiation is particularly crucial as businesses increasingly rely on third-party attestation to verify their security measures.</p><p>Ultimately, the HITRUST CyberInsurance Webinar showcased how strategic partnerships and innovative approaches can transform the traditional cyber insurance landscape, providing organizations with the tools they need to effectively manage risk and achieve better overall security.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Sidney Prasse</strong>, Partner, McGill & Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sidney-prasse-297894aa/">https://www.linkedin.com/in/sidney-prasse-297894aa/</a></p><p><strong>Josh Ladeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships (Session): <a href="https://hitrustalliance.net/webinars/cyber-insurance" target="_blank">https://hitrustalliance.net/webinars/cyber-insurance</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="57699370" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6755cb0d-23a6-4dec-a385-13729612e0d8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6755cb0d-23a6-4dec-a385-13729612e0d8&amp;feed=kDNbmF_B"/>
      <itunes:title>Enhancing Cyber Insurance with HITRUST: Streamlining Coverage through Strategic Partnerships | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Brand Story with Robert Booker, Blake Sutherland, Sidney Prasse, Josh Ladeau</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Sidney Prasse, Blake Sutherland, Robert Booker, Josh Ladeau</itunes:author>
      <itunes:duration>01:00:06</itunes:duration>
      <itunes:summary>If you’re seeking a stronger, simpler way to secure cyber insurance, don’t miss this opportunity to learn from the experts. Join us for this conversation to learn how the HITRUST Shared Risk Facility empowers organizations with: streamlined coverage application, shorter underwriting timelines, and consistent renewals and competitive premiums.</itunes:summary>
      <itunes:subtitle>If you’re seeking a stronger, simpler way to secure cyber insurance, don’t miss this opportunity to learn from the experts. Join us for this conversation to learn how the HITRUST Shared Risk Facility empowers organizations with: streamlined coverage application, shorter underwriting timelines, and consistent renewals and competitive premiums.</itunes:subtitle>
      <itunes:keywords>roi, compliance, transparency, trium, marco ciappelli, mcgill and partners, security posture, efficiency, sidney prasse, sean martin, josh ladeau, hitrust, cybersecurity, robert booker, risk management, underwriting, certification, hitrust collaborate 2024, insurance coverage, blake sutherland, brand story, cyberinsurance, webinar</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>83</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d518f9ba-849a-431e-94a9-1f39a9acb8a3</guid>
      <title>Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A McGill and Partners Short Brand Innovation Story with Ryan Griffin</title>
      <description><![CDATA[<p>During the latest Brand Story episode recorded as part of the On Location series at HITRUST Collaborate 2024, host Sean Martin speaks with Ryan Griffin from McGill Partners about the intricacies of cyber insurance.</p><p>Ryan Griffin, who plays a key role at the cyber insurance brokerage firm McGill Partners, shares insights into the importance of cyber insurance for large and complex organizations. Griffin outlines how the company helps clients understand and quantify their cyber risks before negotiating with over 100 cyber insurers to secure coverage. This rigorous approach is crucial given the volatile nature of cyber risks.</p><p>One of the significant challenges in the field, Griffin notes, is the counterparty risk involved in contractual relationships between large organizations. He emphasizes the necessity for businesses to carry adequate insurance coverage, akin to traditional liability insurance. Griffin reflects on the market evolution where organizations now see the value in cyber insurance, which should ideally cover rare but high-impact events.</p><p>The episode also highlights the pivotal role of data in understanding and pricing cyber risks. Sean Martin brings attention to the collaboration between McGill Partners and HITRUST. HITRUST's extensive data on cybersecurity and privacy maturity provides Griffins' team with a strong foundation for tailored cyber insurance solutions. Griffin praises HITRUST’s reliable framework that has been in place since 2007-2008, saying it’s a key differentiator in the cyber insurance space.</p><p>Sean Martin also notes the ongoing evolution in how organizations approach cyber insurance. Historically, the market's response to cybersecurity certifications has been lukewarm, but there is a shift towards utilizing credible, respected frameworks in insurance solutions. HITRUST certifications, such as the R2 certification, now play a crucial role in demonstrating an organization's efforts to mitigate risk and are instrumental in securing favorable insurance terms.</p><p>Griffin further discusses the multifaceted stakeholders involved in procuring cyber insurance within organizations. He talks about the need for simplifying cyber risk management for different organizational roles, particularly the non-technical insurance buyers. Griffin emphasizes making the insurance process less intimidating by leveraging compliance and cybersecurity measures already in place.</p><p>Ryan Griffin underscores McGill Partners' mission to create a mature and sustainable risk pool, making cyber insurance predictable and reliable for their clients. The collaboration with HITRUST showcases a tangible effort towards improving trust and efficiency in the cyber insurance market. With accurate, trustworthy data, McGill Partners is dedicated to reducing insurance barriers and ensuring organizations are well-prepared to meet their cyber risk management needs.</p><p>Learn more about McGill and Partners: <a href="https://itspm.ag/mcgill-and-partners-o89w">https://itspm.ag/mcgill-and-partners-o89w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Griffin</strong>, Partner, McGill and Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryanpgriffin/">https://www.linkedin.com/in/ryanpgriffin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from McGill and Partners: <a href="https://www.itspmagazine.com/directory/mcgill-and-partners">https://www.itspmagazine.com/directory/mcgill-and-partners</a></p><p>Video Podcast: Introduction to HITRUST’s Cyber Insurance Facility: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 3 Dec 2024 16:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Griffin)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/building-a-sustainable-predictable-cyber-insurance-market-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-mcgill-and-partners-short-brand-innovation-story-with-ryan-griffin-Nwrxuvlt</link>
      <content:encoded><![CDATA[<p>During the latest Brand Story episode recorded as part of the On Location series at HITRUST Collaborate 2024, host Sean Martin speaks with Ryan Griffin from McGill Partners about the intricacies of cyber insurance.</p><p>Ryan Griffin, who plays a key role at the cyber insurance brokerage firm McGill Partners, shares insights into the importance of cyber insurance for large and complex organizations. Griffin outlines how the company helps clients understand and quantify their cyber risks before negotiating with over 100 cyber insurers to secure coverage. This rigorous approach is crucial given the volatile nature of cyber risks.</p><p>One of the significant challenges in the field, Griffin notes, is the counterparty risk involved in contractual relationships between large organizations. He emphasizes the necessity for businesses to carry adequate insurance coverage, akin to traditional liability insurance. Griffin reflects on the market evolution where organizations now see the value in cyber insurance, which should ideally cover rare but high-impact events.</p><p>The episode also highlights the pivotal role of data in understanding and pricing cyber risks. Sean Martin brings attention to the collaboration between McGill Partners and HITRUST. HITRUST's extensive data on cybersecurity and privacy maturity provides Griffins' team with a strong foundation for tailored cyber insurance solutions. Griffin praises HITRUST’s reliable framework that has been in place since 2007-2008, saying it’s a key differentiator in the cyber insurance space.</p><p>Sean Martin also notes the ongoing evolution in how organizations approach cyber insurance. Historically, the market's response to cybersecurity certifications has been lukewarm, but there is a shift towards utilizing credible, respected frameworks in insurance solutions. HITRUST certifications, such as the R2 certification, now play a crucial role in demonstrating an organization's efforts to mitigate risk and are instrumental in securing favorable insurance terms.</p><p>Griffin further discusses the multifaceted stakeholders involved in procuring cyber insurance within organizations. He talks about the need for simplifying cyber risk management for different organizational roles, particularly the non-technical insurance buyers. Griffin emphasizes making the insurance process less intimidating by leveraging compliance and cybersecurity measures already in place.</p><p>Ryan Griffin underscores McGill Partners' mission to create a mature and sustainable risk pool, making cyber insurance predictable and reliable for their clients. The collaboration with HITRUST showcases a tangible effort towards improving trust and efficiency in the cyber insurance market. With accurate, trustworthy data, McGill Partners is dedicated to reducing insurance barriers and ensuring organizations are well-prepared to meet their cyber risk management needs.</p><p>Learn more about McGill and Partners: <a href="https://itspm.ag/mcgill-and-partners-o89w">https://itspm.ag/mcgill-and-partners-o89w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ryan Griffin</strong>, Partner, McGill and Partners</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryanpgriffin/">https://www.linkedin.com/in/ryanpgriffin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from McGill and Partners: <a href="https://www.itspmagazine.com/directory/mcgill-and-partners">https://www.itspmagazine.com/directory/mcgill-and-partners</a></p><p>Video Podcast: Introduction to HITRUST’s Cyber Insurance Facility: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6848799" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a27a5fdf-0880-4904-bf97-eb4cdf05d232/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a27a5fdf-0880-4904-bf97-eb4cdf05d232&amp;feed=kDNbmF_B"/>
      <itunes:title>Building a Sustainable, Predictable Cyber Insurance Market | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A McGill and Partners Short Brand Innovation Story with Ryan Griffin</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Ryan Griffin</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:08</itunes:duration>
      <itunes:summary>Join Sean Martin and Ryan Griffin from McGill Partners as they delve into the complexities of cyber insurance, discussing how reliable data from HITRUST is transforming risk management for large organizations. Discover the evolving role of cyber insurance in safeguarding businesses against high-impact cyber threats and the strategies for making the process less intimidating.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Ryan Griffin from McGill Partners as they delve into the complexities of cyber insurance, discussing how reliable data from HITRUST is transforming risk management for large organizations. Discover the evolving role of cyber insurance in safeguarding businesses against high-impact cyber threats and the strategies for making the process less intimidating.</itunes:subtitle>
      <itunes:keywords>compliance, data, insurance, sean martin, hitrust, cybersecurity, mcgill partners, cyber, itsp, conference, organization, coverage, collaborate, management, cyber insurance, ryan griffin, certifications, hitrust collaborate, risk, privacy, vendor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>82</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4a519511-7a22-4b1b-824b-5878707657af</guid>
      <title>Transforming Cybersecurity with Essential Eight by Building Robust Security Structures with a Default Deny Approach | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</title>
      <description><![CDATA[<p>During AISA Cyber Con 2024 in Melbourne, Sean Martin connected with Jade Wilkie from ThreatLocker. Wilkie, who is currently an account executive and soon to assume a leadership role with the APAC sales team, discusses the significance of ThreatLocker’s presence at the event and their growth in the Australian market. With ThreatLocker’s APAC team attending for the first time, Wilkie emphasizes the importance of support on the ground as Australia has quickly become ThreatLocker’s second-largest market.</p><p>ThreatLocker’s approach, centered on a default deny methodology and zero trust framework, aligns well with Australia’s Essential Eight cybersecurity framework. Wilkie highlights that this strategy not only prevents unauthorized access but also reduces noise during detection and response processes. This makes the Essential 8 a solid foundation for cybersecurity, offering a straightforward and effective structure that companies can implement.</p><p>At their booth, ThreatLocker aims to raise awareness about their comprehensive offerings beyond application control, including EDR and MDR, and network control modules. Wilkie invites attendees to engage with the team to understand how ThreatLocker’s solutions can fortify their security structures.</p><p>The episode teases an upcoming conversation at Zero Trust World in Orlando, where Sean Martin and Jade Wilkie will further explore the event’s takeaways and discuss emerging themes and trends in the cybersecurity space. Don’t miss out on this insightful discussion that promises to deliver valuable information for strengthening cybersecurity efforts.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 27 Nov 2024 01:51:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/transforming-cybersecurity-with-essential-eight-by-building-robust-security-structures-with-a-default-deny-approach-a-brand-story-conversation-from-aisa-cyber-con-2024-in-melbourne-a-threatlocker-story-with-jade-wilkie-pQIpPUSX</link>
      <content:encoded><![CDATA[<p>During AISA Cyber Con 2024 in Melbourne, Sean Martin connected with Jade Wilkie from ThreatLocker. Wilkie, who is currently an account executive and soon to assume a leadership role with the APAC sales team, discusses the significance of ThreatLocker’s presence at the event and their growth in the Australian market. With ThreatLocker’s APAC team attending for the first time, Wilkie emphasizes the importance of support on the ground as Australia has quickly become ThreatLocker’s second-largest market.</p><p>ThreatLocker’s approach, centered on a default deny methodology and zero trust framework, aligns well with Australia’s Essential Eight cybersecurity framework. Wilkie highlights that this strategy not only prevents unauthorized access but also reduces noise during detection and response processes. This makes the Essential 8 a solid foundation for cybersecurity, offering a straightforward and effective structure that companies can implement.</p><p>At their booth, ThreatLocker aims to raise awareness about their comprehensive offerings beyond application control, including EDR and MDR, and network control modules. Wilkie invites attendees to engage with the team to understand how ThreatLocker’s solutions can fortify their security structures.</p><p>The episode teases an upcoming conversation at Zero Trust World in Orlando, where Sean Martin and Jade Wilkie will further explore the event’s takeaways and discuss emerging themes and trends in the cybersecurity space. Don’t miss out on this insightful discussion that promises to deliver valuable information for strengthening cybersecurity efforts.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974" target="_blank">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Jade Wilkie</strong>, Account Executive APAC, ThreatLocker [<a href="https://x.com/threatlocker" target="_blank">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jade-wilkie-salesprofessional/" target="_blank">https://www.linkedin.com/in/jade-wilkie-salesprofessional/</a></p><p><strong>Resources</strong></p><p>Essential Eight: <a href="https://itspm.ag/threatq55q" target="_blank">https://itspm.ag/threatq55q</a></p><p>Zero Trust World: <a href="https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida" target="_blank">https://itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-florida</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker" target="_blank">https://www.itspmagazine.com/directory/threatlocker</a></p><p>View all of our AISA Cyber Con 2024 coverage: <a href="https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia" target="_blank">https://www.itspmagazine.com/australian-cyber-conference-melbourne-2024-cybersecurity-event-coverage-in-australia</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5681847" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/cf9e870a-5e81-431d-a2f8-fe361a1f661c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=cf9e870a-5e81-431d-a2f8-fe361a1f661c&amp;feed=kDNbmF_B"/>
      <itunes:title>Transforming Cybersecurity with Essential Eight by Building Robust Security Structures with a Default Deny Approach | A Brand Story Conversation From AISA Cyber Con 2024 in Melbourne | A ThreatLocker Story with Jade Wilkie</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jade Wilkie</itunes:author>
      <itunes:duration>00:05:55</itunes:duration>
      <itunes:summary>At AISA Cyber Con 2024, Sean Martin connects with Jade Wilkie from ThreatLocker to reveal the company&apos;s growth in the Australian market and their alignment with the Essential Eight cybersecurity framework. Discover how ThreatLocker&apos;s innovative approach and comprehensive offerings can enhance your organization&apos;s security structure by tuning into this insightful episode.</itunes:summary>
      <itunes:subtitle>At AISA Cyber Con 2024, Sean Martin connects with Jade Wilkie from ThreatLocker to reveal the company&apos;s growth in the Australian market and their alignment with the Essential Eight cybersecurity framework. Discover how ThreatLocker&apos;s innovative approach and comprehensive offerings can enhance your organization&apos;s security structure by tuning into this insightful episode.</itunes:subtitle>
      <itunes:keywords>jade wilkie, essential eight, marco ciappelli, security posture, leadership, security structure, sean martin, aisa, regulatory compliance, cybersecurity, risk assessment, threatlocker, risk management, network control, apac, account executive, application control, default deny, certification, sales team, australia, cyber conference, emea, zero trust, cyber con, brand story, 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>81</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b3ebb12-6556-4f21-89fc-874f10c0b1dc</guid>
      <title>Bridging Cybersecurity and Finance for Better Insurance Outcomes | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Google Short Brand Innovation Story with Monica Shokrai</title>
      <description><![CDATA[<p>In this Brand Story episode, recorded live at the HITRUST Collaborate Conference 2024, host Sean Martin sits down with Monica Shokrai, Head of Risk and Insurance for Google Cloud. The topic of conversation centers around cyber insurance, a crucial area impacting organizations across sectors.</p><p>Monica Shokrai leads the charge in managing risk and procuring insurance for Google Cloud, a role that integrates closely with both the finance and security teams. She highlights the unique dual approach of her team, which not only secures coverage for Google but also strategizes on how to leverage insurance to assist Google Cloud customers in mitigating risks.</p><p>A key point discussed is the interdisciplinary nature of cyber insurance. Traditionally managed by the finance or legal departments, Shokrai emphasizes its growing collaboration with cybersecurity teams. She notes that the standard organizational structure often sees a communication divide between finance and security departments. However, the evolving cyber insurance market is pushing these groups closer together, fostering a more integrated risk management strategy.</p><p>Shokrai also shares insights on how Google approaches risk exposure and posture. By modeling risk in-house and leveraging an actuarial team, Google can quantify risks accurately and work closely with security teams. This model not only helps in securing better insurance terms but also aids in understanding and integrating security measures within the organization.</p><p>Another significant point is Google’s innovative approach to automating the cyber insurance process. Through their Risk Protection Program, Google allows security metrics to be shared with insurance partners like Allianz in Munich. This method simplifies the underwriting process and promotes a data-driven approach to evaluating cybersecurity risks, aligning insurers and security teams toward a common goal.</p><p>Overall, the discussion underscores the importance of a cohesive strategy that bridges finance and cybersecurity through innovative risk management and insurance practices. With leaders like Monica Shokrai at the helm, Google Cloud is at the forefront of integrating these critical functions, ultimately benefiting both the company and its customers.</p><p>Learn more about Google Cloud: <a href="https://itspm.ag/google-pkap">https://itspm.ag/google-pkap</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monica Shokrai</strong>, Head of Risk and Insurance, Google Cloud [<a href="https://x.com/lifeatgoogle">@lifeatgoogle</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/monicashokrai/">https://www.linkedin.com/in/monicashokrai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Google: <a href="https://www.itspmagazine.com/directory/google">https://www.itspmagazine.com/directory/google</a></p><p>Simplified Cyber Insurance for Organizations with a HITRUST Certification: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 22 Nov 2024 00:38:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Monica Shokrai)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/bridging-cybersecurity-and-finance-for-better-insurance-outcomes-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-google-short-brand-innovation-story-with-monica-shokrai-bcrs0gGj</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, recorded live at the HITRUST Collaborate Conference 2024, host Sean Martin sits down with Monica Shokrai, Head of Risk and Insurance for Google Cloud. The topic of conversation centers around cyber insurance, a crucial area impacting organizations across sectors.</p><p>Monica Shokrai leads the charge in managing risk and procuring insurance for Google Cloud, a role that integrates closely with both the finance and security teams. She highlights the unique dual approach of her team, which not only secures coverage for Google but also strategizes on how to leverage insurance to assist Google Cloud customers in mitigating risks.</p><p>A key point discussed is the interdisciplinary nature of cyber insurance. Traditionally managed by the finance or legal departments, Shokrai emphasizes its growing collaboration with cybersecurity teams. She notes that the standard organizational structure often sees a communication divide between finance and security departments. However, the evolving cyber insurance market is pushing these groups closer together, fostering a more integrated risk management strategy.</p><p>Shokrai also shares insights on how Google approaches risk exposure and posture. By modeling risk in-house and leveraging an actuarial team, Google can quantify risks accurately and work closely with security teams. This model not only helps in securing better insurance terms but also aids in understanding and integrating security measures within the organization.</p><p>Another significant point is Google’s innovative approach to automating the cyber insurance process. Through their Risk Protection Program, Google allows security metrics to be shared with insurance partners like Allianz in Munich. This method simplifies the underwriting process and promotes a data-driven approach to evaluating cybersecurity risks, aligning insurers and security teams toward a common goal.</p><p>Overall, the discussion underscores the importance of a cohesive strategy that bridges finance and cybersecurity through innovative risk management and insurance practices. With leaders like Monica Shokrai at the helm, Google Cloud is at the forefront of integrating these critical functions, ultimately benefiting both the company and its customers.</p><p>Learn more about Google Cloud: <a href="https://itspm.ag/google-pkap">https://itspm.ag/google-pkap</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Monica Shokrai</strong>, Head of Risk and Insurance, Google Cloud [<a href="https://x.com/lifeatgoogle">@lifeatgoogle</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/monicashokrai/">https://www.linkedin.com/in/monicashokrai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Google: <a href="https://www.itspmagazine.com/directory/google">https://www.itspmagazine.com/directory/google</a></p><p>Simplified Cyber Insurance for Organizations with a HITRUST Certification: <a href="https://itspm.ag/hitrusp5x6" target="_blank">https://itspm.ag/hitrusp5x6</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6792376" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/94fd7490-dc07-42bc-bf62-fd1d019ee0e6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=94fd7490-dc07-42bc-bf62-fd1d019ee0e6&amp;feed=kDNbmF_B"/>
      <itunes:title>Bridging Cybersecurity and Finance for Better Insurance Outcomes | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Google Short Brand Innovation Story with Monica Shokrai</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Monica Shokrai</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>Join Sean Martin and Monica Shokrai, Head of Risk and Insurance for Google Cloud, as they explore the innovative strategies behind Google&apos;s approach to cyber insurance and risk management. Discover how interdisciplinary collaboration and automation are shaping the future of cyber insurance and helping organizations mitigate risks effectively.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Monica Shokrai, Head of Risk and Insurance for Google Cloud, as they explore the innovative strategies behind Google&apos;s approach to cyber insurance and risk management. Discover how interdisciplinary collaboration and automation are shaping the future of cyber insurance and helping organizations mitigate risks effectively.</itunes:subtitle>
      <itunes:keywords>collaboration, monica shokrai, risk protection, google cloud, insurance, sean martin, automation, hitrust, cybersecurity, finance security, cyber, conference, risk management, coverage, metrics, cyber insurance, underwriting, actuary, finance team, strategy, security teams, 2024</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>80</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6b416292-f909-410f-9fc3-d1f9b3719253</guid>
      <title>The 3-2-1 Rule for Cyber Resiliency | 7 Minutes on ITSPmagazine | An Apricorn Short Brand Innovation Story with Kurt Markley</title>
      <description><![CDATA[<p>Companies, organizations and governments have massive volumes of data, and the primary focus for its security is placed on that which is stored in the cloud, but many are not following best practices of taking the extra steps necessary to ensure their backed up data is secure, complete and uncorrupted. This story is to talk about using the 3-2-1 rule for cyber resiliency (keep three copies of data, on two different formats–both encrypted, one of which is stored off-site and offline) and discuss anecdotes of what can happen when cyber resilience plans are not put in place or followed.</p><p>Data is the most important asset an organization has, whether it’s a business, organization or a government. At the same time, the frequency of cyber attacks that compromise data are increasing. Ransomware continues to be a plague, with some reports showing more than 14 publicly claimed attacks daily for the first half of 2024. Having a plan to thwart cyberattack is only part of the strategy. Equally important is how to rapidly recover and restore operations after a ransomware disruption has occurred. Share anecdote about OVHcloud data center that burned down in 2021 with backups in it – all assets destroyed and websites down for days. also might be good to mention the latest ransomware attack on University of Texas healthcare that is still not fully operational, 3 weeks after the attack and counting. it is unknown if they paid the ransom, but if they did and they’re still not operational, that goes to show how unreliable the ransomed data is. Apricorn’s own research shows that only half of U.S. respondents are conducting automatic backups to both a central repository AND a personal repository. Additionally, more than 25% of survey respondents were unable to recover all of their data successfully</p><p>If attackers are successfully breaching data and holding it for ransom, organizations have to be able to recover complete backups of their data in order to a) avoid paying the ransom and b) assure the original data needed for restoration of operations is complete and intact, which statistics show, frequently is corrupted and incomplete when ransom is paid. One of the easiest and most effective ways to rapidly restore operations after a ransomware attempt is to keep multiple copies of integrity-checked data so you can fully recover it if it’s compromised. The 3-2-1 rule is a proven cyber resilience best practice. The 3-2-1 rule calls for keeping at least three copies of your data on two different types of media, with one being encrypted and offsite. This is where Apricorn comes into play - we make the highest grade, portable data encryption products on the market. Our products are security focused - 100% software free, FIPS certified, non-Chinese chips and so many unique features such as admin AND user forced enrollment, programmable PIN lengths, brute force defense, self destruct PINS and more.</p><p>Learn more about Apricorn: <a href="https://itspm.ag/apricomebv" target="_blank">https://itspm.ag/apricomebv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kurt Markley</strong>, Managing Director, America's, Apricorn [<a href="https://x.com/apricorn_info">@apricorn_info</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kurt-markley-1596054/" target="_blank">https://www.linkedin.com/in/kurt-markley-1596054/</a></p><p><strong>Resources</strong></p><p>Securing Data with Hardware Encrypted USB Drives: <a href="https://itspm.ag/apricoy0dm">https://itspm.ag/apricoy0dm</a></p><p>Learn more and catch more stories from Apricorn: <a href="https://www.itspmagazine.com/directory/apricorn" target="_blank">https://www.itspmagazine.com/directory/apricorn</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Nov 2024 00:13:29 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Kurt Markley, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-3-2-1-rule-for-cyber-resiliency-7-minutes-on-itspmagazine-an-apricon-short-brand-innovation-story-with-kurt-markley-2WLo6JNf</link>
      <content:encoded><![CDATA[<p>Companies, organizations and governments have massive volumes of data, and the primary focus for its security is placed on that which is stored in the cloud, but many are not following best practices of taking the extra steps necessary to ensure their backed up data is secure, complete and uncorrupted. This story is to talk about using the 3-2-1 rule for cyber resiliency (keep three copies of data, on two different formats–both encrypted, one of which is stored off-site and offline) and discuss anecdotes of what can happen when cyber resilience plans are not put in place or followed.</p><p>Data is the most important asset an organization has, whether it’s a business, organization or a government. At the same time, the frequency of cyber attacks that compromise data are increasing. Ransomware continues to be a plague, with some reports showing more than 14 publicly claimed attacks daily for the first half of 2024. Having a plan to thwart cyberattack is only part of the strategy. Equally important is how to rapidly recover and restore operations after a ransomware disruption has occurred. Share anecdote about OVHcloud data center that burned down in 2021 with backups in it – all assets destroyed and websites down for days. also might be good to mention the latest ransomware attack on University of Texas healthcare that is still not fully operational, 3 weeks after the attack and counting. it is unknown if they paid the ransom, but if they did and they’re still not operational, that goes to show how unreliable the ransomed data is. Apricorn’s own research shows that only half of U.S. respondents are conducting automatic backups to both a central repository AND a personal repository. Additionally, more than 25% of survey respondents were unable to recover all of their data successfully</p><p>If attackers are successfully breaching data and holding it for ransom, organizations have to be able to recover complete backups of their data in order to a) avoid paying the ransom and b) assure the original data needed for restoration of operations is complete and intact, which statistics show, frequently is corrupted and incomplete when ransom is paid. One of the easiest and most effective ways to rapidly restore operations after a ransomware attempt is to keep multiple copies of integrity-checked data so you can fully recover it if it’s compromised. The 3-2-1 rule is a proven cyber resilience best practice. The 3-2-1 rule calls for keeping at least three copies of your data on two different types of media, with one being encrypted and offsite. This is where Apricorn comes into play - we make the highest grade, portable data encryption products on the market. Our products are security focused - 100% software free, FIPS certified, non-Chinese chips and so many unique features such as admin AND user forced enrollment, programmable PIN lengths, brute force defense, self destruct PINS and more.</p><p>Learn more about Apricorn: <a href="https://itspm.ag/apricomebv" target="_blank">https://itspm.ag/apricomebv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Kurt Markley</strong>, Managing Director, America's, Apricorn [<a href="https://x.com/apricorn_info">@apricorn_info</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/kurt-markley-1596054/" target="_blank">https://www.linkedin.com/in/kurt-markley-1596054/</a></p><p><strong>Resources</strong></p><p>Securing Data with Hardware Encrypted USB Drives: <a href="https://itspm.ag/apricoy0dm">https://itspm.ag/apricoy0dm</a></p><p>Learn more and catch more stories from Apricorn: <a href="https://www.itspmagazine.com/directory/apricorn" target="_blank">https://www.itspmagazine.com/directory/apricorn</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6768985" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a111df7f-eb62-481b-8e09-653de2c69401/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a111df7f-eb62-481b-8e09-653de2c69401&amp;feed=kDNbmF_B"/>
      <itunes:title>The 3-2-1 Rule for Cyber Resiliency | 7 Minutes on ITSPmagazine | An Apricorn Short Brand Innovation Story with Kurt Markley</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Kurt Markley, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:03</itunes:duration>
      <itunes:summary>Companies, organizations and governments have massive volumes of data, and the primary focus for its security is placed on that which is stored in the cloud, but many are not following best practices of taking the extra steps necessary to ensure their backed up data is secure, complete and uncorrupted. This story is to talk about using the 3-2-1 rule for cyber resiliency (keep three copies of data, on two different formats–both encrypted, one of which is stored off-site and offline) and discuss anecdotes of what can happen when cyber resilience plans are not put in place or followed.</itunes:summary>
      <itunes:subtitle>Companies, organizations and governments have massive volumes of data, and the primary focus for its security is placed on that which is stored in the cloud, but many are not following best practices of taking the extra steps necessary to ensure their backed up data is secure, complete and uncorrupted. This story is to talk about using the 3-2-1 rule for cyber resiliency (keep three copies of data, on two different formats–both encrypted, one of which is stored off-site and offline) and discuss anecdotes of what can happen when cyber resilience plans are not put in place or followed.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sean martin, cybersecurity</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>79</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5ff78787-3cb9-41e9-8956-92295fdb003c</guid>
      <title>Cyber Heroes in Action: Delivering Advanced Security Measures for Modern Businesses | A ThreatLocker Brand Story with Danny Jenkins</title>
      <description><![CDATA[<p>In this Brand Story episode, Marco Ciappelli and Sean Martin sit down with Danny Jenkins, CEO and co-founder of ThreatLocker, to uncover the fascinating journey and innovative approach of ThreatLocker in the cybersecurity realm. The episode sheds light on the company’s mission, the challenges it faces, and the transformative solutions it offers.</p><p>Danny Jenkins recounts the origin story of ThreatLocker, beginning with his early career in IT and his fortuitous stumble into cybersecurity. He explains how witnessing firsthand the devastating impact of ransomware led to the inception of ThreatLocker. His experience with ethical hacking and ransomware recovery highlighted a critical need for more effective IT security solutions, enabling Jenkins to spearhead the development of ThreatLocker with a central philosophy: deny by default.</p><p>ThreatLocker’s primary goal is to help organizations implement a zero trust framework by making it as simple and automated as possible. Jenkins emphasizes that effective security requires blocking untrusted software and limiting what trusted software can do. He articulates the importance of learning the intricacies of each environment ThreatLocker protects, from small businesses to massive enterprises like JetBlue. By examining each endpoint and understanding the specific software and dependencies, ThreatLocker ensures that systems remain secure without disrupting daily operations.</p><p>One of the key aspects discussed is ThreatLocker’s unique human element combined with technological innovation. Jenkins introduces the concept of their 'cyber hero' team, dedicated to providing 24/7 support. This team is crucial, especially when onboarding new clients or assisting those already affected by ransomware. This commitment to customer service underscores ThreatLocker’s philosophy of not only providing top-tier solutions but ensuring they are successfully implemented and maintained.</p><p>Jenkins also touches upon the broader industry challenges, specifically the common pitfalls enterprises fall into by relying on endpoint detection and response (EDR) systems alone. He argues that such systems are often reactive, addressing symptoms rather than root causes. ThreatLocker’s approach, focusing on proactive prevention and least privilege access, aims to mitigate vulnerabilities before they can be exploited.</p><p>Finally, Jenkins discusses the future vision for ThreatLocker, highlighting continued growth and innovation. The company’s commitment to maintaining high support levels while expanding its product offerings ensures it remains at the forefront of cybersecurity solutions. Events like Zero Trust World serve as educational opportunities for clients to deepen their understanding and enhance their security postures.</p><p>Overall, this episode provides an in-depth look at ThreatLocker’s strategic approach to cybersecurity, emphasizing the importance of proactive prevention, customer service, and continuous improvement.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Danny Jenkins</strong>, CEO of ThreatLocker [<a href="https://x.com/ThreatLocker">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dannyjenkinscyber/">https://www.linkedin.com/in/dannyjenkinscyber/</a></p><p><strong>Resources</strong></p><p>Zero Trust World Conference: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 20 Nov 2024 22:17:53 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Danny Jenkins)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/cyber-heroes-in-action-delivering-advanced-security-measures-for-modern-businesses-a-threatlocker-story-with-danny-jenkins-nNwzjoPa</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Marco Ciappelli and Sean Martin sit down with Danny Jenkins, CEO and co-founder of ThreatLocker, to uncover the fascinating journey and innovative approach of ThreatLocker in the cybersecurity realm. The episode sheds light on the company’s mission, the challenges it faces, and the transformative solutions it offers.</p><p>Danny Jenkins recounts the origin story of ThreatLocker, beginning with his early career in IT and his fortuitous stumble into cybersecurity. He explains how witnessing firsthand the devastating impact of ransomware led to the inception of ThreatLocker. His experience with ethical hacking and ransomware recovery highlighted a critical need for more effective IT security solutions, enabling Jenkins to spearhead the development of ThreatLocker with a central philosophy: deny by default.</p><p>ThreatLocker’s primary goal is to help organizations implement a zero trust framework by making it as simple and automated as possible. Jenkins emphasizes that effective security requires blocking untrusted software and limiting what trusted software can do. He articulates the importance of learning the intricacies of each environment ThreatLocker protects, from small businesses to massive enterprises like JetBlue. By examining each endpoint and understanding the specific software and dependencies, ThreatLocker ensures that systems remain secure without disrupting daily operations.</p><p>One of the key aspects discussed is ThreatLocker’s unique human element combined with technological innovation. Jenkins introduces the concept of their 'cyber hero' team, dedicated to providing 24/7 support. This team is crucial, especially when onboarding new clients or assisting those already affected by ransomware. This commitment to customer service underscores ThreatLocker’s philosophy of not only providing top-tier solutions but ensuring they are successfully implemented and maintained.</p><p>Jenkins also touches upon the broader industry challenges, specifically the common pitfalls enterprises fall into by relying on endpoint detection and response (EDR) systems alone. He argues that such systems are often reactive, addressing symptoms rather than root causes. ThreatLocker’s approach, focusing on proactive prevention and least privilege access, aims to mitigate vulnerabilities before they can be exploited.</p><p>Finally, Jenkins discusses the future vision for ThreatLocker, highlighting continued growth and innovation. The company’s commitment to maintaining high support levels while expanding its product offerings ensures it remains at the forefront of cybersecurity solutions. Events like Zero Trust World serve as educational opportunities for clients to deepen their understanding and enhance their security postures.</p><p>Overall, this episode provides an in-depth look at ThreatLocker’s strategic approach to cybersecurity, emphasizing the importance of proactive prevention, customer service, and continuous improvement.</p><p>Learn more about ThreatLocker: <a href="https://itspm.ag/threatlocker-r974">https://itspm.ag/threatlocker-r974</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Danny Jenkins</strong>, CEO of ThreatLocker [<a href="https://x.com/ThreatLocker">@ThreatLocker</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dannyjenkinscyber/">https://www.linkedin.com/in/dannyjenkinscyber/</a></p><p><strong>Resources</strong></p><p>Zero Trust World Conference: <a href="https://itspm.ag/threat5mu1" target="_blank">https://itspm.ag/threat5mu1</a></p><p>Learn more and catch more stories from ThreatLocker: <a href="https://www.itspmagazine.com/directory/threatlocker">https://www.itspmagazine.com/directory/threatlocker</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35885657" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/73565335-b95e-4b62-bb2a-0823d33c38f4/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=73565335-b95e-4b62-bb2a-0823d33c38f4&amp;feed=kDNbmF_B"/>
      <itunes:title>Cyber Heroes in Action: Delivering Advanced Security Measures for Modern Businesses | A ThreatLocker Brand Story with Danny Jenkins</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Danny Jenkins</itunes:author>
      <itunes:duration>00:37:22</itunes:duration>
      <itunes:summary>In this Brand Story episode, we connect with Danny Jenkins, CEO of ThreatLocker, to explore innovative cybersecurity measures that proactively prevent threats by using dynamic firewalls, application ringfencing, and a zero trust framework. Discover how these advanced solutions simplify IT security management while ensuring your network and data remain uncompromised.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode, we connect with Danny Jenkins, CEO of ThreatLocker, to explore innovative cybersecurity measures that proactively prevent threats by using dynamic firewalls, application ringfencing, and a zero trust framework. Discover how these advanced solutions simplify IT security management while ensuring your network and data remain uncompromised.</itunes:subtitle>
      <itunes:keywords>ringfencing, marco ciappelli, danny jenkins, proactive defense, dynamic firewall, sean martin, cyber hero, network traffic, cybersecurity, threatlocker, least privilege, endpoint security, unified audit, allowlisting, edr, application control, ransomware, it management, malware prevention, zero trust, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>78</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">415da871-8176-450e-9ada-27369888dfba</guid>
      <title>Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.</p><p>Briefings highlights include:</p><p>● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications</p><p>● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon</p><p>● WorstFit: Unveiling Hidden Transformers in Windows ANSI!</p><p>Trainings highlights include:</p><p>● Assessing and Exploiting Control Systems and IIoT [4105]</p><p>● Fundamentals of Cyber Investigations and Human Intelligence [2111]</p><p>● Attacking DevOps Pipelines [2108]</p><p>● Offensive Mobile Reversing and Exploitation [4108]</p><p>● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]</p><p>Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:</p><p>● Campus as a Living Lab: An Open-World Hacking Environment</p><p>● Pandora: Exploit Password Management Software To Obtain Credential From Memory</p><p>● Morion - A Tool for Experimenting with Symbolic Execution on Real-World Binaries</p><p>For registration and additional information on Black Hat Europe 2024, please visit <a href="http://www.blackhat.com/eu-24" target="_blank">www.blackhat.com/eu-24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.blackhat.com/html/press/2024-11-06.html" target="_blank">https://www.blackhat.com/html/press/2024-11-06.html</a></p><p>Catch all of our On Location Stories: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 19 Nov 2024 16:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/black-hat-announces-content-lineup-for-black-hat-europe-2024-2-minutes-on-itspmagazine-EzvE9Uyc</link>
      <content:encoded><![CDATA[<p>Black Hat, the cybersecurity industry’s most established and in-depth security event series, today announced the release of its content lineup for Black Hat Europe 2024. The live, in-person event will take place at the ExCeL London from December 9 to December 12, and feature 41 Briefings hand selected by the Black Hat Europe Review Board, four days of Trainings, 25 Sponsored Sessions, and 64 in-person tool demos and three labs at Black Hat Arsenal.</p><p>Briefings highlights include:</p><p>● SpAIware & More: Advanced Prompt Injection Exploits in LLM Applications</p><p>● SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon</p><p>● WorstFit: Unveiling Hidden Transformers in Windows ANSI!</p><p>Trainings highlights include:</p><p>● Assessing and Exploiting Control Systems and IIoT [4105]</p><p>● Fundamentals of Cyber Investigations and Human Intelligence [2111]</p><p>● Attacking DevOps Pipelines [2108]</p><p>● Offensive Mobile Reversing and Exploitation [4108]</p><p>● Advanced Cloud Incident Response in Azure and Microsoft 365 [2103]</p><p>Black Hat Arsenal at Black Hat Europe 2024 tool demo highlights include:</p><p>● Campus as a Living Lab: An Open-World Hacking Environment</p><p>● Pandora: Exploit Password Management Software To Obtain Credential From Memory</p><p>● Morion - A Tool for Experimenting with Symbolic Execution on Real-World Binaries</p><p>For registration and additional information on Black Hat Europe 2024, please visit <a href="http://www.blackhat.com/eu-24" target="_blank">www.blackhat.com/eu-24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.blackhat.com/html/press/2024-11-06.html" target="_blank">https://www.blackhat.com/html/press/2024-11-06.html</a></p><p>Catch all of our On Location Stories: <a href="https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage">https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1816075" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/185681d4-f3ed-42bf-8052-a7655b73d820/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=185681d4-f3ed-42bf-8052-a7655b73d820&amp;feed=kDNbmF_B"/>
      <itunes:title>Black Hat Announces Content Lineup for Black Hat Europe 2024 | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:01:53</itunes:duration>
      <itunes:summary>Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends.</itunes:summary>
      <itunes:subtitle>Black Hat is the cybersecurity industry’s most established and in-depth security event series. Founded in 1997, these annual, multi-day events provide attendees with the latest in cybersecurity research, development, and trends.</itunes:subtitle>
      <itunes:keywords>technology, networking, cybersecurity, conference, cybersecurity conference, security, community</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>77</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">82db2f8f-7da3-4162-95f2-fb6900a7dc48</guid>
      <title>SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.</p><p>Show highlights for 2024 included:</p><p>● Keynotes: This year’s event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.</p><p>● Business Hall: This year’s Business Hall showcased the latest products and technologies from more than 140 of the industry’s leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.</p><p>● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.</p><p>● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event" target="_blank">https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 18 Nov 2024 18:14:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/sector-2024-announces-record-breaking-attendance-following-successful-close-of-toronto-event-2-minutes-on-itspmagazine-UsQdIU5V</link>
      <content:encoded><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the successful completion of the in-person component of SecTor 2024. The event welcomed 5,000 unique attendees joining in-person from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto.</p><p>Show highlights for 2024 included:</p><p>● Keynotes: This year’s event featured two Keynote presentations. The opening Keynote was presented by Leigh Honeywell, founder and CEO of Tall Poppy, and the second Keynote was presented by Omkhar Arasaratnam, Distinguished Engineer for Security at LinkedIn.</p><p>● Business Hall: This year’s Business Hall showcased the latest products and technologies from more than 140 of the industry’s leading cybersecurity solution providers. The Business Hall also featured areas for attendee, vendor, and community engagement through Exhibitor Booths, Arsenal, Sponsored Sessions, Bricks & Picks, and the Community Lounge.</p><p>● Summits: On Tuesday, October 22, the event featured a full day of Summit content, including the ninth annual SecTor Executive Summit, the inaugural The AI Summit at SecTor, and the ninth annual Cloud Security Summit at SecTor.</p><p>● Scholarships: As a way to introduce the next generation of security professionals to the SecTor community, SecTor awarded a total of 37 complimentary SecTor 2024 Briefings passes. Black Hat holds its own annual Student and Veteran Scholarship programs, and partners with a variety of associations on additional scholarship opportunities.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Press Release: <a href="https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event" target="_blank">https://www.businesswire.com/news/home/20241030638106/en/SecTor-2024-Announces-Record-Breaking-Attendance-Following-Successful-Close-of-Toronto-Event</a></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="1956092" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9e7750e1-dadf-4180-9526-cf8dae4b7a3a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9e7750e1-dadf-4180-9526-cf8dae4b7a3a&amp;feed=kDNbmF_B"/>
      <itunes:title>SecTor 2024 Announces Record-Breaking Attendance Following Successful Close of Toronto Event | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:02</itunes:duration>
      <itunes:summary>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:summary>
      <itunes:subtitle>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:subtitle>
      <itunes:keywords>leaders, technology, ai summit, networking, summits, cybersecurity, business, conference, metro toronto, sector, expo, cloud, security, global, executives, october, ai, cybersecurity event series, keynote, convention</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>76</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c0eac11a-cc12-41ae-80ed-c6984262e452</guid>
      <title>Leveraging Data for Cyber Insurance to Bring Consistency and Clarity in Underwriting | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Trium Cyber Short Brand Innovation Story with Josh LaDeau</title>
      <description><![CDATA[<p>In this episode of Short Brand Story recorded during the HITRUST Collaborate 2024 conference, Sean Martin sits down with Josh LaDeau, a prominent figure in the world of cyber insurance. Josh, who represents Trium Cyber, illuminates the crucial aspects of cyber insurance, from data integrity to market challenges. Trium Cyber is known for its specialty in providing cyber property, E&O, and miscellaneous coverages.</p><p>Josh emphasizes the importance of data in the insurance industry, explaining how accurate, structured data provided by HITRUST aids in underwriting processes. The partnership with HITRUST brings a unique advantage by ensuring data consistency and structure. This elevates the underwriting process by reducing ambiguities in policy applications and promoting data security. Josh highlights that this collaboration allows clients to present their data in a more uniform manner, making it easier for insurers to assess and underwrite policies accurately.</p><p>Moreover, the HITRUST R2 framework is particularly beneficial for clients, offering a higher quality of data that leads to better coverage options and advantageous premium pricing. Josh points out that a third-party attestation by HITRUST not only assures data integrity but also qualifies clients for a dedicated credit, further enhancing their position in the market.</p><p>The episode underscores the value Trium Cyber brings to its clients, focusing on technological acumen and a keen understanding of the cyber insurance landscape. This partnership is poised to make a significant impact in making cyber insurance more accessible and reliable for businesses.</p><p>Learn more about Trium Cyber: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Josh LaDeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Trium Cyber: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 16 Nov 2024 00:10:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Josh LaDeau)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/leveraging-data-for-cyber-insurance-to-bring-consistency-and-clarity-in-underwriting-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-trium-cybershort-brand-innovation-story-with-josh-ladeau-URJOaNr_</link>
      <content:encoded><![CDATA[<p>In this episode of Short Brand Story recorded during the HITRUST Collaborate 2024 conference, Sean Martin sits down with Josh LaDeau, a prominent figure in the world of cyber insurance. Josh, who represents Trium Cyber, illuminates the crucial aspects of cyber insurance, from data integrity to market challenges. Trium Cyber is known for its specialty in providing cyber property, E&O, and miscellaneous coverages.</p><p>Josh emphasizes the importance of data in the insurance industry, explaining how accurate, structured data provided by HITRUST aids in underwriting processes. The partnership with HITRUST brings a unique advantage by ensuring data consistency and structure. This elevates the underwriting process by reducing ambiguities in policy applications and promoting data security. Josh highlights that this collaboration allows clients to present their data in a more uniform manner, making it easier for insurers to assess and underwrite policies accurately.</p><p>Moreover, the HITRUST R2 framework is particularly beneficial for clients, offering a higher quality of data that leads to better coverage options and advantageous premium pricing. Josh points out that a third-party attestation by HITRUST not only assures data integrity but also qualifies clients for a dedicated credit, further enhancing their position in the market.</p><p>The episode underscores the value Trium Cyber brings to its clients, focusing on technological acumen and a keen understanding of the cyber insurance landscape. This partnership is poised to make a significant impact in making cyber insurance more accessible and reliable for businesses.</p><p>Learn more about Trium Cyber: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Josh LaDeau</strong>, CEO, Trium Cyber</p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Trium Cyber: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6843364" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/007abedb-b5b3-490b-a32e-083ac0b48630/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=007abedb-b5b3-490b-a32e-083ac0b48630&amp;feed=kDNbmF_B"/>
      <itunes:title>Leveraging Data for Cyber Insurance to Bring Consistency and Clarity in Underwriting | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Trium Cyber Short Brand Innovation Story with Josh LaDeau</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Josh LaDeau</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:07</itunes:duration>
      <itunes:summary>Discover how Trium Cyber, in collaboration with HITRUST, is revolutionizing cyber insurance through data integrity and structured frameworks. Join Sean Martin and Josh LaDeau as they explore the challenges and innovative solutions transforming the industry.</itunes:summary>
      <itunes:subtitle>Discover how Trium Cyber, in collaboration with HITRUST, is revolutionizing cyber insurance through data integrity and structured frameworks. Join Sean Martin and Josh LaDeau as they explore the challenges and innovative solutions transforming the industry.</itunes:subtitle>
      <itunes:keywords>data, trium, insurance, sean martin, josh ladeau, hitrust, hitrust, framework, cybersecurity, cyber, application, coverage, cybersecurity compliance, premium, underwriting, policy, attestation, client, security, market, control, risk, vendor</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>75</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">45b9cfa2-b52e-4a92-9b1c-c156e44267f2</guid>
      <title>First of its Kind Cyber Insurance Product Exclusively Available to HITRUST-Certified Customers | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Blake Sutherland and Robert Booker</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin brings together the team from HITRUST, Robert Booker and Blake Sutherland, to discuss the topic of cyber insurance and its current state in the industry. Both guests bring a wealth of experience and insight, with Robert Booker overseeing strategy, research, and innovation at HITRUST, and Blake Sutherland serving as the EVP of Market Engagement.</p><p>A significant portion of the discussion centers around the role of cyber insurance in today's business environment. Cyber insurance is not just a safety net but a critical aspect of a complete risk management strategy. As Robert Booker points out, it’s an essential service, historically used to cover residual risk after companies have applied their own security measures. However, the market has changed considerably, with new capabilities and approaches evolving over the past several years, making it a dynamic area.</p><p>Blake Sutherland further elaborates on the issues that organizations face in acquiring cyber insurance today. The process is often cumbersome, involving extensive questionnaires and varied requirements from different underwriters. This can be particularly challenging for mid-market companies that may lack the internal resources to manage these complexities.</p><p>The episode highlights that HITRUST is addressing these challenges with their R2 certification, which provides an objective, quantifiable measure of an organization’s cybersecurity posture. This certification helps companies not only in fortifying their own security but also in streamlining the insurance acquisition process by offering a standardized measure that underwriters can rely on. According to Robert Booker, this quantified approach can make a significant difference, offering confidence to both the insured and the insurer.</p><p>Another important aspect discussed is the role of brokerage in this process. Brokers traditionally guide companies through the insurance process, and an R2 certification from HITRUST can greatly assist them in securing better terms and conditions, as it is recognized as a testament to a company's robust security posture. This can also translate into potentially lower premiums and more reliable coverage, addressing one of the largest pain points in securing cyber insurance.</p><p>The HITRUST Shared Risk Facility is made available exclusively through licensed brokers and can be accessed by any company holding an R2 certification, with plans to extend to I1 and E1 levels in the future. This facility aims to simplify the process, reduce the administrative burden on companies, and provide greater reliability in the insurance coverage.</p><p>The episode wraps up with an invitation for organizations, brokers, and underwriters to engage with HITRUST to explore these innovative solutions. It’s a call to improve the overall confidence in the insurance landscape through verified, independent measures of cybersecurity maturity, ultimately benefiting all parties involved in the cyber insurance ecosystem.</p><p>Explore how HITRUST’s R2 certification can enhance your organization's cybersecurity posture and streamline your cyber insurance process.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Resources</strong></p><p>HITRUST 2024 Trust Report: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 8 Nov 2024 17:37:22 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Booker, Blake Sutherland)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/first-of-its-kind-cyber-insurance-product-exclusively-available-to-hitrust-certified-customers-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-story-with-blake-sutherland-and-robert-booker-yD0Pc3bR</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin brings together the team from HITRUST, Robert Booker and Blake Sutherland, to discuss the topic of cyber insurance and its current state in the industry. Both guests bring a wealth of experience and insight, with Robert Booker overseeing strategy, research, and innovation at HITRUST, and Blake Sutherland serving as the EVP of Market Engagement.</p><p>A significant portion of the discussion centers around the role of cyber insurance in today's business environment. Cyber insurance is not just a safety net but a critical aspect of a complete risk management strategy. As Robert Booker points out, it’s an essential service, historically used to cover residual risk after companies have applied their own security measures. However, the market has changed considerably, with new capabilities and approaches evolving over the past several years, making it a dynamic area.</p><p>Blake Sutherland further elaborates on the issues that organizations face in acquiring cyber insurance today. The process is often cumbersome, involving extensive questionnaires and varied requirements from different underwriters. This can be particularly challenging for mid-market companies that may lack the internal resources to manage these complexities.</p><p>The episode highlights that HITRUST is addressing these challenges with their R2 certification, which provides an objective, quantifiable measure of an organization’s cybersecurity posture. This certification helps companies not only in fortifying their own security but also in streamlining the insurance acquisition process by offering a standardized measure that underwriters can rely on. According to Robert Booker, this quantified approach can make a significant difference, offering confidence to both the insured and the insurer.</p><p>Another important aspect discussed is the role of brokerage in this process. Brokers traditionally guide companies through the insurance process, and an R2 certification from HITRUST can greatly assist them in securing better terms and conditions, as it is recognized as a testament to a company's robust security posture. This can also translate into potentially lower premiums and more reliable coverage, addressing one of the largest pain points in securing cyber insurance.</p><p>The HITRUST Shared Risk Facility is made available exclusively through licensed brokers and can be accessed by any company holding an R2 certification, with plans to extend to I1 and E1 levels in the future. This facility aims to simplify the process, reduce the administrative burden on companies, and provide greater reliability in the insurance coverage.</p><p>The episode wraps up with an invitation for organizations, brokers, and underwriters to engage with HITRUST to explore these innovative solutions. It’s a call to improve the overall confidence in the insurance landscape through verified, independent measures of cybersecurity maturity, ultimately benefiting all parties involved in the cyber insurance ecosystem.</p><p>Explore how HITRUST’s R2 certification can enhance your organization's cybersecurity posture and streamline your cyber insurance process.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Blake Sutherland</strong>, EVP Market Adoption, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/blake-sutherland-38854a/" target="_blank">https://www.linkedin.com/in/blake-sutherland-38854a/</a></p><p><strong>Robert Booker</strong>, Chief Strategy Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robertbooker/" target="_blank">https://www.linkedin.com/in/robertbooker/</a></p><p><strong>Resources</strong></p><p>HITRUST 2024 Trust Report: <a href="https://itspm.ag/hitrusi2it" target="_blank">https://itspm.ag/hitrusi2it</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30074001" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7acc09e3-5bc1-4760-896d-95ed58d6974e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7acc09e3-5bc1-4760-896d-95ed58d6974e&amp;feed=kDNbmF_B"/>
      <itunes:title>First of its Kind Cyber Insurance Product Exclusively Available to HITRUST-Certified Customers | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Blake Sutherland and Robert Booker</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Robert Booker, Blake Sutherland</itunes:author>
      <itunes:duration>00:31:19</itunes:duration>
      <itunes:summary>Discover how HITRUST&apos;s R2 certification is revolutionizing cyber insurance by providing a quantifiable measure of cybersecurity maturity, easing the insurance acquisition process, and potentially lowering premiums. Join Sean Martin as he speaks with Robert Booker and Blake Sutherland to explore this groundbreaking approach and its benefits for organizations and underwriters alike.</itunes:summary>
      <itunes:subtitle>Discover how HITRUST&apos;s R2 certification is revolutionizing cyber insurance by providing a quantifiable measure of cybersecurity maturity, easing the insurance acquisition process, and potentially lowering premiums. Join Sean Martin as he speaks with Robert Booker and Blake Sutherland to explore this groundbreaking approach and its benefits for organizations and underwriters alike.</itunes:subtitle>
      <itunes:keywords>maturity assessment, hitrust shared risk facility, marco ciappelli, security posture, sean martin, hitrust, regulatory compliance, cybersecurity, risk assessment, robert booker, risk management, r2 certification, cyber insurance, underwriting, data validation, certification, insurance brokers, mid-market companies, hitrust collaborate 2024, insurance acquisition, blake sutherland, brand story, insurance premiums</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>74</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2e4d384c-d916-43b8-9b42-b8aebf434be6</guid>
      <title>Bringing a Consistent, Personable and Hands-On Approach to Compliance | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A IS Partners Short Brand Innovation Story with Ian Terry and Robert Godard</title>
      <description><![CDATA[<p>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Ian Terry and Robert Godard from IS Partners to discuss the importance of compliance in modern corporations. Ian and Robert share their insights from the HITRUST Collaborate event, shedding light on their company's unique approach to cybersecurity and auditing.</p><p>Robert Godard explains that IS Partners was founded with a startup mentality, emphasizing collaboration and a fun work environment. This culture aims to make compliance efforts less daunting for both their team and their clients. Ian Terry adds that fostering an enjoyable work atmosphere is crucial for engaging and committed outcomes, especially in the dynamic world of information security.</p><p>One significant point discussed is the balance between fun and professionalism. Ian highlights that while the job can be stressful during cybersecurity incidents, the focus on industry changes and continuous learning keeps the work interesting and rewarding. The duo also touches on how IS Partners assists clients in navigating complex compliance frameworks. Their tailored approach ensures clients not only meet regulatory requirements but also achieve their business goals.</p><p>The episode concludes with a note on the importance of events like HITRUST Collaborate for networking and professional growth.</p><p>Learn more about IS Partners: <a href="https://itspm.ag/isparto2jk">https://itspm.ag/isparto2jk</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Ian Terry</strong>, Principal, Cybersecurity Services, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-terry/" target="_blank">https://www.linkedin.com/in/ian-terry/</a></p><p><strong>Robert Godard</strong>, Partner, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/" target="_blank">https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from IS Partners: <a href="https://www.itspmagazine.com/directory/is-partners">https://www.itspmagazine.com/directory/is-partners</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 7 Nov 2024 04:24:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ian Terry, Robert Godard, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/bringing-a-consistent-personable-and-hands-on-approach-to-compliance-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-is-partnersshort-brand-innovation-story-with-ian-terry-and-robert-godard-a0e3NGHf</link>
      <content:encoded><![CDATA[<p>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Ian Terry and Robert Godard from IS Partners to discuss the importance of compliance in modern corporations. Ian and Robert share their insights from the HITRUST Collaborate event, shedding light on their company's unique approach to cybersecurity and auditing.</p><p>Robert Godard explains that IS Partners was founded with a startup mentality, emphasizing collaboration and a fun work environment. This culture aims to make compliance efforts less daunting for both their team and their clients. Ian Terry adds that fostering an enjoyable work atmosphere is crucial for engaging and committed outcomes, especially in the dynamic world of information security.</p><p>One significant point discussed is the balance between fun and professionalism. Ian highlights that while the job can be stressful during cybersecurity incidents, the focus on industry changes and continuous learning keeps the work interesting and rewarding. The duo also touches on how IS Partners assists clients in navigating complex compliance frameworks. Their tailored approach ensures clients not only meet regulatory requirements but also achieve their business goals.</p><p>The episode concludes with a note on the importance of events like HITRUST Collaborate for networking and professional growth.</p><p>Learn more about IS Partners: <a href="https://itspm.ag/isparto2jk">https://itspm.ag/isparto2jk</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Ian Terry</strong>, Principal, Cybersecurity Services, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ian-terry/" target="_blank">https://www.linkedin.com/in/ian-terry/</a></p><p><strong>Robert Godard</strong>, Partner, IS Partners [<a href="https://x.com/ispartnersllc">@ISPartnersLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/" target="_blank">https://www.linkedin.com/in/robert-godard-cpa-cisa-hitrust-ccsfp/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from IS Partners: <a href="https://www.itspmagazine.com/directory/is-partners">https://www.itspmagazine.com/directory/is-partners</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="7108367" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/73f33751-97d8-4aa7-ba33-7259c82c42ef/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=73f33751-97d8-4aa7-ba33-7259c82c42ef&amp;feed=kDNbmF_B"/>
      <itunes:title>Bringing a Consistent, Personable and Hands-On Approach to Compliance | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A IS Partners Short Brand Innovation Story with Ian Terry and Robert Godard</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ian Terry, Robert Godard, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:24</itunes:duration>
      <itunes:summary>Join Sean Martin as he chats with Ian Terry and Robert Godard from IS Partners about making compliance fun and approachable for businesses, all while sharing insights from the HITRUST Collaborate event. Discover how IS Partners uses a collaborative and engaging work culture to navigate complex cybersecurity and compliance frameworks successfully.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he chats with Ian Terry and Robert Godard from IS Partners about making compliance fun and approachable for businesses, all while sharing insights from the HITRUST Collaborate event. Discover how IS Partners uses a collaborative and engaging work culture to navigate complex cybersecurity and compliance frameworks successfully.</itunes:subtitle>
      <itunes:keywords>compliance, collaboration, soc 2, networking, startup, sean martin, industry standards, hitrust, robert godard, cybersecurity, nist, penetration testing, is partners, ssa 16, cybersecurity compliance, soc 1, it audit, iso, security, cyber incidents, pci dss, cpe, audit, ian terry, engagement</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>73</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">66449d54-7605-49c7-ab21-e7ddc3d55094</guid>
      <title>Guiding Organizations on the Next Steps in Their Compliance Journey | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | An A-LIGN Short Brand Innovation Story with Shreesh Bhattarai</title>
      <description><![CDATA[<p>The focus is on HITRUST assessments, specifically the e1 certification, which provides an entry-level approach to cybersecurity compliance. The session emphasizes that compliance is an ongoing process and highlights the HITRUST e1 framework's adaptability to evolving threats. It also discusses the value proposition of the e1 certification, its affordability, and its suitability for low-risk organizations, as well as its synergies with existing SOC2 and ISO certifications.</p><p>A-LIGN was founded in 2009 by CEO Scott Price to help companies like yours navigate the complexities of cybersecurity and compliance by offering customized solutions that align specifically with each organization’s unique goals and objectives. We believe your business can reach its fullest potential by aligning compliance objectives with strategic objectives. Working with small businesses to global enterprises, A‑LIGN’s experts coupled with our proprietary compliance management platform, A‑SCEND, are transforming the compliance experience.</p><p>A-LIGN is the leading provider of high-quality, efficient cybersecurity compliance programs. Combining experienced auditors and audit management technology, A-LIGN provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI. A-LIGN is the number one issuer of SOC 2 and HITRUST and a top three FedRAMP assessor.</p><p>Learn more about A-LIGN: <a href="https://itspm.ag/a-lign-uz1w" target="_blank">https://itspm.ag/a-lign-uz1w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Shreesh Bhattarai</strong>, Director of HITRUST, A-LIGN [<a href="https://x.com/AlignCompliance">@aligncompliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/" target="_blank">https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from A-LIGN: <a href="https://www.itspmagazine.com/directory/a-lign">https://www.itspmagazine.com/directory/a-lign</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 31 Oct 2024 02:33:48 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Shreesh Bhattarai)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/guiding-organizations-on-the-next-steps-in-their-compliance-journey-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-an-a-lignshort-brand-innovation-story-with-shreesh-bhattarai-immaPBGM</link>
      <content:encoded><![CDATA[<p>The focus is on HITRUST assessments, specifically the e1 certification, which provides an entry-level approach to cybersecurity compliance. The session emphasizes that compliance is an ongoing process and highlights the HITRUST e1 framework's adaptability to evolving threats. It also discusses the value proposition of the e1 certification, its affordability, and its suitability for low-risk organizations, as well as its synergies with existing SOC2 and ISO certifications.</p><p>A-LIGN was founded in 2009 by CEO Scott Price to help companies like yours navigate the complexities of cybersecurity and compliance by offering customized solutions that align specifically with each organization’s unique goals and objectives. We believe your business can reach its fullest potential by aligning compliance objectives with strategic objectives. Working with small businesses to global enterprises, A‑LIGN’s experts coupled with our proprietary compliance management platform, A‑SCEND, are transforming the compliance experience.</p><p>A-LIGN is the leading provider of high-quality, efficient cybersecurity compliance programs. Combining experienced auditors and audit management technology, A-LIGN provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI. A-LIGN is the number one issuer of SOC 2 and HITRUST and a top three FedRAMP assessor.</p><p>Learn more about A-LIGN: <a href="https://itspm.ag/a-lign-uz1w" target="_blank">https://itspm.ag/a-lign-uz1w</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Shreesh Bhattarai</strong>, Director of HITRUST, A-LIGN [<a href="https://x.com/AlignCompliance">@aligncompliance</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/" target="_blank">https://www.linkedin.com/in/shreesh-bhattarai-cisa-ccsk-hitrust-ccsfp-chqp-5a052837/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from A-LIGN: <a href="https://www.itspmagazine.com/directory/a-lign">https://www.itspmagazine.com/directory/a-lign</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6942845" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/463acc18-50c0-4f20-8af6-26c5da4ea4dd/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=463acc18-50c0-4f20-8af6-26c5da4ea4dd&amp;feed=kDNbmF_B"/>
      <itunes:title>Guiding Organizations on the Next Steps in Their Compliance Journey | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | An A-LIGN Short Brand Innovation Story with Shreesh Bhattarai</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Shreesh Bhattarai</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:13</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Shreesh Bhattarai to share his insights on how A-LIGN has become the leading provider of high-quality, efficient cybersecurity compliance programs and provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Shreesh Bhattarai to share his insights on how A-LIGN has become the leading provider of high-quality, efficient cybersecurity compliance programs and provides the widest breadth and depth of services including SOC 2, ISO 27001, HITRUST, FedRAMP, and PCI.</itunes:subtitle>
      <itunes:keywords>roi, compliance, vc, shreesh bhattarai, ciso, sean martin, assessment, hitrust, framework, cybersecurity, pci, a-lign, soc, attestation, iso, security, certification, private equity, threat</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>72</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">18422562-d702-4f04-a171-1a4150500811</guid>
      <title>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty</title>
      <description><![CDATA[<p>The latest episode of 7 Minutes on ITSPmagazine, recorded during the Black Hat Sector 2024 event in Toronto, Canada, brings insights from the dynamic world of cybersecurity training and education. Hosted by Sean Martin, the discussion features Rushmi Hasham, Director of Strategic Partnerships, and Vasu Daggupaty, Manager of Strategic Partnerships and Investments, both from Rogers Cybersecure Catalyst.</p><p>Rogers Cybersecure Catalyst, a non-profit organization operated by Toronto Metropolitan University, serves as the university’s national hub for cyber education. The organization’s focus spans three primary areas: training individuals to become cybersecurity professionals, helping organizations to bolster their cyber safety measures, and assisting cybersecurity founders in bringing their innovative solutions to the market.</p><p>Vasu Daggupaty explains that the Catalyst’s training programs certify individuals with the necessary credentials to be employable in the cybersecurity field. Moreover, organizations receive guidance on enhancing their incident response strategies and other critical safety practices. An essential part of their mission is also supporting innovators in launching new cybersecurity products and services.</p><p>The episode highlights a compelling story of Gina, a former nurse transitioning into a cybersecurity analyst role. This transformation exemplifies the success of the Catalyst’s Accelerated Rapid Training Program. Rushmi Hasham elaborates on the program’s design, which caters to mid-life career changers, providing a seven-month intensive course in collaboration with the SANS Institute. The program equips participants with hands-on skills, transitioning knowledge, and career development, ensuring they are job-ready upon completion.</p><p>Additionally, the Catalyst’s corporate training services include non-technical tabletop exercises to prepare executives for real-life cyber threats. They also offer a cyber range where clients can safely engage with live malware to elevate their technical response capabilities. This comprehensive approach is instrumental in addressing Canada’s cybersecurity skills shortage and enhancing the nation’s defensive posture. The episode concludes with an invitation to explore the Catalyst's investment initiatives aimed at fortifying cybersecurity innovations and talent development across Canada.</p><p>Learn more about Rogers Cybersecure Catalyst: <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Rushmi Hasham</strong>, Director of Strategic Partnerships, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rushmi-hasham-9523554/">https://www.linkedin.com/in/rushmi-hasham-9523554/</a></p><p><strong>Vasu Daggupaty</strong>, Manager, Partnerships & Investment, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vdaggupaty/">https://www.linkedin.com/in/vdaggupaty/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 24 Oct 2024 01:31:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Rushmi Hasham, Vasu Daggupaty)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/accelerating-cybersecurity-training-and-innovation-7-minutes-on-itspmagazine-from-black-hat-sector-2024-a-rogers-cybersecure-catalyst-short-brand-innovation-story-with-rushmi-hasham-and-vasu-daggupaty-qYaPk_C6</link>
      <content:encoded><![CDATA[<p>The latest episode of 7 Minutes on ITSPmagazine, recorded during the Black Hat Sector 2024 event in Toronto, Canada, brings insights from the dynamic world of cybersecurity training and education. Hosted by Sean Martin, the discussion features Rushmi Hasham, Director of Strategic Partnerships, and Vasu Daggupaty, Manager of Strategic Partnerships and Investments, both from Rogers Cybersecure Catalyst.</p><p>Rogers Cybersecure Catalyst, a non-profit organization operated by Toronto Metropolitan University, serves as the university’s national hub for cyber education. The organization’s focus spans three primary areas: training individuals to become cybersecurity professionals, helping organizations to bolster their cyber safety measures, and assisting cybersecurity founders in bringing their innovative solutions to the market.</p><p>Vasu Daggupaty explains that the Catalyst’s training programs certify individuals with the necessary credentials to be employable in the cybersecurity field. Moreover, organizations receive guidance on enhancing their incident response strategies and other critical safety practices. An essential part of their mission is also supporting innovators in launching new cybersecurity products and services.</p><p>The episode highlights a compelling story of Gina, a former nurse transitioning into a cybersecurity analyst role. This transformation exemplifies the success of the Catalyst’s Accelerated Rapid Training Program. Rushmi Hasham elaborates on the program’s design, which caters to mid-life career changers, providing a seven-month intensive course in collaboration with the SANS Institute. The program equips participants with hands-on skills, transitioning knowledge, and career development, ensuring they are job-ready upon completion.</p><p>Additionally, the Catalyst’s corporate training services include non-technical tabletop exercises to prepare executives for real-life cyber threats. They also offer a cyber range where clients can safely engage with live malware to elevate their technical response capabilities. This comprehensive approach is instrumental in addressing Canada’s cybersecurity skills shortage and enhancing the nation’s defensive posture. The episode concludes with an invitation to explore the Catalyst's investment initiatives aimed at fortifying cybersecurity innovations and talent development across Canada.</p><p>Learn more about Rogers Cybersecure Catalyst: <a href="https://itspm.ag/rogershxbp" target="_blank">https://itspm.ag/rogershxbp</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Rushmi Hasham</strong>, Director of Strategic Partnerships, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rushmi-hasham-9523554/">https://www.linkedin.com/in/rushmi-hasham-9523554/</a></p><p><strong>Vasu Daggupaty</strong>, Manager, Partnerships & Investment, Rogers Cybersecure Catalyst</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vdaggupaty/">https://www.linkedin.com/in/vdaggupaty/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Rogers Cybersecure Catalyst: <a href="https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst" target="_blank">https://www.itspmagazine.com/directory/rogers-cybersecure-catalyst</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6983774" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/478c2675-0e68-4521-a8af-cb0036c7443f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=478c2675-0e68-4521-a8af-cb0036c7443f&amp;feed=kDNbmF_B"/>
      <itunes:title>Accelerating Cybersecurity Training and Innovation | 7 Minutes on ITSPmagazine from Black Hat Sector 2024 | A Rogers Cybersecure Catalyst Short Brand Innovation Story with Rushmi Hasham and Vasu Daggupaty</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Rushmi Hasham, Vasu Daggupaty</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:16</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine, Sean Martin speaks with Rushmi Hasham and Vasu Daggupaty from Rogers Cybersecure Catalyst about their impactful training programs that transform career-changers into cybersecurity professionals and bolster organizational security measures. Discover how their innovative education and corporate training initiatives are bridging the talent gap and driving cybersecurity advancements in Canada.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine, Sean Martin speaks with Rushmi Hasham and Vasu Daggupaty from Rogers Cybersecure Catalyst about their impactful training programs that transform career-changers into cybersecurity professionals and bolster organizational security measures. Discover how their innovative education and corporate training initiatives are bridging the talent gap and driving cybersecurity advancements in Canada.</itunes:subtitle>
      <itunes:keywords>sector 2024, black hat, sean martin, education, job readiness, cybersecure, credentials, cybersecurity, career change, reskilling, upskilling, innovation, vasu daggupaty, rushmi hashim, incident response, itspmagazine, cyber threats, training, catalyst, toronto</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>71</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e6033f6-8613-4d8d-a65a-a518080951bf</guid>
      <title>Effectively Managing a Growing Compliance Program While Minimizing Audit Fatigue | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Schellman Short Brand Innovation Story with Michael Parisi and Ryan Meehan</title>
      <description><![CDATA[<p>Schellman, founded in 2002 as SAS 70 Solutions, was originally focused on just one audit standard; the SAS 70 (subsequently replaced by SOC 2). As the client base grew so did the request to perform other audits outside of the SAS 70. Schellman grew its offerings over the past 20+ years by identifying client needs and then determining if we have the skillset and expertise to deliver high quality work. We have always stayed true to our core strengths and expertise, which is why Schellman is the only Top 100 CPA firm that specializes in IT Audit and Cybersecurity.</p><p>Schellman provides full-spectrum cybersecurity third-party audits, assessments, and certifications. In a marketplace with growing cybersecurity compliance needs, organizations are struggling to incorporate additional framework and regulations in an efficient and effective way. At Schellman we harnesses our expertise and deep knowledge across the compliance standards to roadmap audits throughout the year that promotes the highest return on evidence collection and subject matter expert time.</p><p>By performing specific assessments in a staggered or parallel fashion, Schellman is able to collect once and test many; both in terms of information from subject matters experts and evidence from business stakeholders. The broad range of our compliance offerings, along with our combined audit approach and depth of expertise sets Schellman apart. Schellman's approach was built to provide expertise and quality work while valuing and respecting the time and stress assessments/audits place on an organization.</p><p>Learn more about Schellman: <a href="https://itspm.ag/schellman9a6v">https://itspm.ag/schellman9a6v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Michael Parisi</strong>, Head of Client Acquisition, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a></p><p><strong>Ryan Meehan</strong>, Director, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939" target="_blank">https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Schellman: <a href="https://www.itspmagazine.com/directory/schellman">https://www.itspmagazine.com/directory/schellman</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 23 Oct 2024 16:12:19 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ryan Meehan, Michael Parisi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/effectively-managing-a-growing-compliance-program-while-minimizing-audit-fatigue-7-minutes-on-itspmagazine-from-hitrust-collaborate-2024-a-schellmanshort-brand-innovation-story-with-michael-parisi-and-ryan-meehan-_60SA6lL</link>
      <content:encoded><![CDATA[<p>Schellman, founded in 2002 as SAS 70 Solutions, was originally focused on just one audit standard; the SAS 70 (subsequently replaced by SOC 2). As the client base grew so did the request to perform other audits outside of the SAS 70. Schellman grew its offerings over the past 20+ years by identifying client needs and then determining if we have the skillset and expertise to deliver high quality work. We have always stayed true to our core strengths and expertise, which is why Schellman is the only Top 100 CPA firm that specializes in IT Audit and Cybersecurity.</p><p>Schellman provides full-spectrum cybersecurity third-party audits, assessments, and certifications. In a marketplace with growing cybersecurity compliance needs, organizations are struggling to incorporate additional framework and regulations in an efficient and effective way. At Schellman we harnesses our expertise and deep knowledge across the compliance standards to roadmap audits throughout the year that promotes the highest return on evidence collection and subject matter expert time.</p><p>By performing specific assessments in a staggered or parallel fashion, Schellman is able to collect once and test many; both in terms of information from subject matters experts and evidence from business stakeholders. The broad range of our compliance offerings, along with our combined audit approach and depth of expertise sets Schellman apart. Schellman's approach was built to provide expertise and quality work while valuing and respecting the time and stress assessments/audits place on an organization.</p><p>Learn more about Schellman: <a href="https://itspm.ag/schellman9a6v">https://itspm.ag/schellman9a6v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests:</strong></p><p><strong>Michael Parisi</strong>, Head of Client Acquisition, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michael-parisi-4009b2261/" target="_blank">https://www.linkedin.com/in/michael-parisi-4009b2261/</a></p><p><strong>Ryan Meehan</strong>, Director, Schellman [<a href="https://x.com/schellman">@Schellman</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939" target="_blank">https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Schellman: <a href="https://www.itspmagazine.com/directory/schellman">https://www.itspmagazine.com/directory/schellman</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6883507" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ccbb0774-f8d1-4b38-87ed-20d417955a3f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ccbb0774-f8d1-4b38-87ed-20d417955a3f&amp;feed=kDNbmF_B"/>
      <itunes:title>Effectively Managing a Growing Compliance Program While Minimizing Audit Fatigue | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Schellman Short Brand Innovation Story with Michael Parisi and Ryan Meehan</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ryan Meehan, Michael Parisi</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:10</itunes:duration>
      <itunes:summary>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Michael Parisi and Ryan Meehan from Schellman to discuss the intricacies of streamlining IT audits and compliance for major companies. Discover how Schellman enhances cybersecurity and compliance efficiency while helping organizations navigate audit fatigue and board-level transparency.</itunes:summary>
      <itunes:subtitle>In this episode of 7 Minutes on ITSPmagazine from HITRUST Collaborate 2024, Sean Martin is joined by Michael Parisi and Ryan Meehan from Schellman to discuss the intricacies of streamlining IT audits and compliance for major companies. Discover how Schellman enhances cybersecurity and compliance efficiency while helping organizations navigate audit fatigue and board-level transparency.</itunes:subtitle>
      <itunes:keywords>compliance, transparency, attestations, soc 2, michael parisi, sean martin, trust, hitrust, cybersecurity, audits, clients, it, schellman, ryan meehan, risk, roadmap, board, iso 27001</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>70</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e58bf3d9-ed25-46e5-8bc2-4a99dc5ccdb1</guid>
      <title>Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk</title>
      <description><![CDATA[<p>In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.</p><p>Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.</p><p>Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today’s fast-paced world. In closing, the emphasis on understanding one’s maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Mychalczuk</strong>, Director of Product Management at OpenText [<a href="https://x.com/opentext" target="_blank">@opentext</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michaelmychalczuk/" target="_blank">https://www.linkedin.com/in/michaelmychalczuk/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OpenText: <a href="https://www.itspmagazine.com/directory/opentext" target="_blank">https://www.itspmagazine.com/directory/opentext</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 22 Oct 2024 19:29:42 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Michael Mychalczuk)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/mastering-multi-cloud-management-7-minutes-on-itspmagazine-from-black-hat-sector-2024-an-opentext-short-brand-innovation-story-with-michael-mychalczuk-K7yCjaiI</link>
      <content:encoded><![CDATA[<p>In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.</p><p>Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.</p><p>Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today’s fast-paced world. In closing, the emphasis on understanding one’s maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Michael Mychalczuk</strong>, Director of Product Management at OpenText [<a href="https://x.com/opentext" target="_blank">@opentext</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/michaelmychalczuk/" target="_blank">https://www.linkedin.com/in/michaelmychalczuk/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from OpenText: <a href="https://www.itspmagazine.com/directory/opentext" target="_blank">https://www.itspmagazine.com/directory/opentext</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6857969" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/53984b56-6119-44e7-b4e3-8729aa0a4f6c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=53984b56-6119-44e7-b4e3-8729aa0a4f6c&amp;feed=kDNbmF_B"/>
      <itunes:title>Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Michael Mychalczuk</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/d4a0b98b-17d7-4ab0-b732-9f299e267a6a/3000x3000/expert-insights-square.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:08</itunes:duration>
      <itunes:summary>Join Sean Martin and Michael Mychalczuk during Black Hat SecTor 2024 for a new 7 Minutes on ITSPmagazine Short Brand Story as they unpack the complexities of managing multi-cloud environments and the essential strategies to ensure security. Discover expert insights on how businesses can navigate these challenges and thrive securely in today’s multi-cloud world.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Michael Mychalczuk during Black Hat SecTor 2024 for a new 7 Minutes on ITSPmagazine Short Brand Story as they unpack the complexities of managing multi-cloud environments and the essential strategies to ensure security. Discover expert insights on how businesses can navigate these challenges and thrive securely in today’s multi-cloud world.</itunes:subtitle>
      <itunes:keywords>michael mychalczuk, kubernetes, business enablement, black hat sector, multi-cloud challenges, sean martin, containers, automation, identity management, cloud deployment, itsp magazine, opentext, multicloud, arcsight, cloud security, podcast, cyber security, itspmagazine, cloud management, it operations, toronto, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>69</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">447313db-feb5-44c2-a3cd-4b5821b9d475</guid>
      <title>LevelBlue Futures Report: Cyber Resilience in Retail | 7 Minutes on ITSPmagazine | A LevelBlue Short Brand Innovation Story with Theresa Lanowitz</title>
      <description><![CDATA[<p>Retailers today continue to grapple with unforeseen issues as supply chain attacks become more common and vulnerabilities from third-party sources emerge as major threats.</p><p>Of the 1,050 C-suite and senior executives surveyed, 86% of respondents anticipate that dynamic computing will enhance operational performance within the next three years, especially in AI strategy development and leveraging sophisticated supply chains. However, 82% acknowledge the increased exposure to risk.</p><p>In this age of dynamic computing, retail organizations encounter both significant opportunities and risks. With traditional security boundaries fading and conventional security measures proving inadequate, retail leaders must adopt a comprehensive approach to ensure overall cyber resilience.</p><p>To better achieve cyber resilience in the retail industry, LevelBlue shares five specific steps that can be applied across industries, directly in response to these findings: identify the barriers to cyber resilience; be secure by design; align cyber investment with business; build a support ecosystem; and transform cybersecurity strategies.</p><p>To learn more, download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail here:</p><p><a href="https://itspm.ag/levelbjk57">https://itspm.ag/levelbjk57</a></p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 21 Oct 2024 23:03:04 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Theresa Lanowitz)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/levelblue-futures-report-cyber-resilience-in-retail-7-minutes-on-itspmagazine-a-levelblue-short-brand-innovation-story-with-theresa-lanowitz-rICVLo24</link>
      <content:encoded><![CDATA[<p>Retailers today continue to grapple with unforeseen issues as supply chain attacks become more common and vulnerabilities from third-party sources emerge as major threats.</p><p>Of the 1,050 C-suite and senior executives surveyed, 86% of respondents anticipate that dynamic computing will enhance operational performance within the next three years, especially in AI strategy development and leveraging sophisticated supply chains. However, 82% acknowledge the increased exposure to risk.</p><p>In this age of dynamic computing, retail organizations encounter both significant opportunities and risks. With traditional security boundaries fading and conventional security measures proving inadequate, retail leaders must adopt a comprehensive approach to ensure overall cyber resilience.</p><p>To better achieve cyber resilience in the retail industry, LevelBlue shares five specific steps that can be applied across industries, directly in response to these findings: identify the barriers to cyber resilience; be secure by design; align cyber investment with business; build a support ecosystem; and transform cybersecurity strategies.</p><p>To learn more, download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail here:</p><p><a href="https://itspm.ag/levelbjk57">https://itspm.ag/levelbjk57</a></p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6808704" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5b3bfcc0-9d14-4a9d-aa0e-7ce87580aede/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5b3bfcc0-9d14-4a9d-aa0e-7ce87580aede&amp;feed=kDNbmF_B"/>
      <itunes:title>LevelBlue Futures Report: Cyber Resilience in Retail | 7 Minutes on ITSPmagazine | A LevelBlue Short Brand Innovation Story with Theresa Lanowitz</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Theresa Lanowitz</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:05</itunes:duration>
      <itunes:summary>In this 7 Minutes on ITSPmagazine Short Brand Story episode, Sean Martin and Theresa Lanowitz explore the critical challenges and innovative solutions in achieving cyber resilience within the retail sector, just in time for the holiday shopping season. Learn how retail organizations can enhance their cybersecurity strategies to protect business assets and improve operational efficiency amidst evolving threats.</itunes:summary>
      <itunes:subtitle>In this 7 Minutes on ITSPmagazine Short Brand Story episode, Sean Martin and Theresa Lanowitz explore the critical challenges and innovative solutions in achieving cyber resilience within the retail sector, just in time for the holiday shopping season. Learn how retail organizations can enhance their cybersecurity strategies to protect business assets and improve operational efficiency amidst evolving threats.</itunes:subtitle>
      <itunes:keywords>compliance, sean martin, supply chain, cybersecurity, retail, operational efficiency, innovation, resilience, levelblue, neural networks, business assets, deep learning, theresa lanowitz, machine learning, regulation, cyber attacks, ai, risk, itspmagazine, futures report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>68</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">be0565b6-8c63-4005-9f93-424f87d586c3</guid>
      <title>Leveraging AI for Effective Healthcare Solutions | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Walter Haydock and Steve Dufour</title>
      <description><![CDATA[<p><strong>The Emergence of Innovative Partnerships:</strong> As AI becomes increasingly integral across industries, healthcare is at the forefront of adopting these technologies to improve patient outcomes and streamline services. Sean Martin emphasizes the collaboration between StackAware and Embold Health, setting the stage for a discussion on how they leverage HITRUST to enhance healthcare solutions.</p><p><strong>A Look into StackAware and Embold Health:</strong> Walter Haydock, founder and CEO of StackAware, shares the company's mission to support AI-driven enterprises in measuring and managing cybersecurity compliance and privacy risks. Meanwhile, Steve Dufour, Chief Security and Privacy Officer of Embold Health, describes their initiative to assess physician performance, guiding patients toward top-performing providers.</p><p><strong>Integrating AI Responsibly:</strong> A key theme throughout the conversation is the responsible integration of generative AI into healthcare. Steve Dufour details how Embold Health developed a virtual assistant using Azure OpenAI, ensuring users receive informed healthcare recommendations without long-term storage of sensitive data.</p><p><strong>Assessment Through Rigorous Standards:</strong> Haydock and Dufour also highlight the importance of ensuring data privacy and compliance with security standards, from conducting penetration tests to implementing HITRUST assessments. Their approach underscores the need to prioritize security throughout product development, rather than as an afterthought.</p><p><strong>Navigating Risk and Compliance:</strong> The conversation touches on risk management and compliance, with both speakers emphasizing the importance of aligning AI initiatives with business objectives and risk tolerance. A strong risk assessment framework is essential for maintaining trust and security in AI-enabled applications.</p><p><strong>Conclusion:</strong> This in-depth discussion not only outlines a responsible approach to incorporating AI into healthcare but also showcases the power of collaboration in driving innovation. Sean Martin concludes with a call to embrace secure, impactful technologies that enhance healthcare services and improve outcomes.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Walter Haydock</strong>, Founder and CEO, StackAware</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/walter-haydock/">https://www.linkedin.com/in/walter-haydock/</a></p><p><strong>Steve Dufour</strong>, Chief Security & Privacy Officer, Embold Health</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swdufour/">https://www.linkedin.com/in/swdufour/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 17 Oct 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Walter Haydock, Steve Dufour)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/leveraging-ai-for-effective-healthcare-solutions-a-brand-story-conversation-from-hitrust-collaborate-2024-a-hitrust-story-with-walter-haydock-and-steve-dufour-jKzCwzq9</link>
      <content:encoded><![CDATA[<p><strong>The Emergence of Innovative Partnerships:</strong> As AI becomes increasingly integral across industries, healthcare is at the forefront of adopting these technologies to improve patient outcomes and streamline services. Sean Martin emphasizes the collaboration between StackAware and Embold Health, setting the stage for a discussion on how they leverage HITRUST to enhance healthcare solutions.</p><p><strong>A Look into StackAware and Embold Health:</strong> Walter Haydock, founder and CEO of StackAware, shares the company's mission to support AI-driven enterprises in measuring and managing cybersecurity compliance and privacy risks. Meanwhile, Steve Dufour, Chief Security and Privacy Officer of Embold Health, describes their initiative to assess physician performance, guiding patients toward top-performing providers.</p><p><strong>Integrating AI Responsibly:</strong> A key theme throughout the conversation is the responsible integration of generative AI into healthcare. Steve Dufour details how Embold Health developed a virtual assistant using Azure OpenAI, ensuring users receive informed healthcare recommendations without long-term storage of sensitive data.</p><p><strong>Assessment Through Rigorous Standards:</strong> Haydock and Dufour also highlight the importance of ensuring data privacy and compliance with security standards, from conducting penetration tests to implementing HITRUST assessments. Their approach underscores the need to prioritize security throughout product development, rather than as an afterthought.</p><p><strong>Navigating Risk and Compliance:</strong> The conversation touches on risk management and compliance, with both speakers emphasizing the importance of aligning AI initiatives with business objectives and risk tolerance. A strong risk assessment framework is essential for maintaining trust and security in AI-enabled applications.</p><p><strong>Conclusion:</strong> This in-depth discussion not only outlines a responsible approach to incorporating AI into healthcare but also showcases the power of collaboration in driving innovation. Sean Martin concludes with a call to embrace secure, impactful technologies that enhance healthcare services and improve outcomes.</p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Walter Haydock</strong>, Founder and CEO, StackAware</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/walter-haydock/">https://www.linkedin.com/in/walter-haydock/</a></p><p><strong>Steve Dufour</strong>, Chief Security & Privacy Officer, Embold Health</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/swdufour/">https://www.linkedin.com/in/swdufour/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>View all of our HITRUST Collaborate 2024 coverage: <a href="https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas">https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="24669343" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a07a6a39-daed-4854-98a6-b0c635b7e041/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a07a6a39-daed-4854-98a6-b0c635b7e041&amp;feed=kDNbmF_B"/>
      <itunes:title>Leveraging AI for Effective Healthcare Solutions | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Walter Haydock and Steve Dufour</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Walter Haydock, Steve Dufour</itunes:author>
      <itunes:duration>00:25:41</itunes:duration>
      <itunes:summary>In this new HITRUST Brand Story we explore advancements in healthcare through AI technology. Broadcasting live from HITRUST Collaborate 2024, Sean Martin leads a conversation with Walter Haydock of StackAware and Steve Dufour of Embold Health.</itunes:summary>
      <itunes:subtitle>In this new HITRUST Brand Story we explore advancements in healthcare through AI technology. Broadcasting live from HITRUST Collaborate 2024, Sean Martin leads a conversation with Walter Haydock of StackAware and Steve Dufour of Embold Health.</itunes:subtitle>
      <itunes:keywords>patient outcomes, marco ciappelli, partnership innovation, healthcare compliance, embold health, sean martin, healthcare partnerships, cybersecurity, physician performance, virtual assistant, risk management, stackaware, ai risk assessment, generative ai, cybersecurity compliance, healthcare technology, azure openai, data privacy, ai in healthcare, hitrust collaborate 2024, brand story, health outcomes</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>67</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b97d0b25-f837-4f0c-b708-9b740dd15ad8</guid>
      <title>SecTor 2024 Announces Summit Schedule | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the release of its full schedule of Summits for SecTor 2024. The live, in-person event will take place from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto. Summits will take place on Tuesday, October 22 and include:</p><ul><li>SecTor Executive Summit – This Summit will offer CISOs and other cybersecurity executives an opportunity to hear from industry experts helping to shape the next generation of information security strategy. Sponsors include: Armis, Sysdig, Cyera, and Trend Micro. To apply, please visit <a href="https://www.blackhat.com/sector/2024/executive-summit.html" target="_blank">blackhat.com/sector/2024/executive-summit.html</a>.</li><li>Inaugural AI Summit at SecTor – This Summit will take place as part of The AI Summit Series, a global conference and expo series focusing on practical applications of AI technologies. This Summit will underscore the importance of artificial intelligence (AI) as an organization’s newest and greatest weapon within the ever-evolving cybersecurity landscape. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/ai-summit.html" target="_blank">blackhat.com/sector/2024/ai-summit.html</a>.</li><li>Cloud Security Summit at SecTor – This Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions, and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security. Sponsors include: CrowdStrike, Cyera, Kyndryl, Okta, OpenText, StrongDM, Sysdig, and Lookout. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/cloud-summit.html" target="_blank">blackhat.com/sector/2024/cloud-summit.html</a>.</li></ul><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 10 Oct 2024 15:22:02 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/sector-2024-announces-summit-schedule-brand-story-2-minutes-on-itspmagazine-OMEe6XLG</link>
      <content:encoded><![CDATA[<p>SecTor, Canada’s largest cybersecurity conference, today announced the release of its full schedule of Summits for SecTor 2024. The live, in-person event will take place from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto. Summits will take place on Tuesday, October 22 and include:</p><ul><li>SecTor Executive Summit – This Summit will offer CISOs and other cybersecurity executives an opportunity to hear from industry experts helping to shape the next generation of information security strategy. Sponsors include: Armis, Sysdig, Cyera, and Trend Micro. To apply, please visit <a href="https://www.blackhat.com/sector/2024/executive-summit.html" target="_blank">blackhat.com/sector/2024/executive-summit.html</a>.</li><li>Inaugural AI Summit at SecTor – This Summit will take place as part of The AI Summit Series, a global conference and expo series focusing on practical applications of AI technologies. This Summit will underscore the importance of artificial intelligence (AI) as an organization’s newest and greatest weapon within the ever-evolving cybersecurity landscape. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/ai-summit.html" target="_blank">blackhat.com/sector/2024/ai-summit.html</a>.</li><li>Cloud Security Summit at SecTor – This Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions, and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security. Sponsors include: CrowdStrike, Cyera, Kyndryl, Okta, OpenText, StrongDM, Sysdig, and Lookout. Passes can be purchased here: <a href="https://www.blackhat.com/sector/2024/cloud-summit.html" target="_blank">blackhat.com/sector/2024/cloud-summit.html</a>.</li></ul><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SecTor<strong> </strong>Cybersecurity Conference Toronto 2024: <a href="https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada">https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2111209" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9a16b26d-45ce-4051-894f-b8528ac9fe9b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9a16b26d-45ce-4051-894f-b8528ac9fe9b&amp;feed=kDNbmF_B"/>
      <itunes:title>SecTor 2024 Announces Summit Schedule | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:11</itunes:duration>
      <itunes:summary>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:summary>
      <itunes:subtitle>Since 2007, SecTor, Canada’s largest cybersecurity conference, has brought relevant, engaging, and reputable content for the benefit of the Canadian cybersecurity community. SecTor is part of the Black Hat global cybersecurity events portfolio.</itunes:subtitle>
      <itunes:keywords>leaders, technology, ai summit, networking, summits, cybersecurity, business, conference, metro toronto, sector, expo, cloud, security, global, executives, october, ai, keynote, convention</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>66</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3fdadea5-d3b4-4df6-9a63-613ebc2239bc</guid>
      <title>HITRUST Achieves Major Milestone with Availability of Solution Making it Practical to Manage Third-Party (Information Security) Risk | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>HITRUST, leader in information security and third-party risk management (TPRM), has announced significant enhancements to its HITRUST Assessment XChange. This comprehensive solution addresses longstanding challenges in TPRM by integrating with leading TPRM platforms to streamline vendor risk management processes. These integrations solve the "last mile" challenge by enabling organizations to efficiently capture, consume, and analyze detailed assurance data.</p><p>The HITRUST Assessment XChange operationalizes third-party risk management through end-to-end workflows that cover the entire vendor lifecycle—from initial evaluation to results analysis. This approach significantly improves information security risk capabilities, reducing time, costs, and complexity. It also allows organizations to manage risk with updated threat-adaptive controls, broad assessment options, and real-time updates on risk mitigation.</p><p>Legacy approaches to TPRM have proven inefficient, with many organizations relying on outdated methods like spreadsheets or self-assessment questionnaires. In contrast, HITRUST’s solution offers a practical, effective, and comprehensive approach, making TPRM more manageable and secure across industries.</p><p>HITRUST’s first planned integration with ServiceNow’s TPRM solution is set for release by the end of 2024, allowing users to leverage HITRUST's capabilities within the ServiceNow platform. This integration marks a new era in operationalizing information security TPRM, providing organizations with unprecedented visibility into vendor risk.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 3 Oct 2024 13:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/hitrust-achieves-major-milestone-with-availability-of-solution-making-it-practical-to-manage-third-party-information-security-risk-brand-story-2-minutes-on-itspmagazine-kIhOQyTr</link>
      <content:encoded><![CDATA[<p>HITRUST, leader in information security and third-party risk management (TPRM), has announced significant enhancements to its HITRUST Assessment XChange. This comprehensive solution addresses longstanding challenges in TPRM by integrating with leading TPRM platforms to streamline vendor risk management processes. These integrations solve the "last mile" challenge by enabling organizations to efficiently capture, consume, and analyze detailed assurance data.</p><p>The HITRUST Assessment XChange operationalizes third-party risk management through end-to-end workflows that cover the entire vendor lifecycle—from initial evaluation to results analysis. This approach significantly improves information security risk capabilities, reducing time, costs, and complexity. It also allows organizations to manage risk with updated threat-adaptive controls, broad assessment options, and real-time updates on risk mitigation.</p><p>Legacy approaches to TPRM have proven inefficient, with many organizations relying on outdated methods like spreadsheets or self-assessment questionnaires. In contrast, HITRUST’s solution offers a practical, effective, and comprehensive approach, making TPRM more manageable and secure across industries.</p><p>HITRUST’s first planned integration with ServiceNow’s TPRM solution is set for release by the end of 2024, allowing users to leverage HITRUST's capabilities within the ServiceNow platform. This integration marks a new era in operationalizing information security TPRM, providing organizations with unprecedented visibility into vendor risk.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2229902" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/37fad3d2-b33e-4180-a37c-dc134a204af7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=37fad3d2-b33e-4180-a37c-dc134a204af7&amp;feed=kDNbmF_B"/>
      <itunes:title>HITRUST Achieves Major Milestone with Availability of Solution Making it Practical to Manage Third-Party (Information Security) Risk | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:19</itunes:duration>
      <itunes:summary>HITRUST, the leader in information risk management, security, and compliance assurances, today announces enhancements to the HITRUST Assessment Xchange, its comprehensive third-party risk management (TPRM) solution, overcoming legacy challenges and making TPRM practical and effective for organizations across all industries. In addition, HITRUST is announcing integrations with leading TPRM solution platforms to address the current “last mile” challenge of capturing and consuming detail assurance information and performing population risk analysis. The first platform will be available in Q4 2024, and the company is currently accepting participants into its private preview program. </itunes:summary>
      <itunes:subtitle>HITRUST, the leader in information risk management, security, and compliance assurances, today announces enhancements to the HITRUST Assessment Xchange, its comprehensive third-party risk management (TPRM) solution, overcoming legacy challenges and making TPRM practical and effective for organizations across all industries. In addition, HITRUST is announcing integrations with leading TPRM solution platforms to address the current “last mile” challenge of capturing and consuming detail assurance information and performing population risk analysis. The first platform will be available in Q4 2024, and the company is currently accepting participants into its private preview program. </itunes:subtitle>
      <itunes:keywords>assurance, data, workflows, controls, assessment, hitrust, processes, cybersecurity, risk management, solution, third party risk, management, information security, tprm, servicenow, servicenow, mitigation, platform, updates, security, integration, visibility, risk, vendor, vendor risk management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>65</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a53a7753-d9a5-44cd-a570-2961ba53622a</guid>
      <title>HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>HITRUST has announced the launch of <strong>HITRUST Continuous Assurance</strong>, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evolving cyber threats. Traditional approaches that prioritize compliance over security are increasingly inadequate, especially in the era of generative AI and sophisticated cyber-attacks.</p><p>Continuous Assurance minimizes the risk of evidence decay by enabling organizations to monitor security controls continuously, ensuring that security requirements remain relevant and reliable. Key features of this initiative include automated evidence collection, a continuous monitoring taxonomy integrated with the HITRUST CSF, and enhanced workflows in HITRUST’s MyCSF platform. The system also supports integration with Governance, Risk, and Compliance (GRC) systems, ensuring streamlined risk management.</p><p>HITRUST's Continuous Assurance will leverage its extensive certification framework, which has shown significant success. Notably, the <strong>2024 HITRUST Trust Report</strong> highlighted that 99.4% of HITRUST-certified organizations did not report a breach over the past two years. Continuous Assurance offers new capabilities that further solidify HITRUST’s role as a leader in information security risk management.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem" target="_blank">https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 1 Oct 2024 19:50:59 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem-brand-story-2-minutes-on-itspmagazine-VZ4Xf9YW</link>
      <content:encoded><![CDATA[<p>HITRUST has announced the launch of <strong>HITRUST Continuous Assurance</strong>, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evolving cyber threats. Traditional approaches that prioritize compliance over security are increasingly inadequate, especially in the era of generative AI and sophisticated cyber-attacks.</p><p>Continuous Assurance minimizes the risk of evidence decay by enabling organizations to monitor security controls continuously, ensuring that security requirements remain relevant and reliable. Key features of this initiative include automated evidence collection, a continuous monitoring taxonomy integrated with the HITRUST CSF, and enhanced workflows in HITRUST’s MyCSF platform. The system also supports integration with Governance, Risk, and Compliance (GRC) systems, ensuring streamlined risk management.</p><p>HITRUST's Continuous Assurance will leverage its extensive certification framework, which has shown significant success. Notably, the <strong>2024 HITRUST Trust Report</strong> highlighted that 99.4% of HITRUST-certified organizations did not report a breach over the past two years. Continuous Assurance offers new capabilities that further solidify HITRUST’s role as a leader in information security risk management.</p><p>Learn more about and stay up to date by visiting <a href="http://hitrustalliance.net/news" target="_blank">hitrustalliance.net/news</a>.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem" target="_blank">https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystem</a></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust" target="_blank">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2019679" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/384c1d32-d703-47c7-b52b-50db487bbb0e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=384c1d32-d703-47c7-b52b-50db487bbb0e&amp;feed=kDNbmF_B"/>
      <itunes:title>HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:06</itunes:duration>
      <itunes:summary>HITRUST releases 2025 vision to increase security sustainability and outcomes through continuous control monitoring.</itunes:summary>
      <itunes:subtitle>HITRUST releases 2025 vision to increase security sustainability and outcomes through continuous control monitoring.</itunes:subtitle>
      <itunes:keywords>hitrust, cybersecurity, risk management, continuous assurance, cyber resilience, incident response, cyber attacks, business continuity, disaster recovery, recovery, cyber risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>64</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c909df3c-e0b1-49ae-a15b-a030b9adb3f1</guid>
      <title>HITRUST Announces Industry-Leading AI Security Certification | 7 Minutes on ITSPmagazine | A HITRUST Short Brand Innovation Story with Jeremy Huval</title>
      <description><![CDATA[<p>HITRUST will launch its AI Security Certification in December 2024, addressing the unique security risks of artificial intelligence systems. As AI reshapes the cybersecurity landscape, existing control frameworks, including HITRUST CSF, do not fully address new and evolving threats. The certification offers prescriptive controls to help secure AI deployments effectively.</p><p>Targeted at AI platform and product providers, this certification is an optional extension to HITRUST CSF validated assessments. It addresses AI-specific threats alongside traditional cybersecurity risks, focusing on security practices for AI/ML deployments, including generative AI.</p><p>The certification integrates with third-party risk management (TPRM) platforms, enabling more efficient workflows for managing AI solution security. This helps organizations manage AI risk, adopt AI solutions with confidence, and reduce complexity, time, and costs.</p><p>Designed to enhance third-party AI risk management, the certification allows organizations to identify shared security responsibilities between AI providers and users. It ensures greater trust and security across AI deployments, helping businesses stay ahead of emerging AI threats.</p><p>The draft certification specification is open for public comment until October 17, 2024.</p><p>To learn more and to provide feedback visit: <a href="https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/about" target="_blank">https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/about</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeremy Huval</strong>, Chief Innovation Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeremyhuval/" target="_blank">https://www.linkedin.com/in/jeremyhuval/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 28 Sep 2024 01:09:41 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Jeremy Huval)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/hitrust-announces-industry-leading-ai-security-certification-7-minutes-on-itspmagazine-a-hitrust-short-brand-innovation-story-with-jeremy-huval-tRbIPxcX</link>
      <content:encoded><![CDATA[<p>HITRUST will launch its AI Security Certification in December 2024, addressing the unique security risks of artificial intelligence systems. As AI reshapes the cybersecurity landscape, existing control frameworks, including HITRUST CSF, do not fully address new and evolving threats. The certification offers prescriptive controls to help secure AI deployments effectively.</p><p>Targeted at AI platform and product providers, this certification is an optional extension to HITRUST CSF validated assessments. It addresses AI-specific threats alongside traditional cybersecurity risks, focusing on security practices for AI/ML deployments, including generative AI.</p><p>The certification integrates with third-party risk management (TPRM) platforms, enabling more efficient workflows for managing AI solution security. This helps organizations manage AI risk, adopt AI solutions with confidence, and reduce complexity, time, and costs.</p><p>Designed to enhance third-party AI risk management, the certification allows organizations to identify shared security responsibilities between AI providers and users. It ensures greater trust and security across AI deployments, helping businesses stay ahead of emerging AI threats.</p><p>The draft certification specification is open for public comment until October 17, 2024.</p><p>To learn more and to provide feedback visit: <a href="https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/about" target="_blank">https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/about</a></p><p>Learn more about HITRUST: <a href="https://itspm.ag/itsphitweb">https://itspm.ag/itsphitweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeremy Huval</strong>, Chief Innovation Officer, HITRUST [<a href="https://x.com/hitrust">@HITRUST</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeremyhuval/" target="_blank">https://www.linkedin.com/in/jeremyhuval/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from HITRUST: <a href="https://www.itspmagazine.com/directory/hitrust">https://www.itspmagazine.com/directory/hitrust</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6844185" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/66a2f519-6739-44c7-88d7-bbe7b138c974/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=66a2f519-6739-44c7-88d7-bbe7b138c974&amp;feed=kDNbmF_B"/>
      <itunes:title>HITRUST Announces Industry-Leading AI Security Certification | 7 Minutes on ITSPmagazine | A HITRUST Short Brand Innovation Story with Jeremy Huval</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Jeremy Huval</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:07</itunes:duration>
      <itunes:summary>Join Sean Martin as he interviews Jeremy Huval, Chief Innovation Officer at HITRUST, discussing the latest advancements in AI security and risk management. Discover how HITRUST&apos;s innovative framework and new AI Security Certification will be helping organizations safeguard their AI capabilities and ensuring compliance with the ever-evolving landscape of AI threats.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he interviews Jeremy Huval, Chief Innovation Officer at HITRUST, discussing the latest advancements in AI security and risk management. Discover how HITRUST&apos;s innovative framework and new AI Security Certification will be helping organizations safeguard their AI capabilities and ensuring compliance with the ever-evolving landscape of AI threats.</itunes:subtitle>
      <itunes:keywords>cloud service, compliance, assurance, controls, sean martin, hitrust, jeremy huval, cybersecurity, nist, risk management, mitre atlas, information security, iso, certification, owasp, frameworks, ai, privacy, ai threats, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>63</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">bb293012-11b1-45c4-a58d-c34c1078092f</guid>
      <title>Building Resilient Applications and APIs: The Importance of Security by Design to Ensure Data Protection | An Imperva Brand Story with Lebin Cheng</title>
      <description><![CDATA[<p>In this Brand Story episode, hosts Sean Martin and Marco Ciappelli welcome Lebin Cheng from Imperva to discuss the ever-important topic of API security. As the head of the API security team at Imperva, Lebin Cheng offers a nuanced view into the challenges and solutions involved in protecting sensitive data facilitated by APIs. A central theme of the discussion revolves around API security's complexity due to APIs' role in digital transformation, cloud migration, and data integration. APIs act as a gateway for data interaction and integration, offering flexibility but also introducing significant security risks.</p><p>Cheng underscores that as APIs provide open access to critical data, they become prime targets for sophisticated cyber threats. These threats exploit vulnerabilities in API deployments, making robust security measures indispensable. Cheng highlights the importance of securing APIs not as a one-time effort but as an ongoing process. He discusses how Imperva employs real-time monitoring and behavioral analysis to enhance API security. By establishing a baseline of what constitutes normal behavior, Imperva can quickly detect and respond to anomalies. This approach goes beyond traditional, static security measures, which often fall short against dynamic threats that evolve alongside technology.</p><p>Additionally, the conversation touches on the notion of 'security by design.' Cheng advocates for integrating security considerations from the earliest stages of API development. This results in more resilient applications capable of withstanding sophisticated attacks. The discussion also notes the growing trend of DevSecOps, which emphasizes the collaboration between development, security, and operations teams to embed security throughout the software development lifecycle. Real-world applications of these principles are evident in various sectors, including open banking.</p><p>Cheng explains how open banking initiatives, which allow smaller financial institutions to access larger banks' data via APIs, highlight the necessity of strong API security. A breached API could expose sensitive financial data, leading to significant financial and reputational damage. The hosts and Cheng also explore how Imperva's innovation in API security involves leveraging artificial intelligence and machine learning. These technologies help in identifying and mitigating potential risks by analyzing vast amounts of data to detect unusual patterns that might indicate a security threat.</p><p>In closing, Cheng emphasizes the importance of continuous innovation and vigilance in the field of API security. He invites organizations to adopt a proactive stance, continuously updating their security measures to protect their data assets effectively. This episode serves as a compelling reminder of the critical role API security plays in today's interconnected digital world.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Lebin Cheng</strong>, VP, API Security, Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lebin/" target="_blank">https://www.linkedin.com/in/lebin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 25 Sep 2024 18:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Lebin Cheng)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/building-resilient-applications-and-apis-the-importance-of-security-by-design-to-ensure-data-protection-an-imperva-brand-story-with-lebin-cheng-4TesEA9y</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, hosts Sean Martin and Marco Ciappelli welcome Lebin Cheng from Imperva to discuss the ever-important topic of API security. As the head of the API security team at Imperva, Lebin Cheng offers a nuanced view into the challenges and solutions involved in protecting sensitive data facilitated by APIs. A central theme of the discussion revolves around API security's complexity due to APIs' role in digital transformation, cloud migration, and data integration. APIs act as a gateway for data interaction and integration, offering flexibility but also introducing significant security risks.</p><p>Cheng underscores that as APIs provide open access to critical data, they become prime targets for sophisticated cyber threats. These threats exploit vulnerabilities in API deployments, making robust security measures indispensable. Cheng highlights the importance of securing APIs not as a one-time effort but as an ongoing process. He discusses how Imperva employs real-time monitoring and behavioral analysis to enhance API security. By establishing a baseline of what constitutes normal behavior, Imperva can quickly detect and respond to anomalies. This approach goes beyond traditional, static security measures, which often fall short against dynamic threats that evolve alongside technology.</p><p>Additionally, the conversation touches on the notion of 'security by design.' Cheng advocates for integrating security considerations from the earliest stages of API development. This results in more resilient applications capable of withstanding sophisticated attacks. The discussion also notes the growing trend of DevSecOps, which emphasizes the collaboration between development, security, and operations teams to embed security throughout the software development lifecycle. Real-world applications of these principles are evident in various sectors, including open banking.</p><p>Cheng explains how open banking initiatives, which allow smaller financial institutions to access larger banks' data via APIs, highlight the necessity of strong API security. A breached API could expose sensitive financial data, leading to significant financial and reputational damage. The hosts and Cheng also explore how Imperva's innovation in API security involves leveraging artificial intelligence and machine learning. These technologies help in identifying and mitigating potential risks by analyzing vast amounts of data to detect unusual patterns that might indicate a security threat.</p><p>In closing, Cheng emphasizes the importance of continuous innovation and vigilance in the field of API security. He invites organizations to adopt a proactive stance, continuously updating their security measures to protect their data assets effectively. This episode serves as a compelling reminder of the critical role API security plays in today's interconnected digital world.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Lebin Cheng</strong>, VP, API Security, Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/lebin/" target="_blank">https://www.linkedin.com/in/lebin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="35315129" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/cbdcbd8f-14d8-4061-aa34-c269dbc67a0f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=cbdcbd8f-14d8-4061-aa34-c269dbc67a0f&amp;feed=kDNbmF_B"/>
      <itunes:title>Building Resilient Applications and APIs: The Importance of Security by Design to Ensure Data Protection | An Imperva Brand Story with Lebin Cheng</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Lebin Cheng</itunes:author>
      <itunes:duration>00:36:47</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they engage with Lebin Cheng from Imperva to explore the complexities and solutions surrounding API security. Discover how real-time monitoring, behavioral analysis, and innovative technologies are transforming how organizations protect their sensitive data.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they engage with Lebin Cheng from Imperva to explore the complexities and solutions surrounding API security. Discover how real-time monitoring, behavioral analysis, and innovative technologies are transforming how organizations protect their sensitive data.</itunes:subtitle>
      <itunes:keywords>real-time monitoring, marco ciappelli, artificial intelligence, lebin cheng, sean martin, baseline, open banking, cybersecurity, vulnerability, behavioral analysis, data protection, application development, api, imperva, security, machine learning, digital transformation, devsecops, cloud migration, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>62</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">926bb5ff-8257-43bb-a9f3-eaaa6b65a588</guid>
      <title>$17M Series B Will Accelerate Growth As BlackCloak Further Strengthens Its Personal Cybersecurity Platform And Drives Innovative Products | 7 Minutes on ITSPmagazine | A BlackCloak Short Brand Innovation Story with Chris Pierson</title>
      <description><![CDATA[<p>In 7 Minutes on ITSPmagazine, Sean Martin chats with Chris Pierson, CEO and Co-founder of BlackCloak, about their latest milestone in digital executive protection. BlackCloak, a pioneer in protecting executives, senior leaders, high-net-worth individuals, and family offices, has secured $17 million in a Series B funding round led by Baird Capital, with contributions from Blue Heron, TDF, and Tech Operators.</p><p>Chris explains that the new funds will focus on scaling the company's operations, building proprietary cybersecurity and privacy technologies, and enhancing their concierge-level services. The goal is to provide specialized protection and remediation for corporate executives, board members, and high-profile individuals, including those in their families' personal lives.</p><p>The conversation touches on the increasing need for digital executive protection against breaches, privacy risks, and identity theft. Chris highlights how recent attacks on home environments have accelerated the demand for robust digital security solutions. Investors are drawn to BlackCloak's unique approach and market potential.</p><p>Looking ahead, Chris envisions a day in the life of a protected digital executive as one where privacy enhancements and proactive, intelligence-driven alerts become standard. BlackCloak aims to make managing personal cybersecurity seamless, offering reactive support and expert advice along the way. With this fresh investment, the company is poised to capture significant growth in this critical space.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices: <a href="https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/" target="_blank">https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 18 Sep 2024 21:10:38 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/17m-series-b-will-accelerate-growth-as-blackcloak-further-strengthens-its-personal-cybersecurity-platform-and-drives-innovative-products-7-minutes-on-itspmagazine-a-blackcloak-short-brand-innovation-story-with-chris-pierson-L3HooP02</link>
      <content:encoded><![CDATA[<p>In 7 Minutes on ITSPmagazine, Sean Martin chats with Chris Pierson, CEO and Co-founder of BlackCloak, about their latest milestone in digital executive protection. BlackCloak, a pioneer in protecting executives, senior leaders, high-net-worth individuals, and family offices, has secured $17 million in a Series B funding round led by Baird Capital, with contributions from Blue Heron, TDF, and Tech Operators.</p><p>Chris explains that the new funds will focus on scaling the company's operations, building proprietary cybersecurity and privacy technologies, and enhancing their concierge-level services. The goal is to provide specialized protection and remediation for corporate executives, board members, and high-profile individuals, including those in their families' personal lives.</p><p>The conversation touches on the increasing need for digital executive protection against breaches, privacy risks, and identity theft. Chris highlights how recent attacks on home environments have accelerated the demand for robust digital security solutions. Investors are drawn to BlackCloak's unique approach and market potential.</p><p>Looking ahead, Chris envisions a day in the life of a protected digital executive as one where privacy enhancements and proactive, intelligence-driven alerts become standard. BlackCloak aims to make managing personal cybersecurity seamless, offering reactive support and expert advice along the way. With this fresh investment, the company is poised to capture significant growth in this critical space.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices: <a href="https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/" target="_blank">https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6771072" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/40339bb8-22d9-48af-a3ba-1fff2cd33646/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=40339bb8-22d9-48af-a3ba-1fff2cd33646&amp;feed=kDNbmF_B"/>
      <itunes:title>$17M Series B Will Accelerate Growth As BlackCloak Further Strengthens Its Personal Cybersecurity Platform And Drives Innovative Products | 7 Minutes on ITSPmagazine | A BlackCloak Short Brand Innovation Story with Chris Pierson</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Chris Pierson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:03</itunes:duration>
      <itunes:summary>Discover how BlackCloak is revolutionizing digital executive protection with insights from CEO and Co-founder Chris Pierson, who shares their recent $17 million Series B funding success and future plans for scaling their proprietary technology and concierge-level services. Tune in to find out why investors are excited about BlackCloak&apos;s unique approach to safeguarding high-profile individuals and their families.</itunes:summary>
      <itunes:subtitle>Discover how BlackCloak is revolutionizing digital executive protection with insights from CEO and Co-founder Chris Pierson, who shares their recent $17 million Series B funding success and future plans for scaling their proprietary technology and concierge-level services. Tune in to find out why investors are excited about BlackCloak&apos;s unique approach to safeguarding high-profile individuals and their families.</itunes:subtitle>
      <itunes:keywords>digital protection, chris pierson, proprietary technology, funding, high-net-worth, sean martin, blue heron, blackcloak, cybersecurity, board members, scaling, family offices, baird capital, series b, executive protection, tdf, concierge services, tech operators, breaches, privacy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>61</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2c23a92d-6d91-4824-bb9a-100129ea5adb</guid>
      <title>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices | 2 Minutes on ITSPmagazine</title>
      <description><![CDATA[<p>BlackCloak, the Pioneer in Digital Executive Protection for executives and senior leaders, high-net-worth individuals, and family offices, has successfully closed a $17 Million Series B funding round led by Baird Capital with significant investments from Blue Heron Capital and continued support from existing investors, TDF Ventures and TechOperators. This brings BlackCloak’s total equity financing to over $30 Million.</p><p>BlackCloak will use its new funding to prioritize technology investments in cutting edge platform expanding products and intelligence as the company continues its mission to protect the personal digital lives of highly targeted individuals.</p><p>Trusted by Fortune 50 companies, financial institutions, public officials, and top talent management firms, BlackCloak shields its members from diverse threats, including deepfakes, social engineering, cyber-extortion, and doxxing. BlackCloak understands that cybersecurity isn’t just about technology. It’s about people.</p><p>As a business partner, BlackCloak works with security leaders as an extension of their team, securing the personal digital lives of their executives and families to ensure that bad actors are unable to access the company’s sensitive data and systems.</p><p>What sets BlackCloak apart is its Concierge Support. It offers personalized services tailored to fit every members’ unique needs. Whether you’re a busy executive, a concerned parent, or a small business owner, BlackCloak provides the support you need to stay safe online.</p><p>With BlackCloak, you can enjoy peace of mind knowing that your digital life is secure. Don’t wait until it’s too late. Take control of your cybersecurity today.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/" target="_blank">https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/</a></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 17 Sep 2024 17:32:48 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/blackcloak-raises-17m-series-b-funding-round-to-enhance-personal-cybersecurity-protections-for-corporate-executives-high-net-worth-individuals-and-family-offices-brand-story-2-minutes-on-itspmagazine-bmkLYptT</link>
      <content:encoded><![CDATA[<p>BlackCloak, the Pioneer in Digital Executive Protection for executives and senior leaders, high-net-worth individuals, and family offices, has successfully closed a $17 Million Series B funding round led by Baird Capital with significant investments from Blue Heron Capital and continued support from existing investors, TDF Ventures and TechOperators. This brings BlackCloak’s total equity financing to over $30 Million.</p><p>BlackCloak will use its new funding to prioritize technology investments in cutting edge platform expanding products and intelligence as the company continues its mission to protect the personal digital lives of highly targeted individuals.</p><p>Trusted by Fortune 50 companies, financial institutions, public officials, and top talent management firms, BlackCloak shields its members from diverse threats, including deepfakes, social engineering, cyber-extortion, and doxxing. BlackCloak understands that cybersecurity isn’t just about technology. It’s about people.</p><p>As a business partner, BlackCloak works with security leaders as an extension of their team, securing the personal digital lives of their executives and families to ensure that bad actors are unable to access the company’s sensitive data and systems.</p><p>What sets BlackCloak apart is its Concierge Support. It offers personalized services tailored to fit every members’ unique needs. Whether you’re a busy executive, a concerned parent, or a small business owner, BlackCloak provides the support you need to stay safe online.</p><p>With BlackCloak, you can enjoy peace of mind knowing that your digital life is secure. Don’t wait until it’s too late. Take control of your cybersecurity today.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Resources</strong></p><p>Read the Press Release: <a href="https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/" target="_blank">https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/</a></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak" target="_blank">https://www.itspmagazine.com/directory/blackcloak</a></p><p>Learn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="2225314" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/01195f76-9cc3-445d-9ad2-5d9b6b7db9fb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=01195f76-9cc3-445d-9ad2-5d9b6b7db9fb&amp;feed=kDNbmF_B"/>
      <itunes:title>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices | 2 Minutes on ITSPmagazine</itunes:title>
      <itunes:author>ITSPmagazine</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/b9a7d724-1fa9-47f8-bf1c-623f1a3cec03/772365bf-c2ed-4b4b-bc3f-2b9e690d3468/3000x3000/copy-of-copy-of-rsac-usa-2024-or-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:02:19</itunes:duration>
      <itunes:summary>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices</itunes:summary>
      <itunes:subtitle>BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices</itunes:subtitle>
      <itunes:keywords>cybersecurity, risk management, ransomware, cyber resilience, incident response, identity, cyber attacks, business continuity, disaster recovery, recovery, cyber risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>60</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3ceaff3e-b161-4b9d-8f14-55a6110b7e2e</guid>
      <title>The Critical Role of Identity in Creating Effective Ransomware Attack Defense and Broader Business Resilience Strategies | 7 Minutes on ITSPmagazine | A Semperis Short Brand Story with Simon Hodgkinson</title>
      <description><![CDATA[<p>Semperis, a pioneer in identity-driven cyber resilience has published the results of its global ransomware study of nearly 1,000 IT and security professionals at organisations spanning multiple industries across the US, UK, France, and Germany. The study aims to understand the prevalence, frequency and costs of ransomware attacks—in both ransom payments and collateral damage. The results highlight an alarming trend toward multiple, sometimes simultaneous attacks, forcing business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices. Organisations must ensure they have appropriate controls to withstand attacks where possible, however assume a mindset that at some point they will have to recover from a catastrophic outage and therefore have a tried and tested plan to recover business operations. Given the criticality of Active Directory, firms need a dedicated means of backing up and recovering Active Directory to recover from attacks with integrity and at speed. However, according to our survey, just 23% of UK respondents stated that they have dedicated, Active Directory–specific backup systems.</p><p>Now, more than ever, modernised threats require modernised defences prioritised on the most critical assets – which is the identity platform - and for most organisations this is Active Directory. Semperis is a pioneer in managing and protecting the identity credentials of enterprises' hybrid environments and was purpose-built for securing AD.  Semperis provide a portfolio of products including a free tool - Purple Knight - which organisations use to uncover unknown vulnerabilities, communicate security posture to leaders and other teams, compensate for lack of inhouse AD skills, prepare for other assessments including pen tests, and garner more resources for AD security improvements.</p><p>The full ransomware study, which includes breakdowns of responses by vertical market and by country, is available at <a href="https://itspm.ag/semper6u3w" target="_blank">https://itspm.ag/semper6u3w</a></p><p>Learn more about Semperis: <a href="https://itspm.ag/semperis-1roo">https://itspm.ag/semperis-1roo</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Simon Hodgkinson</strong>, Strategic Advisor, Semperis [<a href="https://x.com/SemperisTech">@SemperisTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/simon-hodgkinson-6072623" target="_blank">https://www.linkedin.com/in/simon-hodgkinson-6072623</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Semperis: <a href="https://www.itspmagazine.com/directory/semperis">https://www.itspmagazine.com/directory/semperis</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 17 Sep 2024 00:38:29 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Simon Hodgkinson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-critical-role-of-identity-in-creating-effective-ransomware-attack-defense-and-broader-business-resilience-strategies-7-minutes-on-itspmagazine-a-semperis-short-brand-story-with-simon-hodgkinson-rQ1hVRlB</link>
      <content:encoded><![CDATA[<p>Semperis, a pioneer in identity-driven cyber resilience has published the results of its global ransomware study of nearly 1,000 IT and security professionals at organisations spanning multiple industries across the US, UK, France, and Germany. The study aims to understand the prevalence, frequency and costs of ransomware attacks—in both ransom payments and collateral damage. The results highlight an alarming trend toward multiple, sometimes simultaneous attacks, forcing business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices. Organisations must ensure they have appropriate controls to withstand attacks where possible, however assume a mindset that at some point they will have to recover from a catastrophic outage and therefore have a tried and tested plan to recover business operations. Given the criticality of Active Directory, firms need a dedicated means of backing up and recovering Active Directory to recover from attacks with integrity and at speed. However, according to our survey, just 23% of UK respondents stated that they have dedicated, Active Directory–specific backup systems.</p><p>Now, more than ever, modernised threats require modernised defences prioritised on the most critical assets – which is the identity platform - and for most organisations this is Active Directory. Semperis is a pioneer in managing and protecting the identity credentials of enterprises' hybrid environments and was purpose-built for securing AD.  Semperis provide a portfolio of products including a free tool - Purple Knight - which organisations use to uncover unknown vulnerabilities, communicate security posture to leaders and other teams, compensate for lack of inhouse AD skills, prepare for other assessments including pen tests, and garner more resources for AD security improvements.</p><p>The full ransomware study, which includes breakdowns of responses by vertical market and by country, is available at <a href="https://itspm.ag/semper6u3w" target="_blank">https://itspm.ag/semper6u3w</a></p><p>Learn more about Semperis: <a href="https://itspm.ag/semperis-1roo">https://itspm.ag/semperis-1roo</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Simon Hodgkinson</strong>, Strategic Advisor, Semperis [<a href="https://x.com/SemperisTech">@SemperisTech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/simon-hodgkinson-6072623" target="_blank">https://www.linkedin.com/in/simon-hodgkinson-6072623</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Semperis: <a href="https://www.itspmagazine.com/directory/semperis">https://www.itspmagazine.com/directory/semperis</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6778597" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/73e232a1-34ce-407e-9454-b525dee768ff/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=73e232a1-34ce-407e-9454-b525dee768ff&amp;feed=kDNbmF_B"/>
      <itunes:title>The Critical Role of Identity in Creating Effective Ransomware Attack Defense and Broader Business Resilience Strategies | 7 Minutes on ITSPmagazine | A Semperis Short Brand Story with Simon Hodgkinson</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Simon Hodgkinson</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:03</itunes:duration>
      <itunes:summary>In this 7 Minutes on ITSPmagazine, we discuss the dilemma of ransom payments, revealing why 78% of organizations opt to pay, and examine the role of Board support in these decisions. We also delve into the long-term effects of ransomware attacks and explore strategies to prevent future incidents.</itunes:summary>
      <itunes:subtitle>In this 7 Minutes on ITSPmagazine, we discuss the dilemma of ransom payments, revealing why 78% of organizations opt to pay, and examine the role of Board support in these decisions. We also delve into the long-term effects of ransomware attacks and explore strategies to prevent future incidents.</itunes:subtitle>
      <itunes:keywords>digital ecosystem, threat monitoring, active directory, sean martin, simon hodgkinson, cybersecurity, business resilience, risk management, resilience strategies, malware, data exfiltration, ransomware, cyber resilience, incident response, identity, cyber attacks, business continuity, disaster recovery, recovery, cyber risk</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>59</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4f44a9db-e1c6-4412-8872-c523c3b2b0af</guid>
      <title>Achieving Compliance in the Cloud through Continuous Controls Monitoring (CCM) | 7 Minutes on ITSPmagazine | A RegScale Short Brand Story with Travis Howerton</title>
      <description><![CDATA[<p>With the rapid pace of cloud adoption, less time is spent ensuring that systems are built and operated effectively and with proper cyber hygiene. As a result, continuous controls monitoring (CCM) has emerged as indispensable for ensuring both security and regulatory compliance. Travis will discuss how CCM: transforms reactive security measures into a proactive stance; strengthens security protocols and embeds compliance within cloud operations; and streamlines the protection of digital assets in an ever-evolving landscape.</p><p>With systems becoming increasingly cloud-native and ephemeral, manual approaches no longer work, can’t scale, and are not timely enough to manage risk. Continuous Controls Monitoring (CCM) is needed to allow cloud adoption in highly regulated industries without sacrificing security. The speed of the cloud, AI development, and digital transformation is quickly reaching a point where human-based risk and compliance business processes cannot keep up. A modern, compliance-as-code approach is needed via CCM platforms to ensure risk and compliance processes can execute in real-time to keep pace with modern cloud technology.</p><p>Embracing compliance-as-code to allow business processes to execute at machine speed, generate self-updating paperwork, and leverage AI and mini-robot automations to validate and assess the results. Consider more sophisticated DevOps approaches leveraging CI/CD software factories to push security from code to cloud. The new CCM approach is to shift security processes left across every layer of the application lifecycle.</p><p>Learn more about RegScale: <a href="https://itspm.ag/regscaksfb">https://itspm.ag/regscaksfb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Travis Howerton</strong>, Co-Founder and CEO, RegScale, [<a href="https://x.com/RegScale">@RegScale</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/travishowerton/" target="_blank">https://www.linkedin.com/in/travishowerton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RegScale: <a href="https://www.itspmagazine.com/directory/regscale">https://www.itspmagazine.com/directory/regscale</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 10 Sep 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Travis Howerton)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/achieving-compliance-in-the-cloud-through-continuous-controls-monitoring-ccm-7-minutes-on-itspmagazine-a-regscale-short-brand-story-with-travis-howerton-1AKU5Y6x</link>
      <content:encoded><![CDATA[<p>With the rapid pace of cloud adoption, less time is spent ensuring that systems are built and operated effectively and with proper cyber hygiene. As a result, continuous controls monitoring (CCM) has emerged as indispensable for ensuring both security and regulatory compliance. Travis will discuss how CCM: transforms reactive security measures into a proactive stance; strengthens security protocols and embeds compliance within cloud operations; and streamlines the protection of digital assets in an ever-evolving landscape.</p><p>With systems becoming increasingly cloud-native and ephemeral, manual approaches no longer work, can’t scale, and are not timely enough to manage risk. Continuous Controls Monitoring (CCM) is needed to allow cloud adoption in highly regulated industries without sacrificing security. The speed of the cloud, AI development, and digital transformation is quickly reaching a point where human-based risk and compliance business processes cannot keep up. A modern, compliance-as-code approach is needed via CCM platforms to ensure risk and compliance processes can execute in real-time to keep pace with modern cloud technology.</p><p>Embracing compliance-as-code to allow business processes to execute at machine speed, generate self-updating paperwork, and leverage AI and mini-robot automations to validate and assess the results. Consider more sophisticated DevOps approaches leveraging CI/CD software factories to push security from code to cloud. The new CCM approach is to shift security processes left across every layer of the application lifecycle.</p><p>Learn more about RegScale: <a href="https://itspm.ag/regscaksfb">https://itspm.ag/regscaksfb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Travis Howerton</strong>, Co-Founder and CEO, RegScale, [<a href="https://x.com/RegScale">@RegScale</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/travishowerton/" target="_blank">https://www.linkedin.com/in/travishowerton/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RegScale: <a href="https://www.itspmagazine.com/directory/regscale">https://www.itspmagazine.com/directory/regscale</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6803642" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/4ccb1e4d-4b60-4c3f-992e-21b353c51a08/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=4ccb1e4d-4b60-4c3f-992e-21b353c51a08&amp;feed=kDNbmF_B"/>
      <itunes:title>Achieving Compliance in the Cloud through Continuous Controls Monitoring (CCM) | 7 Minutes on ITSPmagazine | A RegScale Short Brand Story with Travis Howerton</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Travis Howerton</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:05</itunes:duration>
      <itunes:summary>Learn how RegScale&apos;s continuous controls monitoring (CCM) platform accelerates GRC outcomes at a lower cost, powered by CCM automation engines to efficiently bridges security, risk, and compliance, while its AI tools eliminate manual corrosion that often stalls GRC programs.</itunes:summary>
      <itunes:subtitle>Learn how RegScale&apos;s continuous controls monitoring (CCM) platform accelerates GRC outcomes at a lower cost, powered by CCM automation engines to efficiently bridges security, risk, and compliance, while its AI tools eliminate manual corrosion that often stalls GRC programs.</itunes:subtitle>
      <itunes:keywords>compliance, data, regscale, controls, grc, sean martin, automation, travis howerton, cybersecurity, company, cloud, platform, and compliance; continuous controls monitoring, continuous monitoring, regulatory framework, security, ai, risk, risk, automated tools, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>58</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">248379f8-1370-4d5e-92ee-6a09eb4927ed</guid>
      <title>AI-powered, Unified Detection and Response Platform Streamlines Cybersecurity for MSPs and IT Service Providers | 7 Minutes on ITSPmagazine | A Guardz Short Brand Innovation Story with Dor Eisner</title>
      <description><![CDATA[<p>As cyber threats grow more sophisticated and target various aspects of businesses across digital assets and surfaces, a common practice is to increase the number of security layers a company uses, often tasked to an MSP. However, this approach has led to a new dilemma: MSPs are now dealing with managing a plethora of disparate point solutions simultaneously. These solutions generate an overwhelming amount of data, information, and alerts that demand attention. As SMBs often lack dedicated personnel and resources to handle these alerts, the task falls on MSPs. This leaves MSPs struggling to manage the flood of information effectively.</p><p>Guardz empowers MSPs and IT service providers to protect their clients effectively and efficiently, offering a unified platform with automated detection and response, which ensures digital assets, emails, endpoints, data and cloud directories are secure, allowing businesses to focus on growth. The Guardz platform is tailor-made for MSPs, simplifying cybersecurity management for SMBs and the MSPs that serve them. Leveraging the power of AI, Guardz automates threat detection and response, reducing false alerts and focusing on real threats. It provides scalable solutions for MSPs, comprehensive coverage for SMBs, and a user-friendly interface, ensuring robust protection and proactive security measures like regular vulnerability assessments and continuous monitoring.</p><p>Guardz is transforming the future of cybersecurity by streamlining security management and enhancing efficiency. By unifying disparate solutions into a single platform that unifies detection from its own security stack and automates the response utilizing AI,Guardz empowers MSPs to significantly reduce complexity and operational burdens as they secure their SMB customers. AI-driven threat detection and automated response capabilities minimize false alerts and ensure rapid remediation of threats, allowing MSPs to focus on strategic tasks rather than being overwhelmed by data. The scalability of Guardz’s solutions means that even small businesses can access enterprise-quality security, fostering a more secure business environment overall. This transformation leads to better-prepared MSPs, more resilient SMBs, and a more secure digital landscape.</p><p>Learn more about Guardz: <a href="https://itspm.ag/guardzrgig">https://itspm.ag/guardzrgig</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dor Eisner</strong>, CEO and Co-Founder, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dor-eisner-17067744/" target="_blank">https://www.linkedin.com/in/dor-eisner-17067744/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Guardz: <a href="https://www.itspmagazine.com/directory/guardz">https://www.itspmagazine.com/directory/guardz</a></p><p>For a free 14 day trial of Guardz’s platform please visit <a href="https://itspm.ag/guardzgvu3">https://itspm.ag/guardzgvu3</a> .</p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 9 Sep 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Dor Eisner)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/ai-powered-unified-detection-and-response-platform-streamlines-cybersecurity-for-msps-and-it-service-providers-7-minutes-on-itspmagazine-a-short-brand-innovation-story-with-dor-eisner-BvkLcIun</link>
      <content:encoded><![CDATA[<p>As cyber threats grow more sophisticated and target various aspects of businesses across digital assets and surfaces, a common practice is to increase the number of security layers a company uses, often tasked to an MSP. However, this approach has led to a new dilemma: MSPs are now dealing with managing a plethora of disparate point solutions simultaneously. These solutions generate an overwhelming amount of data, information, and alerts that demand attention. As SMBs often lack dedicated personnel and resources to handle these alerts, the task falls on MSPs. This leaves MSPs struggling to manage the flood of information effectively.</p><p>Guardz empowers MSPs and IT service providers to protect their clients effectively and efficiently, offering a unified platform with automated detection and response, which ensures digital assets, emails, endpoints, data and cloud directories are secure, allowing businesses to focus on growth. The Guardz platform is tailor-made for MSPs, simplifying cybersecurity management for SMBs and the MSPs that serve them. Leveraging the power of AI, Guardz automates threat detection and response, reducing false alerts and focusing on real threats. It provides scalable solutions for MSPs, comprehensive coverage for SMBs, and a user-friendly interface, ensuring robust protection and proactive security measures like regular vulnerability assessments and continuous monitoring.</p><p>Guardz is transforming the future of cybersecurity by streamlining security management and enhancing efficiency. By unifying disparate solutions into a single platform that unifies detection from its own security stack and automates the response utilizing AI,Guardz empowers MSPs to significantly reduce complexity and operational burdens as they secure their SMB customers. AI-driven threat detection and automated response capabilities minimize false alerts and ensure rapid remediation of threats, allowing MSPs to focus on strategic tasks rather than being overwhelmed by data. The scalability of Guardz’s solutions means that even small businesses can access enterprise-quality security, fostering a more secure business environment overall. This transformation leads to better-prepared MSPs, more resilient SMBs, and a more secure digital landscape.</p><p>Learn more about Guardz: <a href="https://itspm.ag/guardzrgig">https://itspm.ag/guardzrgig</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dor Eisner</strong>, CEO and Co-Founder, Guardz [<a href="https://x.com/GuardzCyber">@GuardzCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dor-eisner-17067744/" target="_blank">https://www.linkedin.com/in/dor-eisner-17067744/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Guardz: <a href="https://www.itspmagazine.com/directory/guardz">https://www.itspmagazine.com/directory/guardz</a></p><p>For a free 14 day trial of Guardz’s platform please visit <a href="https://itspm.ag/guardzgvu3">https://itspm.ag/guardzgvu3</a> .</p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6805318" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/74317ade-7f00-41c8-8877-fec6dd24c2e6/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=74317ade-7f00-41c8-8877-fec6dd24c2e6&amp;feed=kDNbmF_B"/>
      <itunes:title>AI-powered, Unified Detection and Response Platform Streamlines Cybersecurity for MSPs and IT Service Providers | 7 Minutes on ITSPmagazine | A Guardz Short Brand Innovation Story with Dor Eisner</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Dor Eisner</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:05</itunes:duration>
      <itunes:summary>Learn how Guardz’s AI-powered, unified detection and response platform streamlines cybersecurity for MSPs and IT service providers to protect clients and grow their businesses.</itunes:summary>
      <itunes:subtitle>Learn how Guardz’s AI-powered, unified detection and response platform streamlines cybersecurity for MSPs and IT service providers to protect clients and grow their businesses.</itunes:subtitle>
      <itunes:keywords>ai-powered, dor eisner, automate, msp, sean martin, msps, attack, smbs, cybersecurity, innovation, cyber insurance, dark web, guards, small businesses, story, problem, platform, service, ai, respond</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>57</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">425d2a94-824c-48a6-aeae-4c857161aad4</guid>
      <title>Harnessing Dark Web Insights to Understand Risks from the Attacker&apos;s Viewpoint | A Brand Story Conversation From Black Hat USA 2024 | A Resecurity Story with Christian Lees and Shawn Loveland | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At Black Hat USA 2024, the spotlight is on redefining and rethinking security, as discussed in this Brand Story episode with Resecurity. Sean Martin, Christian Lees, and Shawn Loveland share the mic to explore the cutting-edge innovations shifting paradigms within the cybersecurity domain. Christian Lees and Shawn Loveland from Resecurity dive deep into the substance of their work and its impact on modern security teams. The primary focus is Resecurity's approach towards threat intelligence and how it aids organizations in proactively mitigating risks.</p><p>The discussion kicks off with an overview of Resecurity's approach to threat intelligence. Unlike conventional models that operate from within the firewall, Resecurity adopts an outside-in perspective, helping clients understand what attackers might know about their infrastructure. Shawn Loveland emphasizes this unique viewpoint by illustrating how Resecurity helps organizations identify potential breaches and vulnerabilities from the attacker's perspective, well before any threats materialize.</p><p>One intriguing point discussed by Lees and Loveland is Resecurity's comprehensive data sourcing from the dark web. Resecurity does not simply rely on common threat intel from visible websites but digs deep into exclusive, invitation-only forums and other obscure corners of the web. This meticulous venture results in a much more profound understanding of potential threats, minimizing blind spots and the risk of data inaccuracies or AI hallucinations. By drawing on diverse data sources, Resecurity promises more significant and accurate insights into the motives and methods of cybercriminals.</p><p>Moreover, Loveland highlights the technologically sophisticated tactics employed by Resecurity, combining AI to convert unstructured data into structured, actionable intelligence for security teams. This automation not only boosts efficiency but also empowers analysts to make more informed decisions swiftly. AI in Resecurity's arsenal is not a standalone entity but integrates deeply with the human-driven aspects of threat intelligence, enriching the overall analytic experience with contextual understanding and tangible evidence.</p><p>The guests also touch on Resecurity's AI capabilities, illustrating this through scenarios where AI accelerates threat detection and response. By transforming vast amounts of data into comprehensible formats, and even summarizing complex situations into actionable insights, AI significantly reduces the ordeal for security analysts while enhancing precision.</p><p>In conclusion, Resecurity’s state-of-the-art threat intelligence solutions, emphasized by the knowledgeable insights from Christian Lees and Shawn Loveland, represent a proactive and innovative approach to modern cybersecurity.</p><p>Learn more about Resecurity: <a href="https://itspm.ag/resecurb51">https://itspm.ag/resecurb51</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Christian Lees</strong>, CTO, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christian-lees-72886b3/" target="_blank">https://www.linkedin.com/in/christian-lees-72886b3/</a></p><p><strong>Shawn Loveland</strong>, Chief Operating Officer, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawn-loveland/" target="_blank">https://www.linkedin.com/in/shawn-loveland/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Resecurity: <a href="https://www.itspmagazine.com/directory/resecurity">https://www.itspmagazine.com/directory/resecurity</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 19 Aug 2024 15:05:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Christian Lees, Shawn Loveland)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/harnessing-dark-web-insights-to-understand-risks-from-the-attackers-viewpoint-a-brand-story-conversation-from-black-hat-usa-2024-a-resecurity-story-with-christian-lees-and-shawn-loveland-on-location-coverage-with-sean-martin-and-marco-ciappelli-c6mgtA47</link>
      <content:encoded><![CDATA[<p>At Black Hat USA 2024, the spotlight is on redefining and rethinking security, as discussed in this Brand Story episode with Resecurity. Sean Martin, Christian Lees, and Shawn Loveland share the mic to explore the cutting-edge innovations shifting paradigms within the cybersecurity domain. Christian Lees and Shawn Loveland from Resecurity dive deep into the substance of their work and its impact on modern security teams. The primary focus is Resecurity's approach towards threat intelligence and how it aids organizations in proactively mitigating risks.</p><p>The discussion kicks off with an overview of Resecurity's approach to threat intelligence. Unlike conventional models that operate from within the firewall, Resecurity adopts an outside-in perspective, helping clients understand what attackers might know about their infrastructure. Shawn Loveland emphasizes this unique viewpoint by illustrating how Resecurity helps organizations identify potential breaches and vulnerabilities from the attacker's perspective, well before any threats materialize.</p><p>One intriguing point discussed by Lees and Loveland is Resecurity's comprehensive data sourcing from the dark web. Resecurity does not simply rely on common threat intel from visible websites but digs deep into exclusive, invitation-only forums and other obscure corners of the web. This meticulous venture results in a much more profound understanding of potential threats, minimizing blind spots and the risk of data inaccuracies or AI hallucinations. By drawing on diverse data sources, Resecurity promises more significant and accurate insights into the motives and methods of cybercriminals.</p><p>Moreover, Loveland highlights the technologically sophisticated tactics employed by Resecurity, combining AI to convert unstructured data into structured, actionable intelligence for security teams. This automation not only boosts efficiency but also empowers analysts to make more informed decisions swiftly. AI in Resecurity's arsenal is not a standalone entity but integrates deeply with the human-driven aspects of threat intelligence, enriching the overall analytic experience with contextual understanding and tangible evidence.</p><p>The guests also touch on Resecurity's AI capabilities, illustrating this through scenarios where AI accelerates threat detection and response. By transforming vast amounts of data into comprehensible formats, and even summarizing complex situations into actionable insights, AI significantly reduces the ordeal for security analysts while enhancing precision.</p><p>In conclusion, Resecurity’s state-of-the-art threat intelligence solutions, emphasized by the knowledgeable insights from Christian Lees and Shawn Loveland, represent a proactive and innovative approach to modern cybersecurity.</p><p>Learn more about Resecurity: <a href="https://itspm.ag/resecurb51">https://itspm.ag/resecurb51</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Christian Lees</strong>, CTO, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christian-lees-72886b3/" target="_blank">https://www.linkedin.com/in/christian-lees-72886b3/</a></p><p><strong>Shawn Loveland</strong>, Chief Operating Officer, Resecurity [<a href="https://x.com/RESecurity">@RESecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shawn-loveland/" target="_blank">https://www.linkedin.com/in/shawn-loveland/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Resecurity: <a href="https://www.itspmagazine.com/directory/resecurity">https://www.itspmagazine.com/directory/resecurity</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17899198" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/82b12f00-b11e-42cf-93aa-2a0337ce118b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=82b12f00-b11e-42cf-93aa-2a0337ce118b&amp;feed=kDNbmF_B"/>
      <itunes:title>Harnessing Dark Web Insights to Understand Risks from the Attacker&apos;s Viewpoint | A Brand Story Conversation From Black Hat USA 2024 | A Resecurity Story with Christian Lees and Shawn Loveland | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Christian Lees, Shawn Loveland</itunes:author>
      <itunes:duration>00:18:38</itunes:duration>
      <itunes:summary>Join Sean Martin as he hosts Christian Lees and Shawn Loveland from Resecurity at Black Hat USA 2024, diving into innovative threat intelligence strategies that offer an attacker&apos;s perspective on security. Discover how Resecurity&apos;s unique approach and advanced AI capabilities empower organizations to proactively mitigate risks and enhance their cybersecurity posture.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he hosts Christian Lees and Shawn Loveland from Resecurity at Black Hat USA 2024, diving into innovative threat intelligence strategies that offer an attacker&apos;s perspective on security. Discover how Resecurity&apos;s unique approach and advanced AI capabilities empower organizations to proactively mitigate risks and enhance their cybersecurity posture.</itunes:subtitle>
      <itunes:keywords>data, marco ciappelli, attackers, black hat, sean martin, resecurity, cybersecurity, dark web, threat intelligence, christian lees, shawn loveland, ai, infrastructure, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">057c5c35-b149-486a-a64d-669c3fd3a3e6</guid>
      <title>Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani</title>
      <description><![CDATA[<p>In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.</p><p>Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.</p><p>A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.</p><p>Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.</p><p>Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization’s security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture’s evolution.</p><p>A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai’s rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.</p><p>The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai’s tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.</p><p>Learn more about Horizon3.ai: <a href="https://itspm.ag/horizon3ai-bh23" target="_blank">https://itspm.ag/horizon3ai-bh23</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Snehal Antani</strong>, Co-Founder & CEO at Horizon3.ai [<a href="https://twitter.com/Horizon3ai"><strong>@Horizon3ai</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/snehalantani/">https://www.linkedin.com/in/snehalantani/</a></p><p>On Twitter | <a href="https://twitter.com/snehalantani">https://twitter.com/snehalantani</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Horizon3.ai: <a href="https://www.itspmagazine.com/directory/horizon3ai" target="_blank">https://www.itspmagazine.com/directory/horizon3ai</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 13:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Snehal Antani)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/innovations-in-autonomous-penetration-testing-and-continuous-security-posture-management-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-black-hat-usa-2024-a-horizon3-brand-story-with-snehal-antani-KVHG_zaf</link>
      <content:encoded><![CDATA[<p>In 7 Minutes on ITSPmagazine Short Brand Story recorded on location during Black Hat USA 2024, Sean Martin had a fascinating conversation with Snehal Antani, CEO and Co-Founder of Horizon3.ai. The discussion revolved around the innovative strides Horizon3.ai is making in autonomous penetration testing and continuous security posture management.</p><p>Snehal Antani shared his journey from being a CIO to founding Horizon3.ai, highlighting the critical gaps in traditional security measures that led to the inception of the company. The main focus at Horizon3.ai is to continuously verify security postures through autonomous penetration testing, essentially enabling organizations to "hack themselves" regularly to stay ahead of potential threats. Antani explained the firm's concept of “go hack yourself,” which emphasizes continuous penetration testing. This approach ensures that security vulnerabilities are identified and addressed proactively rather than reacting after an incident occurs.</p><p>A significant portion of the discussion centered around the differentiation between application and infrastructure penetration testing. While application pen testing remains a uniquely human task due to the need for identifying logic flaws in custom code, infrastructure pen testing can be effectively managed by algorithms at scale. This division allows Horizon3.ai to implement a human-machine teaming workflow, optimizing the strengths of both.</p><p>Antani likened its functionality to installing ring cameras while conducting a pen test, creating an early warning network through the deployment of honey tokens. These tokens are fake credentials and sensitive command tokens designed to attract attackers, triggering alerts when accessed. This early warning system helps organizations build a high signal, low noise alert mechanism, enhancing their ability to detect and respond to threats swiftly.</p><p>Antani emphasized that Horizon3.ai is not just a pen testing company but a data company. The data collected from each penetration test provides valuable telemetry that improves algorithm accuracy and offers insights into an organization’s security posture over time. This data-centric approach allows Horizon3.ai to help clients understand and articulate their security posture’s evolution.</p><p>A compelling example highlighted in the episode involved a CISO from a large chip manufacturing company who utilized Horizon3.ai’s rapid response capabilities to address a potential vulnerability swiftly. The CISO was able to identify, test, fix, and verify the resolution of a critical exploit within two hours, showcasing the platform's efficiency and effectiveness.</p><p>The conversation concluded with a nod to the practical benefits such innovations bring, encapsulating the idea that effective use of Horizon3.ai’s tools not only promotes better security outcomes but also enables security teams to perform their roles more efficiently, potentially even getting them home earlier.</p><p>Learn more about Horizon3.ai: <a href="https://itspm.ag/horizon3ai-bh23" target="_blank">https://itspm.ag/horizon3ai-bh23</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Snehal Antani</strong>, Co-Founder & CEO at Horizon3.ai [<a href="https://twitter.com/Horizon3ai"><strong>@Horizon3ai</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/snehalantani/">https://www.linkedin.com/in/snehalantani/</a></p><p>On Twitter | <a href="https://twitter.com/snehalantani">https://twitter.com/snehalantani</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Horizon3.ai: <a href="https://www.itspmagazine.com/directory/horizon3ai" target="_blank">https://www.itspmagazine.com/directory/horizon3ai</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6920249" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e82e0215-583d-44d1-b0f5-bbf71ed49696/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e82e0215-583d-44d1-b0f5-bbf71ed49696&amp;feed=kDNbmF_B"/>
      <itunes:title>Innovations in Autonomous Penetration Testing and Continuous Security Posture Management | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From Black Hat USA 2024 | A Horizon3 Brand Story with Snehal Antani</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Snehal Antani</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:12</itunes:duration>
      <itunes:summary>Dive into Horizon3.ai&apos;s cutting-edge approach to autonomous penetration testing and continuous security posture management with CEO Snehal Antani, as he discusses innovative solutions that transform how organizations stay ahead of cybersecurity threats.</itunes:summary>
      <itunes:subtitle>Dive into Horizon3.ai&apos;s cutting-edge approach to autonomous penetration testing and continuous security posture management with CEO Snehal Antani, as he discusses innovative solutions that transform how organizations stay ahead of cybersecurity threats.</itunes:subtitle>
      <itunes:keywords>honey tokens, proactive security, security posture, ai security, sean martin, security innovation, threat detection, cybersecurity, itsp magazine, data security, penetration testing, snehal antani, horizon3.ai, rapid response, autonomous testing, cio, pentest, human-machine teaming, vulnerability management</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>56</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">c36c68db-ea48-454e-9301-b0be2f8007df</guid>
      <title>Enhancing Security Posture by Automating and Optimizing Application Security | A Brand Story Conversation From Black Hat USA 2024 | An ArmorCode Story with Mark Lambert | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode recorded during Black Hat USA 2024, host Sean Martin sat down with Mark Lambert of ArmorCode to discuss the evolving challenges and innovative strategies in application security and vulnerability management.</p><p>ArmorCode stands out in its field by not being just another scanner but by integrating with an organization's existing tool ecosystem. Lambert explains that their platform connects with over 250 different source tools, from threat modeling to endpoint security, to provide comprehensive visibility and risk scoring. This integration is crucial for automating remediation workflows downstream and supporting various use cases, including vulnerability management and software supply chain security.</p><p>One of the core strengths of ArmorCode's platform is its ability to ingest data from a multitude of sources, normalize it, and contextualize the risk for better prioritization. Lambert notes that understanding both the technical and business context of vulnerabilities is essential for effective risk management. This dual approach helps organizations avoid the 'fire drill' mentality, focusing instead on business-critical assets first.</p><p>The conversation also touches on the breadth of ArmorCode's integrations, which include not just technical tools but also commercial and open-source threat intelligence feeds. This variety allows for a robust and nuanced understanding of an organization’s security posture. By correlating data across different tools using AI, ArmorCode helps in identifying vulnerabilities and weaknesses that could otherwise remain hidden.</p><p>Lambert emphasizes the platform's ability to streamline interactions between security and development teams. By bringing together data from various sources and applying risk scoring, ArmorCode aids in engaging development teams effectively, often leveraging integrations with tools like Jira. This engagement is pivotal for timely remediation and reducing organizational risk.</p><p>One of the exciting developments Lambert shares is ArmorCode's recent launch of AI-driven remediation capabilities. These capabilities aim to provide not just immediate fixes but strategic insights for reducing future risks. He explains that while fully automated remediation may still involve human oversight, AI significantly reduces the time and effort required for resolving vulnerabilities. This makes the security process more efficient and less burdensome for teams.</p><p>The episode concludes with Lambert discussing the significant adoption of AI functionalities among ArmorCode's customer base. With over 90% adoption of their AI correlation features, it's clear that businesses are seeing real-world benefits from these advanced capabilities. Lambert believes that the integration of AI into security practices is moving past the hype phase into delivering meaningful outcomes.</p><p>This insightful episode underscores the importance of comprehensive, AI-driven solutions in today’s security landscape. With experts like Mark Lambert at the helm, ArmorCode is leading the charge in making application security more integrated, intelligent, and efficient.</p><p>Learn more about ArmorCode: <a href="https://itspm.ag/armorcode-n9t">https://itspm.ag/armorcode-n9t</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Mark Lambert</strong>, Chief Product Officer, ArmorCode [<a href="https://x.com/code_armor">@code_armor</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marklambertlinkedin/" target="_blank">https://www.linkedin.com/in/marklambertlinkedin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ArmorCode: <a href="https://www.itspmagazine.com/directory/armorcode">https://www.itspmagazine.com/directory/armorcode</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 13 Aug 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Mark Lambert)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/enhancing-security-posture-by-automating-and-optimizing-application-security-a-brand-story-conversation-from-black-hat-usa-2024-an-armorcode-story-with-mark-lambert-on-location-coverage-with-sean-martin-and-marco-ciappelli-p441oQxn</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode recorded during Black Hat USA 2024, host Sean Martin sat down with Mark Lambert of ArmorCode to discuss the evolving challenges and innovative strategies in application security and vulnerability management.</p><p>ArmorCode stands out in its field by not being just another scanner but by integrating with an organization's existing tool ecosystem. Lambert explains that their platform connects with over 250 different source tools, from threat modeling to endpoint security, to provide comprehensive visibility and risk scoring. This integration is crucial for automating remediation workflows downstream and supporting various use cases, including vulnerability management and software supply chain security.</p><p>One of the core strengths of ArmorCode's platform is its ability to ingest data from a multitude of sources, normalize it, and contextualize the risk for better prioritization. Lambert notes that understanding both the technical and business context of vulnerabilities is essential for effective risk management. This dual approach helps organizations avoid the 'fire drill' mentality, focusing instead on business-critical assets first.</p><p>The conversation also touches on the breadth of ArmorCode's integrations, which include not just technical tools but also commercial and open-source threat intelligence feeds. This variety allows for a robust and nuanced understanding of an organization’s security posture. By correlating data across different tools using AI, ArmorCode helps in identifying vulnerabilities and weaknesses that could otherwise remain hidden.</p><p>Lambert emphasizes the platform's ability to streamline interactions between security and development teams. By bringing together data from various sources and applying risk scoring, ArmorCode aids in engaging development teams effectively, often leveraging integrations with tools like Jira. This engagement is pivotal for timely remediation and reducing organizational risk.</p><p>One of the exciting developments Lambert shares is ArmorCode's recent launch of AI-driven remediation capabilities. These capabilities aim to provide not just immediate fixes but strategic insights for reducing future risks. He explains that while fully automated remediation may still involve human oversight, AI significantly reduces the time and effort required for resolving vulnerabilities. This makes the security process more efficient and less burdensome for teams.</p><p>The episode concludes with Lambert discussing the significant adoption of AI functionalities among ArmorCode's customer base. With over 90% adoption of their AI correlation features, it's clear that businesses are seeing real-world benefits from these advanced capabilities. Lambert believes that the integration of AI into security practices is moving past the hype phase into delivering meaningful outcomes.</p><p>This insightful episode underscores the importance of comprehensive, AI-driven solutions in today’s security landscape. With experts like Mark Lambert at the helm, ArmorCode is leading the charge in making application security more integrated, intelligent, and efficient.</p><p>Learn more about ArmorCode: <a href="https://itspm.ag/armorcode-n9t">https://itspm.ag/armorcode-n9t</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Mark Lambert</strong>, Chief Product Officer, ArmorCode [<a href="https://x.com/code_armor">@code_armor</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/marklambertlinkedin/" target="_blank">https://www.linkedin.com/in/marklambertlinkedin/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from ArmorCode: <a href="https://www.itspmagazine.com/directory/armorcode">https://www.itspmagazine.com/directory/armorcode</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17210821" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/bbc197ab-f9e1-4379-b4e7-97dc094d4538/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=bbc197ab-f9e1-4379-b4e7-97dc094d4538&amp;feed=kDNbmF_B"/>
      <itunes:title>Enhancing Security Posture by Automating and Optimizing Application Security | A Brand Story Conversation From Black Hat USA 2024 | An ArmorCode Story with Mark Lambert | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Mark Lambert</itunes:author>
      <itunes:duration>00:17:55</itunes:duration>
      <itunes:summary>Listen to this Brand Story to discover how ArmorCode is revolutionizing application security and vulnerability management through comprehensive tool integration and AI-driven remediation. Join host Sean Martin in this insightful episode as ArmorCode&apos;s Mark Lambert shares strategies to prioritize business-critical assets and streamline security operations for enterprises.</itunes:summary>
      <itunes:subtitle>Listen to this Brand Story to discover how ArmorCode is revolutionizing application security and vulnerability management through comprehensive tool integration and AI-driven remediation. Join host Sean Martin in this insightful episode as ArmorCode&apos;s Mark Lambert shares strategies to prioritize business-critical assets and streamline security operations for enterprises.</itunes:subtitle>
      <itunes:keywords>risk scoring, marco ciappelli, security posture, mark lambert, black hat, sean martin, automation, cybersecurity, enterprise security, armorcode, application security, risk management, code security, threat intelligence, development teams, data integration, ai, software supply chain, vulnerability management, brand story, remediation, security operations</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>55</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2db31946-faca-4e71-bbf1-9be5f56efa97</guid>
      <title>Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.</p><p>The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.</p><p>From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.</p><p>Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.</p><p>The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm’s blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.</p><p>Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.</p><p>Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.</p><p>Learn more about DNSFilter: <a href="https://itspm.ag/dnsfilter-1g0f">https://itspm.ag/dnsfilter-1g0f</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: TK Keanini</strong>, CTO, DNSFilter [<a href="https://x.com/dnsfilter">@DNSFilter</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tkkeaninipub/" target="_blank">https://www.linkedin.com/in/tkkeaninipub/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DNSFilter: <a href="https://www.itspmagazine.com/directory/dnsfilter">https://www.itspmagazine.com/directory/dnsfilter</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Aug 2024 22:26:58 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, TK Keanini)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/blocking-billions-to-secure-the-internet-a-brand-story-conversation-from-black-hat-usa-2024-a-dnsfilter-story-with-tk-keanini-on-location-coverage-with-sean-martin-and-marco-ciappelli-TwJ8RncM</link>
      <content:encoded><![CDATA[<p>During Black Hat USA 2024 in Las Vegas, Sean Martin engages in a Brand Story conversation with TK Keanini from DNSFilter to explore the pivotal role DNSFilter plays in safeguarding networks around the world. DNSFilter operates by leveraging the Domain Name System (DNS), an essential component of the internet. As TK Keanini shares, the company's primary mission is to filter out malicious traffic and allow legitimate traffic to pass through, thereby providing an effective layer of security that is both accessible and user-friendly.</p><p>The applicability of DNSFilter spans globally, reflecting the nature of cyber threats, which are not confined by geographic borders. One critical aspect discussed is DNSFilter's ability to manage approximately 130 billion DNS requests daily, blocking between three to four billion potentially harmful requests. This impressive scale underscores the importance of DNSFilter in preventing cyberattacks and protecting users from inadvertently accessing malicious sites.</p><p>From coffee shops to large enterprises, the relevance and ease of deploying DNSFilter stand out. For businesses, the practical uses of DNSFilter are numerous.</p><p>Keanini explains that the technology is effortless to set up and can be integrated directly into various levels of IT infrastructure, including Wi-Fi routers in coffee shops and public Wi-Fi in retail settings. This straightforward setup enables even those with minimal technical expertise to implement robust cybersecurity measures easily.</p><p>The conversation also highlights DNSFilter's effectiveness in addressing global issues, such as Child Sexual Abuse Material (CSAM), reinforcing the company's commitment to making the internet safer for everyone. The firm’s blocking capabilities are not limited to phishing and ransomware; they extend to other harmful content categories, ensuring comprehensive protection.</p><p>Moreover, for Chief Information Security Officers (CISOs) and organizations with established cybersecurity programs, DNSFilter offers an invaluable addition to their security suite. With DNSFilter, policies can be set with a single click, streamlining the process for schools, businesses, and managed service providers alike. Keanini points out that this level of usability ensures that even those without extensive cybersecurity experience can effectively manage and implement necessary protections.</p><p>Additionally, Keanini emphasizes the importance of DNSFilter's role in protecting everyday users on public Wi-Fi networks and its affordability for public-use scenarios. DNSFilter's technology integrates smoothly into existing security frameworks, providing peace of mind to users and IT administrators that their networks are secure. For individuals and organizations looking to enhance their online security, DNSFilter presents a compelling solution. With its easy setup, global reach, and comprehensive protection against a wide range of cyber threats, DNSFilter stands as a vital tool in the arsenal of modern cybersecurity solutions.</p><p>Learn more about DNSFilter: <a href="https://itspm.ag/dnsfilter-1g0f">https://itspm.ag/dnsfilter-1g0f</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: TK Keanini</strong>, CTO, DNSFilter [<a href="https://x.com/dnsfilter">@DNSFilter</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tkkeaninipub/" target="_blank">https://www.linkedin.com/in/tkkeaninipub/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DNSFilter: <a href="https://www.itspmagazine.com/directory/dnsfilter">https://www.itspmagazine.com/directory/dnsfilter</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17065787" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/51dba41a-df4b-466a-9c66-745acc2ccf75/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=51dba41a-df4b-466a-9c66-745acc2ccf75&amp;feed=kDNbmF_B"/>
      <itunes:title>Blocking Billions to Secure the Internet | A Brand Story Conversation From Black Hat USA 2024 | A DNSfilter Story with TK Keanini | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, TK Keanini</itunes:author>
      <itunes:duration>00:17:46</itunes:duration>
      <itunes:summary>Join Sean Martin as he speaks with TK Keanini from DNSFilter at Black Hat USA 2024, exploring how DNSFilter&apos;s innovative approach to leveraging the Domain Name System (DNS) is making the internet safer by blocking billions of harmful requests daily. Learn about the simplicity of setting up this crucial cybersecurity tool and its broad applicability, from personal devices to global business networks.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he speaks with TK Keanini from DNSFilter at Black Hat USA 2024, exploring how DNSFilter&apos;s innovative approach to leveraging the Domain Name System (DNS) is making the internet safer by blocking billions of harmful requests daily. Learn about the simplicity of setting up this crucial cybersecurity tool and its broad applicability, from personal devices to global business networks.</itunes:subtitle>
      <itunes:keywords>dns requests, dns, marco ciappelli, network security, ciso, dnsfilter, sean martin, csam, tk keanini, network traffic, cybersecurity, malware, internet safety, online protection, las vegas, ransomware, black hat usa, public wifi, phishing, brand story, cyber threats, dns server</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>54</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">336b0268-3ca9-4c37-bc0f-2e415ef19120</guid>
      <title>The Evolving Landscape of Application Security | A Brand Story Conversation From Black Hat USA 2024 | An AppSOC Story with Willy Leichter | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Black Hat Hacker Summer Camp: A Meeting Ground for Security Minds</strong></p><p>As Sean Martin and Willy Leichter kick off the discussion, nostalgia sets in as they recount their years of attending the Black Hat Hacker Summer Camp. The perennial themes of security, new technology, and ever-evolving threats always seem to find their way back into the conversation, no matter how much the landscape changes.</p><p><strong>Returning to Basics: The Unending Challenge of Security</strong></p><p>Sean points to the recurring themes in security, to which Willy responds with a reflective acknowledgment of the cyclical nature of the industry. "It's back to figuring out how to manage all of this," he states, highlighting that while new technologies emerge, the essential task of managing them effectively remains unchanged.</p><p><strong>Introducing AppSoc: The New Kid on the Block</strong></p><p>Sean and Willy then dive into the heart of their discussion—AppSoc. Founded by serial entrepreneur Pravin Kothari, AppSoc is positioned in the Application Security Posture Management (ASPM) space. Willy elaborates on the company's mission: to consolidate, normalize, and prioritize security data from various point solutions to reduce noise and enhance actionable intelligence.</p><p><strong>The Importance of Prioritization and Orchestrated Remediation</strong></p><p>Willy explains how AppSoc’s "secret sauce" lies in prioritizing critical alerts among the plethora of security vulnerabilities. The goal is to transform a seemingly unmanageable thousand alerts into twenty high-priority ones that demand immediate attention. He emphasizes that detection without action is futile; hence, AppSoc also focuses on orchestrated remediation to bring the right information to the right teams seamlessly.</p><p><strong>Leveraging AI for Better Prioritization and Security Posture</strong></p><p>The use of AI in AppSoc is multifaceted. The company employs AI not only to streamline security processes but also to protect AI systems—a burgeoning field. Willy suggests that the explosion of AI applications and large language models (LLMs) has opened new attack surfaces. Thus, the role of AppSoc is to safeguard these tools while enabling their efficient use in security practices.</p><p><strong>Real-world Applications: A Day in the Life with AppSoc</strong></p><p>Willy shares a compelling success story about a CISO from an insurance company who managed risk across different departments using AppSoc's platform. This real-time, continuous monitoring solution replaced the less efficient, bi-annual consultant reports, demonstrating AppSoc’s efficacy in providing actionable insights promptly.</p><p><strong>The Shift-Left Strategy and DevSecOps Collaboration</strong></p><p>The conversation shifts to the importance of integrating DevOps and DevSecOps teams. Willy points out that while specializations are valuable, it's crucial to have "connective tissue" to get the bigger picture. This holistic view is essential for understanding how threats impact various departments and teams.</p><p><strong>Conclusion</strong></p><p>Sean Martin wraps up the enriching conversation with Willy Leichter, expressing his excitement for the future of AppSoc. The episode underscores the critical importance of effective application security and how innovations like AppSoc are paving the way for a more secure digital landscape.</p><p>Learn more about AppSOC: <a href="https://itspm.ag/appsoc-z45x">https://itspm.ag/appsoc-z45x</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Willy Leichter</strong>,<strong> </strong>Chief Marketing Officer, AppSOC [<a href="https://x.com/appsoc_inc/">@appsoc_inc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/willyleichter/">https://www.linkedin.com/in/willyleichter/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AppSOC: <a href="https://www.itspmagazine.com/directory/appsoc">https://www.itspmagazine.com/directory/appsoc</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 12 Aug 2024 15:04:35 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Willy Leichter)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-evolving-landscape-of-application-security-a-brand-story-conversation-from-black-hat-usa-2024-an-appsoc-story-with-willy-leichter-on-location-coverage-with-sean-martin-and-marco-ciappelli-SwCr8m7P</link>
      <content:encoded><![CDATA[<p><strong>Black Hat Hacker Summer Camp: A Meeting Ground for Security Minds</strong></p><p>As Sean Martin and Willy Leichter kick off the discussion, nostalgia sets in as they recount their years of attending the Black Hat Hacker Summer Camp. The perennial themes of security, new technology, and ever-evolving threats always seem to find their way back into the conversation, no matter how much the landscape changes.</p><p><strong>Returning to Basics: The Unending Challenge of Security</strong></p><p>Sean points to the recurring themes in security, to which Willy responds with a reflective acknowledgment of the cyclical nature of the industry. "It's back to figuring out how to manage all of this," he states, highlighting that while new technologies emerge, the essential task of managing them effectively remains unchanged.</p><p><strong>Introducing AppSoc: The New Kid on the Block</strong></p><p>Sean and Willy then dive into the heart of their discussion—AppSoc. Founded by serial entrepreneur Pravin Kothari, AppSoc is positioned in the Application Security Posture Management (ASPM) space. Willy elaborates on the company's mission: to consolidate, normalize, and prioritize security data from various point solutions to reduce noise and enhance actionable intelligence.</p><p><strong>The Importance of Prioritization and Orchestrated Remediation</strong></p><p>Willy explains how AppSoc’s "secret sauce" lies in prioritizing critical alerts among the plethora of security vulnerabilities. The goal is to transform a seemingly unmanageable thousand alerts into twenty high-priority ones that demand immediate attention. He emphasizes that detection without action is futile; hence, AppSoc also focuses on orchestrated remediation to bring the right information to the right teams seamlessly.</p><p><strong>Leveraging AI for Better Prioritization and Security Posture</strong></p><p>The use of AI in AppSoc is multifaceted. The company employs AI not only to streamline security processes but also to protect AI systems—a burgeoning field. Willy suggests that the explosion of AI applications and large language models (LLMs) has opened new attack surfaces. Thus, the role of AppSoc is to safeguard these tools while enabling their efficient use in security practices.</p><p><strong>Real-world Applications: A Day in the Life with AppSoc</strong></p><p>Willy shares a compelling success story about a CISO from an insurance company who managed risk across different departments using AppSoc's platform. This real-time, continuous monitoring solution replaced the less efficient, bi-annual consultant reports, demonstrating AppSoc’s efficacy in providing actionable insights promptly.</p><p><strong>The Shift-Left Strategy and DevSecOps Collaboration</strong></p><p>The conversation shifts to the importance of integrating DevOps and DevSecOps teams. Willy points out that while specializations are valuable, it's crucial to have "connective tissue" to get the bigger picture. This holistic view is essential for understanding how threats impact various departments and teams.</p><p><strong>Conclusion</strong></p><p>Sean Martin wraps up the enriching conversation with Willy Leichter, expressing his excitement for the future of AppSoc. The episode underscores the critical importance of effective application security and how innovations like AppSoc are paving the way for a more secure digital landscape.</p><p>Learn more about AppSOC: <a href="https://itspm.ag/appsoc-z45x">https://itspm.ag/appsoc-z45x</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Willy Leichter</strong>,<strong> </strong>Chief Marketing Officer, AppSOC [<a href="https://x.com/appsoc_inc/">@appsoc_inc</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/willyleichter/">https://www.linkedin.com/in/willyleichter/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AppSOC: <a href="https://www.itspmagazine.com/directory/appsoc">https://www.itspmagazine.com/directory/appsoc</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20034148" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/09ee9508-bcde-421b-b3cf-127f7768caef/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=09ee9508-bcde-421b-b3cf-127f7768caef&amp;feed=kDNbmF_B"/>
      <itunes:title>The Evolving Landscape of Application Security | A Brand Story Conversation From Black Hat USA 2024 | An AppSOC Story with Willy Leichter | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Willy Leichter</itunes:author>
      <itunes:duration>00:20:52</itunes:duration>
      <itunes:summary>In this episode of &quot;On Location With Sean Martin and Marco Ciappelli&quot; at Black Hat Conference 2024, host Sean Martin sits down with Willy Leichter to discuss the latest from AppSoc and explore the evolving landscape of application security.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;On Location With Sean Martin and Marco Ciappelli&quot; at Black Hat Conference 2024, host Sean Martin sits down with Willy Leichter to discuss the latest from AppSoc and explore the evolving landscape of application security.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, orchestration remediation, appsoc, real-world security solutions, sean martin, security prioritization, security best practices, cybersecurity, black hat conference, application security, appsoc innovations, ai in security, praveen kothari, cybersecurity conference, application security posture management, willy leichter, security noise reduction, black hat 2024, aspm, managing security threats, ai protection, devsecops, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>53</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9ba3c9cb-909f-4bd4-86c6-5ccf5334eb6d</guid>
      <title>Cutting-Edge Mobile App Security | A Brand Story Conversation From Black Hat USA 2024 | An Appdome Story with Tom Tovar | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to another insightful story from ITSPmagazine, where we bring you exclusive content directly from Hacker Summer Camp at Black Hat Las Vegas 2024. This year, Sean Martin had the pleasure of sitting down with Tom Tovar, CEO of Appdome, to explore the company’s innovative approach to mobile app security.</p><p><strong>A Dynamic Presence at Black Hat</strong></p><p>Black Hat 2024 is buzzing with energy, and Appdome's vibrant booth has become a focal point for many attendees. Tom credits his marketing team for creating an engaging and visually striking presence that truly reflects Appdome’s mission. A standout feature is a unique widescreen shot setup that, although not yet shared on social media, perfectly encapsulates Appdome's vision for mobile app security.</p><p><strong>The Origin of Appdome</strong></p><p>During the conversation, Sean Martin asked Tom to share the origin story of Appdome. Tom, who began his career as a corporate and securities lawyer during the tech boom, later transitioned to roles in security and operations at NetScreen. His journey took a pivotal turn after teaching himself to code and recognizing the need for a more efficient way to secure mobile applications. Driven by frustration with existing solutions and encouraged by a venture capitalist friend, Tom set out to create Appdome, aiming to simplify and automate mobile app security.</p><p><strong>Revolutionizing Mobile App Security with Appdome</strong></p><p>Appdome’s approach integrates security into the mobile app development process through machine learning, making it easier to incorporate essential functions like encryption and anti-tampering. Over time, the platform has evolved to include advanced features such as malware detection and fraud prevention. By automating these processes, Appdome reduces friction for developers and users alike, offering a streamlined path to robust mobile app security.</p><p><strong>Embracing Generative AI for User Empowerment</strong></p><p>A highlight of the interview was the discussion around Appdome’s adoption of Generative AI (Gen AI). This cutting-edge technology offers automated support to users facing mobile app security threats, providing real-time guidance to resolve issues independently. This not only enhances cybersecurity but also raises awareness, helping users become more informed and vigilant.</p><p><strong>Appdome’s Expanding Influence in Cybersecurity</strong></p><p>With over 144,000 applications utilizing its platform and more than 11,000 builds handled daily, Appdome has established itself as a leader in mobile app security. Its widespread adoption across diverse industries underscores the platform’s scalability and versatility.</p><p><strong>Looking Ahead: The Future of Mobile App Security</strong></p><p>Tom Tovar also shared Appdome’s vision for the future, including the introduction of AI-driven recommendations to further streamline security integration. The ultimate goal is to achieve an auto-defend capability, making mobile app security more intuitive and effortless for users worldwide.</p><p><strong>Conclusion</strong></p><p>This exclusive interview with Tom Tovar at Black Hat 2024 highlights how Appdome is at the forefront of mobile app security, driving innovation and automation in a rapidly evolving landscape. As mobile threats continue to grow, Appdome’s solutions will be essential in ensuring secure, seamless experiences for users everywhere.</p><p>For more insights and updates from the cybersecurity world, keep following ITSPmagazine.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tom Tovar</strong>, CEO, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" target="_blank">https://www.linkedin.com/in/tom-tovar-9b8552/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 22:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tom Tovar)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/cutting-edge-mobile-app-security-a-brand-story-conversation-from-black-hat-usa-2024-an-appdome-story-with-tom-tovar-on-location-coverage-with-sean-martin-and-marco-ciappelli-XIcy_mrC</link>
      <content:encoded><![CDATA[<p>Welcome to another insightful story from ITSPmagazine, where we bring you exclusive content directly from Hacker Summer Camp at Black Hat Las Vegas 2024. This year, Sean Martin had the pleasure of sitting down with Tom Tovar, CEO of Appdome, to explore the company’s innovative approach to mobile app security.</p><p><strong>A Dynamic Presence at Black Hat</strong></p><p>Black Hat 2024 is buzzing with energy, and Appdome's vibrant booth has become a focal point for many attendees. Tom credits his marketing team for creating an engaging and visually striking presence that truly reflects Appdome’s mission. A standout feature is a unique widescreen shot setup that, although not yet shared on social media, perfectly encapsulates Appdome's vision for mobile app security.</p><p><strong>The Origin of Appdome</strong></p><p>During the conversation, Sean Martin asked Tom to share the origin story of Appdome. Tom, who began his career as a corporate and securities lawyer during the tech boom, later transitioned to roles in security and operations at NetScreen. His journey took a pivotal turn after teaching himself to code and recognizing the need for a more efficient way to secure mobile applications. Driven by frustration with existing solutions and encouraged by a venture capitalist friend, Tom set out to create Appdome, aiming to simplify and automate mobile app security.</p><p><strong>Revolutionizing Mobile App Security with Appdome</strong></p><p>Appdome’s approach integrates security into the mobile app development process through machine learning, making it easier to incorporate essential functions like encryption and anti-tampering. Over time, the platform has evolved to include advanced features such as malware detection and fraud prevention. By automating these processes, Appdome reduces friction for developers and users alike, offering a streamlined path to robust mobile app security.</p><p><strong>Embracing Generative AI for User Empowerment</strong></p><p>A highlight of the interview was the discussion around Appdome’s adoption of Generative AI (Gen AI). This cutting-edge technology offers automated support to users facing mobile app security threats, providing real-time guidance to resolve issues independently. This not only enhances cybersecurity but also raises awareness, helping users become more informed and vigilant.</p><p><strong>Appdome’s Expanding Influence in Cybersecurity</strong></p><p>With over 144,000 applications utilizing its platform and more than 11,000 builds handled daily, Appdome has established itself as a leader in mobile app security. Its widespread adoption across diverse industries underscores the platform’s scalability and versatility.</p><p><strong>Looking Ahead: The Future of Mobile App Security</strong></p><p>Tom Tovar also shared Appdome’s vision for the future, including the introduction of AI-driven recommendations to further streamline security integration. The ultimate goal is to achieve an auto-defend capability, making mobile app security more intuitive and effortless for users worldwide.</p><p><strong>Conclusion</strong></p><p>This exclusive interview with Tom Tovar at Black Hat 2024 highlights how Appdome is at the forefront of mobile app security, driving innovation and automation in a rapidly evolving landscape. As mobile threats continue to grow, Appdome’s solutions will be essential in ensuring secure, seamless experiences for users everywhere.</p><p>For more insights and updates from the cybersecurity world, keep following ITSPmagazine.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tom Tovar</strong>, CEO, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/tom-tovar-9b8552/" target="_blank">https://www.linkedin.com/in/tom-tovar-9b8552/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21151352" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/3787bfa4-f009-4193-909e-e4aef56ab92a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=3787bfa4-f009-4193-909e-e4aef56ab92a&amp;feed=kDNbmF_B"/>
      <itunes:title>Cutting-Edge Mobile App Security | A Brand Story Conversation From Black Hat USA 2024 | An Appdome Story with Tom Tovar | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tom Tovar</itunes:author>
      <itunes:duration>00:22:01</itunes:duration>
      <itunes:summary>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; ITSPmagazine takes you behind the scenes of Black Hat 2024, where Appdome’s CEO, Tom Tovar, shares insights into the company’s revolutionary mobile app security solutions.</itunes:summary>
      <itunes:subtitle>In this episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; ITSPmagazine takes you behind the scenes of Black Hat 2024, where Appdome’s CEO, Tom Tovar, shares insights into the company’s revolutionary mobile app security solutions.</itunes:subtitle>
      <itunes:keywords>tom tovar, marco ciappelli, appdome, sean martin, cybersecurity, hacker summer camp, technology innovation, mobile threat defense, generative ai, mobile app security, gen ai, machine learning, black hat 2024, security automation, itspmagazine, devsecops, black hat las vegas, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>52</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">384343ac-41e4-43f5-ab6b-2eb0f611dcdc</guid>
      <title>Securing the Digital Economy: A Deep Dive into Application and API Security | A Brand Story Conversation From Black Hat USA 2024 | An Akamai Story with Rupesh Chokshi | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.</p><p>Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.</p><p>The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.</p><p>A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.</p><p>Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.</p><p>The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.</p><p>The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.</p><p>For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 21:30:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/securing-the-digital-economy-a-deep-dive-into-application-and-api-security-a-brand-story-conversation-from-black-hat-usa-2024-an-akamai-story-with-rupesh-chokshi-on-location-coverage-with-sean-martin-and-marco-ciappelli-FicwYVvB</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode as part of the On Location Podcast series, Sean Martin speaks with Rupesh Chokshi, who leads the application security business at Akamai. Connecting directly from Black Hat in Las Vegas, the discussion provides an in-depth look into the world of application security, APIs, and the challenges organizations face in today's technology-driven environment.</p><p>Rupesh Chokshi starts by highlighting Akamai's evolution from an innovative startup focused on improving internet experiences to a global leader in powering and protecting online activities. He emphasizes that Akamai handles trillions of transactions daily, underlining the massive scale and importance of their operations.</p><p>The conversation shifts to the pivotal role of APIs in the digital economy. With every company now being an 'app company,' APIs have become the lifeline of digital interactions, from financial services to entertainment. Chokshi points out that many organizations struggle with cataloging and discovering their APIs, a critical step for ensuring security. Akamai assists in this by employing scanning capabilities and data flow analysis to help organizations understand and protect their API landscape.</p><p>A significant part of the discussion focuses on the security challenges associated with APIs. Chokshi details how attackers exploit APIs for data breaches, financial fraud, and other malicious activities. He cites real-world examples to illustrate the impact and scale of these attacks. Chokshi also explains how attackers use APIs for carding attacks, turning businesses into unwitting accomplices in validating stolen credit cards.</p><p>Chokshi emphasizes the importance of proactive measures like API testing, which Akamai offers to identify vulnerabilities before code deployment. This approach not only bolsters the security of APIs but also instills greater confidence in the enterprise ecosystem.</p><p>The discussion also touches on the broader implications of API security for CISOs and their teams. Chokshi advises that the first step is often discovery and cataloging, followed by ongoing threat intelligence and posture management. Using insights from Akamai's extensive data, organizations can identify and mitigate threats more effectively.</p><p>The episode concludes with Chokshi reinforcing the importance of data-driven insights and AI-driven threat detection in safeguarding the API ecosystem. He notes that Akamai's vast experience and visibility into internet traffic allow them to provide unparalleled support to their clients across various sectors.</p><p>For anyone looking to understand the complexities of API security and how to address them effectively, this episode offers valuable insights from two leaders in the field. Akamai's comprehensive approach to application security, bolstered by real-world examples and expert analysis, provides a robust framework for organizations aiming to protect their digital assets.</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rupesh Chokshi</strong>, SVP & General Manager, Application Security, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rupeshchokshi/" target="_blank">https://www.linkedin.com/in/rupeshchokshi/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20051687" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/68734c66-65b3-4cce-b4af-9a27b7a0569e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=68734c66-65b3-4cce-b4af-9a27b7a0569e&amp;feed=kDNbmF_B"/>
      <itunes:title>Securing the Digital Economy: A Deep Dive into Application and API Security | A Brand Story Conversation From Black Hat USA 2024 | An Akamai Story with Rupesh Chokshi | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rupesh Chokshi</itunes:author>
      <itunes:duration>00:20:53</itunes:duration>
      <itunes:summary>In this Brand Story episode as part of the On Location Podcast series, Sean Martin chats with Rupesh Chokshi from Akamai about the escalating importance of API security and the innovative methods Akamai employs to safeguard against threats. Tune in to discover real-world examples of API breaches and learn how proactive measures can empower organizations to protect their digital assets.</itunes:summary>
      <itunes:subtitle>In this Brand Story episode as part of the On Location Podcast series, Sean Martin chats with Rupesh Chokshi from Akamai about the escalating importance of API security and the innovative methods Akamai employs to safeguard against threats. Tune in to discover real-world examples of API breaches and learn how proactive measures can empower organizations to protect their digital assets.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, ciso, cyberattacks, data breaches, black hat, sean martin, app security, akamai, cybersecurity, application security, hacker summer camp, digital economy, online security, vegas, digital assets, threat intelligence, fintech, api, security, apis, brand story, cyber threats, rupesh chokshi</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>51</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7af92403-2269-4534-aaf4-8b1b0715eb34</guid>
      <title>From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.</p><p>The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.</p><p>Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.</p><p>The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 20:51:43 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-deep-fakes-to-phishing-protecting-high-profile-digital-lives-and-safeguarding-personal-privacy-a-brand-story-conversation-from-black-hat-usa-2024-a-blackcloak-story-with-chris-pierson-on-location-coverage-with-sean-martin-and-marco-ciappelli-AjvEe7nN</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode of On Location, hosts Sean Martin and Marco Ciappelli sit down with Chris Pierson, Founder and CEO of BlackCloak, a digital executive protection company. Throughout their conversation, they explore the intersection of personal privacy, digital security, and the unique challenges faced by high-profile individuals in protecting their digital lives. Chris Pierson discusses the importance of proactive measures in digital security, emphasizing the need for executives and public figures to safeguard their personal information just as rigorously as their corporate data.</p><p>The dialogue covers various critical topics, including the rising threats of deep fakes and the implications for personal and professional security. Pierson explains how these convincing digital forgeries can be used maliciously and provides strategies to identify and combat them. Additionally, the conversation delves into common cyber threats like phishing and business email compromise, with Pierson detailing practical strategies for mitigating these risks.</p><p>Pierson also highlights the evolving landscape of privacy threats and the role of education in empowering individuals to take control of their digital presence. He shares insights on balancing security with usability, pointing out the vulnerabilities that can be overlooked by even the most tech-savvy individuals. Reflecting on his experience building BlackCloak, Pierson discusses key lessons learned while developing solutions tailored to the needs of high-net-worth and high-profile clients.</p><p>The episode underscores the criticality of a tailored approach to digital security, addressing both technical defenses and user behaviors. Listeners are encouraged to think about their own digital habits and consider how they can better protect their personal information in an increasingly interconnected world.</p><p>Learn more about BlackCloak:<a href="https://itspm.ag/itspbcweb">https://itspm.ag/itspbcweb</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from BlackCloak: <a href="https://www.itspmagazine.com/directory/blackcloak">https://www.itspmagazine.com/directory/blackcloak</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30215193" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/88810126-73cc-442e-9ec5-74ada71d0dae/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=88810126-73cc-442e-9ec5-74ada71d0dae&amp;feed=kDNbmF_B"/>
      <itunes:title>From Deep Fakes to Phishing: Protecting High-Profile Digital Lives and Safeguarding Personal Privacy | A Brand Story Conversation From Black Hat USA 2024 | A BlackCloak Story with Chris Pierson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Pierson</itunes:author>
      <itunes:duration>00:31:28</itunes:duration>
      <itunes:summary>Join Chris Pierson, Founder and CEO of BlackCloak, and hosts Sean Martin and Marco Ciappelli, as they discuss the pressing issues of personal privacy and digital security for high-profile individuals. Topics such as combating deep fakes, phishing, and business email compromise provide listeners with practical strategies to protect their digital lives against evolving cyber threats.</itunes:summary>
      <itunes:subtitle>Join Chris Pierson, Founder and CEO of BlackCloak, and hosts Sean Martin and Marco Ciappelli, as they discuss the pressing issues of personal privacy and digital security for high-profile individuals. Topics such as combating deep fakes, phishing, and business email compromise provide listeners with practical strategies to protect their digital lives against evolving cyber threats.</itunes:subtitle>
      <itunes:keywords>digital protection, chris pierson, chris pierson, marco ciappelli, sean martin, personal privacy, blackcloak, cybersecurity, digital habits, business email compromise, online security, executive protection, data privacy, deep fakes, cyber risks, digital security, phishing, brand story, cyber threats, high-profile individuals, tech-savvy</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>50</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fcdea24f-9f23-4e66-a81b-a6c0201f9ac5</guid>
      <title>Insider Insights: Cybersecurity and Collaboration | A Brand Story Conversation From Black Hat USA 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Welcome to Hacker Summer Camp</strong> Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.</p><p><i>Sean Martin:</i> “Welcome to a new episode coming to you from Hacker Summer Camp. We’re here in Las Vegas for Black Hat USA 2024, and I’m thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”</p><p><strong>Simplifying Cybersecurity with Level Blue</strong> Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.</p><p><i>Theresa Lanowitz:</i> “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”</p><p>The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.</p><p><strong>Key Insights from the Level Blue Futures Report</strong> Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.</p><p><strong>Collaboration Among CIO, CTO, and CISO</strong> Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.</p><p><i>Theresa Lanowitz:</i> “The CIO, the CISO, and the CTO must be equal partners. If they’re not, achieving cyber resilience becomes very difficult.”</p><p><strong>The Pandemic's Impact on Cybersecurity</strong> Reflecting on the pandemic’s effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.</p><p><strong>Proactive vs. Reactive Budgets</strong> Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.</p><p><i>Theresa Lanowitz:</i> “If you can align cybersecurity initiatives with business goals, you’re going to be proactive rather than reactive.”</p><p><strong>The Role of Trusted Third-Party Advisors</strong> Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.</p><p><i>Sean Martin:</i> “By working with a trusted partner, you’re not giving up your creative ideas but rather ensuring they play out effectively and securely.”</p><p><strong>The Human Element in Cybersecurity</strong> As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.</p><p><i>Sean Martin:</i> “It always comes back to the people, doesn’t it?”</p><p><strong>Conclusion</strong> The episode wraps up with Sean expressing gratitude for Theresa’s insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 03:43:32 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/insider-insights-cybersecurity-and-collaboration-a-brand-story-conversation-from-black-hat-usa-2024-a-levelblue-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-g_V5k9zv</link>
      <content:encoded><![CDATA[<p><strong>Welcome to Hacker Summer Camp</strong> Sean Martin kicks off the episode with his signature enthusiasm, welcoming listeners to another live broadcast from the renowned Hacker Summer Camp—Black Hat USA 2024 in Las Vegas. He introduces Theresa Lanowitz, a prominent figure in cybersecurity, who shares the latest developments and insights from her venture, Level Blue.</p><p><i>Sean Martin:</i> “Welcome to a new episode coming to you from Hacker Summer Camp. We’re here in Las Vegas for Black Hat USA 2024, and I’m thrilled to be joined by Theresa Lanowitz. Theresa, how are you?”</p><p><strong>Simplifying Cybersecurity with Level Blue</strong> Theresa discusses the origins and mission of Level Blue, a collaborative initiative between AT&T and World Gem Ventures. She outlines how Level Blue serves as a strategic extension to organizations, simplifying cybersecurity through consulting, managed security services, and innovative threat intelligence via Level Blue Labs.</p><p><i>Theresa Lanowitz:</i> “We aim to simplify cybersecurity by helping you protect your business intelligence through our consulting services, predict your security investments through managed services, and mitigate risk with our Level Blue Labs threat intelligence team.”</p><p>The conversation shifts to how Level Blue addresses the complexities in IT, offering practical solutions and actionable intelligence to meet these challenges head-on.</p><p><strong>Key Insights from the Level Blue Futures Report</strong> Theresa reveals exciting updates about their flagship thought leadership piece, the Level Blue Futures Report. Launched at RSA in May, this report anchors their yearly research agenda. Additionally, she introduces the C-suite Accelerator, focusing on the evolving roles of CIOs, CISOs, and CTOs in fostering cyber resilience.</p><p><strong>Collaboration Among CIO, CTO, and CISO</strong> Sean and Theresa explore the dynamics between the CIO, CTO, and CISO roles. Theresa elaborates on how, despite their shared objectives, these roles often face conflicting priorities. She highlights the importance of these roles being equal partners within an organization to ensure cohesive responses during critical events, thereby enhancing overall organizational resilience.</p><p><i>Theresa Lanowitz:</i> “The CIO, the CISO, and the CTO must be equal partners. If they’re not, achieving cyber resilience becomes very difficult.”</p><p><strong>The Pandemic's Impact on Cybersecurity</strong> Reflecting on the pandemic’s effects, Theresa notes how it accelerated digital transformation, underscoring the crucial need for resilient cybersecurity measures. Despite some progress, she observes that cybersecurity often remains siloed, underfunded, and secondary in many organizations. She stresses the importance of aligning cybersecurity goals with business objectives to create a more integrated and effective approach.</p><p><strong>Proactive vs. Reactive Budgets</strong> Theresa emphasizes the significance of proactive budgeting in cybersecurity, contrasting it with the more common reactive approach. Proactive budgets, she argues, allow for better alignment of cybersecurity initiatives with business goals, which is vital for preempting breaches and addressing regulatory compliance.</p><p><i>Theresa Lanowitz:</i> “If you can align cybersecurity initiatives with business goals, you’re going to be proactive rather than reactive.”</p><p><strong>The Role of Trusted Third-Party Advisors</strong> Theresa advocates for the involvement of trusted third-party advisors, such as consulting and managed security services. These advisors bring valuable external perspectives and experience, which are crucial for driving innovation and ensuring robust security measures.</p><p><i>Sean Martin:</i> “By working with a trusted partner, you’re not giving up your creative ideas but rather ensuring they play out effectively and securely.”</p><p><strong>The Human Element in Cybersecurity</strong> As the discussion winds down, Sean and Theresa agree that, at its core, cybersecurity is about people. Theresa underscores the need for cross-functional communication within organizations and with trusted third-party advisors to achieve comprehensive and effective cybersecurity.</p><p><i>Sean Martin:</i> “It always comes back to the people, doesn’t it?”</p><p><strong>Conclusion</strong> The episode wraps up with Sean expressing gratitude for Theresa’s insights and encouraging continued exploration of research and innovation across various sectors. He invites the audience to explore the Level Blue Accelerator Report for actionable insights.</p><p>Learn more about LevelBlue: <a href="https://itspm.ag/levelblue266f6c">https://itspm.ag/levelblue266f6c</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18954562" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/40c85313-a63d-451c-b571-d72cbe924c80/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=40c85313-a63d-451c-b571-d72cbe924c80&amp;feed=kDNbmF_B"/>
      <itunes:title>Insider Insights: Cybersecurity and Collaboration | A Brand Story Conversation From Black Hat USA 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:duration>00:19:44</itunes:duration>
      <itunes:summary>In an engaging episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; Sean Martin has an insightful conversation with Theresa Lanowitz at Black Hat Conference 2024 in Las Vegas. They explore the complexities of cybersecurity, collaboration, and innovative strategies in the tech world.</itunes:summary>
      <itunes:subtitle>In an engaging episode of &quot;On Location with Sean Martin and Marco Ciappelli,&quot; Sean Martin has an insightful conversation with Theresa Lanowitz at Black Hat Conference 2024 in Las Vegas. They explore the complexities of cybersecurity, collaboration, and innovative strategies in the tech world.</itunes:subtitle>
      <itunes:keywords>world gem ventures, marco ciappelli, ciso, sean martin, supply chain security, cross-functional communication, cybersecurity consulting, cybersecurity, black hat conference, at&amp;t, hacker summer camp, reactive budgeting, third-party advisors, black hat usa 2024, cto, proactive budgeting, level blue labs, level blue, cio, cyber resilience, theresa lanowitz, managed security services, digital transformation, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>49</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">81294879-d801-414f-891d-9ec9e3a4e786</guid>
      <title>Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this On Location episode Brand Story, Sean Martin speaks with Artyom Poghosyan at the Black Hat conference in Las Vegas about Britive, a cloud privileged access management platform. They explore how Britive assists medium to large enterprises in tackling identity management and security issues across multi-cloud and hybrid environments.</p><p>Sean and Artyom discuss the complexities that organizations face with cloud adoption, where traditional lift-and-shift approaches no longer suffice. Artyom outlines how the incorporation of new processes and tools, such as DevOps automation, complicates identity and access management in cloud environments. Britive's approach emphasizes the need for dynamic, scalable solutions that align with the speed and agility of cloud-based development while ensuring robust security controls.</p><p>A key focus is the balance between granting necessary access for operational efficiency and minimizing security risks from overprivileged accounts. Artyom describes Britive's method of dynamically granting and revoking access based on justified needs, ensuring that temporary elevated access is appropriately controlled and removed post-use.</p><p>Additionally, the conversation highlights the challenges of managing identities across multiple cloud platforms (AWS, GCP, Azure, etc.) and the diverse technologies used in modern enterprises. Artyom explains Britive's capability to provide a unified identity and access management approach that simplifies and secures these varied environments.</p><p>The episode also emphasizes Britive’s potential to significantly reduce the time required for onboarding DevOps engineers, streamlining the process from days to mere minutes through automation. This not only improves operational efficiency but also vastly reduces risk by limiting standing privileges, a key security vulnerability often exploited by cybercriminals.</p><p>Finally, they touch upon how Britive fits within broader organizational security strategies, particularly Zero Trust initiatives. By eliminating standing access risks and offering integration with existing security processes, Britive supports the implementation of comprehensive identity security programs that align with modern security frameworks.</p><p>Sean closes the episode by encouraging listeners to engage with Artyom and the Britive team to see how their solutions can enhance identity management and security within their organizations.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Artyom Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 9 Aug 2024 02:18:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Artyom Poghosyan)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/dynamic-access-control-in-modern-cloud-environments-a-brand-story-conversation-from-black-hat-usa-2024-a-britive-story-with-artyom-poghosyan-on-location-coverage-with-sean-martin-and-marco-ciappelli-TQBXFtMV</link>
      <content:encoded><![CDATA[<p>In this On Location episode Brand Story, Sean Martin speaks with Artyom Poghosyan at the Black Hat conference in Las Vegas about Britive, a cloud privileged access management platform. They explore how Britive assists medium to large enterprises in tackling identity management and security issues across multi-cloud and hybrid environments.</p><p>Sean and Artyom discuss the complexities that organizations face with cloud adoption, where traditional lift-and-shift approaches no longer suffice. Artyom outlines how the incorporation of new processes and tools, such as DevOps automation, complicates identity and access management in cloud environments. Britive's approach emphasizes the need for dynamic, scalable solutions that align with the speed and agility of cloud-based development while ensuring robust security controls.</p><p>A key focus is the balance between granting necessary access for operational efficiency and minimizing security risks from overprivileged accounts. Artyom describes Britive's method of dynamically granting and revoking access based on justified needs, ensuring that temporary elevated access is appropriately controlled and removed post-use.</p><p>Additionally, the conversation highlights the challenges of managing identities across multiple cloud platforms (AWS, GCP, Azure, etc.) and the diverse technologies used in modern enterprises. Artyom explains Britive's capability to provide a unified identity and access management approach that simplifies and secures these varied environments.</p><p>The episode also emphasizes Britive’s potential to significantly reduce the time required for onboarding DevOps engineers, streamlining the process from days to mere minutes through automation. This not only improves operational efficiency but also vastly reduces risk by limiting standing privileges, a key security vulnerability often exploited by cybercriminals.</p><p>Finally, they touch upon how Britive fits within broader organizational security strategies, particularly Zero Trust initiatives. By eliminating standing access risks and offering integration with existing security processes, Britive supports the implementation of comprehensive identity security programs that align with modern security frameworks.</p><p>Sean closes the episode by encouraging listeners to engage with Artyom and the Britive team to see how their solutions can enhance identity management and security within their organizations.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Artyom Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21332321" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/376e237c-ac05-4531-ac3a-483ce98507a3/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=376e237c-ac05-4531-ac3a-483ce98507a3&amp;feed=kDNbmF_B"/>
      <itunes:title>Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Artyom Poghosyan</itunes:author>
      <itunes:duration>00:22:13</itunes:duration>
      <itunes:summary>Join Sean Martin and Artyom Poghosyan for a Brand Story at the Black Hat conference as they explore how Britive revolutionizes cloud privileged access management, addressing complex security challenges and streamlining operational efficiency across multi-cloud environments. Discover how Britive&apos;s innovative approach can significantly reduce onboarding time and enhance identity security in your organization.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Artyom Poghosyan for a Brand Story at the Black Hat conference as they explore how Britive revolutionizes cloud privileged access management, addressing complex security challenges and streamlining operational efficiency across multi-cloud environments. Discover how Britive&apos;s innovative approach can significantly reduce onboarding time and enhance identity security in your organization.</itunes:subtitle>
      <itunes:keywords>privileged, devops, marco ciappelli, britive, sean martin, automation, gcp, cybersecurity, access, management, cloud, multi-cloud, security, identity, artyom poghosyan, zero trust, azure, aws, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>48</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">26fe55a4-6b95-45ee-9625-69bef3cfa564</guid>
      <title>Coro&apos;s Modular Cybersecurity and True Platform Revolution | A Brand Story Conversation From Black Hat USA 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>At Black Hat 2024 in Las Vegas, Sean Martin from On Location interviews Dror Liwer of Coro, uncovering the impressive strides Coro has made in creating a truly cohesive cybersecurity platform. This conversation reveals how Coro distinguishes itself in an industry saturated with buzzwords and inadequate solutions, particularly for smaller and mid-sized businesses.</p><p><strong>Meeting in Vegas</strong></p><p>Sean Martin starts the conversation by appreciating the vibrant atmosphere at the Black Hat Business Hall. The colorful Coro booth, coupled with the energetic team, sets the perfect backdrop for a discussion centered on platform innovation.</p><p><strong>Sean Martin:</strong> "Here we are, Dror. Fantastic seeing you here in Vegas."</p><p><strong>Dror Liwer:</strong> "It's where we meet."</p><p><strong>The Platform Buzz</strong></p><p>The term “platform” has become a buzzword in the cybersecurity industry. Dror explains that many companies claim to offer platforms, but these so-called platforms often result from the integration of various point solutions, which don't communicate effectively with each other.</p><p><strong>Dror Liwer:</strong> “We built Coro as a platform and have been a platform for 10 years. It's kind of funny to see everybody now catching up and trying to pretend to be a platform.”</p><p>Dror criticizes how companies use “platform” to create market confusion, explaining that a true platform requires seamless integration, a single endpoint agent, and a unified data lake.</p><p><strong>Defining a True Platform</strong></p><p>Dror and Sean delve deep into what makes Coro's platform genuinely innovative. Dror emphasizes that a real platform collects and processes data across multiple modules, providing a single pane of glass for operators. He contrasts this with other solutions that merely integrate various tools, resulting in operational complexity and inefficiencies.</p><p><strong>Dror Liwer:</strong> "A real platform is an engine that has a set of tools on top of it that work seamlessly together using a single pane of glass, a single endpoint agent, and a single data lake that shares all of the information across all of the different modules."</p><p><strong>The Role of Data</strong></p><p>Data integration is a cornerstone of Coro’s platform. Dror explains that each module in Coro functions as both a sensor and protector, feeding data into the system and responding to anomalies in real-time.</p><p><strong>Dror Liwer:</strong> "The collection of data happens natively at the sensor. They feed all the data into one very large data lake."</p><p>This unified approach allows Coro to eliminate the time-critical gap between event detection and response, a significant advantage over traditional systems that often rely on multiple disparate tools.</p><p><strong>Supporting MSPs and Mid-Market Businesses</strong></p><p>One of Coro's key missions is to support Managed Service Providers (MSPs) and mid-market businesses, sectors that have been largely overlooked by larger cybersecurity firms. By offering a more manageable and less costly platform, Coro empowers these providers to offer comprehensive cybersecurity services without the high operational costs traditionally associated with such tasks.</p><p><strong>Dror Liwer:</strong> “We are changing that economic equation, allowing MSPs to offer full cybersecurity solutions to their customers at an affordable price.”</p><p><strong>Fulfilling New Requirements</strong></p><p>Dror also sheds light on how Coro helps businesses comply with new regulatory requirements or cybersecurity mandates, often dictated by their position in the supply chain.</p><p><strong>Dror Liwer:</strong> "When this guy comes to you and says, ‘Hey, I need to now comply with this or do that,’ this is an opportunity to tell them, ‘Don't worry. I got you covered. I have Coro for you.’”</p><p><strong>Conclusion</strong></p><p>Dror Liwer's insights during Black Hat 2024 highlight how Coro is not only addressing but revolutionizing the cybersecurity needs of small to mid-sized businesses and their MSP partners. By creating a true platform that reduces complexity and operational costs, Coro sets a new standard in the cybersecurity industry.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Aug 2024 21:43:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/coros-modular-cybersecurity-and-true-platform-revolution-a-brand-story-conversation-from-black-hat-usa-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-ssEboLlV</link>
      <content:encoded><![CDATA[<p>At Black Hat 2024 in Las Vegas, Sean Martin from On Location interviews Dror Liwer of Coro, uncovering the impressive strides Coro has made in creating a truly cohesive cybersecurity platform. This conversation reveals how Coro distinguishes itself in an industry saturated with buzzwords and inadequate solutions, particularly for smaller and mid-sized businesses.</p><p><strong>Meeting in Vegas</strong></p><p>Sean Martin starts the conversation by appreciating the vibrant atmosphere at the Black Hat Business Hall. The colorful Coro booth, coupled with the energetic team, sets the perfect backdrop for a discussion centered on platform innovation.</p><p><strong>Sean Martin:</strong> "Here we are, Dror. Fantastic seeing you here in Vegas."</p><p><strong>Dror Liwer:</strong> "It's where we meet."</p><p><strong>The Platform Buzz</strong></p><p>The term “platform” has become a buzzword in the cybersecurity industry. Dror explains that many companies claim to offer platforms, but these so-called platforms often result from the integration of various point solutions, which don't communicate effectively with each other.</p><p><strong>Dror Liwer:</strong> “We built Coro as a platform and have been a platform for 10 years. It's kind of funny to see everybody now catching up and trying to pretend to be a platform.”</p><p>Dror criticizes how companies use “platform” to create market confusion, explaining that a true platform requires seamless integration, a single endpoint agent, and a unified data lake.</p><p><strong>Defining a True Platform</strong></p><p>Dror and Sean delve deep into what makes Coro's platform genuinely innovative. Dror emphasizes that a real platform collects and processes data across multiple modules, providing a single pane of glass for operators. He contrasts this with other solutions that merely integrate various tools, resulting in operational complexity and inefficiencies.</p><p><strong>Dror Liwer:</strong> "A real platform is an engine that has a set of tools on top of it that work seamlessly together using a single pane of glass, a single endpoint agent, and a single data lake that shares all of the information across all of the different modules."</p><p><strong>The Role of Data</strong></p><p>Data integration is a cornerstone of Coro’s platform. Dror explains that each module in Coro functions as both a sensor and protector, feeding data into the system and responding to anomalies in real-time.</p><p><strong>Dror Liwer:</strong> "The collection of data happens natively at the sensor. They feed all the data into one very large data lake."</p><p>This unified approach allows Coro to eliminate the time-critical gap between event detection and response, a significant advantage over traditional systems that often rely on multiple disparate tools.</p><p><strong>Supporting MSPs and Mid-Market Businesses</strong></p><p>One of Coro's key missions is to support Managed Service Providers (MSPs) and mid-market businesses, sectors that have been largely overlooked by larger cybersecurity firms. By offering a more manageable and less costly platform, Coro empowers these providers to offer comprehensive cybersecurity services without the high operational costs traditionally associated with such tasks.</p><p><strong>Dror Liwer:</strong> “We are changing that economic equation, allowing MSPs to offer full cybersecurity solutions to their customers at an affordable price.”</p><p><strong>Fulfilling New Requirements</strong></p><p>Dror also sheds light on how Coro helps businesses comply with new regulatory requirements or cybersecurity mandates, often dictated by their position in the supply chain.</p><p><strong>Dror Liwer:</strong> "When this guy comes to you and says, ‘Hey, I need to now comply with this or do that,’ this is an opportunity to tell them, ‘Don't worry. I got you covered. I have Coro for you.’”</p><p><strong>Conclusion</strong></p><p>Dror Liwer's insights during Black Hat 2024 highlight how Coro is not only addressing but revolutionizing the cybersecurity needs of small to mid-sized businesses and their MSP partners. By creating a true platform that reduces complexity and operational costs, Coro sets a new standard in the cybersecurity industry.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19793832" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/35a498bb-c70b-4b91-9e4b-4cf56e4a849b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=35a498bb-c70b-4b91-9e4b-4cf56e4a849b&amp;feed=kDNbmF_B"/>
      <itunes:title>Coro&apos;s Modular Cybersecurity and True Platform Revolution | A Brand Story Conversation From Black Hat USA 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:duration>00:20:37</itunes:duration>
      <itunes:summary>Sean Martin sits down with Dror Liwer at Black Hat 2024 in Las Vegas to discuss Coro&apos;s groundbreaking approach to platform integration and its impact on the cybersecurity landscape.</itunes:summary>
      <itunes:subtitle>Sean Martin sits down with Dror Liwer at Black Hat 2024 in Las Vegas to discuss Coro&apos;s groundbreaking approach to platform integration and its impact on the cybersecurity landscape.</itunes:subtitle>
      <itunes:keywords>single pane of glass, platform integration, cybersecurity solutions, marco ciappelli, machine learning in cybersecurity, coro platform, sean martin, msps, mid-market businesses, cybersecurity, unified data lake, endpoint security, cybersecurity compliance, dror liwer, small and medium businesses, mssps, data integration, it management, black hat conference 2024, cybersecurity innovation, brand story, anomaly detection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>47</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6eedc269-7766-4114-a944-eaffd6b39ea3</guid>
      <title>Behind the Scenes of SquareX&apos;s Exposing DEF CON Talk and Their Latest Browser Security Innovations | A Brand Story Conversation From Black Hat USA 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode, Sean Martin gets to chat with Vivek Ramachandran, Co-Founder and CEO of SquareX, at the Black Hat USA conference in Las Vegas. The discussion centers around SquareX’s innovative approach to browser security and its relevance in today’s cybersecurity landscape.</p><p>Vivek explains that SquareX is developing a browser-native security product designed to detect, mitigate, and hunt threats in real-time, specifically focusing on the online activities of enterprise employees. This solution operates entirely within the browser, leveraging advanced technologies like WebAssembly to ensure minimal impact on the user experience.</p><p>The conversation shifts to the upcoming DEF CON talk by Vivek, titled “Breaking Secure Web Gateways for Fun and Profit,” which highlights the seven sins of secure web gateways and SASE SSE solutions. According to Vivek, these cloud proxies often fail to detect and block web attacks due to inherent architectural limitations. He mentions SquareX's research revealing over 25 different bypasses, emphasizing the need for a new approach to tackle these vulnerabilities effectively.</p><p>Sean and Vivek further discuss the practical implementation of SquareX's solution. Vivek underscores that traditional security measures often overlook browser activities, presenting a blind spot for many organizations. SquareX aims to fill this gap by providing comprehensive visibility and real-time threat detection without relying on cloud connectivity.</p><p>Vivek also answers questions about the automatic nature of the browser extension deployment, ensuring it does not disrupt day-to-day operations for users or IT teams. Additionally, he touches on the importance of organizational training and awareness, helping security teams interpret new types of alerts and attacks that occur within the browser environment.</p><p>Towards the end of the episode, Vivek introduces a new attack toolkit designed for organizations to test their own secure web gateways and SASE SSE solutions, empowering them to identify vulnerabilities firsthand. He encourages security leaders to use this tool and visit a dedicated website for practical demonstrations.</p><p>Listeners are invited to connect with Vivek and the SquareX team, especially those attending Black Hat and DEF CON, to learn more about this innovative approach to browser security.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 8 Aug 2024 16:00:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/behind-the-scenes-of-squarexs-exposing-def-con-talk-and-their-latest-browser-security-innovations-a-brand-story-conversation-from-black-hat-usa-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-wss0iRF3</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode, Sean Martin gets to chat with Vivek Ramachandran, Co-Founder and CEO of SquareX, at the Black Hat USA conference in Las Vegas. The discussion centers around SquareX’s innovative approach to browser security and its relevance in today’s cybersecurity landscape.</p><p>Vivek explains that SquareX is developing a browser-native security product designed to detect, mitigate, and hunt threats in real-time, specifically focusing on the online activities of enterprise employees. This solution operates entirely within the browser, leveraging advanced technologies like WebAssembly to ensure minimal impact on the user experience.</p><p>The conversation shifts to the upcoming DEF CON talk by Vivek, titled “Breaking Secure Web Gateways for Fun and Profit,” which highlights the seven sins of secure web gateways and SASE SSE solutions. According to Vivek, these cloud proxies often fail to detect and block web attacks due to inherent architectural limitations. He mentions SquareX's research revealing over 25 different bypasses, emphasizing the need for a new approach to tackle these vulnerabilities effectively.</p><p>Sean and Vivek further discuss the practical implementation of SquareX's solution. Vivek underscores that traditional security measures often overlook browser activities, presenting a blind spot for many organizations. SquareX aims to fill this gap by providing comprehensive visibility and real-time threat detection without relying on cloud connectivity.</p><p>Vivek also answers questions about the automatic nature of the browser extension deployment, ensuring it does not disrupt day-to-day operations for users or IT teams. Additionally, he touches on the importance of organizational training and awareness, helping security teams interpret new types of alerts and attacks that occur within the browser environment.</p><p>Towards the end of the episode, Vivek introduces a new attack toolkit designed for organizations to test their own secure web gateways and SASE SSE solutions, empowering them to identify vulnerabilities firsthand. He encourages security leaders to use this tool and visit a dedicated website for practical demonstrations.</p><p>Listeners are invited to connect with Vivek and the SquareX team, especially those attending Black Hat and DEF CON, to learn more about this innovative approach to browser security.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19540943" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/24a429f6-a2af-4fec-95c5-7e04821ae749/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=24a429f6-a2af-4fec-95c5-7e04821ae749&amp;feed=kDNbmF_B"/>
      <itunes:title>Behind the Scenes of SquareX&apos;s Exposing DEF CON Talk and Their Latest Browser Security Innovations | A Brand Story Conversation From Black Hat USA 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:duration>00:20:21</itunes:duration>
      <itunes:summary>Join Sean Martin as he interviews Vivek Ramachandran, Co-Founder and CEO of SquareX, about groundbreaking browser-native security solutions and insights into vulnerabilities in secure web gateways. Discover how their innovative approach fills critical security gaps and learn about their toolkit to test your own defenses against advanced threats.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he interviews Vivek Ramachandran, Co-Founder and CEO of SquareX, about groundbreaking browser-native security solutions and insights into vulnerabilities in secure web gateways. Discover how their innovative approach fills critical security gaps and learn about their toolkit to test your own defenses against advanced threats.</itunes:subtitle>
      <itunes:keywords>secure web gateways, web assembly, marco ciappelli, black hat, sean martin, real-time detection, def con, cybersecurity, security product, enterprise security, browser security, cyber defense, mitigation, threat hunting, sse, web threats, sase, attack toolkit, machine learning, vivek ramachandran, squarex, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>46</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">1fc24cf7-05de-440d-a6df-5deed95854e6</guid>
      <title>Breaking Boundaries in Cloud Security, Identity, and Privileged Access Management | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Art Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.</p><p>Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.</p><p>The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.</p><p>Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.</p><p>Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Art Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Cloud PAM: <a href="https://itspm.ag/britivxya3" target="_blank">https://itspm.ag/britivxya3</a></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 6 Aug 2024 01:42:14 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Art Poghosyan)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/breaking-boundaries-in-cloud-security-identity-and-privileged-access-management-a-brand-story-conversation-from-black-hat-usa-2024-a-britive-story-with-art-poghosyan-on-location-coverage-with-sean-martin-and-marco-ciappelli-HIFcDC_0</link>
      <content:encoded><![CDATA[<p>In this Brand Story episode as part of the Black Hat Event Coverage featuring Sean Martin and Marco Ciappelli, guest Art Poghosyan, co-founder of Britive, discusses the evolution and challenges of identity and access management (IAM) in the modern technological landscape. Sean and Marco engage Art in a conversation that covers everything from the significance of effective IAM for businesses to the innovative solutions Britive is bringing to the market.</p><p>Art shares the story behind the foundation of Britive and its journey from conception to a leading provider of cloud-native privileged access management solutions. He highlights the shift from static to dynamic identities, emphasizing the importance of automating and authorizing access in real time to meet the needs of modern DevOps and cloud environments.</p><p>The conversation also touches on how traditional security measures are adapting to new cloud-based infrastructures, highlighting the growing complexity and necessity for advanced IAM solutions. Marco brings in a critical perspective on the changing nature of technology and security, questioning how modern companies can sustain their operations amid rapid technological changes.</p><p>Art shares insight into the convergence of new ideas and the maturity of contemporary technologies, suggesting that today's advancements provide unique opportunities for innovative solutions. Sean and Marco steer the conversation to practical applications, with Art providing real-world examples of how Britive's technologies are being implemented by enterprises facing complex security challenges. He explains how Britive's API-first approach aids in operationalizing security without imposing on performance or user experience.</p><p>Furthermore, the episode sets the stage for an upcoming deeper conversation at the Black Hat event, where Art, Sean, and Marco will continue exploring IAM and the critical role Britive plays in shaping the industry's future. Listeners also get information on how to connect with Art and the Britive team at the event.</p><p>Learn more about Britive: <a href="https://itspm.ag/britive-3fa6" target="_blank">https://itspm.ag/britive-3fa6</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Art Poghosyan</strong>, Co-Founder, Britive [<a href="https://x.com/britive1">@britive1</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/artyompoghosyan/" target="_blank">https://www.linkedin.com/in/artyompoghosyan/</a></p><p><strong>Resources</strong></p><p>Cloud PAM: <a href="https://itspm.ag/britivxya3" target="_blank">https://itspm.ag/britivxya3</a></p><p>Learn more and catch more stories from Britive: <a href="https://www.itspmagazine.com/directory/britive">https://www.itspmagazine.com/directory/britive</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20804433" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ff654e8a-c33c-4719-ac17-0cc0a8cab294/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ff654e8a-c33c-4719-ac17-0cc0a8cab294&amp;feed=kDNbmF_B"/>
      <itunes:title>Breaking Boundaries in Cloud Security, Identity, and Privileged Access Management | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Art Poghosyan | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Art Poghosyan</itunes:author>
      <itunes:duration>00:21:40</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli in this Brand Story as they explore the future of identity and access management with Art Poghosyan, co-founder of Britive. Discover how Britive&apos;s innovative solutions are revolutionizing cloud-native security while tackling the evolving challenges of modern technology environments.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli in this Brand Story as they explore the future of identity and access management with Art Poghosyan, co-founder of Britive. Discover how Britive&apos;s innovative solutions are revolutionizing cloud-native security while tackling the evolving challenges of modern technology environments.</itunes:subtitle>
      <itunes:keywords>privileged, devops, technology, marco ciappelli, britive, black hat, sean martin, automation, cybersecurity, access, art poghosyan, iam, innovation, management, cloud, api, security, identity, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>45</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">3cc6f6e7-5e02-4fca-8f81-85f03569651d</guid>
      <title>From Zero Trust to AI and now Platformization and Consolidation: Debunking Cybersecurity Buzzwords | A Brand Story Conversation From Black Hat USA 2024 | A Coro Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Join the On Location Podcast co-hosts, Sean Martin and Marco Ciappelli, as they kick off an engaging conversation with Dror Liwer, Co-Founder of Coro, discussing SMB cybersecurity and preparations for Black Hat 2024.</p><p>Dror emphasizes Coro’s excitement about participating in Black Hat for the second year, where they will be showcasing their offerings at booth 4734. He contrasts Black Hat with other conferences, noting its unique focus on cybersecurity practitioners and those who carry the weight of their organizations' security.</p><p>Throughout the discussion, Dror tackles the buzzwords and trends in the cybersecurity industry. This year, the buzzword is "platform," and Dror provides insight into what truly constitutes a cybersecurity platform. He distinguishes between various types of platforms, such as those built from multiple vendors, internally developed ones like Cisco and Palo Alto, and Coro's own from-the-ground-up modular platform. He also discusses the advantages of a unified and seamless approach to cybersecurity.</p><p>The conversation covers the practical benefits of Coro’s platform for service providers and end customers. Dror mentions how Coro simplifies cybersecurity by allowing easy onboarding and flexible licensing. He highlights Coro’s data governance capabilities and modular design, which enable users to scale their security needs up or down efficiently.</p><p>Dror also teases his upcoming talk at Black Hat, titled “Platformization, Consolidation, and Other Buzzwords Debunked,” promising a comprehensive framework to help organizations evaluate and select the right cybersecurity platforms for their needs.</p><p>The episode closes with Sean and Marco expressing their enthusiasm for continuing the conversation at Black Hat and encouraging listeners to connect with Coro’s energetic team. They also invite the audience to stay tuned for more updates and insights from the event.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Jul 2024 01:28:54 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-zero-trust-to-ai-and-now-platformization-and-consolidation-debunking-cybersecurity-buzzwords-a-brand-story-conversation-from-black-hat-usa-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-T2rsYyqc</link>
      <content:encoded><![CDATA[<p>Join the On Location Podcast co-hosts, Sean Martin and Marco Ciappelli, as they kick off an engaging conversation with Dror Liwer, Co-Founder of Coro, discussing SMB cybersecurity and preparations for Black Hat 2024.</p><p>Dror emphasizes Coro’s excitement about participating in Black Hat for the second year, where they will be showcasing their offerings at booth 4734. He contrasts Black Hat with other conferences, noting its unique focus on cybersecurity practitioners and those who carry the weight of their organizations' security.</p><p>Throughout the discussion, Dror tackles the buzzwords and trends in the cybersecurity industry. This year, the buzzword is "platform," and Dror provides insight into what truly constitutes a cybersecurity platform. He distinguishes between various types of platforms, such as those built from multiple vendors, internally developed ones like Cisco and Palo Alto, and Coro's own from-the-ground-up modular platform. He also discusses the advantages of a unified and seamless approach to cybersecurity.</p><p>The conversation covers the practical benefits of Coro’s platform for service providers and end customers. Dror mentions how Coro simplifies cybersecurity by allowing easy onboarding and flexible licensing. He highlights Coro’s data governance capabilities and modular design, which enable users to scale their security needs up or down efficiently.</p><p>Dror also teases his upcoming talk at Black Hat, titled “Platformization, Consolidation, and Other Buzzwords Debunked,” promising a comprehensive framework to help organizations evaluate and select the right cybersecurity platforms for their needs.</p><p>The episode closes with Sean and Marco expressing their enthusiasm for continuing the conversation at Black Hat and encouraging listeners to connect with Coro’s energetic team. They also invite the audience to stay tuned for more updates and insights from the event.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23538776" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/fab86b3b-9bbf-414c-ba78-adb30c43373e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=fab86b3b-9bbf-414c-ba78-adb30c43373e&amp;feed=kDNbmF_B"/>
      <itunes:title>From Zero Trust to AI and now Platformization and Consolidation: Debunking Cybersecurity Buzzwords | A Brand Story Conversation From Black Hat USA 2024 | A Coro Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:duration>00:24:31</itunes:duration>
      <itunes:summary>Join Sean Martin and Marco Ciappelli as they chat with Dror Liwer, Co-Founder of Coro, about the latest trends in SMB cybersecurity and preparations for Black Hat 2024. Discover the true meaning of a cybersecurity platform and gain insights on how Coro simplifies and enhances security for small to mid-sized businesses.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Marco Ciappelli as they chat with Dror Liwer, Co-Founder of Coro, about the latest trends in SMB cybersecurity and preparations for Black Hat 2024. Discover the true meaning of a cybersecurity platform and gain insights on how Coro simplifies and enhances security for small to mid-sized businesses.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, cybersecurity buzzwords, trends, cyber trends, bhusa2024, msp, sean martin, cybersecurity, data governance, small business security, bhusa, endpoint security, platformization, mid-market security, consolidation, smb, dror liwer, dror liwer, cloud security, security platforms, black hat 2024, brand story, mssp, coro</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>44</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">82dff616-4dca-4996-a8f1-9114f5b51876</guid>
      <title>A Deep Dive into SquareX | A Brand Story from Black Hat USA 2024 | A SquareX Story with Chief Architect Jeswin Mathai | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to another edition of Brand Stories, part of our On Location coverage of Black Hat Conference 2024 in Las Vegas. In this episode, Sean Martin and Marco Ciappelli chat with Jeswin Mathai, Chief Architect at SquareX, one of our esteemed sponsors for this year’s coverage. Jeswin brings his in-depth knowledge and experience in cybersecurity to discuss the innovative solutions SquareX is bringing to the table and what to expect at this year’s event.</p><p><strong>Getting Ready for Black Hat 2024</strong></p><p>The conversation kicks off with Marco and Sean sharing their excitement about the upcoming Black Hat USA 2024 in Las Vegas. They fondly recall their past experiences and the anticipation that comes with one of the most significant cybersecurity events of the year. Both hosts highlight the significance of the event for ITSP Magazine, marking ten years since its inception at Black Hat.</p><p><strong>Introducing Jeswin Mathai and SquareX</strong></p><p>Jeswin Mathai introduces himself as the Chief Architect at SquareX. He oversees managing the backend infrastructure and ensuring the product’s efficiency and security, particularly as a browser extension designed to be non-intrusive and highly effective. With six years of experience in the security industry, Jeswin has made significant contributions through his work published at various conferences and the development of open-source tools like AWS Goat and Azure Goat.</p><p><strong>The Birth of SquareX</strong></p><p>Sean and Marco delve deeper into the origins of SquareX. Jeswin shares the story of how SquareX was founded by Vivek Ramachandran, who previously founded Pentester Academy, a cybersecurity education company. Seeing the persistent issues in consumer security and the inefficacy of existing antivirus solutions, Vivek decided to shift focus to consumer security, particularly the visibility gap in browser-level security.</p><p><strong>Addressing Security Gaps</strong></p><p>Jeswin explains how traditional security solutions, like endpoint security and secure web gateways, often lack visibility at the browser level. Attacks originating from browsers go unnoticed, creating significant vulnerabilities. SquareX aims to fill this gap by providing comprehensive browser security, detecting and mitigating threats in real time without hampering user productivity.</p><p><strong>Innovative Security Solutions</strong></p><p>SquareX started as a consumer-based product and later expanded to enterprise solutions. The core principles are privacy, productivity, and scalability. Jeswin elaborates on how SquareX leverages advanced web technologies like WebAssembly to perform extensive computations directly on the browser, ensuring minimal dependency on cloud resources and optimizing user experience.</p><p><strong>A Scalable and Privacy-Safe Solution</strong></p><p>Marco raises the question of data privacy regulations like GDPR in Europe and the California Consumer Privacy Act (CCPA). Jeswin reassures that SquareX is designed to be highly configurable, allowing administrators to adjust data privacy settings based on regional regulations. This flexibility ensures that user data remains secure and compliant with local laws.</p><p><strong>Real-World Use Cases</strong></p><p>To illustrate SquareX’s capabilities, Jeswin discusses common use cases like phishing attacks and how SquareX protects users. Attackers often exploit legitimate platforms like SharePoint and GitHub to bypass traditional security measures. With SquareX, administrators can enforce policies to block unauthorized credential entry, perform live analysis, and categorize content to prevent phishing scams and other threats.</p><p><strong>Looking Ahead to Black Hat and DEF CON</strong></p><p>The discussion wraps up with a look at what attendees can expect from SquareX at Black Hat and DEF CON. SquareX will have a booth at both events, and Jeswin previews some of the talks on breaking secure web gateways and the dangers of malicious browser extensions. He encourages everyone to visit their booths and attend the talks to gain deeper insights into today’s cybersecurity challenges and solutions.</p><p><strong>Conclusion</strong></p><p>In conclusion, the conversation with Jeswin Mathai offers a comprehensive look at how SquareX is revolutionizing browser security. Their innovative solutions address critical gaps in traditional security measures, ensuring both consumer and enterprise users are protected against sophisticated threats. Join us at Black Hat Conference 2024 to learn more and engage with the experts at SquareX.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeswin Mathai</strong>, Chief Architect, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeswinmathai/">https://www.linkedin.com/in/jeswinmathai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Jul 2024 21:32:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jeswin Mathai)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/a-deep-dive-into-squarex-a-short-brand-story-from-black-hat-usa-2024-a-squarex-story-with-chief-architect-jeswin-mathai-on-location-coverage-with-sean-martin-and-marco-ciappelli-gW5BZNHv</link>
      <content:encoded><![CDATA[<p>Welcome to another edition of Brand Stories, part of our On Location coverage of Black Hat Conference 2024 in Las Vegas. In this episode, Sean Martin and Marco Ciappelli chat with Jeswin Mathai, Chief Architect at SquareX, one of our esteemed sponsors for this year’s coverage. Jeswin brings his in-depth knowledge and experience in cybersecurity to discuss the innovative solutions SquareX is bringing to the table and what to expect at this year’s event.</p><p><strong>Getting Ready for Black Hat 2024</strong></p><p>The conversation kicks off with Marco and Sean sharing their excitement about the upcoming Black Hat USA 2024 in Las Vegas. They fondly recall their past experiences and the anticipation that comes with one of the most significant cybersecurity events of the year. Both hosts highlight the significance of the event for ITSP Magazine, marking ten years since its inception at Black Hat.</p><p><strong>Introducing Jeswin Mathai and SquareX</strong></p><p>Jeswin Mathai introduces himself as the Chief Architect at SquareX. He oversees managing the backend infrastructure and ensuring the product’s efficiency and security, particularly as a browser extension designed to be non-intrusive and highly effective. With six years of experience in the security industry, Jeswin has made significant contributions through his work published at various conferences and the development of open-source tools like AWS Goat and Azure Goat.</p><p><strong>The Birth of SquareX</strong></p><p>Sean and Marco delve deeper into the origins of SquareX. Jeswin shares the story of how SquareX was founded by Vivek Ramachandran, who previously founded Pentester Academy, a cybersecurity education company. Seeing the persistent issues in consumer security and the inefficacy of existing antivirus solutions, Vivek decided to shift focus to consumer security, particularly the visibility gap in browser-level security.</p><p><strong>Addressing Security Gaps</strong></p><p>Jeswin explains how traditional security solutions, like endpoint security and secure web gateways, often lack visibility at the browser level. Attacks originating from browsers go unnoticed, creating significant vulnerabilities. SquareX aims to fill this gap by providing comprehensive browser security, detecting and mitigating threats in real time without hampering user productivity.</p><p><strong>Innovative Security Solutions</strong></p><p>SquareX started as a consumer-based product and later expanded to enterprise solutions. The core principles are privacy, productivity, and scalability. Jeswin elaborates on how SquareX leverages advanced web technologies like WebAssembly to perform extensive computations directly on the browser, ensuring minimal dependency on cloud resources and optimizing user experience.</p><p><strong>A Scalable and Privacy-Safe Solution</strong></p><p>Marco raises the question of data privacy regulations like GDPR in Europe and the California Consumer Privacy Act (CCPA). Jeswin reassures that SquareX is designed to be highly configurable, allowing administrators to adjust data privacy settings based on regional regulations. This flexibility ensures that user data remains secure and compliant with local laws.</p><p><strong>Real-World Use Cases</strong></p><p>To illustrate SquareX’s capabilities, Jeswin discusses common use cases like phishing attacks and how SquareX protects users. Attackers often exploit legitimate platforms like SharePoint and GitHub to bypass traditional security measures. With SquareX, administrators can enforce policies to block unauthorized credential entry, perform live analysis, and categorize content to prevent phishing scams and other threats.</p><p><strong>Looking Ahead to Black Hat and DEF CON</strong></p><p>The discussion wraps up with a look at what attendees can expect from SquareX at Black Hat and DEF CON. SquareX will have a booth at both events, and Jeswin previews some of the talks on breaking secure web gateways and the dangers of malicious browser extensions. He encourages everyone to visit their booths and attend the talks to gain deeper insights into today’s cybersecurity challenges and solutions.</p><p><strong>Conclusion</strong></p><p>In conclusion, the conversation with Jeswin Mathai offers a comprehensive look at how SquareX is revolutionizing browser security. Their innovative solutions address critical gaps in traditional security measures, ensuring both consumer and enterprise users are protected against sophisticated threats. Join us at Black Hat Conference 2024 to learn more and engage with the experts at SquareX.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jeswin Mathai</strong>, Chief Architect, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jeswinmathai/">https://www.linkedin.com/in/jeswinmathai/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21851032" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d35147e4-9b24-4c47-a3db-b358d50b2c70/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d35147e4-9b24-4c47-a3db-b358d50b2c70&amp;feed=kDNbmF_B"/>
      <itunes:title>A Deep Dive into SquareX | A Brand Story from Black Hat USA 2024 | A SquareX Story with Chief Architect Jeswin Mathai | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jeswin Mathai</itunes:author>
      <itunes:duration>00:22:45</itunes:duration>
      <itunes:summary>Join us on an insightful journey as we sit down with Jeswin Mathai, Chief Architect at SquareX, during our special coverage of the Black Hat Conference 2024, to explore cutting-edge cybersecurity solutions and innovations.</itunes:summary>
      <itunes:subtitle>Join us on an insightful journey as we sit down with Jeswin Mathai, Chief Architect at SquareX, during our special coverage of the Black Hat Conference 2024, to explore cutting-edge cybersecurity solutions and innovations.</itunes:subtitle>
      <itunes:keywords>secure web gateways, browser-level security, cybersecurity solutions, marco ciappelli, marco ciappelli, sean martin, def con, real-time threat analysis, cybersecurity, browser security, itsp magazine, endpoint security, jeswin mathai, webassembly, cybersecurity conference, data privacy, black hat usa, browser extension security, black hat 2024, vivek ramachandran, phishing attacks, squarex, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>43</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">02647969-6b3d-45e7-9ec8-cb804c373c1b</guid>
      <title>From Signatures to Behavior: RAD Security&apos;s Recognized Innovations for Cloud Threat Detection and Response | 7 Minutes on ITSPmagazine | A Short Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta</title>
      <description><![CDATA[<p>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</p><p><strong>The What:</strong> RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.</p><p><strong>The How:</strong> RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.</p><p><strong>Key Points Discussed:</strong></p><ol><li><strong>Behavioral Detection vs. Signature-Based Methods:</strong><ul><li>Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.</li></ul></li><li><strong>Enhanced Capabilities for Real-Time Response:</strong><ul><li>The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.</li></ul></li><li><strong>Recognition and Impact:</strong><ul><li>RAD Security’s innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.</li></ul></li><li><strong>Supply Chain Security:</strong><ul><li>Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security’s verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.</li></ul></li><li><strong>Future of Cloud Security:</strong><ul><li>As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.</li></ul></li></ol><p>RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.</p><p>For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO & Co-Founder, RAD Security [<a href="https://x.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://x.com/brookelynz1">https://x.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>A Brief History of Signature-Based Threat Detection in Cloud Security: <a href="https://itsprad.io/radsec-4bi" target="_blank">https://itsprad.io/radsec-4bi</a></p><p>Open Source Cloud Workload Fingerprint Catalog: <a href="https://itsprad.io/radsec-kro" target="_blank">https://itsprad.io/radsec-kro</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 26 Jul 2024 15:31:41 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-signatures-to-behavior-rad-securitys-recognized-innovations-for-cloud-threat-detection-and-response-a-brand-story-conversation-from-black-hat-usa-2024-a-rad-security-story-with-brooke-motta-GnKGM06X</link>
      <content:encoded><![CDATA[<p>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</p><p><strong>The What:</strong> RAD Security is pioneering the future of cloud security with its state-of-the-art behavioral cloud detection and response (CDR) solution. Unlike traditional CWPP and container detection systems that depend on signatures, RAD Security employs advanced techniques to create behavioral fingerprints based on unique good behavior patterns. This innovative approach aims to eliminate the risks associated with zero-day attacks and apply zero trust principles while ensuring real-time posture verification.</p><p><strong>The How:</strong> RAD Security's approach stands out in multiple ways. By setting behavioral baselines reflecting a system's normal operations, the platform can detect deviations that indicate potential threats earlier in the attack lifecycle. Integrated real-time identity and infrastructure context further sharpens its threat detection capabilities. This not only allows for proactive defenses but also enhances shift-left strategies and posture management, making cloud environments more resilient against emerging threats.</p><p><strong>Key Points Discussed:</strong></p><ol><li><strong>Behavioral Detection vs. Signature-Based Methods:</strong><ul><li>Brooke emphasized the limitations of signature-based detection in addressing modern cloud security challenges. RAD Security's shift to behavioral detection ensures early identification of zero-day attacks, addressing both runtime and software supply chain vulnerabilities.</li></ul></li><li><strong>Enhanced Capabilities for Real-Time Response:</strong><ul><li>The platform provides automated response actions such as quarantining malicious workloads, labeling suspicious activities, and terminating threats. It leverages machine learning and large language models to classify detections accurately, aiding security operations centers (SOC) in quicker and more effective remediation.</li></ul></li><li><strong>Recognition and Impact:</strong><ul><li>RAD Security’s innovative approach has earned it a finalist spot in the prestigious Black Hat Startup Spotlight Competition, signifying industry acknowledgment of the need to move beyond traditional, reactive signatures to a proactive, behavioral security approach. They were also recognized during RSA Conference, one of the only startups to garner such a position.</li></ul></li><li><strong>Supply Chain Security:</strong><ul><li>Brooke highlighted the importance of analyzing third-party services and APIs at runtime to get a comprehensive threat picture. RAD Security’s verified runtime fingerprints ensure a defense-ready posture against supply chain attacks, exemplified by its response to the recent XZ Backdoor vulnerability.</li></ul></li><li><strong>Future of Cloud Security:</strong><ul><li>As security teams navigate increasingly complex cloud environments, the legacy method of relying on signatures is no longer viable. RAD Security's behavioral approach represents the future of cloud detection and response, offering a robust, resilient solution against novel and evolving threats.</li></ul></li></ol><p>RAD Security is leading the charge in transforming cloud security through its innovative, signatureless behavioral detection and response platform. By integrating real-time identity and infrastructure context, RAD Security ensures swift and accurate threat response, laying the groundwork for a new standard in cloud native protection.</p><p>For more insights and to learn how RAD Security can help enhance your organization's cloud security resilience, tune into the full conversation.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO & Co-Founder, RAD Security [<a href="https://x.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://x.com/brookelynz1">https://x.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>A Brief History of Signature-Based Threat Detection in Cloud Security: <a href="https://itsprad.io/radsec-4bi" target="_blank">https://itsprad.io/radsec-4bi</a></p><p>Open Source Cloud Workload Fingerprint Catalog: <a href="https://itsprad.io/radsec-kro" target="_blank">https://itsprad.io/radsec-kro</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our Black Hat USA  2024 coverage: <a href="https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas">https://www.itspmagazine.com/black-hat-usa-2024-hacker-summer-camp-2024-event-coverage-in-las-vegas</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6722566" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/46f8b71f-fd19-4aa9-a280-272191dbb573/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=46f8b71f-fd19-4aa9-a280-272191dbb573&amp;feed=kDNbmF_B"/>
      <itunes:title>From Signatures to Behavior: RAD Security&apos;s Recognized Innovations for Cloud Threat Detection and Response | 7 Minutes on ITSPmagazine | A Short Brand Story Conversation From Black Hat USA 2024 | A RAD Security Story with Brooke Motta</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta</itunes:author>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</itunes:summary>
      <itunes:subtitle>In this Brand Story conversation, Sean Martin sat down with Brooke Motta, CEO and co-founder of RAD Security, to discuss a game-changing shift in cloud security: moving from signature-based to behavioral-based detection and response within the Cloud Workload Protection Platform (CWPP).</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, signatureless, black hat, sean martin, behavioral detection, rad security, security innovation, infrastructure context, runtime fingerprint, cybersecurity, brooke motta, cloud native, zero-day attacks, identity context, cloud protection, cloud security, cwpp, cyber resilience, malicious workload, software supply chain, cdr, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>42</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6f8508fe-986f-4e76-b11d-4f93deba09ac</guid>
      <title>Sevco Sets a New Standard for Vulnerability Risk Prioritization with the Launch of New Exposure Management Capabilities | 7 Minutes on ITSPmagazine | A Sevco Brand Story with J.J. Guy</title>
      <description><![CDATA[<p>Last month, Sevco unveiled new capabilities in the Sevco platform to help manage and remediate risks for a new asset class – software vulnerabilities (think CVEs) and environmental vulnerabilities (think missing security tools, EOL systems, and IT hygiene issues). Sevco’s exposure management capabilities centralize known and surface previously unknown vulnerabilities in one place, prioritize the most critical issues across the environment (based on technical severity and nearly unlimited business context derived from Sevco’s asset intelligence), automate the remediation to fix priority issues and validate that remediation efforts are completed. With the help of these new capabilities in the Sevco platform, CISOs gain quantifiable insights to manage remediation programs, highlighting where efforts are working and where they aren't.</p><p><strong>Why does this matter:</strong> The systems that typically track and report CVEs, don’t report on vulnerabilities in categories such as cloud, identity, system misconfigurations, and more. Those have to be uncovered from data found within different (typically siloed) tools. This visibility issue has caused CISOs to drown in vulnerabilities without the ability to identify the ones that present the highest risk to an organization. With asset intelligence as the foundation, the Sevco platform’s exposure management capabilities help CISOs and security teams solve this challenge by proactively prioritizing, automating, and validating the remediation of all types of exposures, including software and environmental vulnerabilities. Additionally, the Sevco platform validates the successful completion of vulnerability remediation when it’s observed on the asset itself, not just when a ticket is closed. This enables Sevco to highlight actionable metrics that allow CISOs to see what’s working and what’s not working in their remediation programs and break down cross-department silos that can cause visibility issues in the first place.</p><p><strong>How does it work:</strong> Sevco's approach to vulnerability prioritization differs from existing tools because the Sevco platform integrates with existing security tools to aggregate, correlate, and deduplicate the data in those sources to surface important context and assess the risk and business impact for each asset. With this knowledge, Sevco can automatically detect and proactively alert an organization’s security team to vulnerabilities in their environment, including software vulnerabilities (CVEs), missing or misconfigured security controls (security gaps), and IT hygiene issues (unpatched devices and shadow IT). Additionally, Sevco helps to prioritize the CVEs, missing endpoint agents, and other IT hygiene vulnerabilities so our customers are always working on the highest risk issues first based on their specific business needs. Sevco's remediation management workflow helps to reduce risk dramatically with automation, key integrations that allow for collaboration and visibility across IT and security teams, and validation that remediation happened -- no matter the ticket status. Additionally, Sevco provides reports on remediation metrics that arm CISOs with the knowledge needed to understand the utilization of specific IT and security teams.</p><p>Learn more about Sevco: <a href="https://itspm.ag/sevco250d8e" target="_blank">https://itspm.ag/sevco250d8e</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: J.J. Guy</strong>, CEO and Co-Founder, Sevco</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jjguy/">https://www.linkedin.com/in/jjguy/</a></p><p>On Twitter | <a href="https://x.com/jjguy?lang=en">https://x.com/jjguy?lang=en</a></p><p><strong>Resources</strong></p><p>State of the Cybersecurity Attack Surface (June 2024 Report): <a href="https://itspm.ag/sevco-l9bl" target="_blank">https://itspm.ag/sevco-l9bl</a></p><p>Learn more and catch more stories from Sevco: <a href="https://www.itspmagazine.com/directory/sevco" target="_blank">https://www.itspmagazine.com/directory/sevco</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 24 Jul 2024 01:03:58 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, J.J. Guy)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/sevco-sets-a-new-standard-for-vulnerability-risk-prioritization-with-the-launch-of-new-exposure-management-capabilities-7-minutes-on-itspmagazine-a-sevco-brand-story-with-jj-guy-HRhEKtZs</link>
      <content:encoded><![CDATA[<p>Last month, Sevco unveiled new capabilities in the Sevco platform to help manage and remediate risks for a new asset class – software vulnerabilities (think CVEs) and environmental vulnerabilities (think missing security tools, EOL systems, and IT hygiene issues). Sevco’s exposure management capabilities centralize known and surface previously unknown vulnerabilities in one place, prioritize the most critical issues across the environment (based on technical severity and nearly unlimited business context derived from Sevco’s asset intelligence), automate the remediation to fix priority issues and validate that remediation efforts are completed. With the help of these new capabilities in the Sevco platform, CISOs gain quantifiable insights to manage remediation programs, highlighting where efforts are working and where they aren't.</p><p><strong>Why does this matter:</strong> The systems that typically track and report CVEs, don’t report on vulnerabilities in categories such as cloud, identity, system misconfigurations, and more. Those have to be uncovered from data found within different (typically siloed) tools. This visibility issue has caused CISOs to drown in vulnerabilities without the ability to identify the ones that present the highest risk to an organization. With asset intelligence as the foundation, the Sevco platform’s exposure management capabilities help CISOs and security teams solve this challenge by proactively prioritizing, automating, and validating the remediation of all types of exposures, including software and environmental vulnerabilities. Additionally, the Sevco platform validates the successful completion of vulnerability remediation when it’s observed on the asset itself, not just when a ticket is closed. This enables Sevco to highlight actionable metrics that allow CISOs to see what’s working and what’s not working in their remediation programs and break down cross-department silos that can cause visibility issues in the first place.</p><p><strong>How does it work:</strong> Sevco's approach to vulnerability prioritization differs from existing tools because the Sevco platform integrates with existing security tools to aggregate, correlate, and deduplicate the data in those sources to surface important context and assess the risk and business impact for each asset. With this knowledge, Sevco can automatically detect and proactively alert an organization’s security team to vulnerabilities in their environment, including software vulnerabilities (CVEs), missing or misconfigured security controls (security gaps), and IT hygiene issues (unpatched devices and shadow IT). Additionally, Sevco helps to prioritize the CVEs, missing endpoint agents, and other IT hygiene vulnerabilities so our customers are always working on the highest risk issues first based on their specific business needs. Sevco's remediation management workflow helps to reduce risk dramatically with automation, key integrations that allow for collaboration and visibility across IT and security teams, and validation that remediation happened -- no matter the ticket status. Additionally, Sevco provides reports on remediation metrics that arm CISOs with the knowledge needed to understand the utilization of specific IT and security teams.</p><p>Learn more about Sevco: <a href="https://itspm.ag/sevco250d8e" target="_blank">https://itspm.ag/sevco250d8e</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: J.J. Guy</strong>, CEO and Co-Founder, Sevco</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jjguy/">https://www.linkedin.com/in/jjguy/</a></p><p>On Twitter | <a href="https://x.com/jjguy?lang=en">https://x.com/jjguy?lang=en</a></p><p><strong>Resources</strong></p><p>State of the Cybersecurity Attack Surface (June 2024 Report): <a href="https://itspm.ag/sevco-l9bl" target="_blank">https://itspm.ag/sevco-l9bl</a></p><p>Learn more and catch more stories from Sevco: <a href="https://www.itspmagazine.com/directory/sevco" target="_blank">https://www.itspmagazine.com/directory/sevco</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6725498" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/9d88ca5e-5c9d-4460-90ef-efafd8f8316e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=9d88ca5e-5c9d-4460-90ef-efafd8f8316e&amp;feed=kDNbmF_B"/>
      <itunes:title>Sevco Sets a New Standard for Vulnerability Risk Prioritization with the Launch of New Exposure Management Capabilities | 7 Minutes on ITSPmagazine | A Sevco Brand Story with J.J. Guy</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, J.J. Guy</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>With the help of new exposure management capabilities now available in Sevco&apos;s next-generation asset intelligence platform, CISOs gain quantifiable insights to manage remediation programs, highlighting where efforts are working and where they aren&apos;t.</itunes:summary>
      <itunes:subtitle>With the help of new exposure management capabilities now available in Sevco&apos;s next-generation asset intelligence platform, CISOs gain quantifiable insights to manage remediation programs, highlighting where efforts are working and where they aren&apos;t.</itunes:subtitle>
      <itunes:keywords>exposure management, asset inventory, sean martin, complexities, saas, network, cybersecurity, vulnerability, agents, prioritization, endpoint, jj guy, patches, vulnerability remediation, cloud, asset intelligence, enterprise, sevco, j.j. guy, asset, security, visibility, vulnerability prioritization, infrastructure, remediation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>41</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">b1c5ddf0-ed6e-49a8-b2c1-5d3ea0bf2360</guid>
      <title>Revolutionizing Data Privacy and Information Security Compliance: Latest Findings from the ‘State of Information Security’ Report |  A ISMS.online Brand Story with  Luke Dash</title>
      <description><![CDATA[<p>ISMS.online has released its ‘State of Information Security’ report which surveyed 502 people in the UK (over 1500 globally) who work in information security across 10 sectors including technology, manufacturing, education, energy and utilities and healthcare. The main findings that it exposed are: 79% of businesses have been impacted due to an information security incident caused by a third-party vendor or supply chain partner. Over 99% of UK businesses received hefty fines for data breaches or violation of data protection rules over the last year Deepfakes now rank as the second most common information security incident for UK businesses and have been experienced by over a third of organisations.</p><p>What does all of this mean? As data breaches continue to surge, government entities and trade bodies are in turn, trying to meet these challenges with updates and implementation of regulations and compliance mandates. Listen in as Luke speaks to IT managers about the need to build robust and effective information security foundations, invest in securing their supply chains and increasing employee awareness and training.</p><p>Learn more about  ISMS.online: <a href="https://itspm.ag/ismsonline08ab81" target="_blank">https://itspm.ag/ismsonline08ab81</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Luke Dash</strong>, CEO, ISMS.online</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/luke-dash-33867b25/">https://www.linkedin.com/in/luke-dash-33867b25/</a></p><p><strong>Resources</strong></p><p>The State of Information Security Report 2024: <a href="https://itspm.ag/ismsonlinef56b77" target="_blank">https://itspm.ag/ismsonlinef56b77</a></p><p>Learn more and catch more stories from ISMS.online: <a href="https://www.itspmagazine.com/directory/isms-online" target="_blank">https://www.itspmagazine.com/directory/isms-online</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 23 Jul 2024 16:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Luke Dash)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/revolutionizing-data-privacy-and-information-security-compliance-latest-findings-from-the-state-of-information-security-report-a-ismsonline-brand-story-with-luke-dash-Thb_7PRP</link>
      <content:encoded><![CDATA[<p>ISMS.online has released its ‘State of Information Security’ report which surveyed 502 people in the UK (over 1500 globally) who work in information security across 10 sectors including technology, manufacturing, education, energy and utilities and healthcare. The main findings that it exposed are: 79% of businesses have been impacted due to an information security incident caused by a third-party vendor or supply chain partner. Over 99% of UK businesses received hefty fines for data breaches or violation of data protection rules over the last year Deepfakes now rank as the second most common information security incident for UK businesses and have been experienced by over a third of organisations.</p><p>What does all of this mean? As data breaches continue to surge, government entities and trade bodies are in turn, trying to meet these challenges with updates and implementation of regulations and compliance mandates. Listen in as Luke speaks to IT managers about the need to build robust and effective information security foundations, invest in securing their supply chains and increasing employee awareness and training.</p><p>Learn more about  ISMS.online: <a href="https://itspm.ag/ismsonline08ab81" target="_blank">https://itspm.ag/ismsonline08ab81</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Luke Dash</strong>, CEO, ISMS.online</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/luke-dash-33867b25/">https://www.linkedin.com/in/luke-dash-33867b25/</a></p><p><strong>Resources</strong></p><p>The State of Information Security Report 2024: <a href="https://itspm.ag/ismsonlinef56b77" target="_blank">https://itspm.ag/ismsonlinef56b77</a></p><p>Learn more and catch more stories from ISMS.online: <a href="https://www.itspmagazine.com/directory/isms-online" target="_blank">https://www.itspmagazine.com/directory/isms-online</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6829976" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/397fe818-ccd3-4826-898c-e9d04e1f26b9/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=397fe818-ccd3-4826-898c-e9d04e1f26b9&amp;feed=kDNbmF_B"/>
      <itunes:title>Revolutionizing Data Privacy and Information Security Compliance: Latest Findings from the ‘State of Information Security’ Report |  A ISMS.online Brand Story with  Luke Dash</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Luke Dash</itunes:author>
      <itunes:duration>00:07:06</itunes:duration>
      <itunes:summary>ISMS.online has released its ‘State of Information Security’ report which surveyed 502 people in the UK (over 1500 globally) who work in information security across 10 sectors including technology, manufacturing, education, energy and utilities and healthcare. </itunes:summary>
      <itunes:subtitle>ISMS.online has released its ‘State of Information Security’ report which surveyed 502 people in the UK (over 1500 globally) who work in information security across 10 sectors including technology, manufacturing, education, energy and utilities and healthcare. </itunes:subtitle>
      <itunes:keywords>luke dash, luke dash, compliance, compliance, iso standards, data, marco ciappelli, rsa conference, third party vendors, data breaches, sean martin, information security management, supply chain, trust, security regulations, cybersecurity, business compliance, data leaks, information security, auditor guidance, isms online, platform, data privacy, uk government, deep fakes, security, privacy, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>40</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e1534208-d5a0-4fff-aee7-8896e49c1f15</guid>
      <title>2024 AppDome and OWASP Mobile Consumer Cyber Security Survey | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | An AppDome Brand Story with Brian Reed and Chris Roeckl | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the latest Brand Story episode, host Sean Martin chats with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, during the OWASP Global AppSec event in Lisbon. The episode dives into pivotal aspects of mobile app security and consumer expectations.</p><p>Brian Reed articulates how AppDome collaborates with OWASP to tackle mobile app security challenges. He underscores the significant role consumers play in these endeavors. According to AppDome's annual survey, consumer feedback is indispensable, revealing that a staggering 97% of consumers would abandon a brand after an insecure app experience, while 95% would advocate for a brand offering a secure experience. This highlights the stark consequences of neglecting mobile security.</p><p>Chris Roeckl elaborates on how AppDome’s annual survey, spanning four years, has amassed data from over 120,000 consumers across 12 countries. This wealth of information provides a clear trend: consumers increasingly prioritize security, particularly in banking, e-wallet, healthcare, and retail apps. Interestingly, while social media is not at the forefront of security concerns, it is rapidly becoming a focus area as users grow more conscious of account security and privacy.</p><p>The discussion brings to light how brands can effectively communicate their security protocols to consumers. Reed and Roeckl suggest transparency through dedicated web pages, direct email outreach, and in-app notifications. This communication helps build trust and reassures consumers that their security concerns are being addressed.</p><p>The conversation also touches on the integration of security into the development lifecycle. Developers often face the challenge of ensuring robust security without compromising the user experience. Reed mentions the importance of making security processes seamless and non-invasive for developers. By leveraging machine learning and AI, AppDome aims to automate many security tasks, allowing developers to focus on creating innovative, user-friendly applications.</p><p>Moreover, Roeckl points out that a holistic approach is essential. This means incorporating input from various teams within an organization - from product leaders focusing on user engagement to engineers ensuring crash-free applications and cybersecurity teams safeguarding data integrity. This collaborative effort ensures that the final product not only meets but exceeds consumer expectations.</p><p>The insights shared in the episode are a call to action for businesses to prioritize mobile security. With six billion humans using mobile apps globally, the stakes are higher than ever. Brands must recognize the direct correlation between secure mobile experiences and customer loyalty. By investing in robust security measures and effectively communicating these efforts, businesses can foster a secure and trustworthy environment for their users.</p><p>Listeners are encouraged to download the full AppDome report for a deeper understanding of consumer attitudes towards mobile app security. This empathetic report offers valuable insights that can help developers, product managers, and cybersecurity teams align their strategies with consumer expectations, ultimately leading to safer and more secure mobile applications.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Brian Reed</strong>, SVP AppSec & Mobile Defense, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/briancreed/" target="_blank">https://www.linkedin.com/in/briancreed/</a></p><p><strong>Chris Roeckl</strong>, Chief Product Officer, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/croeckl/" target="_blank">https://www.linkedin.com/in/croeckl/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Sat, 20 Jul 2024 01:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Roeckl, Brian Reed)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/2024-appdome-and-owasp-mobile-consumer-cyber-security-survey-a-brand-story-conversation-from-owasp-appsec-global-lisbon-2024-an-appdome-brand-story-with-brian-reed-and-chris-roeckl-on-location-coverage-with-sean-martin-and-marco-ciappelli-Z3vYxa6K</link>
      <content:encoded><![CDATA[<p>In the latest Brand Story episode, host Sean Martin chats with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, during the OWASP Global AppSec event in Lisbon. The episode dives into pivotal aspects of mobile app security and consumer expectations.</p><p>Brian Reed articulates how AppDome collaborates with OWASP to tackle mobile app security challenges. He underscores the significant role consumers play in these endeavors. According to AppDome's annual survey, consumer feedback is indispensable, revealing that a staggering 97% of consumers would abandon a brand after an insecure app experience, while 95% would advocate for a brand offering a secure experience. This highlights the stark consequences of neglecting mobile security.</p><p>Chris Roeckl elaborates on how AppDome’s annual survey, spanning four years, has amassed data from over 120,000 consumers across 12 countries. This wealth of information provides a clear trend: consumers increasingly prioritize security, particularly in banking, e-wallet, healthcare, and retail apps. Interestingly, while social media is not at the forefront of security concerns, it is rapidly becoming a focus area as users grow more conscious of account security and privacy.</p><p>The discussion brings to light how brands can effectively communicate their security protocols to consumers. Reed and Roeckl suggest transparency through dedicated web pages, direct email outreach, and in-app notifications. This communication helps build trust and reassures consumers that their security concerns are being addressed.</p><p>The conversation also touches on the integration of security into the development lifecycle. Developers often face the challenge of ensuring robust security without compromising the user experience. Reed mentions the importance of making security processes seamless and non-invasive for developers. By leveraging machine learning and AI, AppDome aims to automate many security tasks, allowing developers to focus on creating innovative, user-friendly applications.</p><p>Moreover, Roeckl points out that a holistic approach is essential. This means incorporating input from various teams within an organization - from product leaders focusing on user engagement to engineers ensuring crash-free applications and cybersecurity teams safeguarding data integrity. This collaborative effort ensures that the final product not only meets but exceeds consumer expectations.</p><p>The insights shared in the episode are a call to action for businesses to prioritize mobile security. With six billion humans using mobile apps globally, the stakes are higher than ever. Brands must recognize the direct correlation between secure mobile experiences and customer loyalty. By investing in robust security measures and effectively communicating these efforts, businesses can foster a secure and trustworthy environment for their users.</p><p>Listeners are encouraged to download the full AppDome report for a deeper understanding of consumer attitudes towards mobile app security. This empathetic report offers valuable insights that can help developers, product managers, and cybersecurity teams align their strategies with consumer expectations, ultimately leading to safer and more secure mobile applications.</p><p>Learn more about  Appdome: <a href="https://itspm.ag/appdome-neuv">https://itspm.ag/appdome-neuv</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Brian Reed</strong>, SVP AppSec & Mobile Defense, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/briancreed/" target="_blank">https://www.linkedin.com/in/briancreed/</a></p><p><strong>Chris Roeckl</strong>, Chief Product Officer, Appdome [<a href="https://x.com/appdome">@appdome</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/croeckl/" target="_blank">https://www.linkedin.com/in/croeckl/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Appdome: <a href="https://www.itspmagazine.com/directory/appdome">https://www.itspmagazine.com/directory/appdome</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="22113900" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/a47d4e21-9d0c-41cb-9c34-a3dd1464c610/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=a47d4e21-9d0c-41cb-9c34-a3dd1464c610&amp;feed=kDNbmF_B"/>
      <itunes:title>2024 AppDome and OWASP Mobile Consumer Cyber Security Survey | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | An AppDome Brand Story with Brian Reed and Chris Roeckl | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Roeckl, Brian Reed</itunes:author>
      <itunes:duration>00:23:02</itunes:duration>
      <itunes:summary>Join Sean Martin as he discusses crucial insights into mobile app security with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, sharing findings from their annual survey created in collaboration with OWASP on consumer expectations. Discover how mobile security impacts consumer loyalty and learn actionable strategies for integrating robust security measures into app development to foster trust and advocacy.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he discusses crucial insights into mobile app security with Brian Reed, Mobile Security Evangelist, and Chris Roeckl, Chief Product Officer at AppDome, sharing findings from their annual survey created in collaboration with OWASP on consumer expectations. Discover how mobile security impacts consumer loyalty and learn actionable strategies for integrating robust security measures into app development to foster trust and advocacy.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, expectations, lisbon, appdome, consumer, sean martin, brian reed, trust, chris roeckl, cybersecurity, survey, mobile, developers, fraud, appsec, security, brand, global, machine learning, owasp, privacy, brand story, report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>39</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7972a937-8b85-4b41-aa19-4e0141c39396</guid>
      <title>Beyond Traditional Pen Testing for Continuous Risk Assessment | A Brand Story Conversation From RSA Conference 2024 | A Hadrian Story with Rogier Fischer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.</p><p>Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.</p><p>One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.</p><p>Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.</p><p>In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker’s perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.</p><p>Top Questions Addressed</p><ul><li>What drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?</li><li>How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?</li><li>How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?</li></ul><p>Learn more about Hadrian: <a href="https://itspm.ag/hadrian-5ei">https://itspm.ag/hadrian-5ei</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rogier Fischer</strong>, Co-Founder and CEO, Hadrian [<a href="https://x.com/hadriansecurity">@hadriansecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rogierfischer/">https://www.linkedin.com/in/rogierfischer/</a></p><p><strong>Resources</strong></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 16 Jul 2024 20:59:13 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rogier Fischer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/beyond-traditional-pen-testing-for-continuous-risk-assessment-a-brand-story-conversation-from-rsa-conference-2024-a-hadrian-story-with-rogier-fischer-on-location-coverage-with-sean-martin-and-marco-ciappelli-Bv58H3TF</link>
      <content:encoded><![CDATA[<p>In the latest episode of the Redefining CyberSecurity Podcast, host Sean Martin engages with Rogier Fischer, co-founder and CEO of Hadrian, to delve into the evolving landscape of cybersecurity. The discussion navigates through the intricacies of modern cybersecurity challenges and how Hadrian is providing innovative solutions to tackle these issues. Sean Martin sets the stage by emphasizing the importance of operationalizing cybersecurity strategies to manage risk and protect revenue. Rogier Fischer shares his journey from an ethical hacker working with Dutch banks and tech companies to co-founding Hadrian, a company that leverages advanced AI to automate penetration testing.</p><p>Fischer highlights the limitations of traditional cybersecurity tools, noting they are often too passive and fail to provide adequate visibility. Hadrian, on the other hand, offers a proactive approach by simulating hacker behavior to identify vulnerabilities and exposures. The platform provides a more comprehensive view by combining various aspects of offensive security, enabling organizations to prioritize their most critical vulnerabilities.</p><p>One of the key points Fischer discusses is Hadrian's event-driven architecture, which allows the system to detect changes in real-time and reassess vulnerabilities accordingly. This ensures continuous monitoring and timely responses to new threats, adapting to the ever-changing IT environments. Another significant aspect covered is Hadrian's use of AI and machine learning to enhance the context and flexibility of security testing. Fischer explains that AI is selectively applied to maximize efficiency and minimize false positives, thus allowing for smarter, more effective security assessments.</p><p>Fischer also shares insights on how Hadrian assists in automated risk remediation. The platform not only identifies vulnerabilities but also provides clear guidance and tools to address them. This is particularly beneficial for smaller security teams that may lack the resources to handle vast amounts of raw data generated by traditional vulnerability scanners. Additionally, Hadrian's ability to integrate with existing security controls and workflows is highlighted. Fischer notes the company's focus on user experience and the need for features that facilitate easy interaction with different stakeholders, such as IT teams and security engineers, for efficient risk management and remediation.</p><p>In conclusion, Rogier Fischer articulates that the true strength of Hadrian lies in its ability to offer a hacker’s perspective through advanced AI-driven tools, ensuring that organizations not only identify but also effectively mitigate risks. By doing so, Hadrian empowers businesses to stay ahead in the ever-evolving cybersecurity landscape.</p><p>Top Questions Addressed</p><ul><li>What drove the creation of Hadrian, and what gaps in the cybersecurity market does it fill?</li><li>How does Hadrian's event-driven architecture ensure continuous risk assessment and adaptation to changing environments?</li><li>How does Hadrian leverage AI and machine learning to improve the effectiveness of penetration testing and risk remediation?</li></ul><p>Learn more about Hadrian: <a href="https://itspm.ag/hadrian-5ei">https://itspm.ag/hadrian-5ei</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rogier Fischer</strong>, Co-Founder and CEO, Hadrian [<a href="https://x.com/hadriansecurity">@hadriansecurity</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rogierfischer/">https://www.linkedin.com/in/rogierfischer/</a></p><p><strong>Resources</strong></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25520278" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/f5b10436-d8f0-47e6-a899-26fdcf4c1dde/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=f5b10436-d8f0-47e6-a899-26fdcf4c1dde&amp;feed=kDNbmF_B"/>
      <itunes:title>Beyond Traditional Pen Testing for Continuous Risk Assessment | A Brand Story Conversation From RSA Conference 2024 | A Hadrian Story with Rogier Fischer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rogier Fischer</itunes:author>
      <itunes:duration>00:26:34</itunes:duration>
      <itunes:summary>Dive into the complexities of modern cybersecurity with Sean Martin and Hadrian co-founder Rogier Fischer as they explore how advanced AI-driven tools can outsmart traditional methods in vulnerability detection and risk management. Learn how Hadrian’s innovative event-driven architecture and selective AI application are revolutionizing the way organizations protect themselves from ever-evolving threats.</itunes:summary>
      <itunes:subtitle>Dive into the complexities of modern cybersecurity with Sean Martin and Hadrian co-founder Rogier Fischer as they explore how advanced AI-driven tools can outsmart traditional methods in vulnerability detection and risk management. Learn how Hadrian’s innovative event-driven architecture and selective AI application are revolutionizing the way organizations protect themselves from ever-evolving threats.</itunes:subtitle>
      <itunes:keywords>hadrian, marco ciappelli, pen testing, rsa conference, hacking, event-driven, sean martin, automation, cybersecurity, rogier fischer, vulnerability, risk management, exposure, prioritization, threat intelligence, continuous monitoring, breach detection, ethical hacking, attack surface, machine learning, ai, brand story, remediation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>38</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">804951a5-b33b-458d-90c0-d49bad5846fc</guid>
      <title>Is Your App Security Culture Leaving Out the Basics? | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping the industry today.</p><p>The discussion begins by exploring the potential and pitfalls of artificial intelligence (AI) in cybersecurity. Francesco highlights the dual role of AI as both a tool and a target within security frameworks. He emphasizes the importance of proper prompt engineering and specialized training data to avoid common issues, such as AI-generated libraries that don't actually exist. This leads to a broader conversation about how Phoenix Security utilizes AI to intelligently categorize and prioritize vulnerabilities, allowing security teams to focus on the most critical issues.</p><p>The conversation then shifts to the concept of maturity models in vulnerability management. Francesco explains that many organizations are still struggling with basic security tasks and describes how Phoenix Security helps these organizations to quickly enhance their maturity levels. This involves automating the scanning process, aggregating data, and providing clear metrics that align security efforts with executive expectations.</p><p>A significant portion of the episode is dedicated to the importance of collaboration and communication between security and development teams. Francesco stresses that security should be integrated into the spring planning process, helping developers to prioritize tasks in a way that aligns with overall risk management strategies. This approach fosters a culture of cooperation and ensures that security initiatives are seen as a valuable part of the development cycle, rather than a hindrance.</p><p>Francesco also touches on the role of management in security practices, underscoring the need for aligning business expectations with engineering practices. He introduces the vulnerability maturity model that Phoenix Security uses to help organizations mature their security programs effectively. This model, which maps back to established OWASP frameworks, provides a clear path for organizations to improve their security posture systematically.</p><p>The episode concludes with Francesco reflecting on the persistent basic security issues that organizations face and expressing optimism about the future. He is confident that Phoenix Security's approach can help businesses intelligently address these challenges and scale their security practices effectively.</p><p>Learn more about  Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 28 Jun 2024 02:28:25 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/is-your-app-security-culture-leaving-out-the-basics-a-brand-story-conversation-from-owasp-appsec-global-lisbon-2024-a-phoenix-security-story-with-francesco-cipollone-on-location-coverage-with-sean-martin-and-marco-ciappelli-KgODAujD</link>
      <content:encoded><![CDATA[<p>In this episode of the On Location, host Sean Martin engages in an insightful conversation with Francesco Cipollone, Co-founder and CEO of Phoenix Security, at the OWASP AppSec Global conference in Lisbon. They delve into the evolving landscape of application security, focusing on the pressing challenges and innovative solutions that are shaping the industry today.</p><p>The discussion begins by exploring the potential and pitfalls of artificial intelligence (AI) in cybersecurity. Francesco highlights the dual role of AI as both a tool and a target within security frameworks. He emphasizes the importance of proper prompt engineering and specialized training data to avoid common issues, such as AI-generated libraries that don't actually exist. This leads to a broader conversation about how Phoenix Security utilizes AI to intelligently categorize and prioritize vulnerabilities, allowing security teams to focus on the most critical issues.</p><p>The conversation then shifts to the concept of maturity models in vulnerability management. Francesco explains that many organizations are still struggling with basic security tasks and describes how Phoenix Security helps these organizations to quickly enhance their maturity levels. This involves automating the scanning process, aggregating data, and providing clear metrics that align security efforts with executive expectations.</p><p>A significant portion of the episode is dedicated to the importance of collaboration and communication between security and development teams. Francesco stresses that security should be integrated into the spring planning process, helping developers to prioritize tasks in a way that aligns with overall risk management strategies. This approach fosters a culture of cooperation and ensures that security initiatives are seen as a valuable part of the development cycle, rather than a hindrance.</p><p>Francesco also touches on the role of management in security practices, underscoring the need for aligning business expectations with engineering practices. He introduces the vulnerability maturity model that Phoenix Security uses to help organizations mature their security programs effectively. This model, which maps back to established OWASP frameworks, provides a clear path for organizations to improve their security posture systematically.</p><p>The episode concludes with Francesco reflecting on the persistent basic security issues that organizations face and expressing optimism about the future. He is confident that Phoenix Security's approach can help businesses intelligently address these challenges and scale their security practices effectively.</p><p>Learn more about  Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our OWASP AppSec Global Lisbon 2024 coverage: <a href="https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal" target="_blank">https://www.itspmagazine.com/owasp-global-2024-lisbon-application-security-event-coverage-in-portugal</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17030675" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0b6b5402-de26-40ab-80dd-4c91376bda95/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0b6b5402-de26-40ab-80dd-4c91376bda95&amp;feed=kDNbmF_B"/>
      <itunes:title>Is Your App Security Culture Leaving Out the Basics? | A Brand Story Conversation From OWASP AppSec Global Lisbon 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone</itunes:author>
      <itunes:duration>00:17:44</itunes:duration>
      <itunes:summary>In this On Location episode, Sean Martin chats with Francesco Cipollone, Co-founder and CEO of Phoenix Security, about the evolving landscape of application security and the role of AI in tackling persistent vulnerabilities. They explore effective strategies for enhancing security maturity and fostering collaboration between security and development teams, offering valuable insights and practical advice.</itunes:summary>
      <itunes:subtitle>In this On Location episode, Sean Martin chats with Francesco Cipollone, Co-founder and CEO of Phoenix Security, about the evolving landscape of application security and the role of AI in tackling persistent vulnerabilities. They explore effective strategies for enhancing security maturity and fostering collaboration between security and development teams, offering valuable insights and practical advice.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, sean martin, cybersecurity, francesco cipollone, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>37</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0484f014-d272-465e-ace1-19152d5ef033</guid>
      <title>Prioritizing Cyber Resilience for your Business | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A LevelBlue Brand Story with Theresa Lanowitz</title>
      <description><![CDATA[<p>We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just a few short hours – and leaders need to be prepared for recovery from an interruption to the networks, systems, or data that underpin their business. With the advent and proliferation of new technologies, there is more pressure than ever to secure organizations’ computing. Ultimately, the evolution of computing has forced businesses into a paradox of innovation and risk. They must balance technology with security and business resilience, which requires a new way of thinking.</p><ul><li>Conduct a thorough assessment of risk areas to understand the barriers across your IT estate.</li><li>Assess your organization’s dynamic computing initiatives and design security measures from the outset of implementation to ensure compliance and mitigate future risks.</li><li>Allocate resources strategically to align cybersecurity initiatives with business objectives across silos.</li><li>Forge partnerships with external collaborators to augment your organization’s security expertise.</li><li>Regularly adapt your approach to meet the demands of an evolving computing landscape and expanding attack surface.</li></ul><p>Learn more about LevelBlue: https://itspm.ag/levelblue266f6c </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 27 Jun 2024 22:18:03 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Theresa Lanowitz, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/prioritizing-cyber-resilience-for-your-business-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-levelblue-story-with-theresa-lanowitz-jC_wzo7p</link>
      <content:encoded><![CDATA[<p>We are in the era of dynamic computing – and while that gives way to innovation, it also escalates the risks every business faces. Computing no longer occurs solely within the perimeter, and cybersecurity threats are increasingly more sophisticated. In fact, organizations today operate in a climate where entire systems can be taken offline in just a few short hours – and leaders need to be prepared for recovery from an interruption to the networks, systems, or data that underpin their business. With the advent and proliferation of new technologies, there is more pressure than ever to secure organizations’ computing. Ultimately, the evolution of computing has forced businesses into a paradox of innovation and risk. They must balance technology with security and business resilience, which requires a new way of thinking.</p><ul><li>Conduct a thorough assessment of risk areas to understand the barriers across your IT estate.</li><li>Assess your organization’s dynamic computing initiatives and design security measures from the outset of implementation to ensure compliance and mitigate future risks.</li><li>Allocate resources strategically to align cybersecurity initiatives with business objectives across silos.</li><li>Forge partnerships with external collaborators to augment your organization’s security expertise.</li><li>Regularly adapt your approach to meet the demands of an evolving computing landscape and expanding attack surface.</li></ul><p>Learn more about LevelBlue: https://itspm.ag/levelblue266f6c </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6986696" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/671d84c3-d3e3-49ab-ab4d-68756201a10b/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=671d84c3-d3e3-49ab-ab4d-68756201a10b&amp;feed=kDNbmF_B"/>
      <itunes:title>Prioritizing Cyber Resilience for your Business | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A LevelBlue Brand Story with Theresa Lanowitz</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Theresa Lanowitz, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:16</itunes:duration>
      <itunes:summary>Join Sean Martin and Theresa Lanowitz, Chief Evangelist, to hear how LevelBlue simplifies securing your most valuable business assets by providing broad cybersecurity experience and award-winning services to find that critical balance between resilience and innovation in cybersecurity. Discover how businesses can adapt to new risks while driving digital transformation and enhancing their cyber resilience strategies.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Theresa Lanowitz, Chief Evangelist, to hear how LevelBlue simplifies securing your most valuable business assets by providing broad cybersecurity experience and award-winning services to find that critical balance between resilience and innovation in cybersecurity. Discover how businesses can adapt to new risks while driving digital transformation and enhancing their cyber resilience strategies.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, rsa conference, ciso, sean martin, cybersecurity, cybersecurity-as-a-service, managed detection and response, endpoint security, innovation, resilience, levelblue, managed xdr, chief evangelist, rsa conference 2024, edge computing, cio, threat detection and response, theresa lanowitz, service level agreements, futures report, digital transformation, ceo</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>36</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fab0a31c-decd-464a-8080-236bbc744ea0</guid>
      <title>Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Brand Story with Benny Lakunishok</title>
      <description><![CDATA[<p>Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.</p><p>As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can’t have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.</p><p>Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.</p><p>See the platform for yourself - reach out to us at <a href="http://zeronetworks.com" target="_blank">zeronetworks.com</a> for a demo.</p><p>Learn more about Zero Networks: <a href="https://itspm.ag/zeronet-al2d2">https://itspm.ag/zeronet-al2d2</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Benny Lakunishok</strong>, Co-Founder and CEO, Zero Networks [<a href="https://x.com/zeronetworks">@ZeroNetworks</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/bennyl/" target="_blank">https://www.linkedin.com/in/bennyl/</a></p><p>On Twitter | <a href="https://x.com/lakunishok" target="_blank">https://x.com/lakunishok</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Zero Networks: <a href="http://www.itspmagazine.com/directory/zero-networks" target="_blank">www.itspmagazine.com/directory/zero-networks</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 21 Jun 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Benny Lakunishok)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/demystifying-microsegmentation-7-minutes-on-itspmagazine-a-zero-networks-story-with-benny-lakunishok-n6eZWiYF</link>
      <content:encoded><![CDATA[<p>Earlier this year, the NSA released updated zero-trust guidance in which microsegmentation is listed as a daunting, advanced endeavor, only suitable to the most mature organizations. Zero Networks is committed to challenging this sentiment. While some may hesitate, thinking microsegmentation is beyond their reach, we urge organizations to reconsider. Waiting is not an option when it comes to securing your network against evolving threats. By prioritizing microsegmentation, you're taking a proactive stance against unauthorized lateral movement, thwarting advanced attacks, and effectively blocking ransomware. Zero Networks has helped organizations of all sizes, maturity, and complexity levels to deploy our radically simple microsegmentation solution in a click, without breaking anything, and with little to no effort.</p><p>As ransomware attacks double, microsegmentation has been hailed by Gartner, Forrester, the NSA, and leading security trade media outlets, as the most promising solution for halting lateral movement and satisfying zero trust guidelines. You can’t have a zero trust architecture without microsegmentation – but you also need to implement a solution quickly, without breaking anything, and without extensive costs and complexities. Zero Networks offers exactly this solution. Zero Networks' microsegmentation solution locks down lateral movement, effectively stranding hackers and preventing them from spreading ransomware. For an added layer of security, we apply MFA authentication to the network layer, allowing organizations to protect assets that could not be easily protected by MFA before: legacy applications, databases, OT/IoT devices, mainframes, on-prem VMs, and IaaS VMs. Our just-in-time MFA also applies an additional layer of security to privileged remote admin protocols like RDP, SSH, and WinRM – commonly exploited by attackers. This also supports organizations with compliance needs. “Never trust, always verify” comes automatically with Zero Networks.</p><p>Zero Networks' microsegmentation solution provides agentless, automated, and multi-factor authentication (MFA) powered architecture. By monitoring and learning all network connections over a 30-day period, Zero Networks creates precise firewall rules that are centrally applied to all assets. This agentless architecture ensures that every asset, whether on-premises or in the cloud, including OT/IoT devices, is segmented without disrupting normal operations. One of the key challenges with traditional microsegmentation solutions is their complexity and associated costs. Forrester highlights the difficulty in quantifying the business benefits of microsegmentation due to its indirect impact on productivity and user experience. A global independent investment bank, Evercore, was undergoing the major challenge of effectively responding to an incident when a workstation was compromised, and a threat actor was able to gain access to their network to move laterally. They had firewalls, whitelists, blacklists and other measures that could slow them down but nothing that could immediately shut them down. Chris Turek, CIO of Evercore, said “Zero Networks is creating a new sphere of security capabilities.</p><p>See the platform for yourself - reach out to us at <a href="http://zeronetworks.com" target="_blank">zeronetworks.com</a> for a demo.</p><p>Learn more about Zero Networks: <a href="https://itspm.ag/zeronet-al2d2">https://itspm.ag/zeronet-al2d2</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Benny Lakunishok</strong>, Co-Founder and CEO, Zero Networks [<a href="https://x.com/zeronetworks">@ZeroNetworks</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/bennyl/" target="_blank">https://www.linkedin.com/in/bennyl/</a></p><p>On Twitter | <a href="https://x.com/lakunishok" target="_blank">https://x.com/lakunishok</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Zero Networks: <a href="http://www.itspmagazine.com/directory/zero-networks" target="_blank">www.itspmagazine.com/directory/zero-networks</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6835022" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6aaed5a7-a13d-49e3-b3f9-47c4ff411ff0/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6aaed5a7-a13d-49e3-b3f9-47c4ff411ff0&amp;feed=kDNbmF_B"/>
      <itunes:title>Demystifying Microsegmentation | 7 Minutes on ITSPmagazine | A Zero Networks Brand Story with Benny Lakunishok</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Benny Lakunishok</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:07</itunes:duration>
      <itunes:summary>In this 7 Minutes on ITSPmagazine Short Brand Story, Sean is joined by Benny Lakunishok, Co-Founder and CEO at Zero Networks, the company offering a simple, fully automated platform with three core capabilities designed to make true Zero Trust architecture a reality for enterprises of any size: network segmentation, identity segmentation, and secure remote access. Microsegmentation as a step in achieving security maturity is not only for advanced companies, but it can also be achieved by organizations of all sizes, maturity, and complexity.</itunes:summary>
      <itunes:subtitle>In this 7 Minutes on ITSPmagazine Short Brand Story, Sean is joined by Benny Lakunishok, Co-Founder and CEO at Zero Networks, the company offering a simple, fully automated platform with three core capabilities designed to make true Zero Trust architecture a reality for enterprises of any size: network segmentation, identity segmentation, and secure remote access. Microsegmentation as a step in achieving security maturity is not only for advanced companies, but it can also be achieved by organizations of all sizes, maturity, and complexity.</itunes:subtitle>
      <itunes:keywords>mfa, architecture, marco ciappelli, ztna, servers, sean martin, machine, automation, network, cybersecurity, identity segmentation, microsegmentation, remote access, hybrid, cloud, platform, protocols, benny lakunishok, visibility, iot, zero trust, zeronetworks</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>35</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">5b7283b9-4094-4d5a-8cab-0e8271dba18d</guid>
      <title>The Focus on Community and Empathy-Driven Culture Behind BlackCloak&apos;s Success in Attracting Passionate Professionals | A BlackCloak Brand Story with Chris Pierson, Matt Covington, and Ryan Black</title>
      <description><![CDATA[<p>In this BlackCLoak Brand Story, hosts Sean Martin and Marco Ciappelli engage in an in-depth conversation with Founder Chris Pierson, Chief Information Security Officer Ryan Black, and Product Manager Matt Covington. The discussion explores the company’s dedication to protecting security and privacy for CISOs, executives, and high-net-worth individuals.</p><p>The episode kicks off with Martin and Ciappelli extending a warm welcome to Pierson, Black, and Covington while highlighting the mission-driven approach of BlackCloak. Pierson elaborates on BlackCloak’s unique focus on protecting not just organizations but also extending security measures to the personal lives of executives and their families. This connection underscores the significance of safeguarding home environments, which are increasingly becoming targets for cyberattacks.</p><p>Covington shares his intriguing journey from having a master's degree in literary theory to becoming involved in cybersecurity, emphasizing the importance of empathy in product development. He explains how BlackCloak's technology seeks to scale its services efficiently by automating repetitive tasks, thereby allowing their experts to focus on critical problem-solving for clients.</p><p>Throughout the conversation, Ryan Black describes the flexible, personalized concierge service that BlackCloak offers, aimed at addressing the unique security needs of individuals outside the corporate framework. He emphasizes that their approach goes beyond traditional enterprise security, focusing on protecting personal devices and networks that executives use at home.</p><p>The episode also touches on the emotional and psychological aspects of cybersecurity, illustrating how personal experiences with phishing attacks have driven both Black and Covington in their professional paths. The hosts and guests also discuss the personal side of cybersecurity, addressing behavioral vulnerabilities and the integration of user-friendly technology in personal security measures.</p><p>Finally, the session highlights the collaborative and proactive culture at Black Cloak, where team members are committed to going above and beyond to protect their clients. This episode offers listeners valuable insights into how BlackCloak is pioneering an empathetic and comprehensive approach to cybersecurity.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more: https://www.itspmagazine.com/their-infosec-story</i></a></p><p><strong>Guests: </strong></p><p><strong>Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Ryan Black</strong>, Chief Information Security Officer, BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryancblack/">https://www.linkedin.com/in/ryancblack/</a></p><p><strong>Matt Covington</strong>, VP of Product, BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/mecovington/">https://www.linkedin.com/in/mecovington/</a></p><p><strong>Resources</strong><br />Learn more about BlackCloak and their offering: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>BlackCloak welcomes Ryan Black: <a href="https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5z" target="_blank">https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5z</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 17 Jun 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, Chris Pierson, Ryan Black, Matt Covington)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-focus-on-community-and-empathy-driven-culture-behind-blackcloaks-success-in-attracting-passionate-professionals-a-blackcloak-brand-story-with-chris-pierson-matt-covington-and-ryan-black-CHhJZb9j</link>
      <content:encoded><![CDATA[<p>In this BlackCLoak Brand Story, hosts Sean Martin and Marco Ciappelli engage in an in-depth conversation with Founder Chris Pierson, Chief Information Security Officer Ryan Black, and Product Manager Matt Covington. The discussion explores the company’s dedication to protecting security and privacy for CISOs, executives, and high-net-worth individuals.</p><p>The episode kicks off with Martin and Ciappelli extending a warm welcome to Pierson, Black, and Covington while highlighting the mission-driven approach of BlackCloak. Pierson elaborates on BlackCloak’s unique focus on protecting not just organizations but also extending security measures to the personal lives of executives and their families. This connection underscores the significance of safeguarding home environments, which are increasingly becoming targets for cyberattacks.</p><p>Covington shares his intriguing journey from having a master's degree in literary theory to becoming involved in cybersecurity, emphasizing the importance of empathy in product development. He explains how BlackCloak's technology seeks to scale its services efficiently by automating repetitive tasks, thereby allowing their experts to focus on critical problem-solving for clients.</p><p>Throughout the conversation, Ryan Black describes the flexible, personalized concierge service that BlackCloak offers, aimed at addressing the unique security needs of individuals outside the corporate framework. He emphasizes that their approach goes beyond traditional enterprise security, focusing on protecting personal devices and networks that executives use at home.</p><p>The episode also touches on the emotional and psychological aspects of cybersecurity, illustrating how personal experiences with phishing attacks have driven both Black and Covington in their professional paths. The hosts and guests also discuss the personal side of cybersecurity, addressing behavioral vulnerabilities and the integration of user-friendly technology in personal security measures.</p><p>Finally, the session highlights the collaborative and proactive culture at Black Cloak, where team members are committed to going above and beyond to protect their clients. This episode offers listeners valuable insights into how BlackCloak is pioneering an empathetic and comprehensive approach to cybersecurity.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more: https://www.itspmagazine.com/their-infosec-story</i></a></p><p><strong>Guests: </strong></p><p><strong>Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Ryan Black</strong>, Chief Information Security Officer, BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/ryancblack/">https://www.linkedin.com/in/ryancblack/</a></p><p><strong>Matt Covington</strong>, VP of Product, BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/mecovington/">https://www.linkedin.com/in/mecovington/</a></p><p><strong>Resources</strong><br />Learn more about BlackCloak and their offering: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>BlackCloak welcomes Ryan Black: <a href="https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5z" target="_blank">https://www.linkedin.com/posts/blackcloak_personalcybersecurity-cybersecurity-executiveprotection-activity-7198293889777098752-Bd5z</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="36572792" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/6d718b20-7abd-404d-bdb3-698693f0f073/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=6d718b20-7abd-404d-bdb3-698693f0f073&amp;feed=kDNbmF_B"/>
      <itunes:title>The Focus on Community and Empathy-Driven Culture Behind BlackCloak&apos;s Success in Attracting Passionate Professionals | A BlackCloak Brand Story with Chris Pierson, Matt Covington, and Ryan Black</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, Chris Pierson, Ryan Black, Matt Covington</itunes:author>
      <itunes:duration>00:38:05</itunes:duration>
      <itunes:summary>Discover how BlackCloak takes cybersecurity beyond the enterprise, extending critical protection to the personal lives of executives and their families. Join hosts Sean Martin and Marco Ciappelli as they discuss the importance of empathy, innovation, and personalized service in today&apos;s security landscape with Founder Chris Pierson and two new BlackCloak hires, Ryan Black and Matt Covington.</itunes:summary>
      <itunes:subtitle>Discover how BlackCloak takes cybersecurity beyond the enterprise, extending critical protection to the personal lives of executives and their families. Join hosts Sean Martin and Marco Ciappelli as they discuss the importance of empathy, innovation, and personalized service in today&apos;s security landscape with Founder Chris Pierson and two new BlackCloak hires, Ryan Black and Matt Covington.</itunes:subtitle>
      <itunes:keywords>security culture, chris pierson, technology, marco ciappelli, matt covington, ciso, sean martin, blackcloak, personal security, cybersecurity, vulnerability, security team, innovation, executive protection, concierge service, empathy, black cloak, ryan black, ryan black, product management, privacy, high net worth</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>34</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">99b1dd55-7f7e-45ff-b6e6-2571a011bb04</guid>
      <title>Directly From The CORO Security Modular Booth: Expansion Into The European Market | A Brand Story Conversation From InfoSecurity Europe 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market.</p><p><strong>Day Three: Nonstop Conversations and Presentations</strong></p><p>From the get-go, Dror shares his enthusiasm about being part of this prestigious event for the first time. With a primary presence in the U.S., CORO is now aggressively moving into EMEA, starting right here in London. This move is in response to increasing demand from small to medium-sized enterprises (SMEs) in Europe who need robust cybersecurity solutions.</p><p><strong>Addressing the Security Needs of SMEs</strong></p><p>Sean recalls the comprehensive capabilities of CORO discussed in previous episodes. CORO provides multiple layers of security tailored to an organization’s specific needs, such as regulatory requirements, budget, and staffing capabilities. Sean encourages everyone to revisit those insightful seven-minute chats from RSA Conference to get an in-depth view.</p><p>Dror emphasizes that CORO is unique in targeting the mid-market from the ground up, unlike other companies that retrofit enterprise solutions to fit smaller businesses. With a focus on simplicity and powerful protection, CORO ensures that its solutions are manageable even for lean IT teams.</p><p><strong>Navigating the Complexities of Europe</strong></p><p>One of the significant discussions revolves around the differences between the U.S. and European markets. While Sean and Dror acknowledge the similar types of cyber threats faced globally, operational nuances like data residency and privacy regulations differ widely across Europe. CORO has established a data center in Germany to comply with local data residency requirements, ensuring that email and file inspections stay within the EU boundaries.</p><p><strong>Real-World Applications and Challenges</strong></p><p>Sean drives the conversation into the specific challenges CORO has faced and the different attack scenarios in Europe compared to the U.S. Dror mentions that while SME awareness of being targets has been prevalent in the U.S. for a while, European SMEs are just beginning to realize the same. As a result, CORO is educating this market about the imminent threats and how to efficiently protect against them without becoming overwhelmed.</p><p><strong>The Importance of Affordability</strong></p><p>Dror and Sean discuss the financial challenges faced by SMEs, such as difficult decisions on whether to invest in cybersecurity or other critical needs like educational resources. Dror emphasizes that CORO has priced its suite of security solutions to remove this barrier, making comprehensive coverage affordable for even the smallest enterprises.</p><p><strong>Team and Technology: The Backbone of CORO</strong></p><p>The conversation takes a moment to appreciate CORO’s dedicated team. Sean praises the high energy and mutual support visible at CORO’s booth. Dror points out that customer reviews often highlight how easy it is to work with CORO—a testimony to the company’s dedication to protecting overlooked small and mid-sized businesses.</p><p><strong>The Future of SME Cybersecurity</strong></p><p>CORO aims to remove the guesswork ("threat roulette”) for SMEs by providing an all-encompassing platform that is accessible and easy to manage. This approach ensures that small businesses can protect themselves comprehensively without the need to prioritize between different threat vectors due to budget constraints.</p><p><strong>CORO’s Mission</strong></p><p>As the conversation winds down, Dror reiterates CORO's mission to protect SMEs globally and make cybersecurity as effortless as possible. Sean encourages attendees of Infosecurity Europe to visit CORO's dynamic and innovative booth, and for those who cannot make it, to check out CORO online. For more information, visit CORO's website at Coro.net</p><p>Thanks to everyone for joining us. Expect more exciting updates from CORO, possibly next time from Las Vegas!</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 7 Jun 2024 02:04:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/directly-from-the-coro-security-modular-booth-expansion-into-the-european-market-a-brand-story-conversation-from-infosecurity-europe-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-FiAyTz0j</link>
      <content:encoded><![CDATA[<p>Here we are, once again from the bustling show floor at Infosecurity Europe 2024 in London, situated at the Excel Centre. Sean Martin of ITSP Magazine is your host, and he's joined by Dror Liwer, co-founder of CORO Security. Both are excited to dive deep into how CORO is expanding its focus into the European market.</p><p><strong>Day Three: Nonstop Conversations and Presentations</strong></p><p>From the get-go, Dror shares his enthusiasm about being part of this prestigious event for the first time. With a primary presence in the U.S., CORO is now aggressively moving into EMEA, starting right here in London. This move is in response to increasing demand from small to medium-sized enterprises (SMEs) in Europe who need robust cybersecurity solutions.</p><p><strong>Addressing the Security Needs of SMEs</strong></p><p>Sean recalls the comprehensive capabilities of CORO discussed in previous episodes. CORO provides multiple layers of security tailored to an organization’s specific needs, such as regulatory requirements, budget, and staffing capabilities. Sean encourages everyone to revisit those insightful seven-minute chats from RSA Conference to get an in-depth view.</p><p>Dror emphasizes that CORO is unique in targeting the mid-market from the ground up, unlike other companies that retrofit enterprise solutions to fit smaller businesses. With a focus on simplicity and powerful protection, CORO ensures that its solutions are manageable even for lean IT teams.</p><p><strong>Navigating the Complexities of Europe</strong></p><p>One of the significant discussions revolves around the differences between the U.S. and European markets. While Sean and Dror acknowledge the similar types of cyber threats faced globally, operational nuances like data residency and privacy regulations differ widely across Europe. CORO has established a data center in Germany to comply with local data residency requirements, ensuring that email and file inspections stay within the EU boundaries.</p><p><strong>Real-World Applications and Challenges</strong></p><p>Sean drives the conversation into the specific challenges CORO has faced and the different attack scenarios in Europe compared to the U.S. Dror mentions that while SME awareness of being targets has been prevalent in the U.S. for a while, European SMEs are just beginning to realize the same. As a result, CORO is educating this market about the imminent threats and how to efficiently protect against them without becoming overwhelmed.</p><p><strong>The Importance of Affordability</strong></p><p>Dror and Sean discuss the financial challenges faced by SMEs, such as difficult decisions on whether to invest in cybersecurity or other critical needs like educational resources. Dror emphasizes that CORO has priced its suite of security solutions to remove this barrier, making comprehensive coverage affordable for even the smallest enterprises.</p><p><strong>Team and Technology: The Backbone of CORO</strong></p><p>The conversation takes a moment to appreciate CORO’s dedicated team. Sean praises the high energy and mutual support visible at CORO’s booth. Dror points out that customer reviews often highlight how easy it is to work with CORO—a testimony to the company’s dedication to protecting overlooked small and mid-sized businesses.</p><p><strong>The Future of SME Cybersecurity</strong></p><p>CORO aims to remove the guesswork ("threat roulette”) for SMEs by providing an all-encompassing platform that is accessible and easy to manage. This approach ensures that small businesses can protect themselves comprehensively without the need to prioritize between different threat vectors due to budget constraints.</p><p><strong>CORO’s Mission</strong></p><p>As the conversation winds down, Dror reiterates CORO's mission to protect SMEs globally and make cybersecurity as effortless as possible. Sean encourages attendees of Infosecurity Europe to visit CORO's dynamic and innovative booth, and for those who cannot make it, to check out CORO online. For more information, visit CORO's website at Coro.net</p><p>Thanks to everyone for joining us. Expect more exciting updates from CORO, possibly next time from Las Vegas!</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19983234" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/35c43a58-c965-4c06-8b1f-16af66b37592/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=35c43a58-c965-4c06-8b1f-16af66b37592&amp;feed=kDNbmF_B"/>
      <itunes:title>Directly From The CORO Security Modular Booth: Expansion Into The European Market | A Brand Story Conversation From InfoSecurity Europe 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:duration>00:20:48</itunes:duration>
      <itunes:summary>Join us as Sean Martin hosts CORO Security’s Dror Liwer live from the show floor at Infosecurity Europe 2024 in London, where they discuss CORO&apos;s mission to protect SMEs across the globe.</itunes:summary>
      <itunes:subtitle>Join us as Sean Martin hosts CORO Security’s Dror Liwer live from the show floor at Infosecurity Europe 2024 in London, where they discuss CORO&apos;s mission to protect SMEs across the globe.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, small business protection, threat landscape, sean martin, secure enterprise solutions, cybersecurity, data residency, itsp magazine, coro security, automated security, endpoint security, cybersecurity sme, cybersecurity platform, cybersecurity education, dror liwer, phishing protection, mid-market protection, cloud security, privacy regulations, infosecurity europe 2024, brand story, coro, ransomware protection, emea market</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>33</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0198c42c-a08f-4a1f-907d-8cee43d873b6</guid>
      <title>Meet Phoenix Security | A Brand Story Conversation From Infosecurity Europe 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix Security, to discuss the company’s journey, achievements, and unique value propositions, highlighting their significant impact within the cybersecurity community.</p><p><strong>Setting the Stage</strong></p><p>The bustling environment of Infosecurity Europe 2024 serves as the backdrop for an engaging conversation about the latest cybersecurity trends. Martin and Cipollone delve into Phoenix Security’s origins as an internal project at HSBC, aimed at addressing engineer burnout by improving communication and prioritization in vulnerability management.</p><p><strong>Phoenix Security’s Journey and Vision</strong></p><p>Cipollone explains how Phoenix Security was created to help engineers avoid burnout, originally focusing on solving communication and prioritization challenges in vulnerability management. This initiative quickly evolved into a comprehensive solution that bridges the gap between security and engineering teams by providing actionable risk assessments and automating decision-making processes.</p><p><strong>Innovative Solutions for Modern Cybersecurity Challenges</strong></p><p>Phoenix Security stands out by offering powerful tools that streamline vulnerability management across enterprise systems. Their platform allows for better scheduling of workloads and prioritization of tasks, significantly reducing the time it takes to address vulnerabilities from hours to just minutes. This efficiency not only prevents engineer burnout but also ensures that security measures are implemented effectively.</p><p><strong>Success Stories and Client Feedback</strong></p><p>Cipollone shares success stories from clients like ClearBank, who have benefited from real-time, up-to-date asset inventory and operational insights. By using Phoenix Security, these organizations can engage in informed risk-based decision-making, enabling security teams to focus on high-impact vulnerabilities and maximize risk reduction.</p><p><strong>Expanding Reach Through Strategic Partnerships</strong></p><p>Highlighting the importance of collaboration, Cipollone mentions Phoenix Security’s recent partnership with Booncheck. This partnership integrates advanced threat intelligence into the Phoenix platform, offering clients access to a wealth of vulnerability data and enabling more effective risk management strategies.</p><p><strong>Conclusion</strong></p><p>The conversation concludes with insights into future security trends and Phoenix Security’s commitment to innovation and community-driven solutions. Cipollone emphasizes that Phoenix Security aims to simplify decision-making processes, giving engineers and security professionals more time to focus on what truly matters.</p><p>We encourage all ITSPmagazine viewers and listeners to connect with the Phoenix team, download their new book, and stay tuned for more updates from Infosecurity Europe 2024.</p><p>Learn more about Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 6 Jun 2024 21:01:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/meet-phoenix-security-a-brand-story-conversation-from-infosecurity-europe-2024-a-phoenix-security-story-with-francesco-cipollone-on-location-coverage-with-sean-martin-and-marco-ciappelli-xVDPYwBa</link>
      <content:encoded><![CDATA[<p>In the dynamic and ever-changing world of cybersecurity, it is crucial to remain at the forefront of addressing vulnerabilities, implementing innovative solutions, and getting to know companies that are making a differences in this industry. At Infosecurity Europe 2024 in London, Sean Martin sits down with Francesco Cipollone, co-founder of Phoenix Security, to discuss the company’s journey, achievements, and unique value propositions, highlighting their significant impact within the cybersecurity community.</p><p><strong>Setting the Stage</strong></p><p>The bustling environment of Infosecurity Europe 2024 serves as the backdrop for an engaging conversation about the latest cybersecurity trends. Martin and Cipollone delve into Phoenix Security’s origins as an internal project at HSBC, aimed at addressing engineer burnout by improving communication and prioritization in vulnerability management.</p><p><strong>Phoenix Security’s Journey and Vision</strong></p><p>Cipollone explains how Phoenix Security was created to help engineers avoid burnout, originally focusing on solving communication and prioritization challenges in vulnerability management. This initiative quickly evolved into a comprehensive solution that bridges the gap between security and engineering teams by providing actionable risk assessments and automating decision-making processes.</p><p><strong>Innovative Solutions for Modern Cybersecurity Challenges</strong></p><p>Phoenix Security stands out by offering powerful tools that streamline vulnerability management across enterprise systems. Their platform allows for better scheduling of workloads and prioritization of tasks, significantly reducing the time it takes to address vulnerabilities from hours to just minutes. This efficiency not only prevents engineer burnout but also ensures that security measures are implemented effectively.</p><p><strong>Success Stories and Client Feedback</strong></p><p>Cipollone shares success stories from clients like ClearBank, who have benefited from real-time, up-to-date asset inventory and operational insights. By using Phoenix Security, these organizations can engage in informed risk-based decision-making, enabling security teams to focus on high-impact vulnerabilities and maximize risk reduction.</p><p><strong>Expanding Reach Through Strategic Partnerships</strong></p><p>Highlighting the importance of collaboration, Cipollone mentions Phoenix Security’s recent partnership with Booncheck. This partnership integrates advanced threat intelligence into the Phoenix platform, offering clients access to a wealth of vulnerability data and enabling more effective risk management strategies.</p><p><strong>Conclusion</strong></p><p>The conversation concludes with insights into future security trends and Phoenix Security’s commitment to innovation and community-driven solutions. Cipollone emphasizes that Phoenix Security aims to simplify decision-making processes, giving engineers and security professionals more time to focus on what truly matters.</p><p>We encourage all ITSPmagazine viewers and listeners to connect with the Phoenix team, download their new book, and stay tuned for more updates from Infosecurity Europe 2024.</p><p>Learn more about Phoenix Security: <a href="https://itspm.ag/phoenix-security-sx8v">https://itspm.ag/phoenix-security-sx8v</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Francesco Cipollone</strong>, CEO & Founder at Phoenix Security [<a href="https://twitter.com/sec_phoenix">@sec_phoenix</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/fracipo/" target="_blank">https://www.linkedin.com/in/fracipo/</a></p><p>On Twitter | <a href="https://twitter.com/FrankSEC42" target="_blank">https://twitter.com/FrankSEC42</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Phoenix Security: <a href="https://www.itspmagazine.com/directory/phoenix-security">https://www.itspmagazine.com/directory/phoenix-security</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20156617" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/334f7971-47de-4fe5-a230-6e9d2d32950f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=334f7971-47de-4fe5-a230-6e9d2d32950f&amp;feed=kDNbmF_B"/>
      <itunes:title>Meet Phoenix Security | A Brand Story Conversation From Infosecurity Europe 2024 | A Phoenix Security Story with Francesco Cipollone | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Francesco Cipollone</itunes:author>
      <itunes:duration>00:20:59</itunes:duration>
      <itunes:summary>Join Sean Martin and Francesco Cipollone for an insightful discussion on Phoenix Security, live from Infosecurity Europe 2024 in London.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Francesco Cipollone for an insightful discussion on Phoenix Security, live from Infosecurity Europe 2024 in London.</itunes:subtitle>
      <itunes:keywords>booncheck partnership, enterprise security solutions, cyber threat intelligence, marco ciappelli, asset inventory, sean martin, engineering prioritization, cybersecurity, cybersecurity, cybersecurity innovations, application security, clearbank case study, risk management, engineering burnout, francesco cipollone, risk reduction, infosecurity europe 2024, community-driven security, vulnerability management, brand story, infrastructure security, automated risk formula, phoenix security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>32</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">171d7792-3113-4381-8cd7-d775e6ee92e9</guid>
      <title>The Latest Insights in Cybersecurity Resilience and The Ongoing Battle Against DDoS Attacks | A Brand Story Conversation From Infosecurity Europe 2024 | An Akamai Story with Richard Meeus | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distributed denial of service (DDoS) attacks.</p><p><strong>The High Energy at Infosecurity Europe 2024</strong></p><p>Sean Martin kicks off the conversation by highlighting the vibrant atmosphere at Infosecurity Europe. With a bustling crowd and high energy, it's the perfect setting to look and discuss pressing cybersecurity topics. Richard Meeus appreciates the opportunity to be part of this lively event and shares his excitement for the discussions ahead.</p><p><strong>The Importance of Resilience</strong></p><p>In recent months, Sean has noticed a growing emphasis on the concept of resilience in cybersecurity conversations. Notably, both Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) are prioritizing resilience to safeguard their organizations. Richard shares his perspective, emphasizing the critical importance of resilience, especially in Europe. He points out that new legislations like NIST 2 and DORA are driving organizations to focus on maintaining the availability of their systems.</p><p><strong>The Rise in DDoS Attacks</strong></p><p>Transitioning to the main topic, Sean and Richard discuss the alarming increase in DDoS attacks observed in EMEA (Europe, the Middle East, and Africa). Over the past few years, there has been a significant surge in such attacks, with notable activity driven by hacktivists rather than traditional criminal actors. Richard explains that hacktivists use DDoS attacks to make a statement, often targeting high-profile organizations to maximize their impact.</p><p><strong>The Role of Akamai in Protecting Against DDoS</strong></p><p>Richard explains Akamai's pivotal role in defending against DDoS attacks. He highlights Akamai's extensive cloud protection service, boasting a global network with 2,400 points of presence (PoPs). This vast infrastructure allows Akamai to protect some of the world's largest and most prominent brands.</p><p>Richard explains the importance of shifting the burden of DDoS defense to the cloud to handle the massive attack traffic. Akamai's scrubbing centers, strategically located worldwide, meticulously clean the incoming traffic, ensuring only legitimate requests reach the client's systems.</p><p><strong>Evolution of DDoS Attacks</strong></p><p>Sean invites Richard to provide an overview of how DDoS attacks have evolved over the years. While some traditional tactics like sin floods remain prevalent, there has been a resurgence of older techniques like water torture attacks targeting DNS. Richard emphasizes that organizations must protect their entire infrastructure, including APIs, which are increasingly becoming the target of such attacks.</p><p><strong>The Financial Sector: A Prime Target</strong></p><p>The financial sector is frequently targeted by DDoS attacks, according to Richard. He stresses that the trust customers place in financial institutions is heavily reliant on the availability of their digital services. Any disruption can erode this trust and have a significant material impact on the organization's reputation and customer confidence.</p><p><strong>Comprehensive Protection Strategy</strong></p><p>Richard underscores the importance of a comprehensive protection strategy for organizations facing the threat of DDoS attacks. By leveraging Akamai's global network and sophisticated scrubbing techniques, organizations can effectively mitigate the impact of these attacks. The combination of automated defenses and skilled SOC teams ensures real-time protection and rapid response to evolving threats.</p><p>In this conversation, Sean and Richard reiterate the significance of maintaining trust and resilience in the face of growing cyber threats. With the right strategies, partnerships, and technologies, organizations can safeguard their digital presence and continue to deliver reliable services to their customers.</p><p>For more in-depth insights, be sure to check out Akamai's latest report and explore their extensive back catalog of valuable cybersecurity resources</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Richard Meeus</strong>, Director, Security Technology and Strategy, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/richard-meeus/">https://www.linkedin.com/in/richard-meeus/</a></p><p><strong>Resources</strong></p><p>Fighting the Heat: EMEA’s Rising DDoS Threats: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 4 Jun 2024 22:32:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Richard Meeus)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-latest-insights-in-cybersecurity-resilience-and-the-ongoing-battle-against-ddos-attacks-a-brand-story-conversation-from-infosecurity-europe-2024-an-akamai-story-with-richard-meeus-on-location-coverage-with-sean-martin-and-marco-ciappelli-Wa6DV8Y5</link>
      <content:encoded><![CDATA[<p>Welcome to a brand-new episode of On Location with Sean Martin and Marco Ciappelli at Infosecurity Europe 2024 in London. Today, Sean hosts a very special guest, Richard Meeus, Director of Security Technology and Strategy, EMEA at Akamai, who will provide us with valuable insights into cybersecurity resilience and the evolving landscape of distributed denial of service (DDoS) attacks.</p><p><strong>The High Energy at Infosecurity Europe 2024</strong></p><p>Sean Martin kicks off the conversation by highlighting the vibrant atmosphere at Infosecurity Europe. With a bustling crowd and high energy, it's the perfect setting to look and discuss pressing cybersecurity topics. Richard Meeus appreciates the opportunity to be part of this lively event and shares his excitement for the discussions ahead.</p><p><strong>The Importance of Resilience</strong></p><p>In recent months, Sean has noticed a growing emphasis on the concept of resilience in cybersecurity conversations. Notably, both Chief Information Security Officers (CISOs) and Chief Information Officers (CIOs) are prioritizing resilience to safeguard their organizations. Richard shares his perspective, emphasizing the critical importance of resilience, especially in Europe. He points out that new legislations like NIST 2 and DORA are driving organizations to focus on maintaining the availability of their systems.</p><p><strong>The Rise in DDoS Attacks</strong></p><p>Transitioning to the main topic, Sean and Richard discuss the alarming increase in DDoS attacks observed in EMEA (Europe, the Middle East, and Africa). Over the past few years, there has been a significant surge in such attacks, with notable activity driven by hacktivists rather than traditional criminal actors. Richard explains that hacktivists use DDoS attacks to make a statement, often targeting high-profile organizations to maximize their impact.</p><p><strong>The Role of Akamai in Protecting Against DDoS</strong></p><p>Richard explains Akamai's pivotal role in defending against DDoS attacks. He highlights Akamai's extensive cloud protection service, boasting a global network with 2,400 points of presence (PoPs). This vast infrastructure allows Akamai to protect some of the world's largest and most prominent brands.</p><p>Richard explains the importance of shifting the burden of DDoS defense to the cloud to handle the massive attack traffic. Akamai's scrubbing centers, strategically located worldwide, meticulously clean the incoming traffic, ensuring only legitimate requests reach the client's systems.</p><p><strong>Evolution of DDoS Attacks</strong></p><p>Sean invites Richard to provide an overview of how DDoS attacks have evolved over the years. While some traditional tactics like sin floods remain prevalent, there has been a resurgence of older techniques like water torture attacks targeting DNS. Richard emphasizes that organizations must protect their entire infrastructure, including APIs, which are increasingly becoming the target of such attacks.</p><p><strong>The Financial Sector: A Prime Target</strong></p><p>The financial sector is frequently targeted by DDoS attacks, according to Richard. He stresses that the trust customers place in financial institutions is heavily reliant on the availability of their digital services. Any disruption can erode this trust and have a significant material impact on the organization's reputation and customer confidence.</p><p><strong>Comprehensive Protection Strategy</strong></p><p>Richard underscores the importance of a comprehensive protection strategy for organizations facing the threat of DDoS attacks. By leveraging Akamai's global network and sophisticated scrubbing techniques, organizations can effectively mitigate the impact of these attacks. The combination of automated defenses and skilled SOC teams ensures real-time protection and rapid response to evolving threats.</p><p>In this conversation, Sean and Richard reiterate the significance of maintaining trust and resilience in the face of growing cyber threats. With the right strategies, partnerships, and technologies, organizations can safeguard their digital presence and continue to deliver reliable services to their customers.</p><p>For more in-depth insights, be sure to check out Akamai's latest report and explore their extensive back catalog of valuable cybersecurity resources</p><p>Learn more about Akamai: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Richard Meeus</strong>, Director, Security Technology and Strategy, Akamai [<a href="https://x.com/Akamai">@Akamai</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/richard-meeus/">https://www.linkedin.com/in/richard-meeus/</a></p><p><strong>Resources</strong></p><p>Fighting the Heat: EMEA’s Rising DDoS Threats: <a href="https://itspm.ag/akamaievki" target="_blank">https://itspm.ag/akamaievki</a></p><p>Learn more and catch more stories from Akamai: <a href="https://www.itspmagazine.com/directory/akamai">https://www.itspmagazine.com/directory/akamai</a></p><p>View all of our InfoSecurity Europe 2024 coverage: <a href="https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage">https://www.itspmagazine.com/infosecurity-europe-2024-infosec-london-cybersecurity-event-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="23967567" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ad19cc4a-f16f-4168-abb2-e722ed86ae64/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ad19cc4a-f16f-4168-abb2-e722ed86ae64&amp;feed=kDNbmF_B"/>
      <itunes:title>The Latest Insights in Cybersecurity Resilience and The Ongoing Battle Against DDoS Attacks | A Brand Story Conversation From Infosecurity Europe 2024 | An Akamai Story with Richard Meeus | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Richard Meeus</itunes:author>
      <itunes:duration>00:24:57</itunes:duration>
      <itunes:summary>Join Sean Martin as he chats with Richard Meeus from Akamai at Infosecurity Europe in London, exploring the latest insights in cybersecurity resilience and the ongoing battle against DDoS attacks.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he chats with Richard Meeus from Akamai at Infosecurity Europe in London, exploring the latest insights in cybersecurity resilience and the ongoing battle against DDoS attacks.</itunes:subtitle>
      <itunes:keywords>hacktivists, evolving cyber threats, marco ciappelli, infosecurity europe, dns security, sean martin, distributed denial of service, real-time threat detection, api security, akamai, cybersecurity, dora legislation, nist 2, financial sector cybersecurity, cloud protection, akamai scrubbing centers, cyber resilience, resilience in cybersecurity, ddos attacks, trust in digital services, richard meeus, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>31</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fe637f80-86b4-4e95-a53f-5c9a5ad3045f</guid>
      <title>Protecting The Overlooked: SMBs and Mid Market Organizations | 7 Minutes on ITSPmagazine | A Coro Story with Dror Liwer</title>
      <description><![CDATA[<p>SMBs and Mid Market companies make up 63% of the GDP, and over 70% of employment - making them the backbone of the economy. The entire cybersecurity industry is focused on the enterprise market, paying lip service to the SMB SME segments, leaving them vulnerable to cyber attacks. Coro decided to change the status quo and built a platform that was designed from day one for the overlooked SMB and SME segments - because we believe they deserve the best protection there is so they can focus on growing their businesses, and not cyber threats.</p><p>There were three barriers to SMBs getting adequate protection: The need for multiple tools to get end to end protection, the extreme labor intensiveness of managing these platforms, and the overall cost. What Coro did was create a platform that removes all three barriers. 1) It's a single platform with one dashboard and one endpoint agent that covered all of the cybersecurity needs. 2) The platform uses smart automation to offload workloads from people to machines, dramatically reducing the need to chase and remediate security events manually, and 3) Provide all of that for a price point that any SMB could easily afford.</p><p>Visit the Coro website and schedule a call with our Cyber Experts to see how we can help.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>2024 SME Security Workload Impact Report -- <a href="https://www.coro.net/sme-security-workload-impact-report" target="_blank">https://www.coro.net/sme-security-workload-impact-report</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 3 Jun 2024 20:01:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/protecting-the-overlooked-smbs-and-mid-market-organizations-7-minutes-on-itspmagazine-a-coro-story-with-dror-liwer-hmRxqMcy</link>
      <content:encoded><![CDATA[<p>SMBs and Mid Market companies make up 63% of the GDP, and over 70% of employment - making them the backbone of the economy. The entire cybersecurity industry is focused on the enterprise market, paying lip service to the SMB SME segments, leaving them vulnerable to cyber attacks. Coro decided to change the status quo and built a platform that was designed from day one for the overlooked SMB and SME segments - because we believe they deserve the best protection there is so they can focus on growing their businesses, and not cyber threats.</p><p>There were three barriers to SMBs getting adequate protection: The need for multiple tools to get end to end protection, the extreme labor intensiveness of managing these platforms, and the overall cost. What Coro did was create a platform that removes all three barriers. 1) It's a single platform with one dashboard and one endpoint agent that covered all of the cybersecurity needs. 2) The platform uses smart automation to offload workloads from people to machines, dramatically reducing the need to chase and remediate security events manually, and 3) Provide all of that for a price point that any SMB could easily afford.</p><p>Visit the Coro website and schedule a call with our Cyber Experts to see how we can help.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>2024 SME Security Workload Impact Report -- <a href="https://www.coro.net/sme-security-workload-impact-report" target="_blank">https://www.coro.net/sme-security-workload-impact-report</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6725490" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/afc87b25-5e3a-4d65-a2aa-b4a6f198bfe8/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=afc87b25-5e3a-4d65-a2aa-b4a6f198bfe8&amp;feed=kDNbmF_B"/>
      <itunes:title>Protecting The Overlooked: SMBs and Mid Market Organizations | 7 Minutes on ITSPmagazine | A Coro Story with Dror Liwer</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>Coro is the only cybersecurity company the built a platform that SMBs can use to protect themselves against Cyber threats. Join us for 7 Minutes on ITSPmagazine to learn more about Coro and their offering.</itunes:summary>
      <itunes:subtitle>Coro is the only cybersecurity company the built a platform that SMBs can use to protect themselves against Cyber threats. Join us for 7 Minutes on ITSPmagazine to learn more about Coro and their offering.</itunes:subtitle>
      <itunes:keywords>data, marco ciappelli, sean martin, response, mediumbusiness, affordable, network, cybersecurity, smallbusiness, dashboard, endpoint, dror liwer, midmarket, service provider, cloud, platform, emailprotection, breaches, threat, stack, coro, governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>30</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">74a6657f-5b73-427a-b620-7ea5f9cfca74</guid>
      <title>Unveiling Innovation at SquareX Booth during RSA Conference 2024: A Deep Dive Into SquareX&apos;s Vision | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A SquareX Story with Dakshitaa Babu and Shourya Pratap Singh</title>
      <description><![CDATA[<p><strong>Innovation Unveiled: SquareX's Vision at RSA Conference 2024</strong></p><p>During RSA Conference 2024, SquareX emerged as a source of fresh innovation, revolutionizing the cybersecurity landscape with their cutting-edge solutions. Hosted by Sean Martin, this episode of "On Location" takes you on a journey through the insights and revelations brought to light by key figures at SquareX.</p><p><strong>Introducing SquareX: Meet the Visionaries</strong></p><p>The episode turn on the microphones at the Square X booth, where Sean Martin introduces the audience to Dakshitaa Babu and Shourya Pratap Singh, pivotal figures driving innovation at SquareX. Dakshitaa, the product evangelist, and Shourya, the principal software engineer, shed light on their roles and the impact of SquareX's work on the industry.</p><p><strong>The Passion Behind the Innovation</strong></p><p>Dakshitaa shares her perspective on the privilege of contributing to a company that drives meaningful change in the industry, emphasizing SquareX's commitment to innovation. Shourya echoes this sentiment, highlighting the satisfaction of solving complex problems and witnessing their solutions making a tangible impact on customers.</p><p><strong>Pushing the Boundaries: A Glimpse Into SquareX's Technology</strong></p><p>Sean Martin delves into the intricacies of SquareX's technology, discussing AI-generated images and reverse engineering techniques employed to uncover hidden threats within images. Shourya elaborates on the challenges posed by malicious files and the innovative approaches adopted by SquareX to enhance cybersecurity.</p><p><strong>Addressing Customer Concerns: SquareX's Value Proposition</strong></p><p>Sean Martin probes Dakshitaa and Shourya on the key concerns voiced by prospects and customers at the conference. They shed light on how SquareX addresses the gap in endpoint security solutions, providing customers with insightful data and a comprehensive understanding of cyber threats.</p><p><strong>Empowering Organizations: The SquareX Difference</strong></p><p>The episode concludes with Sean Martin underscoring the significance of visibility at the web browser level and commending SquareX for empowering organizations to proactively tackle cybersecurity challenges. Dakshitaa extends her gratitude to visitors at the booth, emphasizing the value of SquareX's solutions for a secure digital environment.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Dakshitaa Babu</strong>, Security Researcher, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dakshitaababu/">https://www.linkedin.com/in/dakshitaababu/</a></p><p><strong>Shourya Pratap Singh</strong>, Principal Software Engineer, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shouryaps/">https://www.linkedin.com/in/shouryaps/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 22 May 2024 06:58:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Dakshitaa Babu, Shourya Pratap Singh)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/unveiling-innovation-at-squarex-booth-during-rsa-conference-2024-a-deep-dive-into-squarexs-vision-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-squarex-story-with-dakshitaa-babu-and-shourya-pratap-singh-7A35NncG</link>
      <content:encoded><![CDATA[<p><strong>Innovation Unveiled: SquareX's Vision at RSA Conference 2024</strong></p><p>During RSA Conference 2024, SquareX emerged as a source of fresh innovation, revolutionizing the cybersecurity landscape with their cutting-edge solutions. Hosted by Sean Martin, this episode of "On Location" takes you on a journey through the insights and revelations brought to light by key figures at SquareX.</p><p><strong>Introducing SquareX: Meet the Visionaries</strong></p><p>The episode turn on the microphones at the Square X booth, where Sean Martin introduces the audience to Dakshitaa Babu and Shourya Pratap Singh, pivotal figures driving innovation at SquareX. Dakshitaa, the product evangelist, and Shourya, the principal software engineer, shed light on their roles and the impact of SquareX's work on the industry.</p><p><strong>The Passion Behind the Innovation</strong></p><p>Dakshitaa shares her perspective on the privilege of contributing to a company that drives meaningful change in the industry, emphasizing SquareX's commitment to innovation. Shourya echoes this sentiment, highlighting the satisfaction of solving complex problems and witnessing their solutions making a tangible impact on customers.</p><p><strong>Pushing the Boundaries: A Glimpse Into SquareX's Technology</strong></p><p>Sean Martin delves into the intricacies of SquareX's technology, discussing AI-generated images and reverse engineering techniques employed to uncover hidden threats within images. Shourya elaborates on the challenges posed by malicious files and the innovative approaches adopted by SquareX to enhance cybersecurity.</p><p><strong>Addressing Customer Concerns: SquareX's Value Proposition</strong></p><p>Sean Martin probes Dakshitaa and Shourya on the key concerns voiced by prospects and customers at the conference. They shed light on how SquareX addresses the gap in endpoint security solutions, providing customers with insightful data and a comprehensive understanding of cyber threats.</p><p><strong>Empowering Organizations: The SquareX Difference</strong></p><p>The episode concludes with Sean Martin underscoring the significance of visibility at the web browser level and commending SquareX for empowering organizations to proactively tackle cybersecurity challenges. Dakshitaa extends her gratitude to visitors at the booth, emphasizing the value of SquareX's solutions for a secure digital environment.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Dakshitaa Babu</strong>, Security Researcher, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/dakshitaababu/">https://www.linkedin.com/in/dakshitaababu/</a></p><p><strong>Shourya Pratap Singh</strong>, Principal Software Engineer, SquareX</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/shouryaps/">https://www.linkedin.com/in/shouryaps/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="5524738" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/531ccb57-f4cc-4d62-b077-8f145b8c883e/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=531ccb57-f4cc-4d62-b077-8f145b8c883e&amp;feed=kDNbmF_B"/>
      <itunes:title>Unveiling Innovation at SquareX Booth during RSA Conference 2024: A Deep Dive Into SquareX&apos;s Vision | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A SquareX Story with Dakshitaa Babu and Shourya Pratap Singh</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Dakshitaa Babu, Shourya Pratap Singh</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:05:45</itunes:duration>
      <itunes:summary>Join Sean Martin in this exclusive coverage of RSA Conference 2024, where he dives into the groundbreaking technology and vision showcased by SquareX.</itunes:summary>
      <itunes:subtitle>Join Sean Martin in this exclusive coverage of RSA Conference 2024, where he dives into the groundbreaking technology and vision showcased by SquareX.</itunes:subtitle>
      <itunes:keywords>cyber defense strategies, cybersecurity solutions, rsa conference, shourya pratap singh, sean martin, endpoint security solutions, ai generated images, web application security, web browser security, cybersecurity, cyber threat detection, dakshitaa babu, tech conference coverage, reverse engineering techniques, squarex vision, squarex booth, cybersecurity trends 2024, digital security solutions, threat intelligence, data privacy, rsa conference 2024, innovation in cybersecurity, cybersecurity innovation, customer data protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>29</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">219ec0f9-36af-4521-bc70-0e24562a4360</guid>
      <title>Unveiling the Future of Cybersecurity: A Deep Dive into the LevelBlue Futures Report | A Brand Story Conversation From RSA Conference 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it's a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report, a comprehensive annual thought leadership report that offers a glimpse into the future of cybersecurity and resilience. Join us as we unravel the key takeaways and implications of this groundbreaking report.</p><p><strong>Exploring the Landscape</strong></p><p>The LevelBlue Futures Report covers the core challenges and opportunities faced by organizations when it comes to cybersecurity and resilience. In a candid conversation between Theresa Lanowitz, Chief Evangelist of ATT Cybersecurity and Agent of LevelBlue, and Sean Martin, the stage is set for an enlightening discussion on the pressing issues at hand.</p><p><strong>Key Insights and Findings: A Closer Look</strong></p><p>As the conversation unfolds, we are introduced to critical findings from the report. From the changing role of the economic buyer to the imperative of aligning cybersecurity with business objectives, each insight sheds light on the evolving dynamics of the cybersecurity landscape.</p><p><strong>Challenges and Barriers: Addressing the Reality</strong></p><p>One of the stark revelations from the report is the prevailing challenges and barriers that hinder organizations from achieving cyber resilience. From the lack of a formalized incident response plan to the reactive nature of cybersecurity practices, the report highlights the urgent need for proactive and intentional cybersecurity measures.</p><p><strong>Looking Toward the Future: A Call to Action</strong></p><p>Despite the hurdles and complexities inherent in cybersecurity, the LevelBlue Futures Report serves as a guidance for organizations seeking to bolster their cybersecurity posture. By leveraging the insights and recommendations laid out in the report, organizations can embark on a journey towards enhanced cyber resilience and strategic alignment with business goals.</p><p><strong>Empowering Change: The Role of Strategic Planning and Collaboration</strong></p><p>A key theme that emerges from the report is the pivotal role of strategic planning and collaboration in driving cybersecurity innovation and resilience. By engaging third-party advisors, fostering cross-functional communication, and realigning cybersecurity investments with business objectives, organizations can pave the way for transformative change in their cybersecurity practices.</p><p>With the LevelBlue Futures Report one thing becomes abundantly clear: the future of cybersecurity lies in proactive, business-aligned strategies that prioritize resilience and innovation. By heeding the insights and recommendations put forth in the report, organizations can chart a course towards a more secure and resilient future.</p><p>In an era where cybersecurity threats loom large and innovations abound, armed with knowledge, foresight, and a commitment to change, organizations can forge a path towards a brighter, more secure tomorrow.</p><p>Learn more about LevelBlue: https://itspm.ag/levelblue266f6c </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>LevelBlue Futures Report: <a href="https://itspm.ag/att-cy8awv" target="_blank">https://itspm.ag/att-cy8awv</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 03:53:54 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/unveiling-the-future-of-cybersecurity-a-deep-dive-into-the-levelblue-futures-report-a-brand-story-conversation-from-rsa-conference-2024-a-levelblue-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-LOWZGyw_</link>
      <content:encoded><![CDATA[<p>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it's a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report, a comprehensive annual thought leadership report that offers a glimpse into the future of cybersecurity and resilience. Join us as we unravel the key takeaways and implications of this groundbreaking report.</p><p><strong>Exploring the Landscape</strong></p><p>The LevelBlue Futures Report covers the core challenges and opportunities faced by organizations when it comes to cybersecurity and resilience. In a candid conversation between Theresa Lanowitz, Chief Evangelist of ATT Cybersecurity and Agent of LevelBlue, and Sean Martin, the stage is set for an enlightening discussion on the pressing issues at hand.</p><p><strong>Key Insights and Findings: A Closer Look</strong></p><p>As the conversation unfolds, we are introduced to critical findings from the report. From the changing role of the economic buyer to the imperative of aligning cybersecurity with business objectives, each insight sheds light on the evolving dynamics of the cybersecurity landscape.</p><p><strong>Challenges and Barriers: Addressing the Reality</strong></p><p>One of the stark revelations from the report is the prevailing challenges and barriers that hinder organizations from achieving cyber resilience. From the lack of a formalized incident response plan to the reactive nature of cybersecurity practices, the report highlights the urgent need for proactive and intentional cybersecurity measures.</p><p><strong>Looking Toward the Future: A Call to Action</strong></p><p>Despite the hurdles and complexities inherent in cybersecurity, the LevelBlue Futures Report serves as a guidance for organizations seeking to bolster their cybersecurity posture. By leveraging the insights and recommendations laid out in the report, organizations can embark on a journey towards enhanced cyber resilience and strategic alignment with business goals.</p><p><strong>Empowering Change: The Role of Strategic Planning and Collaboration</strong></p><p>A key theme that emerges from the report is the pivotal role of strategic planning and collaboration in driving cybersecurity innovation and resilience. By engaging third-party advisors, fostering cross-functional communication, and realigning cybersecurity investments with business objectives, organizations can pave the way for transformative change in their cybersecurity practices.</p><p>With the LevelBlue Futures Report one thing becomes abundantly clear: the future of cybersecurity lies in proactive, business-aligned strategies that prioritize resilience and innovation. By heeding the insights and recommendations put forth in the report, organizations can chart a course towards a more secure and resilient future.</p><p>In an era where cybersecurity threats loom large and innovations abound, armed with knowledge, foresight, and a commitment to change, organizations can forge a path towards a brighter, more secure tomorrow.</p><p>Learn more about LevelBlue: https://itspm.ag/levelblue266f6c </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Chief Evangelist of AT&T Cybersecurity / LevelBlue [<a href="https://twitter.com/LevelBlueCyber">@LevelBlueCyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/" target="_blank">https://www.linkedin.com/in/theresalanowitz/</a></p><p><strong>Resources</strong></p><p>LevelBlue Futures Report: <a href="https://itspm.ag/att-cy8awv" target="_blank">https://itspm.ag/att-cy8awv</a></p><p>Learn more and catch more stories from LevelBlue: <a href="https://www.itspmagazine.com/directory/levelblue">https://www.itspmagazine.com/directory/levelblue</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19392255" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/22b93e19-ebac-40ea-b822-3a1101adbf62/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=22b93e19-ebac-40ea-b822-3a1101adbf62&amp;feed=kDNbmF_B"/>
      <itunes:title>Unveiling the Future of Cybersecurity: A Deep Dive into the LevelBlue Futures Report | A Brand Story Conversation From RSA Conference 2024 | A LevelBlue Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:duration>00:20:10</itunes:duration>
      <itunes:summary>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it&apos;s a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report.</itunes:summary>
      <itunes:subtitle>In a constantly changing cybersecurity landscape, staying ahead of the curve is not just a competitive advantage; it&apos;s a necessity. Recently, we had the privilege of diving into the insights of the LevelBlue Futures Report.</itunes:subtitle>
      <itunes:keywords>collaboration, marco ciappelli, rsa conference, sean martin, strategic planning, cybersecurity, proactive, innovation, transformation, future, resilience, barriers, level blue, alignment, business objectives, security, cyber resilience, guidance, insights, theresa lanowitz, knowledge, recommendations, challenges, brand story, report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>28</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">eb1f7cf8-3237-4a2f-9508-3403777899e7</guid>
      <title>Digital Dawn: Cyber Security Policy in the Wake of Political Change | A Brand Story Conversation From RSA Conference 2024 | A NCC Group Story with Siân John | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>This Brand Story Podcast comes to you from the RSA Conference Broadcast Alley and features an insightful discussion between Sean Martin, the host, and Siân John, the Chief Technology Officer at NCC Group. The conversation dives deep into the complex world of cybersecurity, shedding light on critical issues and trends impacting organizations globally. Siân John, in her role as the Chief Technology Officer at NCC Group, brings a wealth of experience and knowledge to the table. She discusses the challenges faced by organizations in the rapidly evolving cybersecurity landscape.</p><p>From insights to innovation, threat intelligence to research, her role encompasses a wide range of responsibilities aimed at enhancing cybersecurity capabilities. One of the key highlights of the episode is the discussion around the shift in regulatory dynamics driven by citizen advocacy. Siân John emphasizes how the push for regulations, especially in areas like online safety and data privacy, is now coming from the citizens themselves. This shift signifies a growing awareness and concern among the general public regarding cybersecurity issues.</p><p>The conversation also touches upon the importance of bridging the gap between business and cybersecurity. Sean Martin and Siân John discuss how organizations need to align their security strategies with business objectives to effectively manage cyber risks. By emphasizing the need for a business-driven approach to cybersecurity, they underscore the significance of integrating security into the fabric of the organization. Furthermore, the episode explores emerging technology trends that are reshaping the cybersecurity landscape. Siân John highlights the importance of consolidation, simplification, and automation in security operations.</p><p>The discussion underscores the need for organizations to adapt to new technologies while ensuring a streamlined and resilient cybersecurity posture. As the conversation unfolds, Sean Martin and Siân John stress the importance of strategic planning and gradual implementation in cybersecurity initiatives. They caution against hasty decisions driven by urgency, advocating for a methodical approach to security transformation. By drawing parallels with failed IT projects, they emphasize the need for careful planning and execution in cybersecurity endeavors.</p><p>Ultimately, the episode offers valuable insights into the evolving cybersecurity landscape and the role of key stakeholders in driving security transformation. Sean Martin and Siân John bring a wealth of knowledge and expertise to the table, offering practical advice and strategic guidance for organizations navigating the complex cybersecurity terrain.</p><p>To learn more about the latest cybersecurity trends and best practices, connect with Sean John and the team at NCC Group and explore the cutting-edge solutions they offer to enhance cybersecurity resilience and protect against evolving threats.</p><p>Learn more about NCC Group: <a href="https://itspm.ag/ncc-gr1ajh" target="_blank">https://itspm.ag/ncc-gr1ajh</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Siân John</strong>, Chief Technology Officer,  NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from NCC Group: <a href="https://www.itspmagazine.com/directory/ncc-group" target="_blank">https://www.itspmagazine.com/directory/ncc-group</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 01:39:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Siân John)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/digital-dawn-cyber-security-policy-in-the-wake-of-political-change-a-brand-story-conversation-from-rsa-conference-2024-a-ncc-group-story-with-sian-john-on-location-coverage-with-sean-martin-and-marco-ciappelli-PJntBod1</link>
      <content:encoded><![CDATA[<p>This Brand Story Podcast comes to you from the RSA Conference Broadcast Alley and features an insightful discussion between Sean Martin, the host, and Siân John, the Chief Technology Officer at NCC Group. The conversation dives deep into the complex world of cybersecurity, shedding light on critical issues and trends impacting organizations globally. Siân John, in her role as the Chief Technology Officer at NCC Group, brings a wealth of experience and knowledge to the table. She discusses the challenges faced by organizations in the rapidly evolving cybersecurity landscape.</p><p>From insights to innovation, threat intelligence to research, her role encompasses a wide range of responsibilities aimed at enhancing cybersecurity capabilities. One of the key highlights of the episode is the discussion around the shift in regulatory dynamics driven by citizen advocacy. Siân John emphasizes how the push for regulations, especially in areas like online safety and data privacy, is now coming from the citizens themselves. This shift signifies a growing awareness and concern among the general public regarding cybersecurity issues.</p><p>The conversation also touches upon the importance of bridging the gap between business and cybersecurity. Sean Martin and Siân John discuss how organizations need to align their security strategies with business objectives to effectively manage cyber risks. By emphasizing the need for a business-driven approach to cybersecurity, they underscore the significance of integrating security into the fabric of the organization. Furthermore, the episode explores emerging technology trends that are reshaping the cybersecurity landscape. Siân John highlights the importance of consolidation, simplification, and automation in security operations.</p><p>The discussion underscores the need for organizations to adapt to new technologies while ensuring a streamlined and resilient cybersecurity posture. As the conversation unfolds, Sean Martin and Siân John stress the importance of strategic planning and gradual implementation in cybersecurity initiatives. They caution against hasty decisions driven by urgency, advocating for a methodical approach to security transformation. By drawing parallels with failed IT projects, they emphasize the need for careful planning and execution in cybersecurity endeavors.</p><p>Ultimately, the episode offers valuable insights into the evolving cybersecurity landscape and the role of key stakeholders in driving security transformation. Sean Martin and Siân John bring a wealth of knowledge and expertise to the table, offering practical advice and strategic guidance for organizations navigating the complex cybersecurity terrain.</p><p>To learn more about the latest cybersecurity trends and best practices, connect with Sean John and the team at NCC Group and explore the cutting-edge solutions they offer to enhance cybersecurity resilience and protect against evolving threats.</p><p>Learn more about NCC Group: <a href="https://itspm.ag/ncc-gr1ajh" target="_blank">https://itspm.ag/ncc-gr1ajh</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Siân John</strong>, Chief Technology Officer,  NCC Group</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/sian-john/">https://www.linkedin.com/in/sian-john/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from NCC Group: <a href="https://www.itspmagazine.com/directory/ncc-group" target="_blank">https://www.itspmagazine.com/directory/ncc-group</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21205446" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/fa2cbd6a-f3b0-4e4d-9f94-01f46a3cecf7/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=fa2cbd6a-f3b0-4e4d-9f94-01f46a3cecf7&amp;feed=kDNbmF_B"/>
      <itunes:title>Digital Dawn: Cyber Security Policy in the Wake of Political Change | A Brand Story Conversation From RSA Conference 2024 | A NCC Group Story with Siân John | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Siân John</itunes:author>
      <itunes:duration>00:22:03</itunes:duration>
      <itunes:summary>Join Sean Martin, host of Redefining Cyber Security Podcast, and Siân John, Chief Technology Officer at NCC Group, in an engaging discussion on the evolving cybersecurity landscape. Explore key insights on citizen-driven regulation, bridging business-cybersecurity gaps, and emerging trends reshaping security strategies.</itunes:summary>
      <itunes:subtitle>Join Sean Martin, host of Redefining Cyber Security Podcast, and Siân John, Chief Technology Officer at NCC Group, in an engaging discussion on the evolving cybersecurity landscape. Explore key insights on citizen-driven regulation, bridging business-cybersecurity gaps, and emerging trends reshaping security strategies.</itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, siân john, trends, rsa conference, sean martin, automation, cybersecurity, it projects, business, ncc group, innovation, threat intelligence, redefining cyber security podcast, data privacy, citizen advocacy, podcast, security, strategy, regulation, cyber risks, brand story, digital dawn report</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>27</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">28b74034-328b-4b50-aa6d-d495e20d0655</guid>
      <title>Revolutionizing Cybersecurity for Small Businesses and Mid-Market Companies | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions due to limited resources and expertise. That's where Coro comes in, revolutionizing cybersecurity for smaller enterprises with its innovative approach.</p><p><strong>Unveiling Coro: A Purpose-Built Platform</strong></p><p>The conversation between Sean Martin, host of the Redefining Cybersecurity Podcast on ITSPmagazine, and Dror Liwer, sheds light on the groundbreaking solutions offered by Coro. Positioned as the first purpose-built platform for the mid-market and small businesses, Coro addresses the cybersecurity needs of organizations that are often overlooked by traditional enterprise-focused solutions.</p><p><strong>Understanding the Threat Landscape</strong></p><p>Dror Liwer highlights the evolving threat landscape faced by small businesses and mid-market companies. Attackers are increasingly targeting these organizations due to their vulnerabilities and limited protection measures. With Coro, businesses can gain comprehensive control and protection at an affordable cost, tailored to their specific needs.</p><p><strong>Simplifying Cybersecurity Management</strong></p><p>One of the key benefits of Coro is its simplicity and ease of use. Unlike traditional cybersecurity solutions that require extensive configuration and management, Coro streamlines the deployment process, allowing businesses to be up and running within an hour for all 14 modules. By consolidating protection measures into one platform, Coro eliminates the need for multiple endpoint agents and ensures seamless integration across different modules.</p><p><strong>Peace of Mind and Assurance</strong></p><p>Coro's approach to cybersecurity is not just about protection; it's about providing peace of mind to business owners and executives. Automatic updates, simplified dashboards, and detailed reports give stakeholders the confidence to know that their systems are secure and compliant. Additionally, Coro's emphasis on transparency and accountability positions businesses to easily obtain cyber insurance by demonstrating their commitment to cybersecurity best practices.</p><p><strong>Affordable and Comprehensive Solutions</strong></p><p>Coro offers five suites tailored to different business needs, including endpoint protection, email protection, network and access, essential suite, and core complete. With competitive pricing starting at $6 per user per month, businesses can access a wide range of cybersecurity features without breaking the bank. The core complete suite, priced at $15 per user per month, provides a comprehensive package of security measures that cover all bases.</p><p><strong>The Future of Cybersecurity is Here</strong></p><p>As the cybersecurity landscape continues to evolve, solutions like Coro are paving the way for smaller businesses to achieve robust protection without the complexities and high costs associated with traditional enterprise solutions. By empowering organizations to focus on their core operations and leaving the cybersecurity heavy lifting to Coro, businesses can embrace a future where cybersecurity is no longer a headache but a seamless part of their operations.</p><p>Coro's innovative approach to cybersecurity is setting a new standard for small businesses and mid-market companies. By providing affordable, comprehensive, and user-friendly solutions, Coro is ensuring that cybersecurity is no longer a luxury but a necessity for all organizations. Embrace the future of cybersecurity with Coro and protect your business from ever-evolving threats.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 10 May 2024 00:50:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/revolutionizing-cybersecurity-for-small-businesses-and-mid-market-companies-a-brand-story-conversation-from-rsa-conference-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-gaZvt_ro</link>
      <content:encoded><![CDATA[<p>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions due to limited resources and expertise. That's where Coro comes in, revolutionizing cybersecurity for smaller enterprises with its innovative approach.</p><p><strong>Unveiling Coro: A Purpose-Built Platform</strong></p><p>The conversation between Sean Martin, host of the Redefining Cybersecurity Podcast on ITSPmagazine, and Dror Liwer, sheds light on the groundbreaking solutions offered by Coro. Positioned as the first purpose-built platform for the mid-market and small businesses, Coro addresses the cybersecurity needs of organizations that are often overlooked by traditional enterprise-focused solutions.</p><p><strong>Understanding the Threat Landscape</strong></p><p>Dror Liwer highlights the evolving threat landscape faced by small businesses and mid-market companies. Attackers are increasingly targeting these organizations due to their vulnerabilities and limited protection measures. With Coro, businesses can gain comprehensive control and protection at an affordable cost, tailored to their specific needs.</p><p><strong>Simplifying Cybersecurity Management</strong></p><p>One of the key benefits of Coro is its simplicity and ease of use. Unlike traditional cybersecurity solutions that require extensive configuration and management, Coro streamlines the deployment process, allowing businesses to be up and running within an hour for all 14 modules. By consolidating protection measures into one platform, Coro eliminates the need for multiple endpoint agents and ensures seamless integration across different modules.</p><p><strong>Peace of Mind and Assurance</strong></p><p>Coro's approach to cybersecurity is not just about protection; it's about providing peace of mind to business owners and executives. Automatic updates, simplified dashboards, and detailed reports give stakeholders the confidence to know that their systems are secure and compliant. Additionally, Coro's emphasis on transparency and accountability positions businesses to easily obtain cyber insurance by demonstrating their commitment to cybersecurity best practices.</p><p><strong>Affordable and Comprehensive Solutions</strong></p><p>Coro offers five suites tailored to different business needs, including endpoint protection, email protection, network and access, essential suite, and core complete. With competitive pricing starting at $6 per user per month, businesses can access a wide range of cybersecurity features without breaking the bank. The core complete suite, priced at $15 per user per month, provides a comprehensive package of security measures that cover all bases.</p><p><strong>The Future of Cybersecurity is Here</strong></p><p>As the cybersecurity landscape continues to evolve, solutions like Coro are paving the way for smaller businesses to achieve robust protection without the complexities and high costs associated with traditional enterprise solutions. By empowering organizations to focus on their core operations and leaving the cybersecurity heavy lifting to Coro, businesses can embrace a future where cybersecurity is no longer a headache but a seamless part of their operations.</p><p>Coro's innovative approach to cybersecurity is setting a new standard for small businesses and mid-market companies. By providing affordable, comprehensive, and user-friendly solutions, Coro is ensuring that cybersecurity is no longer a luxury but a necessity for all organizations. Embrace the future of cybersecurity with Coro and protect your business from ever-evolving threats.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18619901" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/b860728b-cc25-4e4a-ad36-e4726f92d3af/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=b860728b-cc25-4e4a-ad36-e4726f92d3af&amp;feed=kDNbmF_B"/>
      <itunes:title>Revolutionizing Cybersecurity for Small Businesses and Mid-Market Companies | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:duration>00:19:22</itunes:duration>
      <itunes:summary>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions.</itunes:summary>
      <itunes:subtitle>In the fast-paced world of cybersecurity, staying ahead of threats and protecting sensitive data is a top priority for organizations of all sizes. However, small businesses and mid-market companies often face unique challenges when it comes to implementing comprehensive cybersecurity solutions.</itunes:subtitle>
      <itunes:keywords>seamless integration, innovative solutions, transparency, comprehensive suites, marco ciappelli, rsa conference, evolving threats, threat landscape, sean martin, future of cybersecurity, cybersecurity, places, robust security measures, cyber insurance, dror liwer, small businesses, simplicity, or facts, affordable pricing, peace of mind, user-friendly, mid-market companies, accountability, business owners, brand story, coro, protection</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>26</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e5278b43-cdd2-4810-a433-e019e36f61a7</guid>
      <title>The Art of Possible In the World of Enterprise Storage Solutions | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Infinidat Story with Bill Basinas</title>
      <description><![CDATA[<p><strong>7 Minutes Conversation at RSA Conference</strong></p><p>As the Senior Director of Product Marketing, Bill Basinas brings a wealth of experience and knowledge as he sits down with Sean Martin for a new episode of "7 Minutes on ITSP Magazine" live from the RSA Conference. Bill shared insights into how Infinidat is redefining the landscape of storage solutions.</p><p><strong>Bridging the Gap with InfiniSafe Technology</strong></p><p>Bill's discussion shed light on how Infinidat's InfiniSafe technology is leading the industry in cyber resilience and data protection. In a world where cyber attacks are becoming increasingly prevalent, organizations need robust solutions to safeguard their critical data assets. Infinidat's platform not only ensures uninterrupted operations but also builds a bridge between cyber security measures and data storage.</p><p><strong>Meeting the Evolving Needs of Customers</strong></p><p>In the conversation, Bill highlighted how customers are constantly evolving, moving towards cloud-based solutions, and generating vast amounts of data. In response to these changing dynamics, Infinidat is continuously adapting its strategies to meet the evolving needs of its clientele.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion continues, Bill teased upcoming developments at Infinidat, hinting at new announcements that will further revolutionize the industry. With a focus on orchestrating end-to-end data protection and recovery processes, Infinidat is set to unveil groundbreaking solutions that will redefine data security.</p><p><strong>Connecting with Infinidat</strong></p><p>For those intrigued by Infinidat's cutting-edge technology and commitment to cyber resilience, Bill shared insights on how to connect with the company. Through webinars, live demos, and product demonstrations, individuals can delve deeper into the world of Infinidat and explore the innovative solutions they offer.</p><p>This conversation with Bill Basinas provided a fascinating glimpse into the world of enterprise storage solutions and cyber resilience. Infinidat's dedication to pushing boundaries and delivering unmatched customer experiences sets them apart in a competitive industry.</p><p>Stay tuned for more updates from Infinidat as they continue to lead the way in secure data storage and cyber resilience.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d" target="_blank">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bill Basinas</strong>, Sr. Director Product Marketing, Infinidat [<a href="https://twitter.com/infinidat">@Infinidat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/billbasinas/">https://www.linkedin.com/in/billbasinas/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat" target="_blank">https://www.itspmagazine.com/directory/infinidat</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 02:14:34 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Bill Basinas, Marco Ciappelli)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-art-of-possible-in-the-world-of-enterprise-storage-solutions-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-infinidat-story-with-bill-basinas-g_0ZggYS</link>
      <content:encoded><![CDATA[<p><strong>7 Minutes Conversation at RSA Conference</strong></p><p>As the Senior Director of Product Marketing, Bill Basinas brings a wealth of experience and knowledge as he sits down with Sean Martin for a new episode of "7 Minutes on ITSP Magazine" live from the RSA Conference. Bill shared insights into how Infinidat is redefining the landscape of storage solutions.</p><p><strong>Bridging the Gap with InfiniSafe Technology</strong></p><p>Bill's discussion shed light on how Infinidat's InfiniSafe technology is leading the industry in cyber resilience and data protection. In a world where cyber attacks are becoming increasingly prevalent, organizations need robust solutions to safeguard their critical data assets. Infinidat's platform not only ensures uninterrupted operations but also builds a bridge between cyber security measures and data storage.</p><p><strong>Meeting the Evolving Needs of Customers</strong></p><p>In the conversation, Bill highlighted how customers are constantly evolving, moving towards cloud-based solutions, and generating vast amounts of data. In response to these changing dynamics, Infinidat is continuously adapting its strategies to meet the evolving needs of its clientele.</p><p><strong>Looking Towards the Future</strong></p><p>As the discussion continues, Bill teased upcoming developments at Infinidat, hinting at new announcements that will further revolutionize the industry. With a focus on orchestrating end-to-end data protection and recovery processes, Infinidat is set to unveil groundbreaking solutions that will redefine data security.</p><p><strong>Connecting with Infinidat</strong></p><p>For those intrigued by Infinidat's cutting-edge technology and commitment to cyber resilience, Bill shared insights on how to connect with the company. Through webinars, live demos, and product demonstrations, individuals can delve deeper into the world of Infinidat and explore the innovative solutions they offer.</p><p>This conversation with Bill Basinas provided a fascinating glimpse into the world of enterprise storage solutions and cyber resilience. Infinidat's dedication to pushing boundaries and delivering unmatched customer experiences sets them apart in a competitive industry.</p><p>Stay tuned for more updates from Infinidat as they continue to lead the way in secure data storage and cyber resilience.</p><p>Learn more about Infinidat: <a href="https://itspm.ag/infini3o5d" target="_blank">https://itspm.ag/infini3o5d</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Bill Basinas</strong>, Sr. Director Product Marketing, Infinidat [<a href="https://twitter.com/infinidat">@Infinidat</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/billbasinas/">https://www.linkedin.com/in/billbasinas/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Infinidat: <a href="https://www.itspmagazine.com/directory/infinidat" target="_blank">https://www.itspmagazine.com/directory/infinidat</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6710335" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/d0c15cda-4f1b-43f6-97c9-8711201934ca/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=d0c15cda-4f1b-43f6-97c9-8711201934ca&amp;feed=kDNbmF_B"/>
      <itunes:title>The Art of Possible In the World of Enterprise Storage Solutions | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Infinidat Story with Bill Basinas</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Bill Basinas, Marco Ciappelli</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:06:58</itunes:duration>
      <itunes:summary>In the fast-paced world of enterprise storage solutions and cyber resilience, one company stands out for its commitment to providing unparalleled customer experiences and cutting-edge technology - Infinidat.</itunes:summary>
      <itunes:subtitle>In the fast-paced world of enterprise storage solutions and cyber resilience, one company stands out for its commitment to providing unparalleled customer experiences and cutting-edge technology - Infinidat.</itunes:subtitle>
      <itunes:keywords>industry leading solutions, customer experiences, marco ciappelli, rsa conference, data assets, infinidat, sean martin, bill basinas, senior director, cybersecurity, data security, webinars, innovation, data protection, product marketing, storage technology, end-to-end protection, cloud solutions, cyber resilience, cyber security, orchestrating data protection, live demos, enterprise storage solutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>25</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">81aee1b5-0e34-4257-ae6e-c95e264f22c9</guid>
      <title>Revolutionizing Network Security: How to Strategize the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSP Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry.</p><p><strong>Unveiling Dispersive's Stealth Networking</strong></p><p>At the heart of Dispersive's network security strategy lies the concept of Dispersive Stealth Networking. Rajiv Pimplaskar, with over 25 years of experience in the industry, revealed that Dispersive is a DARPA-incubated network security company with 53 patents granted. Their approach leverages spread spectrum technology from the radio frequency domain to secure cloud and internet communications effectively. By enabling customers to hide in plain sight while ensuring the integrity of their critical systems, Dispersive offers a unique solution in the cybersecurity landscape.</p><p><strong>The Evolution of Network Security</strong></p><p>Rajiv emphasized the shift from legacy SD WAN solutions to a more cloud-native approach, highlighting the challenges faced by businesses in ensuring security and privacy in today's distributed workforce model. The conversation with Sean shed light on the need for a more resilient and efficient networking infrastructure that can adapt to the evolving demands of modern businesses.</p><p><strong>Use Cases and Success Stories</strong></p><p>Through real-world examples with customers like Ovzon and Endeavour Energy, Rajiv illustrated how Dispersive's solutions are driving transformation in sectors such as satellite communications and sustainable infrastructure. By providing secure and efficient network connectivity across geographically dispersed assets, Dispersive is empowering organizations to meet the demands of the digital age without compromising on security.</p><p><strong>Looking Towards the Future</strong></p><p>As the conversation delved deeper into the intricacies of network security, Rajiv expressed optimism for the future of cybersecurity. Embracing principles like zero trust and automated moving target defense, Dispersive aims to stay ahead of the curve in protecting critical assets and resources from evolving cyber threats.</p><p>In a rapidly changing digital landscape where cybersecurity is non-negotiable, companies like Dispersive and leaders like Rajiv Pimplaskar are paving the way for a more secure and resilient network infrastructure. By combining innovative technology with a collaborative approach, Dispersive is redefining the art of network security in the digital age.</p><p>With Dispersive's disruptive approach to stealth networking, businesses can navigate the digital landscape with confidence, knowing that their critical systems are protected and secure.</p><p>Learn more about Dispersive: <a href="https://itspm.ag/dispermlwt" target="_blank">https://itspm.ag/dispermlwt</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rajiv Pimplaskar</strong>, President & CEO, Dispersive</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rajiv1p/">https://www.linkedin.com/in/rajiv1p/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Dispersive: <a href="https://www.itspmagazine.com/directory/dispersive" target="_blank">https://www.itspmagazine.com/directory/dispersive</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 9 May 2024 01:13:52 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Rajiv Pimplaskar)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/revolutionizing-network-security-how-to-strategies-the-relationship-between-it-and-ot-a-brand-story-conversation-from-rsa-conference-2024-a-dispersive-story-with-rajiv-pimplaskar-on-location-coverage-with-sean-martin-and-marco-ciappelli-08L_ohpf</link>
      <content:encoded><![CDATA[<p>One company at the forefront of redefining IT security is Dispersive, led by the visionary CEO, Rajiv Pimplaskar. In a recent discussion with Sean Martin of ITSP Magazine at the RSA Conference, Rajiv shared insights into Dispersive's cutting-edge approach to network security and how they are revolutionizing the industry.</p><p><strong>Unveiling Dispersive's Stealth Networking</strong></p><p>At the heart of Dispersive's network security strategy lies the concept of Dispersive Stealth Networking. Rajiv Pimplaskar, with over 25 years of experience in the industry, revealed that Dispersive is a DARPA-incubated network security company with 53 patents granted. Their approach leverages spread spectrum technology from the radio frequency domain to secure cloud and internet communications effectively. By enabling customers to hide in plain sight while ensuring the integrity of their critical systems, Dispersive offers a unique solution in the cybersecurity landscape.</p><p><strong>The Evolution of Network Security</strong></p><p>Rajiv emphasized the shift from legacy SD WAN solutions to a more cloud-native approach, highlighting the challenges faced by businesses in ensuring security and privacy in today's distributed workforce model. The conversation with Sean shed light on the need for a more resilient and efficient networking infrastructure that can adapt to the evolving demands of modern businesses.</p><p><strong>Use Cases and Success Stories</strong></p><p>Through real-world examples with customers like Ovzon and Endeavour Energy, Rajiv illustrated how Dispersive's solutions are driving transformation in sectors such as satellite communications and sustainable infrastructure. By providing secure and efficient network connectivity across geographically dispersed assets, Dispersive is empowering organizations to meet the demands of the digital age without compromising on security.</p><p><strong>Looking Towards the Future</strong></p><p>As the conversation delved deeper into the intricacies of network security, Rajiv expressed optimism for the future of cybersecurity. Embracing principles like zero trust and automated moving target defense, Dispersive aims to stay ahead of the curve in protecting critical assets and resources from evolving cyber threats.</p><p>In a rapidly changing digital landscape where cybersecurity is non-negotiable, companies like Dispersive and leaders like Rajiv Pimplaskar are paving the way for a more secure and resilient network infrastructure. By combining innovative technology with a collaborative approach, Dispersive is redefining the art of network security in the digital age.</p><p>With Dispersive's disruptive approach to stealth networking, businesses can navigate the digital landscape with confidence, knowing that their critical systems are protected and secure.</p><p>Learn more about Dispersive: <a href="https://itspm.ag/dispermlwt" target="_blank">https://itspm.ag/dispermlwt</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rajiv Pimplaskar</strong>, President & CEO, Dispersive</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rajiv1p/">https://www.linkedin.com/in/rajiv1p/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Dispersive: <a href="https://www.itspmagazine.com/directory/dispersive" target="_blank">https://www.itspmagazine.com/directory/dispersive</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19788416" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5ba57f16-8df9-49b0-ae15-285b2be0ee54/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5ba57f16-8df9-49b0-ae15-285b2be0ee54&amp;feed=kDNbmF_B"/>
      <itunes:title>Revolutionizing Network Security: How to Strategize the relationship between IT and OT | A Brand Story Conversation From RSA Conference 2024 | A Dispersive Story with Rajiv Pimplaskar | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Rajiv Pimplaskar</itunes:author>
      <itunes:duration>00:20:35</itunes:duration>
      <itunes:summary>In a world where businesses are constantly adapting to new technologies and facing ever-evolving cybersecurity threats, the importance of innovative solutions for network security cannot be overstated. </itunes:summary>
      <itunes:subtitle>In a world where businesses are constantly adapting to new technologies and facing ever-evolving cybersecurity threats, the importance of innovative solutions for network security cannot be overstated. </itunes:subtitle>
      <itunes:keywords>technology, marco ciappelli, network security, secure connectivity, rsa conference, sean martin, sdwan, rajiv pimplaskar, cybersecurity, cybersecurity, data security, places, it security ai responses can produce inaccurate information about people, cloud native, innovation, information security, cyber defense, or facts, dispersive, edge computing, security solutions, digital transformation, zero trust, brand story, cyber threats, network infrastructure</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>24</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">ce23d2c2-d14b-4c7f-a0de-8359c4a99daf</guid>
      <title>Empowering Businesses Through IT and Security Transformation | A Brand Story Conversation From RSA Conference 2024 | An Open Systems Story with Tim Roddy | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.</p><p><strong>Business and IT Transformation in the Digital Age</strong></p><p>The conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.</p><p><strong>Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and Security</strong></p><p>One of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.</p><p><strong>Bridging the Gap Between IT and Security Teams</strong></p><p>Tim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.</p><p><strong>Real-World Use Cases and Success Stories</strong></p><p>Throughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.</p><p><strong>Looking Towards a Secure Future</strong></p><p>As businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.</p><p>This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.</p><p>Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.</p><p>Learn more about Open Systems: <a href="https://itspm.ag/opensystems-d11">https://itspm.ag/opensystems-d11</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tim Roddy</strong>, Vice President Marketing, Open Systems [<a href="https://twitter.com/RealOpenSystems">@RealOpenSystems</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/troddy/">https://www.linkedin.com/in/troddy/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Open Systems: <a href="https://www.itspmagazine.com/directory/open-systems">https://www.itspmagazine.com/directory/open-systems</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 21:52:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Roddy)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/empowering-businesses-through-it-and-security-transformation-a-brand-story-conversation-from-rsa-conference-2024-an-open-systems-story-with-tim-roddy-on-location-coverage-with-sean-martin-and-marco-ciappelli-H2WhQ2jX</link>
      <content:encoded><![CDATA[<p>In a world where businesses are constantly evolving and facing new challenges in cybersecurity and IT infrastructure, the importance of collaboration between IT and security teams has never been more critical. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Tim Roddy from Open Systems to talk about the topics of business transformation, IT security, and the necessity of aligning IT and security initiatives for a more secure and efficient operation.</p><p><strong>Business and IT Transformation in the Digital Age</strong></p><p>The conversation kicked off discussing the challenges that businesses face in a rapidly changing digital landscape. Tim highlighted the need for businesses to adapt to transformations driven by factors like remote work, cloud migrations, and evolving business requirements. With threats constantly looming, the alignment of business processes, IT functions, and security measures becomes paramount to staying ahead of the curve.</p><p><strong>Zero Trust Network Access (ZTNA) - A Game-Changer in Connectivity and Security</strong></p><p>One of the key topics discussed was the concept of Zero Trust Network Access (ZTNA) and its impact on network security. Tim shed light on the importance of implementing ZTNA to ensure secure and controlled access to critical applications and data. By deploying ZTNA, organizations can limit access to authorized personnel only, thereby reducing the risk of unauthorized access and potential data breaches.</p><p><strong>Bridging the Gap Between IT and Security Teams</strong></p><p>Tim emphasized the need for organizations to bridge the gap between IT and security teams, especially in smaller enterprises where resources are limited. By offering managed services like SASE (Secure Access Service Edge), Open Systems enables organizations to focus on core business activities while ensuring that IT and security functions are efficiently managed and monitored.</p><p><strong>Real-World Use Cases and Success Stories</strong></p><p>Throughout the conversation, Tim shared insightful examples of how Open Systems has helped businesses, particularly in the manufacturing sector, enhance their security posture and IT infrastructure. From implementing ZTNA for secure access to critical equipment to transitioning from MPLS to SD WAN for cost efficiency and flexibility, Open Systems has been instrumental in driving IT and security transformations for organizations of all sizes.</p><p><strong>Looking Towards a Secure Future</strong></p><p>As businesses continue to navigate the complexities of modern cybersecurity challenges, the role of providers like Open Systems in guiding organizations towards a more secure and efficient future becomes increasingly significant. By offering tailored solutions, expert guidance, and proactive monitoring, Open Systems stands as a valuable partner in the journey towards robust IT and security operations.</p><p>This conversation with Tim Roddy from Open Systems highlighted the critical need for businesses to prioritize IT and security transformation in today's digital landscape. By embracing collaboration, deploying innovative solutions like ZTNA, and relying on trusted partners for managed services, organizations can navigate the complexities of cybersecurity with confidence and efficiency.</p><p>Reach out to Open Systems to learn more about their comprehensive IT and security solutions and embark on a transformative journey towards a more secure and resilient business infrastructure.</p><p>Learn more about Open Systems: <a href="https://itspm.ag/opensystems-d11">https://itspm.ag/opensystems-d11</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Tim Roddy</strong>, Vice President Marketing, Open Systems [<a href="https://twitter.com/RealOpenSystems">@RealOpenSystems</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/troddy/">https://www.linkedin.com/in/troddy/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Open Systems: <a href="https://www.itspmagazine.com/directory/open-systems">https://www.itspmagazine.com/directory/open-systems</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19325284" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/35f0cea7-55f6-4f33-bace-f17c439266a1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=35f0cea7-55f6-4f33-bace-f17c439266a1&amp;feed=kDNbmF_B"/>
      <itunes:title>Empowering Businesses Through IT and Security Transformation | A Brand Story Conversation From RSA Conference 2024 | An Open Systems Story with Tim Roddy | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Tim Roddy</itunes:author>
      <itunes:duration>00:20:06</itunes:duration>
      <itunes:summary>Discover insights from a conversation with Tim Roddy from Open Systems on business transformation, IT security, and collaboration at the RSA Conference.</itunes:summary>
      <itunes:subtitle>Discover insights from a conversation with Tim Roddy from Open Systems on business transformation, IT security, and collaboration at the RSA Conference.</itunes:subtitle>
      <itunes:keywords>zero trust network access, managed services, remote work, it infrastructure, cybersecurity landscape, sd wan, collaboration, secure future, manufacturing sector, business transformation, marco ciappelli, ztna, security posture, rsa conference, sean martin, mpls, cybersecurity, cost efficiency, cybersecurity challenges, tim roddy, sase, insights, flexibility, brand story, cloud migrations, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>23</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">9cd3f8c2-e7c5-4875-b2b1-512c6888a648</guid>
      <title>Embracing Zero Trust: A Conversation with Object First and Numberline Security | A Brand Story Conversation From RSA Conference 2024 | An Object First Story with Anthony Cusimano and Jason Garbis | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Throughout the cybersecurity planet, one term that continues to resonate and shape organizations' security strategies is Zero Trust. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Anthony Cusimano from Object First and Jason Garbis from Numberline Security to talk about Zero Trust and its implications for data security and resilience.</p><p><strong>Understanding Zero Trust</strong></p><p>Zero Trust is more than just a buzzword; it represents a fundamental shift in how organizations approach security. Anthony and Jason emphasized that Zero Trust is not a one-size-fits-all solution but a strategy that requires a shift in mindset and collaboration across various teams within an organization.</p><p><strong>The Role of Data Security in Zero Trust</strong></p><p>Data security and resilience play a crucial role in the Zero Trust framework. Jason highlighted the importance of applying Zero Trust principles to backup and recovery processes to ensure the protection and availability of critical data, especially in the face of evolving threats like ransomware.</p><p><strong>The Intersection of IT and Security</strong></p><p>As organizations navigate the implementation of Zero Trust, the conversation touched on how the boundaries between IT and security are becoming increasingly blurred. The shared responsibility model extends beyond technical aspects to involve finance, operations, and every individual within the organization.</p><p><strong>Empowering Organizations with Zero Trust</strong></p><p>Both Object First and Numberline Security are at the forefront of helping organizations navigate their Zero Trust journey. Object First's Ootbi product focuses on out-of-the-box immutability to secure backup data effectively, while Numberline Security provides guidance on Zero Trust strategy and readiness assessments.</p><p><strong>Taking the First Steps Towards Zero Trust</strong></p><p>Starting the Zero Trust journey does not require perfection from the get-go. Jason stressed the importance of focusing on foundational security measures before moving  into more complex aspects of Zero Trust, emphasizing the need for a methodical and incremental approach.</p><p><strong>Final Thoughts</strong></p><p>Embracing Zero Trust is not just about adopting a new security paradigm but about fostering a culture of continuous improvement and security resilience across all facets of an organization. As Anthony and Jason aptly put it, leadership can emerge from any part of the organization, driving the transformation towards a Zero Trust mindset.</p><p>In conclusion, the conversation with Object First and Numberline Security sheds light on the multifaceted nature of Zero Trust and underscores the importance of collaboration, resilience, and proactive security measures in today's threat landscape. Embracing Zero Trust is not a choice; it's a necessity in safeguarding the most valuable asset organizations possess—their data.</p><p>Stay tuned for more insights and resources from Object First and Numberline Security as they continue to pave the way for organizations embarking on their Zero Trust journey.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Anthony Cusimano</strong>, Director of Technical Marketing, Object First [<a href="https://twitter.com/object_first">@object_first</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anthonycusimano89/">https://www.linkedin.com/in/anthonycusimano89/</a></p><p><strong>Jason Garbis</strong>, Founder and CEO, Numberline Security </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasongarbis/">https://www.linkedin.com/in/jasongarbis/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 20:59:46 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony Cusimano, Jason Garbis)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/embracing-zero-trust-a-conversation-with-object-first-and-numberline-security-a-brand-story-conversation-from-rsa-conference-2024-an-object-first-story-with-anthony-cusimano-and-jason-garbis-on-location-coverage-with-sean-martin-and-marco-ciappelli-HyfsLpyb</link>
      <content:encoded><![CDATA[<p>Throughout the cybersecurity planet, one term that continues to resonate and shape organizations' security strategies is Zero Trust. At the recent RSA Conference, Sean Martin had the opportunity to sit down with Anthony Cusimano from Object First and Jason Garbis from Numberline Security to talk about Zero Trust and its implications for data security and resilience.</p><p><strong>Understanding Zero Trust</strong></p><p>Zero Trust is more than just a buzzword; it represents a fundamental shift in how organizations approach security. Anthony and Jason emphasized that Zero Trust is not a one-size-fits-all solution but a strategy that requires a shift in mindset and collaboration across various teams within an organization.</p><p><strong>The Role of Data Security in Zero Trust</strong></p><p>Data security and resilience play a crucial role in the Zero Trust framework. Jason highlighted the importance of applying Zero Trust principles to backup and recovery processes to ensure the protection and availability of critical data, especially in the face of evolving threats like ransomware.</p><p><strong>The Intersection of IT and Security</strong></p><p>As organizations navigate the implementation of Zero Trust, the conversation touched on how the boundaries between IT and security are becoming increasingly blurred. The shared responsibility model extends beyond technical aspects to involve finance, operations, and every individual within the organization.</p><p><strong>Empowering Organizations with Zero Trust</strong></p><p>Both Object First and Numberline Security are at the forefront of helping organizations navigate their Zero Trust journey. Object First's Ootbi product focuses on out-of-the-box immutability to secure backup data effectively, while Numberline Security provides guidance on Zero Trust strategy and readiness assessments.</p><p><strong>Taking the First Steps Towards Zero Trust</strong></p><p>Starting the Zero Trust journey does not require perfection from the get-go. Jason stressed the importance of focusing on foundational security measures before moving  into more complex aspects of Zero Trust, emphasizing the need for a methodical and incremental approach.</p><p><strong>Final Thoughts</strong></p><p>Embracing Zero Trust is not just about adopting a new security paradigm but about fostering a culture of continuous improvement and security resilience across all facets of an organization. As Anthony and Jason aptly put it, leadership can emerge from any part of the organization, driving the transformation towards a Zero Trust mindset.</p><p>In conclusion, the conversation with Object First and Numberline Security sheds light on the multifaceted nature of Zero Trust and underscores the importance of collaboration, resilience, and proactive security measures in today's threat landscape. Embracing Zero Trust is not a choice; it's a necessity in safeguarding the most valuable asset organizations possess—their data.</p><p>Stay tuned for more insights and resources from Object First and Numberline Security as they continue to pave the way for organizations embarking on their Zero Trust journey.</p><p>Learn more about Object First: <a href="https://itspm.ag/object-first-2gjl">https://itspm.ag/object-first-2gjl</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Anthony Cusimano</strong>, Director of Technical Marketing, Object First [<a href="https://twitter.com/object_first">@object_first</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/anthonycusimano89/">https://www.linkedin.com/in/anthonycusimano89/</a></p><p><strong>Jason Garbis</strong>, Founder and CEO, Numberline Security </p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jasongarbis/">https://www.linkedin.com/in/jasongarbis/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Object First: <a href="https://www.itspmagazine.com/directory/object-first">https://www.itspmagazine.com/directory/object-first</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20769618" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/717ad518-c761-421f-8325-60095785ad1a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=717ad518-c761-421f-8325-60095785ad1a&amp;feed=kDNbmF_B"/>
      <itunes:title>Embracing Zero Trust: A Conversation with Object First and Numberline Security | A Brand Story Conversation From RSA Conference 2024 | An Object First Story with Anthony Cusimano and Jason Garbis | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Anthony Cusimano, Jason Garbis</itunes:author>
      <itunes:duration>00:21:36</itunes:duration>
      <itunes:summary>Exploring the significance of Zero Trust in today’s cybersecurity through a conversation with Object First and Numberline Security experts.</itunes:summary>
      <itunes:subtitle>Exploring the significance of Zero Trust in today’s cybersecurity through a conversation with Object First and Numberline Security experts.</itunes:subtitle>
      <itunes:keywords>continuous improvement, collaboration, jason garbis, marco ciappelli, leadership, rsa conference, threat landscape, sean martin, proactive measures, cybersecurity, data security, numberline security, readiness assessment, data protection, resilience, it, anthony cusimano, foundational security, security, strategy, cybersecurity practices, object first, zero trust, incremental approach, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>22</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2d92cf26-3358-4fec-b762-f55ebd0a321e</guid>
      <title>Shaking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation of a groundbreaking platform designed to transform the way organizations tackle data collection, analysis, and threat detection.</p><p><strong>A Walk Down Memory Lane</strong></p><p>The dialogue between Colby DeRodeff and Sean Martin at the RSA Conference delved into the history of cybersecurity, reflecting on the shifts from perimeter security to compliance-driven approaches and the emergence of new technologies like XDR. This introspective look highlighted the need for a paradigm shift in cybersecurity strategies to keep pace with the rapidly evolving threat landscape.</p><p><strong>Challenges in Traditional Approaches</strong></p><p>One of the key challenges discussed was the inefficiency of traditional SIEM solutions, which often resulted in data overload, lack of actionable insights, and hefty costs associated with data storage. Colby emphasized the importance of focusing on outcome-driven data collection and detection scenarios rather than accumulating vast amounts of data with limited value.</p><p><strong>The Birth of Abstract Security</strong></p><p>The catalyst for Abstract Security stemmed from Colby's experiences in previous companies, where the disconnect between data collection and effective threat detection became glaringly apparent. This realization led to the inception of a platform that prioritizes data relevance, streamlining the process of identifying and responding to security threats efficiently.</p><p><strong>Abstract Security's Unique Approach</strong></p><p>Abstract Security's modular platform offers a refreshing take on cybersecurity data management, with a focus on tailored data collection, analytics, and storage solutions. By enabling organizations to align data sources with specific detection outcomes, Abstract Security empowers teams to make informed decisions and optimize their cybersecurity strategies.</p><p><strong>Seamless Integration with Existing Tech Stack</strong></p><p>One of the standout features of Abstract Security is its seamless integration capabilities with existing tech stacks. The platform can complement and enhance current security infrastructure without the need for rip-and-replace, offering a smooth transition towards more effective threat detection and response mechanisms.</p><p><strong>Looking Towards the Future</strong></p><p>As organizations navigate the complexities of cloud environments and evolving cybersecurity challenges, Abstract Security stands out with fresh innovative ideas and practicality. By reimagining the data management process and emphasizing outcome-driven approaches, Abstract Security is poised to shape the future of cybersecurity operations.</p><p><strong>Conclusion</strong></p><p>The conversation between Colby DeRodeff and Sean Martin at the RSA Conference not only highlighted the pivotal role of Abstract Security in revolutionizing cybersecurity data management but also underscored the importance of reevaluating traditional approaches in the face of modern threats. With Abstract Security leading the charge towards a more efficient and proactive cybersecurity landscape, organizations have the opportunity to elevate their security posture and stay ahead of emerging cyber risks.</p><p>Learn more about Abstract Security: <a href="https://itspm.ag/abstractsec-zao">https://itspm.ag/abstractsec-zao</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Colby DeRodeff</strong>, CEO and Co-Founder, Abstract Security [<a href="https://twitter.com/get_abstracted">@get_abstracted</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/colbyderodeff/">https://www.linkedin.com/in/colbyderodeff/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Abstract Security: <a href="https://www.itspmagazine.com/directory/abstract-security">https://www.itspmagazine.com/directory/abstract-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 19:52:50 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Colby DeRodeff)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/shaking-up-the-security-information-and-event-management-market-a-brand-story-conversation-from-rsa-conference-2024-an-abstract-security-story-with-colby-derodeff-on-location-coverage-with-sean-martin-and-marco-ciappelli-_X6kcK4z</link>
      <content:encoded><![CDATA[<p>In the bustling atmosphere of the RSA Conference, a conversation unfolded that shed light on the evolution of cybersecurity and the innovative solutions paving the way for a more efficient and effective approach to data management. Colby DeRodeff, the CEO and co-founder of Abstract Security, shared insights into the journey that led to the creation of a groundbreaking platform designed to transform the way organizations tackle data collection, analysis, and threat detection.</p><p><strong>A Walk Down Memory Lane</strong></p><p>The dialogue between Colby DeRodeff and Sean Martin at the RSA Conference delved into the history of cybersecurity, reflecting on the shifts from perimeter security to compliance-driven approaches and the emergence of new technologies like XDR. This introspective look highlighted the need for a paradigm shift in cybersecurity strategies to keep pace with the rapidly evolving threat landscape.</p><p><strong>Challenges in Traditional Approaches</strong></p><p>One of the key challenges discussed was the inefficiency of traditional SIEM solutions, which often resulted in data overload, lack of actionable insights, and hefty costs associated with data storage. Colby emphasized the importance of focusing on outcome-driven data collection and detection scenarios rather than accumulating vast amounts of data with limited value.</p><p><strong>The Birth of Abstract Security</strong></p><p>The catalyst for Abstract Security stemmed from Colby's experiences in previous companies, where the disconnect between data collection and effective threat detection became glaringly apparent. This realization led to the inception of a platform that prioritizes data relevance, streamlining the process of identifying and responding to security threats efficiently.</p><p><strong>Abstract Security's Unique Approach</strong></p><p>Abstract Security's modular platform offers a refreshing take on cybersecurity data management, with a focus on tailored data collection, analytics, and storage solutions. By enabling organizations to align data sources with specific detection outcomes, Abstract Security empowers teams to make informed decisions and optimize their cybersecurity strategies.</p><p><strong>Seamless Integration with Existing Tech Stack</strong></p><p>One of the standout features of Abstract Security is its seamless integration capabilities with existing tech stacks. The platform can complement and enhance current security infrastructure without the need for rip-and-replace, offering a smooth transition towards more effective threat detection and response mechanisms.</p><p><strong>Looking Towards the Future</strong></p><p>As organizations navigate the complexities of cloud environments and evolving cybersecurity challenges, Abstract Security stands out with fresh innovative ideas and practicality. By reimagining the data management process and emphasizing outcome-driven approaches, Abstract Security is poised to shape the future of cybersecurity operations.</p><p><strong>Conclusion</strong></p><p>The conversation between Colby DeRodeff and Sean Martin at the RSA Conference not only highlighted the pivotal role of Abstract Security in revolutionizing cybersecurity data management but also underscored the importance of reevaluating traditional approaches in the face of modern threats. With Abstract Security leading the charge towards a more efficient and proactive cybersecurity landscape, organizations have the opportunity to elevate their security posture and stay ahead of emerging cyber risks.</p><p>Learn more about Abstract Security: <a href="https://itspm.ag/abstractsec-zao">https://itspm.ag/abstractsec-zao</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Colby DeRodeff</strong>, CEO and Co-Founder, Abstract Security [<a href="https://twitter.com/get_abstracted">@get_abstracted</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/colbyderodeff/">https://www.linkedin.com/in/colbyderodeff/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Abstract Security: <a href="https://www.itspmagazine.com/directory/abstract-security">https://www.itspmagazine.com/directory/abstract-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="17717855" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/df639ec6-0bb9-48f1-918a-107331aa590c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=df639ec6-0bb9-48f1-918a-107331aa590c&amp;feed=kDNbmF_B"/>
      <itunes:title>Shaking Up the Security Information and Event Management Market | A Brand Story Conversation From RSA Conference 2024 | An Abstract Security Story with Colby DeRodeff | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Colby DeRodeff</itunes:author>
      <itunes:duration>00:18:26</itunes:duration>
      <itunes:summary>Discover how Abstract Security is revolutionizing cybersecurity data management at the RSA Conference.</itunes:summary>
      <itunes:subtitle>Discover how Abstract Security is revolutionizing cybersecurity data management at the RSA Conference.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, network security, rsa conference, rsa conference, colby derodeff, sean martin, threat detection, infosec, cybersecurity, cybersecurity, security tech, data management, innovation, cyber awareness, cyber defense, tech news, cyber protection, abstract security, data privacy, cloud security, cyber resilience, security solutions, digital security, brand story, cyber threats, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>21</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0d7d1de9-18be-4355-b719-fcbccdaf6f9b</guid>
      <title>From Data to Defense. Behind the Scenes of the DirectDefense&apos;s Threat Report Insights | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Jim Broome | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In cybersecurity, understanding the constantly evolving landscape of threats is key to safeguarding digital assets and sensitive information. DirectDefense, a leading security services provider, offers valuable insights into the world of threat intelligence through a candid conversation with Jim Broome, the Director of DirectDefense. In a recent discussion with Sean Martin, they delved into the nuances of IT and OT convergence, network separation, and the critical significance of threat reports.</p><p><strong>Uncovering Threat Intelligence Trends</strong></p><p>The dialogue between Sean Martin and Jim Broome sheds light on the intricate details of threat intelligence gathered by DirectDefense. Jim Broome's extensive experience in the industry, coupled with DirectDefense's commitment to cybersecurity excellence, unveils compelling narratives of threat actors, attack methodologies, and strategic responses to mitigate risks effectively.</p><p><strong>From Penetration Testing to Managed Services: DirectDefense's Evolution</strong></p><p>Jim Broome narrates DirectDefense's journey from its inception, focusing on core services like penetration testing and managed services. The shift towards leveraging threat reports to provide actionable insights to clients showcases DirectDefense's proactive approach in addressing emerging cyber threats effectively.</p><p><strong>The Impact of Threat Actor Behavior on Security Posture</strong></p><p>Through real-world examples like the Scattered Spider threat group's activities, Jim Broome highlights the direct impact of threat actor behavior on organizations. By dissecting attack vectors and lessons learned from engagements with threat actors, DirectDefense empowers clients with the knowledge to strengthen their security postures.</p><p><strong>Collaboration and Customized Solutions</strong></p><p>Jim Broome emphasizes the value of collaboration and customization in cybersecurity services. By tailoring alerts, response strategies, and monitoring solutions to suit each client's unique environment, DirectDefense fosters a culture of resilience and preparedness against potential cyber threats.</p><p><strong>Empowering Organizations with Actionable Insights</strong></p><p>The blog post underscores the importance of utilizing threat reports to gain actionable insights and establish robust security protocols. DirectDefense's approach to presenting information in a tangible and practical manner resonates with organizations seeking to enhance their cybersecurity frameworks.</p><p><strong>Looking Towards the Future of Cybersecurity</strong></p><p>As cybersecurity landscapes continue to evolve, organizations face the challenge of adapting to new threats and vulnerabilities. DirectDefense's proactive stance on integrating cybersecurity solutions with core IT disciplines signals a strategic approach towards ensuring operational resilience and uptime in critical infrastructure sectors.</p><p><strong>The Essence of Collaboration and Expert Guidance</strong></p><p>DirectDefense's emphasis on collaboration, expert guidance, and responsiveness to evolving threats underscores their commitment to ensuring clients are equipped with the necessary tools and insights to navigate the complex cybersecurity landscape successfully.</p><p>DirectDefense's conversation with Jim Broome offers a glimpse into the intricate world of threat intelligence, showcasing a blend of experience, expertise, and foresight in safeguarding organizations against cyber threats. By leveraging actionable insights and strategic responses, DirectDefense paves the way for a more secure and resilient digital environment.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Broome</strong>, President and CTO, DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jim-broome-88a0a02/">https://www.linkedin.com/in/jim-broome-88a0a02/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 19:14:19 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Broome)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/from-data-to-defense-behind-the-scenes-of-the-directdefenses-threat-report-insights-a-brand-story-conversation-from-rsa-conference-2024-a-directdefense-story-with-jim-broome-on-location-coverage-with-sean-martin-and-marco-ciappelli-FrdBTBmT</link>
      <content:encoded><![CDATA[<p>In cybersecurity, understanding the constantly evolving landscape of threats is key to safeguarding digital assets and sensitive information. DirectDefense, a leading security services provider, offers valuable insights into the world of threat intelligence through a candid conversation with Jim Broome, the Director of DirectDefense. In a recent discussion with Sean Martin, they delved into the nuances of IT and OT convergence, network separation, and the critical significance of threat reports.</p><p><strong>Uncovering Threat Intelligence Trends</strong></p><p>The dialogue between Sean Martin and Jim Broome sheds light on the intricate details of threat intelligence gathered by DirectDefense. Jim Broome's extensive experience in the industry, coupled with DirectDefense's commitment to cybersecurity excellence, unveils compelling narratives of threat actors, attack methodologies, and strategic responses to mitigate risks effectively.</p><p><strong>From Penetration Testing to Managed Services: DirectDefense's Evolution</strong></p><p>Jim Broome narrates DirectDefense's journey from its inception, focusing on core services like penetration testing and managed services. The shift towards leveraging threat reports to provide actionable insights to clients showcases DirectDefense's proactive approach in addressing emerging cyber threats effectively.</p><p><strong>The Impact of Threat Actor Behavior on Security Posture</strong></p><p>Through real-world examples like the Scattered Spider threat group's activities, Jim Broome highlights the direct impact of threat actor behavior on organizations. By dissecting attack vectors and lessons learned from engagements with threat actors, DirectDefense empowers clients with the knowledge to strengthen their security postures.</p><p><strong>Collaboration and Customized Solutions</strong></p><p>Jim Broome emphasizes the value of collaboration and customization in cybersecurity services. By tailoring alerts, response strategies, and monitoring solutions to suit each client's unique environment, DirectDefense fosters a culture of resilience and preparedness against potential cyber threats.</p><p><strong>Empowering Organizations with Actionable Insights</strong></p><p>The blog post underscores the importance of utilizing threat reports to gain actionable insights and establish robust security protocols. DirectDefense's approach to presenting information in a tangible and practical manner resonates with organizations seeking to enhance their cybersecurity frameworks.</p><p><strong>Looking Towards the Future of Cybersecurity</strong></p><p>As cybersecurity landscapes continue to evolve, organizations face the challenge of adapting to new threats and vulnerabilities. DirectDefense's proactive stance on integrating cybersecurity solutions with core IT disciplines signals a strategic approach towards ensuring operational resilience and uptime in critical infrastructure sectors.</p><p><strong>The Essence of Collaboration and Expert Guidance</strong></p><p>DirectDefense's emphasis on collaboration, expert guidance, and responsiveness to evolving threats underscores their commitment to ensuring clients are equipped with the necessary tools and insights to navigate the complex cybersecurity landscape successfully.</p><p>DirectDefense's conversation with Jim Broome offers a glimpse into the intricate world of threat intelligence, showcasing a blend of experience, expertise, and foresight in safeguarding organizations against cyber threats. By leveraging actionable insights and strategic responses, DirectDefense paves the way for a more secure and resilient digital environment.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jim Broome</strong>, President and CTO, DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jim-broome-88a0a02/">https://www.linkedin.com/in/jim-broome-88a0a02/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20489610" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1d149298-31c7-4f1e-ad34-3727871c3403/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1d149298-31c7-4f1e-ad34-3727871c3403&amp;feed=kDNbmF_B"/>
      <itunes:title>From Data to Defense. Behind the Scenes of the DirectDefense&apos;s Threat Report Insights | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Jim Broome | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jim Broome</itunes:author>
      <itunes:duration>00:21:19</itunes:duration>
      <itunes:summary>Explore the dynamic world of threat intelligence with DirectDefense&apos;s Jim Broome, offering insights into cybersecurity trends and strategies.</itunes:summary>
      <itunes:subtitle>Explore the dynamic world of threat intelligence with DirectDefense&apos;s Jim Broome, offering insights into cybersecurity trends and strategies.</itunes:subtitle>
      <itunes:keywords>uptime, managed services, collaboration, actionable insights, marco ciappelli, security posture, rsa conference, sean martin, cybersecurity, cybersecurity, threat actors, vulnerabilities, customization, penetration testing, directdefense, resilience, threat intelligence, expert guidance, operational resilience, proactive approach, core it disciplines, attack methodologies, jim broome, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>20</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">a1926abc-0034-4375-9170-a75ac93add3d</guid>
      <title>Presenting The Superhero Product for Browser Security at RSA Conference | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>As we journey through the ever-evolving landscape of enterprise and individual cybersecurity, it is clear for organizations that is it essential to stay one step ahead of malicious actors looking to exploit vulnerabilities. One such innovative solution, SquareX, has emerged as a superhero product in the market of browser security, providing a dynamic shield against sophisticated cyber threats.</p><p>At the recent RSA Conference, the founder and cybersecurity veteran, Vivek Ramachandran, shed light on the mission behind SquareX - to empower enterprises and individuals to be fearless online. The conversation with Sean Martin focuses onto the crucial role of browsers in modern-day cyberattacks and highlighted the challenges organizations face in securing this often overlooked aspect of their IT infrastructure.</p><p><strong>Unveiling the Blind Spot in Browser Security</strong></p><p>The dialogue between Sean and Vivek underscored the significance of addressing the blind spot that browsers present in the cybersecurity posture of organizations. While traditional security measures such as firewalls and web gateways play a vital role, they often fall short in detecting and mitigating threats originating from the browser.</p><p><strong>The Power of Managed Browsers and Browser Extensions</strong></p><p>Vivek emphasized the importance of deploying managed browsers as a foundational step towards enhancing visibility and control over browser-based threats. SquareX's browser extension acts as a vigilant guardian, monitoring every tab and window for anomalous activities and potential security risks.</p><p><strong>Real-World Impact: Stories from the Field</strong></p><p>Vivek shared compelling anecdotes of how SquareX has made a tangible difference in fortifying organizations against cyber threats. From preventing data leakage through unauthorized file uploads to thwarting sophisticated social engineering attacks via malicious documents, SquareX proved its effectiveness in identifying and neutralizing threats that evaded traditional security measures.</p><p><strong>Elevating Browser Security with Cutting-Edge Technology</strong></p><p>SquareX's innovative approach to browser security leverages AI vision and in-browser macro analysis to detect and block malicious activities in real-time. By providing detailed visibility into browser-based threats and streamlining post-incident forensics, SquareX equips organizations with the tools needed to proactively defend against evolving cyber threats.</p><p><strong>The Path to Enhanced Cyber Resilience</strong></p><p>In conclusion, the discussion between Sean Martin and Vivek Ramachandran encapsulates the essence of proactive cybersecurity measures in today's threat landscape. By embracing solutions like SquareX and prioritizing browser security, organizations can bolster their cyber resilience and safeguard their digital assets against sophisticated adversaries.</p><p>As we navigate the digital frontier, the importance of browser security cannot be overstated. With SquareX leading the charge as a superhero product of cybersecurity, organizations can embark on a journey towards a more secure and resilient future online.</p><p>Cheers to the new hero!</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 18:37:31 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/presenting-the-superhero-product-for-browser-security-at-rsa-conference-a-brand-story-conversation-from-rsa-conference-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-a4NPDYQp</link>
      <content:encoded><![CDATA[<p>As we journey through the ever-evolving landscape of enterprise and individual cybersecurity, it is clear for organizations that is it essential to stay one step ahead of malicious actors looking to exploit vulnerabilities. One such innovative solution, SquareX, has emerged as a superhero product in the market of browser security, providing a dynamic shield against sophisticated cyber threats.</p><p>At the recent RSA Conference, the founder and cybersecurity veteran, Vivek Ramachandran, shed light on the mission behind SquareX - to empower enterprises and individuals to be fearless online. The conversation with Sean Martin focuses onto the crucial role of browsers in modern-day cyberattacks and highlighted the challenges organizations face in securing this often overlooked aspect of their IT infrastructure.</p><p><strong>Unveiling the Blind Spot in Browser Security</strong></p><p>The dialogue between Sean and Vivek underscored the significance of addressing the blind spot that browsers present in the cybersecurity posture of organizations. While traditional security measures such as firewalls and web gateways play a vital role, they often fall short in detecting and mitigating threats originating from the browser.</p><p><strong>The Power of Managed Browsers and Browser Extensions</strong></p><p>Vivek emphasized the importance of deploying managed browsers as a foundational step towards enhancing visibility and control over browser-based threats. SquareX's browser extension acts as a vigilant guardian, monitoring every tab and window for anomalous activities and potential security risks.</p><p><strong>Real-World Impact: Stories from the Field</strong></p><p>Vivek shared compelling anecdotes of how SquareX has made a tangible difference in fortifying organizations against cyber threats. From preventing data leakage through unauthorized file uploads to thwarting sophisticated social engineering attacks via malicious documents, SquareX proved its effectiveness in identifying and neutralizing threats that evaded traditional security measures.</p><p><strong>Elevating Browser Security with Cutting-Edge Technology</strong></p><p>SquareX's innovative approach to browser security leverages AI vision and in-browser macro analysis to detect and block malicious activities in real-time. By providing detailed visibility into browser-based threats and streamlining post-incident forensics, SquareX equips organizations with the tools needed to proactively defend against evolving cyber threats.</p><p><strong>The Path to Enhanced Cyber Resilience</strong></p><p>In conclusion, the discussion between Sean Martin and Vivek Ramachandran encapsulates the essence of proactive cybersecurity measures in today's threat landscape. By embracing solutions like SquareX and prioritizing browser security, organizations can bolster their cyber resilience and safeguard their digital assets against sophisticated adversaries.</p><p>As we navigate the digital frontier, the importance of browser security cannot be overstated. With SquareX leading the charge as a superhero product of cybersecurity, organizations can embark on a journey towards a more secure and resilient future online.</p><p>Cheers to the new hero!</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="25470795" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7c4b50b3-1f25-4674-8f4d-9d7a4b74158a/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7c4b50b3-1f25-4674-8f4d-9d7a4b74158a&amp;feed=kDNbmF_B"/>
      <itunes:title>Presenting The Superhero Product for Browser Security at RSA Conference | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:duration>00:26:30</itunes:duration>
      <itunes:summary>In the ever-evolving landscape of cybersecurity, SquareX emerges as a superhero product at the forefront of browser security, offering organizations a shield against sophisticated cyber threats.</itunes:summary>
      <itunes:subtitle>In the ever-evolving landscape of cybersecurity, SquareX emerges as a superhero product at the forefront of browser security, offering organizations a shield against sophisticated cyber threats.</itunes:subtitle>
      <itunes:keywords>innovative solution, marco ciappelli, rsa conference, proactive defense, sean martin, real-time detection, managed browsers, cybersecurity, browser security, security measures, digital assets, forensics, digital frontier, malicious actors, cyber resilience, post-incident analysis, ai technology, ai vision, vivek ramachandran, squarex, web gateways, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>19</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">d498762a-4479-4f35-9210-085f7a37eb7a</guid>
      <title>Navigating the Future of AI Governance with LogicGate | A Brand Story Conversation From RSA Conference 2024 | A LogicGate Story with Matt Kunkel and Nick Kathmann | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The RSA Conference in San Francisco is renowned for being a hub of cutting-edge discussions around everything related to cybersecurity, and this year, one of the spotlight was on and AI governance. In this conversation featuring industry experts from LogicGate, the focus was on unraveling the challenges organizations face in adapting to the rapidly evolving landscape of AI implementation.</p><p><strong>Unveiling the Experts</strong></p><p>Moderated by Sean Martin, the discussion kicked off with a warm welcome to the LogicGate team, setting the stage for a deep dive into the complexity of AI governance. Matt Kunkel, the CEO of LogicGate, shared insights from his extensive consulting background in building GRC solutions for a diverse range of organizations. His vast experience culminated in the creation of the Risk Cloud Platform, a versatile tool that aids organizations in automating risk management processes tailored to their specific needs.</p><p><strong>The CISO Perspective</strong></p><p>Nick Kathmann, the Chief Information Security Officer at LogicGate, brought to the table over two decades of experience in cybersecurity. His journey through managing security compliance for major players like Virtustream and RSA highlighted the intricate web of challenges posed by evolving technologies like AI. Nick emphasized the critical importance of aligning internal governance with external regulations to ensure a robust security posture.</p><p><strong>Demystifying AI Governance</strong></p><p>As the conversation continues Sean Martin steered the discussion towards demystifying AI governance and its impact on organizational frameworks. The panel shed light on the dual challenges organizations face – the risk of embracing AI too recklessly and stifling innovation versus the risk of over-regulating and impeding progress. The consensus was clear – a balanced approach that marries speed and security is imperative for a successful AI governance strategy.</p><p><strong>The LogicGate Solution</strong></p><p>Matt and Nick unraveled the intricacies of the AI governance solution developed by LogicGate, designed to provide organizations with a holistic framework for managing AI risks. By integrating AI governance with existing risk management protocols, LogicGate’s platform offers a transformative approach that streamlines processes, enhances visibility, and ensures compliance with emerging standards.</p><p><strong>Looking Towards the Future</strong></p><p>The conversation concluded with a forward-looking approach, underscoring the rapidly evolving nature of AI technologies and the indispensable need for agile governance frameworks. The consensus was that staying ahead of the curve demands continuous assessment, adaptation, and alignment of AI governance with overarching business objectives.</p><p><strong>In Closing</strong></p><p>This episode of On Location Coverage at the RSA Conference 2024 offered a glimpse into the complexities and opportunities that AI governance presents for organizations worldwide. With LogicGate leading the charge in innovative solutions, the future of AI governance looks promising, anchored in a foundation of collaboration, foresight, and strategic alignment.</p><p>As organizations navigate the uncharted waters of AI implementation, partnering with pioneers like LogicGate is poised to be the key to unlocking the full potential of this transformative technology. Stay tuned for more insights and developments on AI governance as we journey towards a future powered by innovation and resilience.</p><p>Learn more about LogicGate: <a href="https://itspm.ag/logicgate-92d6bc">https://itspm.ag/logicgate-92d6bc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Matt Kunkel</strong>, CEO at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/matt-kunkel-91056143/">https://www.linkedin.com/in/matt-kunkel-91056143/</a></p><p><strong>Nick Kathmann</strong>, Chief Information Security Officer at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicholaskathmann/">https://www.linkedin.com/in/nicholaskathmann/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LogicGate: <a href="https://www.itspmagazine.com/directory/logicgate">https://www.itspmagazine.com/directory/logicgate</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 00:59:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Matt Kunkel, Nick Kathmann)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/navigating-the-future-of-ai-governance-with-logicgate-a-brand-story-conversation-from-rsa-conference-2024-a-logicgate-story-with-matt-kunkel-and-nick-kathmann-on-location-coverage-with-sean-martin-and-marco-ciappelli-cXMJDhCE</link>
      <content:encoded><![CDATA[<p>The RSA Conference in San Francisco is renowned for being a hub of cutting-edge discussions around everything related to cybersecurity, and this year, one of the spotlight was on and AI governance. In this conversation featuring industry experts from LogicGate, the focus was on unraveling the challenges organizations face in adapting to the rapidly evolving landscape of AI implementation.</p><p><strong>Unveiling the Experts</strong></p><p>Moderated by Sean Martin, the discussion kicked off with a warm welcome to the LogicGate team, setting the stage for a deep dive into the complexity of AI governance. Matt Kunkel, the CEO of LogicGate, shared insights from his extensive consulting background in building GRC solutions for a diverse range of organizations. His vast experience culminated in the creation of the Risk Cloud Platform, a versatile tool that aids organizations in automating risk management processes tailored to their specific needs.</p><p><strong>The CISO Perspective</strong></p><p>Nick Kathmann, the Chief Information Security Officer at LogicGate, brought to the table over two decades of experience in cybersecurity. His journey through managing security compliance for major players like Virtustream and RSA highlighted the intricate web of challenges posed by evolving technologies like AI. Nick emphasized the critical importance of aligning internal governance with external regulations to ensure a robust security posture.</p><p><strong>Demystifying AI Governance</strong></p><p>As the conversation continues Sean Martin steered the discussion towards demystifying AI governance and its impact on organizational frameworks. The panel shed light on the dual challenges organizations face – the risk of embracing AI too recklessly and stifling innovation versus the risk of over-regulating and impeding progress. The consensus was clear – a balanced approach that marries speed and security is imperative for a successful AI governance strategy.</p><p><strong>The LogicGate Solution</strong></p><p>Matt and Nick unraveled the intricacies of the AI governance solution developed by LogicGate, designed to provide organizations with a holistic framework for managing AI risks. By integrating AI governance with existing risk management protocols, LogicGate’s platform offers a transformative approach that streamlines processes, enhances visibility, and ensures compliance with emerging standards.</p><p><strong>Looking Towards the Future</strong></p><p>The conversation concluded with a forward-looking approach, underscoring the rapidly evolving nature of AI technologies and the indispensable need for agile governance frameworks. The consensus was that staying ahead of the curve demands continuous assessment, adaptation, and alignment of AI governance with overarching business objectives.</p><p><strong>In Closing</strong></p><p>This episode of On Location Coverage at the RSA Conference 2024 offered a glimpse into the complexities and opportunities that AI governance presents for organizations worldwide. With LogicGate leading the charge in innovative solutions, the future of AI governance looks promising, anchored in a foundation of collaboration, foresight, and strategic alignment.</p><p>As organizations navigate the uncharted waters of AI implementation, partnering with pioneers like LogicGate is poised to be the key to unlocking the full potential of this transformative technology. Stay tuned for more insights and developments on AI governance as we journey towards a future powered by innovation and resilience.</p><p>Learn more about LogicGate: <a href="https://itspm.ag/logicgate-92d6bc">https://itspm.ag/logicgate-92d6bc</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guests: </strong></p><p><strong>Matt Kunkel</strong>, CEO at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/matt-kunkel-91056143/">https://www.linkedin.com/in/matt-kunkel-91056143/</a></p><p><strong>Nick Kathmann</strong>, Chief Information Security Officer at LogicGate [<a href="https://twitter.com/LogicGate">@LogicGate</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nicholaskathmann/">https://www.linkedin.com/in/nicholaskathmann/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from LogicGate: <a href="https://www.itspmagazine.com/directory/logicgate">https://www.itspmagazine.com/directory/logicgate</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20074596" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/67ae7f0f-365c-4154-bfbd-8392dc89c38f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=67ae7f0f-365c-4154-bfbd-8392dc89c38f&amp;feed=kDNbmF_B"/>
      <itunes:title>Navigating the Future of AI Governance with LogicGate | A Brand Story Conversation From RSA Conference 2024 | A LogicGate Story with Matt Kunkel and Nick Kathmann | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Matt Kunkel, Nick Kathmann</itunes:author>
      <itunes:duration>00:20:53</itunes:duration>
      <itunes:summary>In this episode of LogicGate RSAC 2024 Brand Story, we delve into the world of AI governance and its impact on organizations.AI responses can produce inaccurate information about people, places, or facts.</itunes:summary>
      <itunes:subtitle>In this episode of LogicGate RSAC 2024 Brand Story, we delve into the world of AI governance and its impact on organizations.AI responses can produce inaccurate information about people, places, or facts.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, business governance, artificial intelligence, third party risk management, rsa conference, technology safety, ethics in ai, ai governance, sean martin, logic gate rsac 2024, risk and compliance, tech industry, cybersecurity, enterprise risk, compliance programs, compliance frameworks, data security, risk programs, matt kunkel, nick kathmann, regulatory risk, technology impact, privacy regulations, security teams, brand story, security and governance</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>18</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">7eb20dac-55c1-4473-b92f-6fcb24d2c76b</guid>
      <title>Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Sean and Jon Baker, shedding light on the groundbreaking work being done at MITRE's Center for Threat Informed Defense.</p><p><strong>The Art of Possible: A Glimpse into RSA Conference 2024</strong></p><p>The RSA Conference provided a platform for cybersecurity professionals to come together and discuss pressing issues in the industry. Sean Martin and Jon Baker's conversation touched upon the theme of this year's conference, "The Art of Possible." This theme resonated with the audience as they delved into the dynamic nature of cybersecurity and the need for continual learning and growth.</p><p><strong>MITRE: A Beacon of Innovation in Cybersecurity</strong></p><p>Jon Baker, Director of the Center for Threat Informed Defense at MITRE, shared insights into the organization's rich history and its mission to solve problems for a safer world. With a focus on advancing threat informed defense globally, MITRE has been a driving force behind initiatives like the ATT&CK framework and the CVE program.</p><p><strong>Collaborative Research and Development at MITRE</strong></p><p>One of the key pillars of MITRE's work is collaborative research and development. Through projects like the Technique Inference Engine and Summoning the Pyramid, MITRE is pushing the boundaries of what is possible in cybersecurity. These projects not only aim to enhance detection capabilities but also empower security teams to proactively defend against threats.</p><p><strong>Engaging the Community: How You Can Get Involved</strong></p><p>The Center for Threat Informed Defense encourages active participation from the cybersecurity community. By leveraging resources like the Top Attack Technique Calculator and M3TID, organizations can enhance their threat intelligence capabilities and improve their defenses. MITRE also hosts global events and training sessions to promote awareness and facilitate knowledge sharing.</p><p><strong>Join the Movement: Embracing Innovation in Cybersecurity</strong></p><p>As the cybersecurity landscape continues to evolve, embracing innovation is key to staying ahead of cyber threats. MITRE's Center for Threat Informed Defense offers a roadmap for organizations looking to enhance their security posture and adapt to the changing threat landscape. By getting involved, providing feedback, and leveraging the tools and resources available, organizations can contribute to a safer and more secure digital ecosystem.</p><p><strong>Closing Thoughts</strong></p><p>The conversation between Sean Martin and Jon Baker at the RSA Conference highlighted the critical role of collaboration and innovation in cybersecurity. MITRE's Center for Threat Informed Defense is at the forefront of driving impactful research and development efforts that benefit the entire cybersecurity community. By embracing the spirit of continual learning and advancement, organizations can strengthen their defenses and create a more resilient cybersecurity posture.</p><p>Stay tuned for more insights and updates from MITRE's Center for Threat Informed Defense and join the movement towards a safer digital world.</p><p>Learn more about MITRE:<a href="https://itspm.ag/mitre-eng24">https://itspm.ag/mitre-eng24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jon Baker</strong>, Director , Center for Threat-Informed Defense, MITRE [<a href="https://twitter.com/mitrecorp"><strong>@MITREcorp</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jonathanobaker/">https://www.linkedin.com/in/jonathanobaker/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from MITRE: <a href="https://www.itspmagazine.com/directory/mitre">https://www.itspmagazine.com/directory/mitre</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 8 May 2024 00:04:47 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Baker)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/innovations-in-cybersecurity-and-threat-intelligence-solutions-a-brand-story-conversation-from-rsa-conference-2024-a-mitre-story-with-jon-baker-on-location-coverage-with-sean-martin-and-marco-ciappelli-A2L5zPYW</link>
      <content:encoded><![CDATA[<p>The cybersecurity landscape is ever-evolving, and staying ahead of threats requires constant innovation and collaboration. At the recent RSA Conference, industry experts gathered to discuss the latest trends and advancements in the field. One of the On Location Coverage with Sean Martin and Marco Ciappelli was the insightful conversation between Sean and Jon Baker, shedding light on the groundbreaking work being done at MITRE's Center for Threat Informed Defense.</p><p><strong>The Art of Possible: A Glimpse into RSA Conference 2024</strong></p><p>The RSA Conference provided a platform for cybersecurity professionals to come together and discuss pressing issues in the industry. Sean Martin and Jon Baker's conversation touched upon the theme of this year's conference, "The Art of Possible." This theme resonated with the audience as they delved into the dynamic nature of cybersecurity and the need for continual learning and growth.</p><p><strong>MITRE: A Beacon of Innovation in Cybersecurity</strong></p><p>Jon Baker, Director of the Center for Threat Informed Defense at MITRE, shared insights into the organization's rich history and its mission to solve problems for a safer world. With a focus on advancing threat informed defense globally, MITRE has been a driving force behind initiatives like the ATT&CK framework and the CVE program.</p><p><strong>Collaborative Research and Development at MITRE</strong></p><p>One of the key pillars of MITRE's work is collaborative research and development. Through projects like the Technique Inference Engine and Summoning the Pyramid, MITRE is pushing the boundaries of what is possible in cybersecurity. These projects not only aim to enhance detection capabilities but also empower security teams to proactively defend against threats.</p><p><strong>Engaging the Community: How You Can Get Involved</strong></p><p>The Center for Threat Informed Defense encourages active participation from the cybersecurity community. By leveraging resources like the Top Attack Technique Calculator and M3TID, organizations can enhance their threat intelligence capabilities and improve their defenses. MITRE also hosts global events and training sessions to promote awareness and facilitate knowledge sharing.</p><p><strong>Join the Movement: Embracing Innovation in Cybersecurity</strong></p><p>As the cybersecurity landscape continues to evolve, embracing innovation is key to staying ahead of cyber threats. MITRE's Center for Threat Informed Defense offers a roadmap for organizations looking to enhance their security posture and adapt to the changing threat landscape. By getting involved, providing feedback, and leveraging the tools and resources available, organizations can contribute to a safer and more secure digital ecosystem.</p><p><strong>Closing Thoughts</strong></p><p>The conversation between Sean Martin and Jon Baker at the RSA Conference highlighted the critical role of collaboration and innovation in cybersecurity. MITRE's Center for Threat Informed Defense is at the forefront of driving impactful research and development efforts that benefit the entire cybersecurity community. By embracing the spirit of continual learning and advancement, organizations can strengthen their defenses and create a more resilient cybersecurity posture.</p><p>Stay tuned for more insights and updates from MITRE's Center for Threat Informed Defense and join the movement towards a safer digital world.</p><p>Learn more about MITRE:<a href="https://itspm.ag/mitre-eng24">https://itspm.ag/mitre-eng24</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Jon Baker</strong>, Director , Center for Threat-Informed Defense, MITRE [<a href="https://twitter.com/mitrecorp"><strong>@MITREcorp</strong></a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jonathanobaker/">https://www.linkedin.com/in/jonathanobaker/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from MITRE: <a href="https://www.itspmagazine.com/directory/mitre">https://www.itspmagazine.com/directory/mitre</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19186854" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/5f200b08-d234-44cd-9b95-3640076dce3f/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=5f200b08-d234-44cd-9b95-3640076dce3f&amp;feed=kDNbmF_B"/>
      <itunes:title>Innovations in Cybersecurity and Threat Intelligence Solutions | A Brand Story Conversation From RSA Conference 2024 | A MITRE Story with Jon Baker | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Jon Baker</itunes:author>
      <itunes:duration>00:19:57</itunes:duration>
      <itunes:summary>Join Sean Martin as he discusses the present and future of cybersecurity threats with Jon Baker from MITRE, discussing cutting-edge research projects and the mission to advance threat informed defense globally.</itunes:summary>
      <itunes:subtitle>Join Sean Martin as he discusses the present and future of cybersecurity threats with Jon Baker from MITRE, discussing cutting-edge research projects and the mission to advance threat informed defense globally.</itunes:subtitle>
      <itunes:keywords>marco ciappelli, network security, rsa conference, rsa conference, sean martin, threat detection, technology innovations, jon baker, cybersecurity, data protection, information security, cyber defense, threat intelligence, threat informed defense, security programs, cyber resilience, mitre, cybersecurity research, security solutions, cyber attacks, cybersecurity professionals, digital security, brand story, cyber threats, it security</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>17</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">14fee753-b478-489f-a54f-abbd41c30f96</guid>
      <title>Navigating the World of Operational Technology and Cybersecurity | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Chris Walcutt | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In a recent episode recorded live at the RSA Conference, an insightful discussion unfolded between Sean Martin and Chris Walcutt on the intersection of operational technology (OT) and cybersecurity. The conversation look into the challenges, insights, and best practices surrounding these vital areas of technology. Let's dive deeper into the key takeaways from this engaging dialogue.</p><p><strong>Bridging the Gap Between IT and OT</strong></p><p>Chris emphasized the importance of collaboration between IT and OT teams, highlighting the need for mutual understanding and cooperation. By fostering communication and building trust, organizations can navigate the complexities of integrating IT and OT systems effectively.</p><p><strong>Understanding Critical Infrastructure</strong></p><p>One of the key insights shared by Chris revolved around the critical nature of infrastructure, particularly in sectors such as energy, water, and manufacturing. The emphasis on resilience-based risk assessments and the need to comprehensively evaluate vulnerabilities underscored the importance of proactive cybersecurity measures.</p><p><strong>The Purdue Model and Practical Approaches</strong></p><p>Chris shed light on the Purdue model, a framework often referenced in the OT space. While acknowledging its value, he emphasized the need for practical implementations tailored to individual environments. Simplifying zones and focusing on critical operational aspects can enhance security without compromising system performance.</p><p><strong>Fostering Resilience through Collaboration</strong></p><p>The conversation underscored the significance of resilience in cybersecurity efforts. By fostering collaboration, implementing tailored security measures, and leveraging expertise across IT and OT domains, organizations can bolster their resilience to cyber threats effectively.</p><p><strong>Procurement as a Strategic Ally</strong></p><p>An insightful recommendation from Chris highlighted the role of procurement as a strategic ally in the cybersecurity landscape. Educating procurement teams on the specific needs of OT systems and integrating cybersecurity requirements into vendor contracts can fortify defense mechanisms and mitigate risks.</p><p>The dialogue between Sean Martin and Chris Walcutt offered a comprehensive glimpse into the dynamic realm of operational technology and cybersecurity. By emphasizing collaboration, risk assessment, and strategic partnerships, organizations can navigate the evolving cybersecurity landscape with resilience and adaptability.</p><p>The insights shared in this conversation serve as a valuable resource for IT and OT professionals seeking to enhance their cybersecurity practices and fortify critical infrastructure against potential threats. Embracing a proactive and collaborative approach can pave the way for a more secure and resilient technological ecosystem.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Walcutt</strong>, Chief Security Officer at DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/">https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:58:19 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Walcutt)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/navigating-the-world-of-operational-technology-and-cybersecurity-a-brand-story-conversation-from-rsa-conference-2024-a-directdefense-story-with-chris-walcutt-on-location-coverage-with-sean-martin-and-marco-ciappelli-su8mXQEe</link>
      <content:encoded><![CDATA[<p>In a recent episode recorded live at the RSA Conference, an insightful discussion unfolded between Sean Martin and Chris Walcutt on the intersection of operational technology (OT) and cybersecurity. The conversation look into the challenges, insights, and best practices surrounding these vital areas of technology. Let's dive deeper into the key takeaways from this engaging dialogue.</p><p><strong>Bridging the Gap Between IT and OT</strong></p><p>Chris emphasized the importance of collaboration between IT and OT teams, highlighting the need for mutual understanding and cooperation. By fostering communication and building trust, organizations can navigate the complexities of integrating IT and OT systems effectively.</p><p><strong>Understanding Critical Infrastructure</strong></p><p>One of the key insights shared by Chris revolved around the critical nature of infrastructure, particularly in sectors such as energy, water, and manufacturing. The emphasis on resilience-based risk assessments and the need to comprehensively evaluate vulnerabilities underscored the importance of proactive cybersecurity measures.</p><p><strong>The Purdue Model and Practical Approaches</strong></p><p>Chris shed light on the Purdue model, a framework often referenced in the OT space. While acknowledging its value, he emphasized the need for practical implementations tailored to individual environments. Simplifying zones and focusing on critical operational aspects can enhance security without compromising system performance.</p><p><strong>Fostering Resilience through Collaboration</strong></p><p>The conversation underscored the significance of resilience in cybersecurity efforts. By fostering collaboration, implementing tailored security measures, and leveraging expertise across IT and OT domains, organizations can bolster their resilience to cyber threats effectively.</p><p><strong>Procurement as a Strategic Ally</strong></p><p>An insightful recommendation from Chris highlighted the role of procurement as a strategic ally in the cybersecurity landscape. Educating procurement teams on the specific needs of OT systems and integrating cybersecurity requirements into vendor contracts can fortify defense mechanisms and mitigate risks.</p><p>The dialogue between Sean Martin and Chris Walcutt offered a comprehensive glimpse into the dynamic realm of operational technology and cybersecurity. By emphasizing collaboration, risk assessment, and strategic partnerships, organizations can navigate the evolving cybersecurity landscape with resilience and adaptability.</p><p>The insights shared in this conversation serve as a valuable resource for IT and OT professionals seeking to enhance their cybersecurity practices and fortify critical infrastructure against potential threats. Embracing a proactive and collaborative approach can pave the way for a more secure and resilient technological ecosystem.</p><p>Learn more about DirectDefense: <a href="https://itspm.ag/directdef-gs7">https://itspm.ag/directdef-gs7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Chris Walcutt</strong>, Chief Security Officer at DirectDefense [<a href="https://twitter.com/Direct_Defense">@Direct_Defense</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/">https://www.linkedin.com/in/christopher-walcutt-cism-cissp-45a6631/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from DirectDefense: <a href="https://www.itspmagazine.com/directory/directdefense">https://www.itspmagazine.com/directory/directdefense</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="27043075" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/0319d421-c1f8-4d6c-99d4-4c4098a2c663/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=0319d421-c1f8-4d6c-99d4-4c4098a2c663&amp;feed=kDNbmF_B"/>
      <itunes:title>Navigating the World of Operational Technology and Cybersecurity | A Brand Story Conversation From RSA Conference 2024 | A DirectDefense Story with Chris Walcutt | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chris Walcutt</itunes:author>
      <itunes:duration>00:28:08</itunes:duration>
      <itunes:summary>Explore the intersection of operational technology and cybersecurity in a captivating dialogue between Sean Martin and Chris Walcutt.</itunes:summary>
      <itunes:subtitle>Explore the intersection of operational technology and cybersecurity in a captivating dialogue between Sean Martin and Chris Walcutt.</itunes:subtitle>
      <itunes:keywords>it-ot communication, cybersecurity dialogue at rsa conference, marco ciappelli, rsa conference, sean martin, it and ot integration, critical infrastructure security, operational technology, cybersecurity, ot cybersecurity best practices, enhancing ot security, building cyber resilience, cybersecurity resilience strategies, it and ot collaboration, procurement strategies for cybersecurity, understanding ot systems, bridging it and ot divide, risk management in operational technology, chris walcutt, resilience-based risk assessment, purdue model in cybersecurity, ot security challenges, vendor security contracts, cyber threats in critical infrastructure, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>16</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">71281b36-e875-4b85-9a8e-b78d38fe190d</guid>
      <title>Unveiling the World of Bad Bots: Insights from Imperva&apos;s 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.</p><p><strong>Unraveling the Bad Bot Landscape</strong></p><p>The conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.</p><p><strong>Delving into Key Statistics</strong></p><p>Erez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.</p><p><strong>Industry Insights and Use Cases</strong></p><p>The conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.</p><p><strong>Transforming Data into Action</strong></p><p>Sean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.</p><p><strong>AI's Role in Bot Evolution</strong></p><p>The discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.</p><p><strong>Safeguarding Against Bot Abuse</strong></p><p>The conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.</p><p><strong>Conclusion</strong></p><p>As the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.</p><p>By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Erez Hasson</strong>, Product Marketing Manager at Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/erezh/" target="_blank">https://www.linkedin.com/in/erezh/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:34:45 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Erez Hasson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/unveiling-the-world-of-bad-bots-insights-from-impervas-11th-edition-report-a-brand-story-conversation-from-rsa-conference-2024-an-imperva-story-with-erez-hasson-on-location-coverage-with-sean-martin-and-marco-ciappelli-53Ke36zA</link>
      <content:encoded><![CDATA[<p>The world of cybersecurity never ceases to amaze with its intricacies and challenges. One of the ongoing battles that organizations face is the constant threat posed by bad bots infiltrating the digital landscape. In a recent interview with Sean Martin and Erez Hasson from Imperva, key insights from the 11th edition of the Bad Bot Report were unveiled, shedding light on the evolving nature of automated traffic and the impact it has on various industries.</p><p><strong>Unraveling the Bad Bot Landscape</strong></p><p>The conversation kicks off with Sean Martin introducing the topic of bad bots and the significance of Imperva's Bad Bot Report in providing insights into the world of automated traffic. Erez Hasson, a senior product marketing manager at Imperva, dives into the details of the 11th edition report, which is based on a staggering 6 trillion blocked bad bot requests processed by the Imperva network over the past year.</p><p><strong>Delving into Key Statistics</strong></p><p>Erez Hasson elaborates on the critical statistics highlighted in the report, such as the percentage breakdown of automated traffic into bad bots and good bots. The report categorizes bad bots based on their sophistication levels, ranging from simple to advanced (evasive), emphasizing the need for robust bot management strategies to combat sophisticated attacks.</p><p><strong>Industry Insights and Use Cases</strong></p><p>The conversation shifts towards exploring the impact of bad bots across different industries, with a focus on sectors such as Law, Government, Travel, Airlines, Retail, and Financial Services. Erez emphasizes the need for organizations to understand the sophistication level of bot attacks targeting their industry to effectively mitigate risks and safeguard their digital assets.</p><p><strong>Transforming Data into Action</strong></p><p>Sean Martin underscores the importance of translating the insights from the Bad Bot Report into actionable strategies for organizations. By leveraging the educational content provided in the report, companies can enhance their understanding of bot-related challenges and tailor their security programs to address potential threats effectively.</p><p><strong>AI's Role in Bot Evolution</strong></p><p>The discussion moves into the intersection of artificial intelligence (AI) and bot activity, highlighting the increased use of AI-driven attacks, including credential stuffing attacks orchestrated through AI algorithms. The evolving landscape of automated traffic poses challenges for organizations, necessitating a proactive approach to mitigate risks associated with bot-driven activities.</p><p><strong>Safeguarding Against Bot Abuse</strong></p><p>The conversation touches upon the misuse of bots targeting AI interfaces, leading to increased operational costs for organizations. Additionally, the resurgence of debates around the legality of web scraping underscores the complex nature of combating bot-related activities and protecting proprietary content from illicit scraping practices.</p><p><strong>Conclusion</strong></p><p>As the conversation draws to a close, a call to action is extended to readers to delve into the insights provided by Imperva's Bad Bot Report and equip themselves with the knowledge needed to combat bot threats effectively. The collaboration between security teams, leadership, and practitioners is essential in implementing robust bot management strategies to safeguard against evolving cyber threats.</p><p>By understanding bad bots and automated traffic, organizations can bolster their cybersecurity defenses and stay ahead of malicious actors looking to exploit digital vulnerabilities. The insights shared in Imperva's 11th edition report serve as the base of awareness, guiding organizations towards a more secure digital future.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Erez Hasson</strong>, Product Marketing Manager at Imperva [<a href="https://twitter.com/Imperva">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/erezh/" target="_blank">https://www.linkedin.com/in/erezh/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva: <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="20799636" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/8eff24ab-92ad-419e-8187-ff19a3b300cf/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=8eff24ab-92ad-419e-8187-ff19a3b300cf&amp;feed=kDNbmF_B"/>
      <itunes:title>Unveiling the World of Bad Bots: Insights from Imperva&apos;s 11th Edition Report | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Erez Hasson | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Erez Hasson</itunes:author>
      <itunes:duration>00:21:38</itunes:duration>
      <itunes:summary>Dive into the world of cybersecurity and automated traffic with key insights from Imperva&apos;s 11th edition Bad Bot Report.</itunes:summary>
      <itunes:subtitle>Dive into the world of cybersecurity and automated traffic with key insights from Imperva&apos;s 11th edition Bad Bot Report.</itunes:subtitle>
      <itunes:keywords>automated traffic, malicious activities, web scraping, marco ciappelli, digital defense, rsa conference, bad bots, cyber intelligence, sean martin, ai-driven attacks, web security, erez hasson, cybersecurity, bot sophistication, threat mitigation, ai interface attacks, data protection, bot management, security strategies, imperva, cyber resilience, industry insights, operational costs, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>15</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">321d5e92-5dc7-4cae-8652-a1f25a4ff1cf</guid>
      <title>Embracing the Art of Possible | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Nanhi Singh | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.</p><p><strong>Embracing Technology for Business Success</strong></p><p>The theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.</p><p><strong>Navigating the Complexities of Application Environments</strong></p><p>As organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.</p><p><strong>Addressing Concerns of API-Driven Attacks</strong></p><p>The conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.</p><p><strong>Empowering Organizations with Comprehensive Security Solutions</strong></p><p>With the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.</p><p><strong>Driving Operational Efficiency and Focus</strong></p><p>In a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.</p><p><strong>Securing Applications Anywhere</strong></p><p>As applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.</p><p><strong>Conclusion</strong></p><p>The engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.</p><p>Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.</p><p>Thank you for joining us in this exploration of cybersecurity and business resilience.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Nanhi Singh</strong>, Chief Customer Officer and GM Application Security at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nanhi-singh-aa51371" target="_blank">https://www.linkedin.com/in/nanhi-singh-aa51371</a></p><p>On Twitter | <a href="https://twitter.com/NanhiSingh14" target="_blank">https://twitter.com/NanhiSingh14</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 04:00:51 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Nanhi Singh)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/embracing-the-art-of-possible-a-brand-story-conversation-from-rsa-conference-2024-an-imperva-story-with-nanhi-singh-on-location-coverage-with-sean-martin-and-marco-ciappelli-NeML0w_u</link>
      <content:encoded><![CDATA[<p>In the buzzing atmosphere of the RSA conference in San Francisco, key players in the cybersecurity industry gathered to discuss the evolving landscape of technology and data security. Among them was Nanhi Singh, the General Manager for the application security business of Imperva, who shared insights on how organizations are redefining cybersecurity to achieve better business outcomes.</p><p><strong>Embracing Technology for Business Success</strong></p><p>The theme of this year's conference, "The Art of Possible," resonated with Nahnhi Singh as she highlighted the shifting perspectives of executives and organizations towards leveraging technology and cybersecurity to drive business growth. In a conversation with Sean Martin, host of the Redefining Cybersecurity podcast on ITSP magazine, Nanhi discussed the critical role of CIOs and CISOs in not only securing digital experiences but also enabling business innovations.</p><p><strong>Navigating the Complexities of Application Environments</strong></p><p>As organizations embark on their digital transformation journeys, the complexities of modern application environments come to the forefront. Nanhi emphasized the prevalence of APIs in connecting various systems and the challenges of securing these connections amidst cloud migrations and hybrid infrastructures. Imperva's API security solutions were highlighted as essential tools in providing visibility and protection against potential threats.</p><p><strong>Addressing Concerns of API-Driven Attacks</strong></p><p>The conversation delved into the rising concern of API-driven attacks, with Nanhi underscoring the importance of identifying and mitigating threats posed by advanced bots targeting organizations across different industries. By leveraging Imperva's advanced bot protection solutions and a comprehensive security portfolio, organizations can fortify their defenses against evolving cyber threats.</p><p><strong>Empowering Organizations with Comprehensive Security Solutions</strong></p><p>With the recent acquisition of Imperva by Thales, Nanhi Singh showcased the combined strength of their security offerings, encompassing application security, API security, advanced bot protection, data security, encryption, key management, and identity and access management solutions. This holistic approach enables organizations to protect their data and applications across diverse environments and technologies.</p><p><strong>Driving Operational Efficiency and Focus</strong></p><p>In a landscape where security teams are stretched thin and faced with cost constraints, Imperva's solutions aim to enhance operational efficiency and empower teams to concentrate on strategic security initiatives. By automating security controls and collaborating closely with customers to mitigate threats, Imperva ensures that organizations can operate securely and effectively in a rapidly evolving digital ecosystem.</p><p><strong>Securing Applications Anywhere</strong></p><p>As applications are deployed across multiple cloud providers and environments, the need to secure them anywhere becomes paramount. Imperva's commitment to safeguarding applications and APIs regardless of their deployment location reinforces the idea that security should be intrinsic to every aspect of an organization's digital infrastructure.</p><p><strong>Conclusion</strong></p><p>The engaging dialogue between Nanhi Singh and Sean Martin offered valuable insights into the current cybersecurity landscape and the imperative for organizations to adapt proactively to emerging threats. By embracing the art of what is possible in cybersecurity, businesses can not only safeguard their digital assets but also unlock new opportunities for growth and innovation. Imperva's comprehensive security solutions stand as a beacon of trust and efficacy in an ever-evolving cybersecurity landscape.</p><p>Stay tuned for more insightful conversations and updates from Imperva at the RSA Conference, and continue following our coverage to stay abreast of the latest trends and developments in cybersecurity.</p><p>Thank you for joining us in this exploration of cybersecurity and business resilience.</p><p>Learn more about Imperva: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Nanhi Singh</strong>, Chief Customer Officer and GM Application Security at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/nanhi-singh-aa51371" target="_blank">https://www.linkedin.com/in/nanhi-singh-aa51371</a></p><p>On Twitter | <a href="https://twitter.com/NanhiSingh14" target="_blank">https://twitter.com/NanhiSingh14</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19889255" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/f8f0ff16-b54d-42e5-9236-b4cc96160786/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=f8f0ff16-b54d-42e5-9236-b4cc96160786&amp;feed=kDNbmF_B"/>
      <itunes:title>Embracing the Art of Possible | A Brand Story Conversation From RSA Conference 2024 | An Imperva Story with Nanhi Singh | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Nanhi Singh</itunes:author>
      <itunes:duration>00:20:41</itunes:duration>
      <itunes:summary>Join us for a deep dive into cybersecurity insights with Nanhi Singh from Imperva at the RSA conference.</itunes:summary>
      <itunes:subtitle>Join us for a deep dive into cybersecurity insights with Nanhi Singh from Imperva at the RSA conference.</itunes:subtitle>
      <itunes:keywords>cyberdefense, technology, marco ciappelli, rsa conference, applicationsecurity, sean martin, cyberrisk, infosec, cyberawareness, networksecurity, cybersecurity, digitaltransformation, dataprotection, cloudsecurity, businesssecurity, datasecurity, cyberthreats, imperva, rsaconference, cyberaware, itsecurity, apis, nanhi singh, brand story, securitysolutions</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>14</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">77d885fa-d5dc-464d-b049-66f00ec46cc8</guid>
      <title>Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.</p><p><strong>Protecting Data in the New Technological Landscape</strong></p><p>Vishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.</p><p><strong>Shifting from Infrastructure to Data Protection</strong></p><p>The dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.</p><p><strong>Enabling Secure Data Collaboration with Seclore</strong></p><p>By introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.</p><p><strong>Navigating the Path to Data-Centric Security</strong></p><p>As enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.</p><p>The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.</p><p>Learn more about Seclore: <a href="https://itspm.ag/seclore-km6r">https://itspm.ag/seclore-km6r </a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vishal Gupta</strong>, CEO, Seclore [<a href="https://twitter.com/secloretech">@secloretech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jiguptaji/">https://www.linkedin.com/in/jiguptaji/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Seclore: <a href="https://www.itspmagazine.com/directory/seclore">https://www.itspmagazine.com/directory/seclore</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 7 May 2024 02:09:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vishal Gupta)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/embracing-data-centric-security-a-brand-story-conversation-from-rsa-conference-2024-a-seclore-story-with-vishal-gupta-on-location-coverage-with-sean-martin-and-marco-ciappelli-n9QyLzxM</link>
      <content:encoded><![CDATA[<p>Amidst the buzzing atmosphere of RSA Conference 2024, Sean Martin, host an On Location Brand Story With ITSPmagazine, engages in a thought-provoking discussion with Vishal Gupta, co-founder of Seclore. The theme of this year's conference, the Art of Possible, sets the stage for a conversation that unravels the critical role of data in driving business innovation and success.</p><p><strong>Protecting Data in the New Technological Landscape</strong></p><p>Vishal Gupta sheds light on the importance of ensuring that security and collaboration align seamlessly, emphasizing that CISOs and security teams must work in harmony to foster a secure yet conducive business environment. In a world where data sprawls across diverse platforms and devices, the focus on data protection emerges as a paramount necessity to mitigate risks and safeguard critical assets.</p><p><strong>Shifting from Infrastructure to Data Protection</strong></p><p>The dialogue navigates towards a fundamental shift from traditional infrastructure protection to data-centric security. Gupta highlights the challenges that arise when enterprises grapple with securing an ever-expanding volume of data across varied networks, devices, and applications. The conversation underscores the significance of transitioning towards a data-centric approach to address the inherent vulnerabilities in contemporary cybersecurity frameworks.</p><p><strong>Enabling Secure Data Collaboration with Seclore</strong></p><p>By introducing the innovative concept of embedding security, privacy, and compliance directly into the data itself, Seclore revolutionizes the paradigm of data sharing and collaboration. Gupta elucidates how organizations can enforce personalized security policies, regulate data access, and monitor data interactions in real-time to prevent unauthorized usage and ensure data integrity.</p><p><strong>Navigating the Path to Data-Centric Security</strong></p><p>As enterprises embark on the journey towards data-centric security, Gupta emphasizes the importance of meticulous planning and strategic implementation. By focusing on targeted use cases and achieving early wins, organizations can gradually scale their data protection initiatives and cultivate a culture of data-centricity within their operations.</p><p>The enriching discussion between Sean Martin and Vishal Gupta showcases the transformative potential of data-centric security solutions in the realm of cybersecurity. For further insights and collaboration opportunities with Seclore, connect with them on LinkedIn, on their website, or meet them at upcoming industry events.</p><p>Learn more about Seclore: <a href="https://itspm.ag/seclore-km6r">https://itspm.ag/seclore-km6r </a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vishal Gupta</strong>, CEO, Seclore [<a href="https://twitter.com/secloretech">@secloretech</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/jiguptaji/">https://www.linkedin.com/in/jiguptaji/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Seclore: <a href="https://www.itspmagazine.com/directory/seclore">https://www.itspmagazine.com/directory/seclore</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="12652583" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/24032062-4a7d-4c0e-aaab-e3e3cb1f6fcb/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=24032062-4a7d-4c0e-aaab-e3e3cb1f6fcb&amp;feed=kDNbmF_B"/>
      <itunes:title>Embracing Data-Centric Security | A Brand Story Conversation From RSA Conference 2024 | A Seclore Story with Vishal Gupta | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vishal Gupta</itunes:author>
      <itunes:duration>00:13:09</itunes:duration>
      <itunes:summary>Join Sean Martin and Visha Gupta in their insightful conversation at RSA Conference 2024 as they delve into the world of data-centric security and the evolving landscape of cybersecurity.</itunes:summary>
      <itunes:subtitle>Join Sean Martin and Visha Gupta in their insightful conversation at RSA Conference 2024 as they delve into the world of data-centric security and the evolving landscape of cybersecurity.</itunes:subtitle>
      <itunes:keywords>vishal gupta, collaboration, marco ciappelli, seclore, tech innovations, network security, rsa conference, sean martin, cybersecurity, cybersecurity, data governance, enterprise security, data security, business resilience, data protection, information security, data compliance, data privacy, cloud security, rsa conference 2024, cyber resilience, visha gupta, data leakage prevention, data encryption, brand story, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>13</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aaa4f45b-fd91-4556-9909-160f3eb81667</guid>
      <title>Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling</title>
      <description><![CDATA[<p>In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.</p><p><strong>The Evolution of Identity Management and Its Current Challenges</strong></p><p>The conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.</p><p>Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.</p><p><strong>The Integral Role of Identity in Modern Organizations</strong></p><p>The conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.</p><p>Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.</p><p><strong>JumpCloud's Role in Shaping the Future of Identity Management</strong></p><p>As the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.</p><p>JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.</p><p><strong>Evolving with Identity Management: Insights and Future Directions</strong></p><p>In concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.</p><p>This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Mon, 6 May 2024 00:58:59 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/simplifying-identity-management-in-2024-a-deep-dive-into-latest-research-about-it-and-the-role-of-msps-a-jumpcloud-brand-story-with-chase-doelling-z5reWEL2</link>
      <content:encoded><![CDATA[<p>In an enlightening discussion on ITSP Magazine, Sean Martin, a seasoned voice in the technology space, dives into the evolving realm of identity management with Chase Doelling, Principal Strategist at JumpCloud. This conversation sheds light on the operational challenges organizations face in today's complex digital landscapes and how identity management stands at the core of addressing these issues. Below, we unpack the essentials of this dialogue, offering insights into identity management's current state, its implications for businesses, and how JumpCloud is pioneering solutions to streamline and secure identity management.</p><p><strong>The Evolution of Identity Management and Its Current Challenges</strong></p><p>The conversation begins with an exploration of the journey to the present state of identity management, particularly in the context of hybrid cloud environments. Sean and Chase navigate the history and complexities that have led to the current landscape, emphasizing how identity management has become central to enabling business operations, securing revenue, protecting against cyber threats, and facilitating growth.</p><p>Chase Doelling articulates the paradox of identity management: when it's functioning seamlessly, it's virtually invisible to organizations, yet it's fundamental to the operational, security, and business continuity of any organization. The discussion highlights how the COVID-19 pandemic has accelerated the shift toward remote work, intensifying the focus on identity management as organizations navigate the challenges of a global, hybrid workforce.</p><p><strong>The Integral Role of Identity in Modern Organizations</strong></p><p>The conversation shifts to how identity management, viewed as the hub around which all tech solutions revolve, has evolved. Over the years, the perception of identity management has oscillated between being a centerpiece and receding into the backdrop. However, with increasing cybersecurity threats and the adoption of multi-cloud environments, identity management is now more crucial than ever.</p><p>Doelling vividly illustrates the concept of identity being at the core of operational enablement, drawing parallels to how it grants access and interconnectivity within the organizational ecosystem. This section of the dialogue underscores the critical nature of identity management in enabling access to resources, ensuring security, and fostering operational efficiency.</p><p><strong>JumpCloud's Role in Shaping the Future of Identity Management</strong></p><p>As the discussion unfolds, the spotlight turns to JumpCloud and its innovative approach to identity management. Sean Martin probes into how JumpCloud's solutions are designed to address the multifaceted challenges businesses face today. Chase Doelling provides a comprehensive overview of JumpCloud's role in redefining identity management, detailing how their platform aids organizations in overcoming operational hurdles through seamless identity and access management across cloud environments.</p><p>JumpCloud's solution is presented as a robust platform that integrates digital identity management with device management, offering a unified approach to secure access across various applications and systems. This integration is crucial for enabling passwordless access, simplifying onboarding and offboarding processes, and enhancing overall security posture.</p><p><strong>Evolving with Identity Management: Insights and Future Directions</strong></p><p>In concluding the conversation, Doelling emphasizes the importance of a proactive and curious mindset towards identity management. He encourages organizations to re-evaluate their approach to identity management, considering its central role in ensuring operational resilience, security, and scalability. The discussion ends with a forward-looking perspective, highlighting the need for organizations to adapt and evolve with the trends in identity management to stay competitive and secure in the digital age.</p><p>This insightful episode with Chase Doelling not only highlights the critical role of identity management in today's digital landscape but also showcases how JumpCloud is at the forefront of innovating solutions that enable businesses to navigate the complexities of modern IT environments. As organizations continue to face evolving challenges, adopting a cohesive and integrated approach to identity management will be key to ensuring operational efficiency, security, and business growth in 2024 and beyond.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Chase Doelling</strong>, Principal Strategist, JumpCloud [<a href="https://twitter.com/JumpCloud">@JumpCloud</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/chasedoelling/" target="_blank">https://www.linkedin.com/in/chasedoelling/</a></p><p><strong>Resources</strong></p><p>Learn more about JumpCloud and their offering: <a href="https://itspm.ag/jumpcloud-pg7z">https://itspm.ag/jumpcloud-pg7z</a></p><p>Catch more stories from JumpCloud at <a href="https://www.itspmagazine.com/directory/jumpcloud">https://www.itspmagazine.com/directory/jumpcloud</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="37594539" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c452fabd-6d94-4f7f-8a38-16a75f1c3c58/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c452fabd-6d94-4f7f-8a38-16a75f1c3c58&amp;feed=kDNbmF_B"/>
      <itunes:title>Simplifying Identity Management in 2024: A Deep Dive into Latest Research about IT and the Role of MSPs | A JumpCloud Brand Story with Chase Doelling</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Chase Doelling</itunes:author>
      <itunes:duration>00:39:07</itunes:duration>
      <itunes:summary>Dive into the enlightening conversation between ITSP Magazine and Chase Doling of JumpCloud, exploring the pivotal role of identity management in enhancing organizational security and operational efficiency in today&apos;s hybrid cloud environments.</itunes:summary>
      <itunes:subtitle>Dive into the enlightening conversation between ITSP Magazine and Chase Doling of JumpCloud, exploring the pivotal role of identity management in enhancing organizational security and operational efficiency in today&apos;s hybrid cloud environments.</itunes:subtitle>
      <itunes:keywords>identity lifecycle management, cloud identity, identity focused attacks, api orchestration, multi hybrid cloud environments, security identity, marco ciappelli, active directory, rsa conference, sean martin, identity management, secure identity management, jumpcloud, cybersecurity, biometrics authentication, two-factor authentication, passwordless access, digital identity, device identity management, soar, operational challenges, digital transformation, remote workforce security, brand story</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">fc7b6eff-9a21-4645-bb11-1651bfcc022e</guid>
      <title>Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p><strong>Unveiling the Origin Story</strong></p><p>In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity solutions for mid-market companies and small businesses.</p><p><strong>Solving Real-World Challenges</strong></p><p>While the cybersecurity industry often overlooks the needs of mid-market companies and small businesses, CORO identified a critical deficiency in the market. By providing a comprehensive platform with a "power of one" approach, CORO offers a simplified yet effective solution to address the unique cybersecurity challenges faced by these organizations.</p><p><strong>Empowering with Affordable Protection</strong></p><p>CORO's modular approach allows businesses to tailor their cybersecurity strategy based on their specific needs, without the burden of unnecessary complexities. With affordable pricing and automated cybersecurity tasks, CORO ensures that even organizations with limited budgets and resources can benefit from robust protection.</p><p><strong>Tailored Solutions for Every Industry</strong></p><p>Recognizing the diverse needs of different sectors, CORO offers specialized suites for industries like education and automotive. By securing both staff and students in educational environments, CORO's tailored solutions demonstrate a commitment to protecting vital institutions against cyber threats.</p><p><strong>Partnering for Success</strong></p><p>With a strong channel-centric approach, CORO collaborates closely with partners to deliver personalized support and education. From onboarding processes to managed detection and response services, CORO empowers organizations to navigate their cybersecurity journey with confidence.</p><p><strong>The Path Ahead: RSA Conference and Beyond</strong></p><p>As CORO continues its mission to revolutionize cybersecurity, Dror Liwer's upcoming engagements at the RSA Conference underscore the company's commitment to sharing knowledge and driving industry advancements. Through deeper dive discussions, use cases, and real-world outcomes, CORO aims to showcase the tangible benefits of their solutions.</p><p><strong>Stay Tuned for Chapter Two</strong></p><p>With an exciting chapter ahead, listeners are encouraged to follow CORO's journey and explore the transformative impact of their cybersecurity solutions. Whether in person at events like the RSA Conference or through online resources, the opportunity to connect with Dror Liwer and the CORO team remains open for all interested parties.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Fri, 3 May 2024 04:02:40 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/unveiling-the-cybersecurity-revolution-for-small-and-medium-sized-enterprises-smes-a-brand-story-conversation-from-rsa-conference-2024-a-coro-story-with-dror-liwer-on-location-coverage-with-sean-martin-and-marco-ciappelli-ldz6baqi-7lvBpQgN</link>
      <content:encoded><![CDATA[<p><strong>Unveiling the Origin Story</strong></p><p>In a recent brand story episode, Sean Martin and Marco Ciappelli engaged in a compelling conversation with Dror Liwer, shedding light on the inception of CORO. Dror's background as a former CIO of the Israeli military police paved the way for the founding of Coro in 2014, with a mission to bridge the gap in cybersecurity solutions for mid-market companies and small businesses.</p><p><strong>Solving Real-World Challenges</strong></p><p>While the cybersecurity industry often overlooks the needs of mid-market companies and small businesses, CORO identified a critical deficiency in the market. By providing a comprehensive platform with a "power of one" approach, CORO offers a simplified yet effective solution to address the unique cybersecurity challenges faced by these organizations.</p><p><strong>Empowering with Affordable Protection</strong></p><p>CORO's modular approach allows businesses to tailor their cybersecurity strategy based on their specific needs, without the burden of unnecessary complexities. With affordable pricing and automated cybersecurity tasks, CORO ensures that even organizations with limited budgets and resources can benefit from robust protection.</p><p><strong>Tailored Solutions for Every Industry</strong></p><p>Recognizing the diverse needs of different sectors, CORO offers specialized suites for industries like education and automotive. By securing both staff and students in educational environments, CORO's tailored solutions demonstrate a commitment to protecting vital institutions against cyber threats.</p><p><strong>Partnering for Success</strong></p><p>With a strong channel-centric approach, CORO collaborates closely with partners to deliver personalized support and education. From onboarding processes to managed detection and response services, CORO empowers organizations to navigate their cybersecurity journey with confidence.</p><p><strong>The Path Ahead: RSA Conference and Beyond</strong></p><p>As CORO continues its mission to revolutionize cybersecurity, Dror Liwer's upcoming engagements at the RSA Conference underscore the company's commitment to sharing knowledge and driving industry advancements. Through deeper dive discussions, use cases, and real-world outcomes, CORO aims to showcase the tangible benefits of their solutions.</p><p><strong>Stay Tuned for Chapter Two</strong></p><p>With an exciting chapter ahead, listeners are encouraged to follow CORO's journey and explore the transformative impact of their cybersecurity solutions. Whether in person at events like the RSA Conference or through online resources, the opportunity to connect with Dror Liwer and the CORO team remains open for all interested parties.</p><p>Learn more about CORO: <a href="https://itspm.ag/coronet-30de">https://itspm.ag/coronet-30de</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Dror Liwer</strong>, Co-Founder at Coro [<a href="https://twitter.com/coro_cyber">@coro_cyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/drorliwer/">https://www.linkedin.com/in/drorliwer/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from CORO: <a href="https://www.itspmagazine.com/directory/coro" target="_blank">https://www.itspmagazine.com/directory/coro</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="21587883" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/b03fc26c-e012-4d4b-8ba4-8772ba529152/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=b03fc26c-e012-4d4b-8ba4-8772ba529152&amp;feed=kDNbmF_B"/>
      <itunes:title>Unveiling the Cybersecurity Revolution for Small and Medium-Sized Enterprises (SMEs) | A Brand Story Conversation From RSA Conference 2024 | A CORO Story with Dror Liwer | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Dror Liwer</itunes:author>
      <itunes:duration>00:22:27</itunes:duration>
      <itunes:summary>Dive into the world of cybersecurity innovation with Dror Liwer, the co-founder of CORO, as he shares the journey of revolutionizing the Small and Medium-Sized Enterprises (SMEs) cybersecurity industry with groundbreaking solutions.</itunes:summary>
      <itunes:subtitle>Dive into the world of cybersecurity innovation with Dror Liwer, the co-founder of CORO, as he shares the journey of revolutionizing the Small and Medium-Sized Enterprises (SMEs) cybersecurity industry with groundbreaking solutions.</itunes:subtitle>
      <itunes:keywords>revolutionizing cybersecurity, cybersecurity solutions, affordable protection, marco ciappelli, automated security tasks, rsa conference, rsa conference, sean martin, industry tailored solutions, cybersecurity, partner collaboration, innovation, educational cybersecurity, dror liwer, small businesses, cybersecurity journey, mid-market companies, brand story, coro</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">aedf6e17-c7b3-4534-afb3-32fea425cae3</guid>
      <title>Easily Answer the Questions Fundamental to a Modern Organization’s Security and Resilience | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Mitiga Story with Ariel Parnes</title>
      <description><![CDATA[<p>Today organizations have a large part of their environment outside of their control. They have authentication, email, data, code—some organizations have the majority of their most important assets in cloud and SaaS applications. And yet the security team does not have effective tooling to investigate across this surface.</p><p>So when a complex breach unfolds, an organization can find themselves scrambling. Why?</p><p>The first problem is cloud scale. The amount of telemetry that is produced daily across this surface is extraordinary. The security tooling a team would use is not appropriate for the sheer volume of data that needs to be collected.</p><p>The second problem is cloud complexity. Correlating cloud data into contextual alerts and insights that teams can act on is a massive task that requires deep understanding of each environment—which leads into the third problem:</p><p>Most teams lack cloud expertise—and the DevOps teams they often turn to for cloud knowledge lack security expertise. Nobody is holding all the cards when it comes to detecting, investigating and responding to threats.</p><p>We have spent years building a comprehensive solution that addresses the challenges facing modern SOC teams and the transforming enterprises they're tasked with securing. It distills our knowledge to elevate their cloud security capacity and capabilities. So the now SecOps can have broad visibility across clouds and SaaS—because our solution harvests all the needed telemetry and stores it for years for a minimal cost.</p><p>When an incident happens, they can easily answer the questions that are fundamental to a modern organization’s security and resilience: Did anyone get in? Where did they go? What did they do while inside? What did they take? —because our Cloud Attack Scenario Library filled with the latest intelligence to root out cloud and SaaS threats.</p><p>And they'll possess the speed of Mitiga's automation—to dramatically accelerate detection, investigation and response—minimizing impact.</p><p>With Mitiga, the SOC is well equipped to deal with cloud threats.</p><p>Learn more about Mitiga: <a href="https://itspm.ag/mitiga-5zz" target="_blank">https://itspm.ag/mitiga-5zz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ariel Parnes</strong>, COO and Co-Founder at Mitiga</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/arielparnes/" target="_blank">https://www.linkedin.com/in/arielparnes/</a></p><p>On Twitter | <a href="https://twitter.com/arielparnes" target="_blank">https://twitter.com/arielparnes</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Mitiga: <a href="https://www.itspmagazine.com/directory/mitiga" target="_blank">https://www.itspmagazine.com/directory/mitiga</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 May 2024 18:53:44 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Ariel Parnes)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/easily-answer-the-questions-fundamental-to-a-modern-organizations-security-and-resilience-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-mitiga-story-with-ariel-parnes-gAmtXEqN</link>
      <content:encoded><![CDATA[<p>Today organizations have a large part of their environment outside of their control. They have authentication, email, data, code—some organizations have the majority of their most important assets in cloud and SaaS applications. And yet the security team does not have effective tooling to investigate across this surface.</p><p>So when a complex breach unfolds, an organization can find themselves scrambling. Why?</p><p>The first problem is cloud scale. The amount of telemetry that is produced daily across this surface is extraordinary. The security tooling a team would use is not appropriate for the sheer volume of data that needs to be collected.</p><p>The second problem is cloud complexity. Correlating cloud data into contextual alerts and insights that teams can act on is a massive task that requires deep understanding of each environment—which leads into the third problem:</p><p>Most teams lack cloud expertise—and the DevOps teams they often turn to for cloud knowledge lack security expertise. Nobody is holding all the cards when it comes to detecting, investigating and responding to threats.</p><p>We have spent years building a comprehensive solution that addresses the challenges facing modern SOC teams and the transforming enterprises they're tasked with securing. It distills our knowledge to elevate their cloud security capacity and capabilities. So the now SecOps can have broad visibility across clouds and SaaS—because our solution harvests all the needed telemetry and stores it for years for a minimal cost.</p><p>When an incident happens, they can easily answer the questions that are fundamental to a modern organization’s security and resilience: Did anyone get in? Where did they go? What did they do while inside? What did they take? —because our Cloud Attack Scenario Library filled with the latest intelligence to root out cloud and SaaS threats.</p><p>And they'll possess the speed of Mitiga's automation—to dramatically accelerate detection, investigation and response—minimizing impact.</p><p>With Mitiga, the SOC is well equipped to deal with cloud threats.</p><p>Learn more about Mitiga: <a href="https://itspm.ag/mitiga-5zz" target="_blank">https://itspm.ag/mitiga-5zz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Ariel Parnes</strong>, COO and Co-Founder at Mitiga</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/arielparnes/" target="_blank">https://www.linkedin.com/in/arielparnes/</a></p><p>On Twitter | <a href="https://twitter.com/arielparnes" target="_blank">https://twitter.com/arielparnes</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Mitiga: <a href="https://www.itspmagazine.com/directory/mitiga" target="_blank">https://www.itspmagazine.com/directory/mitiga</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6802478" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/de43f0a8-4c5e-4277-8e02-0d742fae1b01/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=de43f0a8-4c5e-4277-8e02-0d742fae1b01&amp;feed=kDNbmF_B"/>
      <itunes:title>Easily Answer the Questions Fundamental to a Modern Organization’s Security and Resilience | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A Mitiga Story with Ariel Parnes</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Ariel Parnes</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>Cloud incidents now represent 82% of all data breaches, but enterprise SOC teams still aren’t equipped to investigate threats across their complex, continually changing cloud and SaaS estates. SOC teams lack the visibility, context, expertise, and automation required to quickly, simply, and affordably answer those questions. That’s the problem Mitiga solves through its unique, comprehensive, and complete solution.</itunes:summary>
      <itunes:subtitle>Cloud incidents now represent 82% of all data breaches, but enterprise SOC teams still aren’t equipped to investigate threats across their complex, continually changing cloud and SaaS estates. SOC teams lack the visibility, context, expertise, and automation required to quickly, simply, and affordably answer those questions. That’s the problem Mitiga solves through its unique, comprehensive, and complete solution.</itunes:subtitle>
      <itunes:keywords>intelligence, skill sets, collaboration, data, investigation, innovation sandbox, rsa conference, threats, sean martin, ariel parnes, automation, response, cybersecurity, breach, seven minutes podcast, innovation, telemetry, mitiga, cloud, security, tooling, sandbox, visibility, forensics.</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">e9549141-3c77-4c36-bbec-712c5d0d76be</guid>
      <title>The Evolution to Highly Reliable, Highly Performant Workload IAM | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | An Aembit Story with Apurva Davé</title>
      <description><![CDATA[<p>Aembit is the first Workload Identity and Access Management Platform. It discovers, enforces, and audits workload access. By using native identities and short-lived credentials, we eliminate the need for secrets scanning and credential rotation. We let your teams focus on building your software, without worrying about sharing API keys or misusing vaults. An Aembit access policy enforces authorized access in three steps: First, Aembit cryptographically verifies workload identity, and validates access rights. This works for the most complex environments like an AWS serverless app accessing Snowflake or Salesforce. Second, Aembit implements workload Zero Trust by adding conditional access. For example, Aembit can check CrowdStrike or Wiz posture assessment before authorizing access. Finally, Aembit issues access credentials. Aembit automatically injects short-lived credentials into requests with no burdensome code changes required by the dev team.</p><p>The benefits of using Aembit include significant time savings and reduced complexity. This allows engineering teams to move faster in building software and APIs that help companies automate more and build great products. From a security standpoint, Aembit also mitigates a growing attack surface (workload credential compromise) by allowing companies to go secretless using short-lived dynamic access credentials, as opposed to long lived tokens. There's no more credential reuse across multiple workloads. They can also enable Zero Trust conditional access for workload access. If the workload isn't being actively managed by their cloud security tool, it shouldn't get access. And with Aembit, they now have a highly compliant automated system of record to keep track of every workload requesting access, which is huge for audit and compliance requirements.</p><p>Learn more about Aembit: <a href="https://itspm.ag/aembit-1oq" target="_blank">https://itspm.ag/aembit-1oq</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Apurva Davé</strong>, CMO at Aembit [<a href="https://twitter.com/aembit_io" target="_blank">@aembit_io</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/apurvadave/" target="_blank">https://www.linkedin.com/in/apurvadave/</a></p><p>On Twitter | <a href="https://twitter.com/ApurvaBDave" target="_blank">https://twitter.com/ApurvaBDave</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Aembit: <a href="https://www.itspmagazine.com/directory/aembit" target="_blank">https://www.itspmagazine.com/directory/aembit</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 2 May 2024 18:19:09 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Apurva Davé)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-evolution-to-highly-reliable-highly-performant-workload-iam-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-an-aembit-story-with-apurva-dave-T6xTc1ct</link>
      <content:encoded><![CDATA[<p>Aembit is the first Workload Identity and Access Management Platform. It discovers, enforces, and audits workload access. By using native identities and short-lived credentials, we eliminate the need for secrets scanning and credential rotation. We let your teams focus on building your software, without worrying about sharing API keys or misusing vaults. An Aembit access policy enforces authorized access in three steps: First, Aembit cryptographically verifies workload identity, and validates access rights. This works for the most complex environments like an AWS serverless app accessing Snowflake or Salesforce. Second, Aembit implements workload Zero Trust by adding conditional access. For example, Aembit can check CrowdStrike or Wiz posture assessment before authorizing access. Finally, Aembit issues access credentials. Aembit automatically injects short-lived credentials into requests with no burdensome code changes required by the dev team.</p><p>The benefits of using Aembit include significant time savings and reduced complexity. This allows engineering teams to move faster in building software and APIs that help companies automate more and build great products. From a security standpoint, Aembit also mitigates a growing attack surface (workload credential compromise) by allowing companies to go secretless using short-lived dynamic access credentials, as opposed to long lived tokens. There's no more credential reuse across multiple workloads. They can also enable Zero Trust conditional access for workload access. If the workload isn't being actively managed by their cloud security tool, it shouldn't get access. And with Aembit, they now have a highly compliant automated system of record to keep track of every workload requesting access, which is huge for audit and compliance requirements.</p><p>Learn more about Aembit: <a href="https://itspm.ag/aembit-1oq" target="_blank">https://itspm.ag/aembit-1oq</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Apurva Davé</strong>, CMO at Aembit [<a href="https://twitter.com/aembit_io" target="_blank">@aembit_io</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/apurvadave/" target="_blank">https://www.linkedin.com/in/apurvadave/</a></p><p>On Twitter | <a href="https://twitter.com/ApurvaBDave" target="_blank">https://twitter.com/ApurvaBDave</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from Aembit: <a href="https://www.itspmagazine.com/directory/aembit" target="_blank">https://www.itspmagazine.com/directory/aembit</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6807853" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/7756bcf8-24cc-47b4-b38d-308b3ddb20fe/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=7756bcf8-24cc-47b4-b38d-308b3ddb20fe&amp;feed=kDNbmF_B"/>
      <itunes:title>The Evolution to Highly Reliable, Highly Performant Workload IAM | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | An Aembit Story with Apurva Davé</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Apurva Davé</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:04</itunes:duration>
      <itunes:summary>As software increasingly automates business, the risks from long-lived secrets, leaky vaults, and compromised software supply chains are becoming more acute. We need to secure workload access now, and Aembit has elegantly solved this challenge. Aembit&apos;s mission is to build a world where businesses can automate their operations safely by securing application access to partners, customers, and clouds.</itunes:summary>
      <itunes:subtitle>As software increasingly automates business, the risks from long-lived secrets, leaky vaults, and compromised software supply chains are becoming more acute. We need to secure workload access now, and Aembit has elegantly solved this challenge. Aembit&apos;s mission is to build a world where businesses can automate their operations safely by securing application access to partners, customers, and clouds.</itunes:subtitle>
      <itunes:keywords>identity access management, devops, software lifecycle, innovation sandbox, rsa conference, apurva davé, sean martin, cybersecurity, contextual, seven minutes podcast, workload, policy, chief marketing officer, devsecops, secops</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">2368a2cb-be2b-4880-83ba-3b60387c6742</guid>
      <title>Aligning Safety with Business Strategy to Enable Operational Reliability | 7 Minutes on ITSPmagazine with Rock Lambros | A Short Brand Innovation Story By Rock Cyber</title>
      <description><![CDATA[<p>Sometimes organizations know they need to do something to improve their cybersecurity posture … or, in some cases, something more, something different. They know there is a disconnect between cybersecurity and the business — they just don’t know how to get started or transition to get the best results, given their unique environments and operating processes. What’s truly innovative about RockCyber’s cybersecurity assessments is how they intertwine cybersecurity strategies directly with business alignment and outcomes. This is not just about securing IT assets; it's about shaping cybersecurity as a strategic advantage that supports overall business goals. The service is tailored for organizations that need a cybersecurity approach that is not only robust but also aligned with their business objectives, enhancing both security and business performance.</p><p>This approach solves the key problem of the disconnect between cybersecurity practices and business objectives, which many companies struggle with. The RockCyber vCISO and cybersecurity assessment services are particularly valuable for organizations where security must be a driver of cyber resiliency and growth, not just a protective measure.</p><p>Let’s talk about how this changes the future for our customers. Traditionally, cybersecurity has often been a siloed IT function, reactive and disconnected from core business functions. RockCyber’s assessments transform this by integrating cybersecurity with business strategy, making it a cornerstone of business planning and execution.</p><p>Imagine a before scenario where a company's cybersecurity efforts are technically adequate but not aligned with the strategic business initiatives, leading to inefficiencies and missed opportunities. After a RockCyber assessment, this company strengthens its security and aligns its cybersecurity strategy with business objectives, ensuring that every security investment directly supports business growth and resilience.</p><p>With the assessment in place, RockCyber clients typically lean in on the virtual CISO services where the RockCyber team can take the knowledge we have in the field — both figuratively and literally — to establish a strategy that will begin the process of maturity and lead the organization down a path of cyber sustainability.</p><p>For example, with one recent oil and gas client, the cybersecurity program the RockCyber created not only reduces cyber risk and improves the ability of the organization to handle and manage a potential cyber incident, but it aligns directly with the organization’s key objectives:</p><ul><li>Maintain operating reliability</li><li>Drive positive impact on revenue and profit</li><li>Ensure digital and physical safety</li></ul><p>To achieve this, the team at RockCyber kept the big business picture in mind while focusing on breaking down the problem into smaller projects that be accomplished successfully, building on the past to continue to improve the future.</p><p>The RockCyber cybersecurity assessment and vCISO services provide the following benefits:</p><ul><li>Establish a business-aligned strategic vision while bringing the skills, experience, and technology needed to execute tactically.</li><li>Helping the organization to identify key challenges in security operations, staffing, training, execution, and communication and to help them overcome these challenges with confidence, giving them peace of mind to know we are there by their side every step of the way.</li></ul><p>Rock invites you all to connect with him via LinkedIn where you can find some of his musings on this topic and so many more. If you have questions about getting started and/or transforming your program in a meaningful way, you can reach out to Rock and the team directly at <a href="mailto:info@rockcyber.com" target="_blank">info@rockcyber.com</a>.</p><p>Learn more about RockCyber: <a href="https://itspm.ag/rockcyber-3gq7" target="_blank">https://itspm.ag/rockcyber-3gq7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rock Lambros</strong></p><p>CEO and founder of RockCyber [<a href="https://twitter.com/RockCyberLLC" target="_blank">@RockCyberLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rocklambros/" target="_blank">https://www.linkedin.com/in/rocklambros/</a></p><p>On Twitter | <a href="https://twitter.com/rocklambros" target="_blank">https://twitter.com/rocklambros</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RockCyber: <a href="https://www.itspmagazine.com/directory/rockcyber" target="_blank">https://www.itspmagazine.com/directory/rockcyber</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 1 May 2024 12:00:00 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Rock Lambros)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/aligning-safety-with-business-strategy-to-enable-operational-reliability-7-minutes-on-itspmagazine-with-rock-lambros-a-short-brand-innovation-story-by-rock-cyber-nagVOPWW</link>
      <content:encoded><![CDATA[<p>Sometimes organizations know they need to do something to improve their cybersecurity posture … or, in some cases, something more, something different. They know there is a disconnect between cybersecurity and the business — they just don’t know how to get started or transition to get the best results, given their unique environments and operating processes. What’s truly innovative about RockCyber’s cybersecurity assessments is how they intertwine cybersecurity strategies directly with business alignment and outcomes. This is not just about securing IT assets; it's about shaping cybersecurity as a strategic advantage that supports overall business goals. The service is tailored for organizations that need a cybersecurity approach that is not only robust but also aligned with their business objectives, enhancing both security and business performance.</p><p>This approach solves the key problem of the disconnect between cybersecurity practices and business objectives, which many companies struggle with. The RockCyber vCISO and cybersecurity assessment services are particularly valuable for organizations where security must be a driver of cyber resiliency and growth, not just a protective measure.</p><p>Let’s talk about how this changes the future for our customers. Traditionally, cybersecurity has often been a siloed IT function, reactive and disconnected from core business functions. RockCyber’s assessments transform this by integrating cybersecurity with business strategy, making it a cornerstone of business planning and execution.</p><p>Imagine a before scenario where a company's cybersecurity efforts are technically adequate but not aligned with the strategic business initiatives, leading to inefficiencies and missed opportunities. After a RockCyber assessment, this company strengthens its security and aligns its cybersecurity strategy with business objectives, ensuring that every security investment directly supports business growth and resilience.</p><p>With the assessment in place, RockCyber clients typically lean in on the virtual CISO services where the RockCyber team can take the knowledge we have in the field — both figuratively and literally — to establish a strategy that will begin the process of maturity and lead the organization down a path of cyber sustainability.</p><p>For example, with one recent oil and gas client, the cybersecurity program the RockCyber created not only reduces cyber risk and improves the ability of the organization to handle and manage a potential cyber incident, but it aligns directly with the organization’s key objectives:</p><ul><li>Maintain operating reliability</li><li>Drive positive impact on revenue and profit</li><li>Ensure digital and physical safety</li></ul><p>To achieve this, the team at RockCyber kept the big business picture in mind while focusing on breaking down the problem into smaller projects that be accomplished successfully, building on the past to continue to improve the future.</p><p>The RockCyber cybersecurity assessment and vCISO services provide the following benefits:</p><ul><li>Establish a business-aligned strategic vision while bringing the skills, experience, and technology needed to execute tactically.</li><li>Helping the organization to identify key challenges in security operations, staffing, training, execution, and communication and to help them overcome these challenges with confidence, giving them peace of mind to know we are there by their side every step of the way.</li></ul><p>Rock invites you all to connect with him via LinkedIn where you can find some of his musings on this topic and so many more. If you have questions about getting started and/or transforming your program in a meaningful way, you can reach out to Rock and the team directly at <a href="mailto:info@rockcyber.com" target="_blank">info@rockcyber.com</a>.</p><p>Learn more about RockCyber: <a href="https://itspm.ag/rockcyber-3gq7" target="_blank">https://itspm.ag/rockcyber-3gq7</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Rock Lambros</strong></p><p>CEO and founder of RockCyber [<a href="https://twitter.com/RockCyberLLC" target="_blank">@RockCyberLLC</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/rocklambros/" target="_blank">https://www.linkedin.com/in/rocklambros/</a></p><p>On Twitter | <a href="https://twitter.com/rocklambros" target="_blank">https://twitter.com/rocklambros</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from RockCyber: <a href="https://www.itspmagazine.com/directory/rockcyber" target="_blank">https://www.itspmagazine.com/directory/rockcyber</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6736311" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/992ebf8a-e4ea-4963-aa90-8a3bb80c1f9d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=992ebf8a-e4ea-4963-aa90-8a3bb80c1f9d&amp;feed=kDNbmF_B"/>
      <itunes:title>Aligning Safety with Business Strategy to Enable Operational Reliability | 7 Minutes on ITSPmagazine with Rock Lambros | A Short Brand Innovation Story By Rock Cyber</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Rock Lambros</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:00</itunes:duration>
      <itunes:summary>In this Short Brand Story episode, Kyriakos (Rock) Lambros, CEO of RockCyber, shares insights on how their cybersecurity assessments and vCISO services align cybersecurity with business strategies to drive operational reliability, positive revenue impact, and ensure digital and physical safety. Join Kyriakos and host Sean Martin for a thought-provoking discussion on the vital connection between cybersecurity and business success in just seven minutes.</itunes:summary>
      <itunes:subtitle>In this Short Brand Story episode, Kyriakos (Rock) Lambros, CEO of RockCyber, shares insights on how their cybersecurity assessments and vCISO services align cybersecurity with business strategies to drive operational reliability, positive revenue impact, and ensure digital and physical safety. Join Kyriakos and host Sean Martin for a thought-provoking discussion on the vital connection between cybersecurity and business success in just seven minutes.</itunes:subtitle>
      <itunes:keywords>kyriakos lambros, business enablement, cyber resiliency, revenue impact, security controls, digital safety, sean martin, safety measures, strategic vision, cybersecurity, risk management, seven minutes podcast, compliance regulations, vciso services, private equity, cyber incidents, rockcyber, business strategy, operational reliability, it security, business alignment</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">6259f9e7-6524-44bf-b3c1-f61dfd27d4cd</guid>
      <title>Automated Behavioral Fingerprinting: The Key to Cloud Security | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta</title>
      <description><![CDATA[<p>When you are only looking for malicious indicators, you will NEVER get security teams in control of the rapidly evolving threats to their organizations. When Brooke Motta's co-founder, Jimmy Mesta, was a security architect, and consulting companies on Kubernetes security at the very start of containerization, he witnessed a paradigm shift to defining your environment in a declarative way, through code. He decided to apply this paradigm shift toward a positive security model.</p><p>To this end, RAD Security was born. RAD Security creates fingerprints of known good behavior and notifies on drift from that behavior. RAD Security have built fingerprints for cloud native workloads, identities, and infrastructure to detect attacks through meaningful drift that signifies attacker behavior. RAD Security have also built a real-time posture model that can accept the data from our drift engine, so teams can constantly refine their shift-left efforts with the best data possible. By necessity, RAD Security have the first runtime agent that would automate the creation of these behavioral fingerprints.</p><p>Today, teams use RAD Security’s industry-first positive security model for their zero trust initiatives, posture management for cloud native infrastructure, and detection of zero days in runtime. RAD Security's mission is to empower engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In today’s environment, attackers are more versed in cloud native security than security teams.</p><p>RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. To learn more, meet with Brooke Motta and her RAD Security co-founder Jimmy Mesta at the Innovation Sandbox on Monday, May 6th, where they will be participating in the pitch contest.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO and Co-Founder of RAD Security [<a href="https://twitter.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/" target="_blank">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://twitter.com/brookelynz1" target="_blank">https://twitter.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>RAD Security Blog: <a href="https://itspm.ag/radsec-477a54" target="_blank">https://itspm.ag/radsec-477a54</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 30 Apr 2024 21:26:56 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/automated-behavioral-fingerprinting-the-key-to-cloud-security-7-minutes-on-itspmagazine-a-short-brand-innovation-story-from-rsa-conference-2024-a-rad-security-story-with-brooke-motta-2MxnYxII</link>
      <content:encoded><![CDATA[<p>When you are only looking for malicious indicators, you will NEVER get security teams in control of the rapidly evolving threats to their organizations. When Brooke Motta's co-founder, Jimmy Mesta, was a security architect, and consulting companies on Kubernetes security at the very start of containerization, he witnessed a paradigm shift to defining your environment in a declarative way, through code. He decided to apply this paradigm shift toward a positive security model.</p><p>To this end, RAD Security was born. RAD Security creates fingerprints of known good behavior and notifies on drift from that behavior. RAD Security have built fingerprints for cloud native workloads, identities, and infrastructure to detect attacks through meaningful drift that signifies attacker behavior. RAD Security have also built a real-time posture model that can accept the data from our drift engine, so teams can constantly refine their shift-left efforts with the best data possible. By necessity, RAD Security have the first runtime agent that would automate the creation of these behavioral fingerprints.</p><p>Today, teams use RAD Security’s industry-first positive security model for their zero trust initiatives, posture management for cloud native infrastructure, and detection of zero days in runtime. RAD Security's mission is to empower engineering and security teams to push boundaries, build technology and drive innovation so they can focus on growth versus security problems. In today’s environment, attackers are more versed in cloud native security than security teams.</p><p>RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. To learn more, meet with Brooke Motta and her RAD Security co-founder Jimmy Mesta at the Innovation Sandbox on Monday, May 6th, where they will be participating in the pitch contest.</p><p>Learn more about RAD Security: <a href="https://itspm.ag/radsec-l33tz" target="_blank">https://itspm.ag/radsec-l33tz</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Brooke Motta</strong>, CEO and Co-Founder of RAD Security [<a href="https://twitter.com/RADSecurity_">@RADSecurity_</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/brookemotta/" target="_blank">https://www.linkedin.com/in/brookemotta/</a></p><p>On Twitter | <a href="https://twitter.com/brookelynz1" target="_blank">https://twitter.com/brookelynz1</a></p><p><strong>Resources</strong></p><p>RAD Security Blog: <a href="https://itspm.ag/radsec-477a54" target="_blank">https://itspm.ag/radsec-477a54</a></p><p>Learn more and catch more stories from RAD Security: <a href="https://www.itspmagazine.com/directory/rad-security" target="_blank">https://www.itspmagazine.com/directory/rad-security</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: <a href="https://www.itspmagazine.com/purchase-programs" target="_blank">https://www.itspmagazine.com/purchase-programs</a></p><p>Newsletter Archive: <a href="https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/">https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/</a></p><p>Business Newsletter Signup: <a href="https://www.itspmagazine.com/itspmagazine-business-updates-sign-up" target="_blank">https://www.itspmagazine.com/itspmagazine-business-updates-sign-up</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="6781923" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/2530974d-73c5-4326-9008-fc66e9e75e2c/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=2530974d-73c5-4326-9008-fc66e9e75e2c&amp;feed=kDNbmF_B"/>
      <itunes:title>Automated Behavioral Fingerprinting: The Key to Cloud Security | 7 Minutes on ITSPmagazine | A Short Brand Innovation Story From RSA Conference 2024 | A RAD Security Story with Brooke Motta</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Brooke Motta</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/72647e54-a06b-454d-8178-e55d0a2ae6a3/0765fecb-ce12-4e4b-9367-02c9d9b534b9/3000x3000/short-brand-innovation-stories-podcast-cover-3500x.jpg?aid=rss_feed"/>
      <itunes:duration>00:07:03</itunes:duration>
      <itunes:summary>Cloud native development is the biggest threat facing security teams today. For teams to achieve true resilience against emerging threats, detection and response solutions must evolve their approach beyond signature-based, one-size-fits-all solutions. RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. Listen to this new episode of &quot;7 Minutes on ITSPmagazine&quot; to hear RAD Security&apos;s Brooke Motta share their latest Innovation Short Brand Story.</itunes:summary>
      <itunes:subtitle>Cloud native development is the biggest threat facing security teams today. For teams to achieve true resilience against emerging threats, detection and response solutions must evolve their approach beyond signature-based, one-size-fits-all solutions. RAD Security removes the blind spots of legacy tools, closing the gap for prioritization and remediation in cloud native infrastructure. Listen to this new episode of &quot;7 Minutes on ITSPmagazine&quot; to hear RAD Security&apos;s Brooke Motta share their latest Innovation Short Brand Story.</itunes:subtitle>
      <itunes:keywords>kubernetes, ultimate source of truth, environment, skills gap, marco ciappelli, rsa conference, sean martin, rad security, cybersecurity, brooke motta, vulnerabilities, organizations, seven minutes podcast, material changes, co-founder, containerized environments, cloud native development, challenges, security teams, unique behavioral fingerprints, ceo, cloud breaches</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">8979511d-f0da-4a76-8208-9c230e6fbead</guid>
      <title>Leading the Charge to Fortify Web Browsing Security | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>Vivek Ramachandran, a cybersecurity luminary with over two decades of experience, embarked on a transformative journey from developer to esteemed security researcher. His relentless pursuit of innovation led to the creation of SquareX, a pioneering cybersecurity company redefining secure web browsing.</p><p>Vivek's journey epitomizes a shift towards innovative and proactive cybersecurity measures. With a keen eye for detecting vulnerabilities and a passion for safeguarding corporate assets, he envisioned a solution that transcends traditional security paradigms. SquareX stands as a testament to Vivek's commitment to fortifying online defenses against sophisticated cyber threats.</p><p>By providing real-time attack detection and comprehensive insights, SquareX empowers organizations to fortify their web browsing environment effectively. Vivek's team's innovations address the critical gap in existing security measures, offering a holistic approach to threat mitigation. With a focus on user-centric protection and robust defense mechanisms, SquareX champions a new era of cybersecurity resilience. Vivek's visionary leadership positions SquareX as a trailblazer in secure browsing solutions.</p><p>As SquareX continues to make strides in the cybersecurity arena, Vivek's story serves as an inspiration for budding innovators and security enthusiasts while providing much-needed confidence for business and security leaders looking to protect their business assets.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 25 Apr 2024 21:33:33 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/leading-the-charge-to-fortify-web-browsing-security-a-brand-story-conversation-from-rsa-conference-2024-a-squarex-story-with-vivek-ramachandran-on-location-coverage-with-sean-martin-and-marco-ciappelli-bEQrLEFf</link>
      <content:encoded><![CDATA[<p>Vivek Ramachandran, a cybersecurity luminary with over two decades of experience, embarked on a transformative journey from developer to esteemed security researcher. His relentless pursuit of innovation led to the creation of SquareX, a pioneering cybersecurity company redefining secure web browsing.</p><p>Vivek's journey epitomizes a shift towards innovative and proactive cybersecurity measures. With a keen eye for detecting vulnerabilities and a passion for safeguarding corporate assets, he envisioned a solution that transcends traditional security paradigms. SquareX stands as a testament to Vivek's commitment to fortifying online defenses against sophisticated cyber threats.</p><p>By providing real-time attack detection and comprehensive insights, SquareX empowers organizations to fortify their web browsing environment effectively. Vivek's team's innovations address the critical gap in existing security measures, offering a holistic approach to threat mitigation. With a focus on user-centric protection and robust defense mechanisms, SquareX champions a new era of cybersecurity resilience. Vivek's visionary leadership positions SquareX as a trailblazer in secure browsing solutions.</p><p>As SquareX continues to make strides in the cybersecurity arena, Vivek's story serves as an inspiration for budding innovators and security enthusiasts while providing much-needed confidence for business and security leaders looking to protect their business assets.</p><p>Learn more about SquareX: <a href="https://itspm.ag/sqrx-l91" target="_blank">https://itspm.ag/sqrx-l91</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Vivek Ramachandran</strong>, Founder, SquareX [<a href="https://twitter.com/getsquarex">@getsquarex</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/vivekramachandran/">https://www.linkedin.com/in/vivekramachandran/</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from SquareX: <a href="https://www.itspmagazine.com/directory/squarex" target="_blank">https://www.itspmagazine.com/directory/squarex</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="19724412" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/fc61ed5e-628e-4700-aea5-055599a553d5/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=fc61ed5e-628e-4700-aea5-055599a553d5&amp;feed=kDNbmF_B"/>
      <itunes:title>Leading the Charge to Fortify Web Browsing Security | A Brand Story Conversation From RSA Conference 2024 | A SquareX Story with Vivek Ramachandran | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Vivek Ramachandran</itunes:author>
      <itunes:duration>00:20:31</itunes:duration>
      <itunes:summary>Join cybersecurity visionary Vivek Ramachandran as he shares his transformative journey from developer to researcher to CEO of SquareX, offering dynamic solutions to fortify web browsing security. Discover the innovative defense mechanisms and proactive measures reshaping the cybersecurity landscape in this thought-provoking conversation.</itunes:summary>
      <itunes:subtitle>Join cybersecurity visionary Vivek Ramachandran as he shares his transformative journey from developer to researcher to CEO of SquareX, offering dynamic solutions to fortify web browsing security. Discover the innovative defense mechanisms and proactive measures reshaping the cybersecurity landscape in this thought-provoking conversation.</itunes:subtitle>
      <itunes:keywords>secure solutions, innovative defense, innovative solutions, marco ciappelli, rsa conference, sean martin, cybersecurity resilience, web browsing, cybersecurity luminary, proactive measures, cybersecurity, threat mitigation, visionary founder, digital assets, cyber defense, security solutions, vivek ramachandran, vivek ramachandran, squarex, cyber threats, advanced threats, transformative journey</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">faa6d891-3a62-450b-af94-c80e3bbf68b3</guid>
      <title>New Research Reveals Five New Trends for Cyber Resilience | A Brand Story Conversation From RSA Conference 2024 | An AT&amp;T Cybersecurity Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</title>
      <description><![CDATA[<p>The upcoming thought leadership research set to be announced at the RSA Conference which will be presented by Theresa Lanowitz, the Head of Cybersecurity Evangelism at AT&T Cybersecurity, promises to dive into critical aspects of cyber resilience, providing actionable advice for organizations to enhance their cybersecurity strategies. AT&T Cybersecurity aims to empower businesses of all sizes to strengthen their security posture and embrace a proactive approach to cyber resilience through the insights delivered through their upcoming thought leadership report for 2024.</p><p>As organizations navigate the complex cybersecurity landscape, the focus on cyber resilience becomes paramount. The thought leadership report intends to prompt discussions within organizations, urging them to reevaluate their cybersecurity strategies and resilience efforts. By sharing insights and trends in cybersecurity, the report aims to equip businesses with the tools needed to enhance their security practices.</p><p>The interconnected nature of the supply chain, both physical and software-based, presents challenges and opportunities for businesses of all sizes. Assessing the security posture of vendors and partners is crucial in mitigating cyber threats and ensuring a robust cybersecurity framework within organizations. The thought leadership report from AT&T Cybersecurity seeks to guide organizations in fortifying their security posture and navigating the ever-evolving threat landscape effectively.</p><p>Be sure to connect with the Theresa and the rest of the AT&T Cybersecurity team during the RSA Conference. You can learn more and find them by visiting: <a href="https://itspm.ag/att-cy4nk3" target="_blank">https://itspm.ag/att-cy4nk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Head of Cybersecurity Evangelism at AT&T Cybersecurity [<a href="https://cybersecurity.att.com/newsroom/events/rsac2024?utm_content=att-cyber">@attcyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/">https://www.linkedin.com/in/theresalanowitz/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Theresa%20Lanowitz">https://www.rsaconference.com/experts/Theresa%20Lanowitz</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AT&T Cybersecurity: <a href="https://www.itspmagazine.com/directory/att-cybersecurity">https://www.itspmagazine.com/directory/att-cybersecurity</a></p><p>The Possibilities, Risks, and Rewards of Cyber Tech Convergence: <a href="https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence">https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence</a></p><p>New Research Reveals Five New Trends for Cyber Resilience: <a href="https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience">https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Wed, 24 Apr 2024 18:43:11 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/new-research-reveals-five-new-trends-for-cyber-resilience-a-brand-story-conversation-from-rsa-conference-2024-an-att-cybersecurity-story-with-theresa-lanowitz-on-location-coverage-with-sean-martin-and-marco-ciappelli-wPCn7UPe</link>
      <content:encoded><![CDATA[<p>The upcoming thought leadership research set to be announced at the RSA Conference which will be presented by Theresa Lanowitz, the Head of Cybersecurity Evangelism at AT&T Cybersecurity, promises to dive into critical aspects of cyber resilience, providing actionable advice for organizations to enhance their cybersecurity strategies. AT&T Cybersecurity aims to empower businesses of all sizes to strengthen their security posture and embrace a proactive approach to cyber resilience through the insights delivered through their upcoming thought leadership report for 2024.</p><p>As organizations navigate the complex cybersecurity landscape, the focus on cyber resilience becomes paramount. The thought leadership report intends to prompt discussions within organizations, urging them to reevaluate their cybersecurity strategies and resilience efforts. By sharing insights and trends in cybersecurity, the report aims to equip businesses with the tools needed to enhance their security practices.</p><p>The interconnected nature of the supply chain, both physical and software-based, presents challenges and opportunities for businesses of all sizes. Assessing the security posture of vendors and partners is crucial in mitigating cyber threats and ensuring a robust cybersecurity framework within organizations. The thought leadership report from AT&T Cybersecurity seeks to guide organizations in fortifying their security posture and navigating the ever-evolving threat landscape effectively.</p><p>Be sure to connect with the Theresa and the rest of the AT&T Cybersecurity team during the RSA Conference. You can learn more and find them by visiting: <a href="https://itspm.ag/att-cy4nk3" target="_blank">https://itspm.ag/att-cy4nk3</a></p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p><strong>Guest: Theresa Lanowitz</strong>, Head of Cybersecurity Evangelism at AT&T Cybersecurity [<a href="https://cybersecurity.att.com/newsroom/events/rsac2024?utm_content=att-cyber">@attcyber</a>]</p><p>On LinkedIn | <a href="https://www.linkedin.com/in/theresalanowitz/">https://www.linkedin.com/in/theresalanowitz/</a></p><p>At RSAC | <a href="https://www.rsaconference.com/experts/Theresa%20Lanowitz">https://www.rsaconference.com/experts/Theresa%20Lanowitz</a></p><p><strong>Resources</strong></p><p>Learn more and catch more stories from AT&T Cybersecurity: <a href="https://www.itspmagazine.com/directory/att-cybersecurity">https://www.itspmagazine.com/directory/att-cybersecurity</a></p><p>The Possibilities, Risks, and Rewards of Cyber Tech Convergence: <a href="https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence">https://www.rsaconference.com/usa/agenda/session/The-Possibilities-Risks-and-Rewards-of-Cyber-Tech-Convergence</a></p><p>New Research Reveals Five New Trends for Cyber Resilience: <a href="https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience">https://www.rsaconference.com/USA/agenda/session/New%20Research%20Reveals%20Five%20New%20Trends%20for%20Cyber%20Resilience</a></p><p>View all of our RSA Conference Coverage: <a href="https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage">https://www.itspmagazine.com/rsa-conference-usa-2024-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="18443001" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/416d8520-e8d7-4e02-a3f2-ac9514efc7f1/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=416d8520-e8d7-4e02-a3f2-ac9514efc7f1&amp;feed=kDNbmF_B"/>
      <itunes:title>New Research Reveals Five New Trends for Cyber Resilience | A Brand Story Conversation From RSA Conference 2024 | An AT&amp;T Cybersecurity Story with Theresa Lanowitz | On Location Coverage with Sean Martin and Marco Ciappelli</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Theresa Lanowitz</itunes:author>
      <itunes:duration>00:19:11</itunes:duration>
      <itunes:summary>Discover critical insights on enhancing cybersecurity strategies and embracing cyber resilience in the upcoming thought leadership research from AT&amp;T Cybersecurity. Join the conversation with Theresa Lanowitz on reevaluating cybersecurity approaches and fortifying security postures to navigate the complex cybersecurity landscape effectively.</itunes:summary>
      <itunes:subtitle>Discover critical insights on enhancing cybersecurity strategies and embracing cyber resilience in the upcoming thought leadership research from AT&amp;T Cybersecurity. Join the conversation with Theresa Lanowitz on reevaluating cybersecurity approaches and fortifying security postures to navigate the complex cybersecurity landscape effectively.</itunes:subtitle>
      <itunes:keywords>thought leadership, marco ciappelli, security posture, trends, complex landscape, rsa conference, critical aspects, sean martin, supply chain, vendors, cybersecurity, proactive approach, cyber resilience, insights, theresa lanowitz, robust framework, effective navigation, at&amp;t cybersecurity, cyber threats</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">13b77c85-2f39-470e-b6fe-d613f17ead71</guid>
      <title>The Art and Science of Defending Against Business Logic Attacks: Insights from Imperva&apos;s Observations and Best Practices for Defense | An Imperva Brand Story with Luke Babarinde</title>
      <description><![CDATA[<p>Hosts Sean Martin and Marco Ciappelli delve into the complexities of business logic attacks, with a particular focus on vulnerabilities within APIs. They engage with Luke Babarinde, Global Solutions Architect at Imperva, in a detailed conversation about how cybersecurity threats have evolved in tandem with business processes, tapping into Sean Martin's introduction of the novel concept of a "Workflow Bill of Materials," underlining the necessity of comprehending each step within complex business tasks to defend against potential misuse and abuse.</p><p>The discussion explores the mechanisms through which attackers leverage business logic for sophisticated, hard-to-detect attacks that pose significant risks to organizations. Through examples, Babarinde illustrates how automated bots and malicious actors can inflict substantial financial damage by exploiting publicly accessible services, highlighting the paramount importance of identifying and counteracting these threats. Moreover, the episode addresses the impact of artificial intelligence and machine learning in enhancing cybersecurity defenses while also expanding attackers’ arsenals. The conversation reflects on the dual effects of these technologies, especially concerning API usage, which now dominates a considerable volume of internet traffic and is integral to digital services.</p><p>Babarinde also emphasizes the crucial role of human interaction in cybersecurity, advocating for substantive dialogue between security experts and business leaders to align on strategies and comprehend the motivations behind attacks. This human-centered approach, augmented by the technological solutions offered by entities like Imperva, is portrayed as the foundation of effective cybersecurity strategies amid continuously evolving threats.</p><p>Overall, the episode offers an exhaustive overview of both the challenges and strategies associated with business logic attacks, promoting a collaborative and informed stance on cybersecurity in the face of progressing threats.</p><p>Top Questions Addressed:</p><ul><li>What are business logic attacks and why are they important to understand?</li><li>How do artificial intelligence and machine learning impact cybersecurity strategies?</li><li>Why is collaboration between security experts and business leaders crucial in combating cyber threats?</li></ul><p> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Luke Babarinde</strong>, Global Solution Architect at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/lbabs/" target="_blank">https://www.linkedin.com/in/lbabs/</a></p><p><strong>Resources</strong></p><p>Learn more about Imperva and their offering: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p>Report: The State of API Security in 2024: <a href="https://itspm.ag/imperv7szg" target="_blank">https://itspm.ag/imperv7szg</a></p><p><a href="https://www.imperva.com/learn/application-security/business-logic/" target="_blank">What is business logic?</a></p><p><a href="https://www.imperva.com/blog/state-of-api-security-in-2024/" target="_blank">Rise in API Usage and Attacks Putting Businesses at Risk in 2024</a></p><p><a href="https://www.imperva.com/solutions/protect-against-business-logic-abuse/" target="_blank">Protect applications from business logic abuse</a></p><p>Catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Tue, 9 Apr 2024 21:31:10 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Luke Babarinde)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/the-art-and-science-of-defending-against-business-logic-attacks-insights-from-impervas-observations-and-best-practices-for-defense-an-imperva-brand-story-with-luke-babarinde-ZkiJaAaJ</link>
      <content:encoded><![CDATA[<p>Hosts Sean Martin and Marco Ciappelli delve into the complexities of business logic attacks, with a particular focus on vulnerabilities within APIs. They engage with Luke Babarinde, Global Solutions Architect at Imperva, in a detailed conversation about how cybersecurity threats have evolved in tandem with business processes, tapping into Sean Martin's introduction of the novel concept of a "Workflow Bill of Materials," underlining the necessity of comprehending each step within complex business tasks to defend against potential misuse and abuse.</p><p>The discussion explores the mechanisms through which attackers leverage business logic for sophisticated, hard-to-detect attacks that pose significant risks to organizations. Through examples, Babarinde illustrates how automated bots and malicious actors can inflict substantial financial damage by exploiting publicly accessible services, highlighting the paramount importance of identifying and counteracting these threats. Moreover, the episode addresses the impact of artificial intelligence and machine learning in enhancing cybersecurity defenses while also expanding attackers’ arsenals. The conversation reflects on the dual effects of these technologies, especially concerning API usage, which now dominates a considerable volume of internet traffic and is integral to digital services.</p><p>Babarinde also emphasizes the crucial role of human interaction in cybersecurity, advocating for substantive dialogue between security experts and business leaders to align on strategies and comprehend the motivations behind attacks. This human-centered approach, augmented by the technological solutions offered by entities like Imperva, is portrayed as the foundation of effective cybersecurity strategies amid continuously evolving threats.</p><p>Overall, the episode offers an exhaustive overview of both the challenges and strategies associated with business logic attacks, promoting a collaborative and informed stance on cybersecurity in the face of progressing threats.</p><p>Top Questions Addressed:</p><ul><li>What are business logic attacks and why are they important to understand?</li><li>How do artificial intelligence and machine learning impact cybersecurity strategies?</li><li>Why is collaboration between security experts and business leaders crucial in combating cyber threats?</li></ul><p> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Luke Babarinde</strong>, Global Solution Architect at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/lbabs/" target="_blank">https://www.linkedin.com/in/lbabs/</a></p><p><strong>Resources</strong></p><p>Learn more about Imperva and their offering: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p>Report: The State of API Security in 2024: <a href="https://itspm.ag/imperv7szg" target="_blank">https://itspm.ag/imperv7szg</a></p><p><a href="https://www.imperva.com/learn/application-security/business-logic/" target="_blank">What is business logic?</a></p><p><a href="https://www.imperva.com/blog/state-of-api-security-in-2024/" target="_blank">Rise in API Usage and Attacks Putting Businesses at Risk in 2024</a></p><p><a href="https://www.imperva.com/solutions/protect-against-business-logic-abuse/" target="_blank">Protect applications from business logic abuse</a></p><p>Catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="41891285" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/ac7a565c-4a7c-44f1-8fab-a2cbe23059fe/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=ac7a565c-4a7c-44f1-8fab-a2cbe23059fe&amp;feed=kDNbmF_B"/>
      <itunes:title>The Art and Science of Defending Against Business Logic Attacks: Insights from Imperva&apos;s Observations and Best Practices for Defense | An Imperva Brand Story with Luke Babarinde</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Luke Babarinde</itunes:author>
      <itunes:duration>00:43:35</itunes:duration>
      <itunes:summary>Hosts Sean Martin and Marco Ciappelli, together with Luke Babarinde from Imperva, unravel the intricacies of business logic attacks targeting APIs, revealing the blend of human intellect and advanced technology needed to combat evolving cybersecurity threats. Through engaging discussions on the impact of artificial intelligence and real-world examples, they offer a deep dive into strategies for safeguarding business processes against sophisticated attacks.</itunes:summary>
      <itunes:subtitle>Hosts Sean Martin and Marco Ciappelli, together with Luke Babarinde from Imperva, unravel the intricacies of business logic attacks targeting APIs, revealing the blend of human intellect and advanced technology needed to combat evolving cybersecurity threats. Through engaging discussions on the impact of artificial intelligence and real-world examples, they offer a deep dive into strategies for safeguarding business processes against sophisticated attacks.</itunes:subtitle>
      <itunes:keywords>collaboration, marco ciappelli, artificial intelligence, sean martin, attacks, cybersecurity, vulnerabilities, internet traffic, risk management, data protection, luke babarinde, api, automated bots, imperva, business logic, technology solutions, machine learning, human-centered, security strategy, digital services</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">0985bf2f-cdfc-47b8-acf7-dedd4c7a1156</guid>
      <title>Embracing Technology Safely: A Look into Consilio&apos;s Role in Legal Cybersecurity | A Brand Story Conversation from LegalWeek 2024 | A Consilio Story with James Jansen</title>
      <description><![CDATA[<p><strong>Guest: James Jansen</strong>, Vice President & Global Head - Cyber Response Solutions at Consilio [<a href="https://twitter.com/ConsilioGlobal" target="_blank">@ConsilioGlobal</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/james-jansen-076a0214/" target="_blank">https://www.linkedin.com/in/james-jansen-076a0214/</a></p><p>In the latest episode of Brand Stories, Sean Martin and Marco Ciappelli host James Jansen, Vice President & Global Head of Cyber Response Solutions at Consilio as he sheds light on the critical intersection of technology and cybersecurity in the legal space. The conversation dives deep into the challenges and opportunities that arise when embracing technology while maintaining a keen focus on cybersecurity and risk management.</p><p>The Importance of a Technology-Forward Approach: Consilio has always been at the forefront of embracing technology to drive efficiencies in legal workflows. With a forward-leaning attitude towards legal technology services, Consilio understands the significance of technology in assisting clients with various legal processes. From conceptual analytics to technology-assisted reviews, it has consistently leaned into new technologies with a blend of curiosity and skepticism, ensuring that they are utilized in the right way for their clients.</p><p>Navigating the Landscape of AI in Legal Processes: As technology evolves, Consilio continues to vet new technologies and adopt innovative solutions to enhance their services. Particularly noteworthy is the adoption of generative AI, which presents both opportunities and challenges. Jansen emphasizes the importance of having humans at the wheel, underscoring the critical role of human oversight in leveraging technology effectively.</p><p>Fostering a Culture of Cybersecurity: The dialogue highlights the need for a cultural shift within organizations towards cybersecurity. Every business is a potential target for cyber attacks, emphasizing the importance of developing a cybersecurity-conscious culture. By empowering employees to recognize and address cybersecurity threats, organizations can bolster their defenses and mitigate risks effectively.</p><p>Enabling Legal Teams to Embrace Technology Safely: Consilio's role in helping legal teams navigate the complexities of technology integration is paramount. By offering insights, resources, and expertise, they assist organizations in managing legal processes, protecting data, and handling incidents with precision. Their commitment to connecting the human element with technological advancements ensures a balanced approach that prioritizes both innovation and security.</p><p>Consilio stands out as a trusted partner for legal teams seeking to leverage technology safely and effectively. By emphasizing the importance of human oversight, fostering a culture of cybersecurity, and embracing innovative solutions like generative AI, it is possible to lead with a strategic approach to navigating the intersection of technology and legal cybersecurity.</p><p>By adopting a technology-forward approach and prioritizing cybersecurity, Consilio is paving the way for legal teams to navigate the digital age with confidence and resilience.</p><p>To learn more about Consilio and how they can assist your organization in embracing technology safely in the legal space, visit their website at <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a> or reach out to their team for personalized insights and solutions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/brand-story" target="_blank"><i>Learn more: </i>https://www.itspmagazine.com/brand-story</a></p><p><strong>Resources</strong><br />Learn more about Consilio and their offering: <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a></p><p>Hear more stories from the Consilio team on their directory page: <a href="https://www.itspmagazine.com/directory/consilio" target="_blank">https://www.itspmagazine.com/directory/consilio</a></p><p>Are you interested in telling your Brand Story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 4 Apr 2024 15:20:17 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, James Jansen)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/embracing-technology-safely-a-look-into-consilios-role-in-legal-cybersecurity-a-brand-story-conversation-from-legalweek-2024-a-consilio-story-with-james-jansen-cxbnMoAR</link>
      <content:encoded><![CDATA[<p><strong>Guest: James Jansen</strong>, Vice President & Global Head - Cyber Response Solutions at Consilio [<a href="https://twitter.com/ConsilioGlobal" target="_blank">@ConsilioGlobal</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/james-jansen-076a0214/" target="_blank">https://www.linkedin.com/in/james-jansen-076a0214/</a></p><p>In the latest episode of Brand Stories, Sean Martin and Marco Ciappelli host James Jansen, Vice President & Global Head of Cyber Response Solutions at Consilio as he sheds light on the critical intersection of technology and cybersecurity in the legal space. The conversation dives deep into the challenges and opportunities that arise when embracing technology while maintaining a keen focus on cybersecurity and risk management.</p><p>The Importance of a Technology-Forward Approach: Consilio has always been at the forefront of embracing technology to drive efficiencies in legal workflows. With a forward-leaning attitude towards legal technology services, Consilio understands the significance of technology in assisting clients with various legal processes. From conceptual analytics to technology-assisted reviews, it has consistently leaned into new technologies with a blend of curiosity and skepticism, ensuring that they are utilized in the right way for their clients.</p><p>Navigating the Landscape of AI in Legal Processes: As technology evolves, Consilio continues to vet new technologies and adopt innovative solutions to enhance their services. Particularly noteworthy is the adoption of generative AI, which presents both opportunities and challenges. Jansen emphasizes the importance of having humans at the wheel, underscoring the critical role of human oversight in leveraging technology effectively.</p><p>Fostering a Culture of Cybersecurity: The dialogue highlights the need for a cultural shift within organizations towards cybersecurity. Every business is a potential target for cyber attacks, emphasizing the importance of developing a cybersecurity-conscious culture. By empowering employees to recognize and address cybersecurity threats, organizations can bolster their defenses and mitigate risks effectively.</p><p>Enabling Legal Teams to Embrace Technology Safely: Consilio's role in helping legal teams navigate the complexities of technology integration is paramount. By offering insights, resources, and expertise, they assist organizations in managing legal processes, protecting data, and handling incidents with precision. Their commitment to connecting the human element with technological advancements ensures a balanced approach that prioritizes both innovation and security.</p><p>Consilio stands out as a trusted partner for legal teams seeking to leverage technology safely and effectively. By emphasizing the importance of human oversight, fostering a culture of cybersecurity, and embracing innovative solutions like generative AI, it is possible to lead with a strategic approach to navigating the intersection of technology and legal cybersecurity.</p><p>By adopting a technology-forward approach and prioritizing cybersecurity, Consilio is paving the way for legal teams to navigate the digital age with confidence and resilience.</p><p>To learn more about Consilio and how they can assist your organization in embracing technology safely in the legal space, visit their website at <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a> or reach out to their team for personalized insights and solutions.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/brand-story" target="_blank"><i>Learn more: </i>https://www.itspmagazine.com/brand-story</a></p><p><strong>Resources</strong><br />Learn more about Consilio and their offering: <a href="https://itspm.ag/consilio-ch4i" target="_blank">https://itspm.ag/consilio-ch4i</a></p><p>Hear more stories from the Consilio team on their directory page: <a href="https://www.itspmagazine.com/directory/consilio" target="_blank">https://www.itspmagazine.com/directory/consilio</a></p><p>Are you interested in telling your Brand Story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="29733279" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/e2f018cf-9cdc-4ca1-83f5-c0d0934f6d8d/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=e2f018cf-9cdc-4ca1-83f5-c0d0934f6d8d&amp;feed=kDNbmF_B"/>
      <itunes:title>Embracing Technology Safely: A Look into Consilio&apos;s Role in Legal Cybersecurity | A Brand Story Conversation from LegalWeek 2024 | A Consilio Story with James Jansen</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, James Jansen</itunes:author>
      <itunes:duration>00:30:56</itunes:duration>
      <itunes:summary>Join us for an insightful episode of a new Brand Story to explore how Consilio is revolutionizing legal cybersecurity with a tech-forward approach.</itunes:summary>
      <itunes:subtitle>Join us for an insightful episode of a new Brand Story to explore how Consilio is revolutionizing legal cybersecurity with a tech-forward approach.</itunes:subtitle>
      <itunes:keywords>cyber incident response, ediscovery, cybersecurity solutions, human oversight, embracing technology safely, legal data breaches, risk management, generative ai, legal culture, legal technology services, data protection, cybersecurity challenges, ai in legal, technology in law, legal cybersecurity, technology adoption, legal tech, privacy regulations, legal operations, cybersecurity culture, consilio</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">90590538-6094-424f-9f57-e8eddd794af1</guid>
      <title>BlackCloak Exposes a Surge in Cyber Attacks Targeting Crypto-Invested Venture Capital and Private Equity Firms | A BlackCloak Brand Story with Chris Pierson</title>
      <description><![CDATA[<p>In the recent installment of Brand Stories with BlackCloak, co-hosts Marco Ciappelli and Sean take a journey into the escalating issue of cyber threats facing venture capitalists, private equity professionals, and affluent individuals invested in cryptocurrency. This episode stands out for its insightful analysis into how cybercriminals are increasingly targeting high-net-worth individuals, employing sophisticated strategies to breach their privacy and security and to steal their cryptocurrency. The discussion, enriched by the expertise of Chris Pierson, CEO and founder of BlackCloak, along with in-depth research from his team, highlights the imperative for tailored cybersecurity solutions in an era where financial investments intersect with digital vulnerability.</p><p>The conversation begins with an overview of the emerging trend where cybercriminals meticulously target individuals at the apex of financial and technological investments. Pierson’s input paints a detailed picture of the advanced tactics these nefarious actors use, ranging from social engineering to advanced phishing and hacking methods. These tactics are not random; they are precisely aimed at exploiting the unique lifestyles and the consequent vulnerabilities of high-net-worth individuals, making the need for customized cybersecurity measures more critical than ever.</p><p>A significant portion of the episode is dedicated to discussing the necessity of concierge-style cybersecurity services. Pierson emphasizes that BlackCloak’s approach is far from generic; it offers bespoke protection plans that cater to the individual’s specific lifestyle and risk profile. This personalized approach is crucial, as the assets and digital footprints of high-net-worth individuals are far from ordinary and require specialized protection strategies.</p><p>Pierson further outlines essential mitigating controls and risk reduction tactics that are pivotal in safeguarding against cyber-attacks. The focus here is on creating a multi-layered defense system that protects personal devices, secures network connections, and minimizes vulnerabilities related to one's digital presence. This strategy is not only about defending against current threats but also about being agile enough to adapt to new risks as they emerge.</p><p>A key insight from the discussion is BlackCloak’s proactive stance in anticipating future cybersecurity challenges. The cyber threat landscape is dynamic, with criminals continuously innovating to find new ways to breach defenses. BlackCloak’s methodology is centered on staying ahead of these threats through anticipation and preparation, ensuring their clients remain protected against both current and future vulnerabilities.</p><p>This episode goes beyond traditional cybersecurity discussions, focusing on the nuanced challenges faced by individuals whose financial success makes them prime targets for cybercriminals. It underscores the importance of investing in advanced, personalized cybersecurity solutions in today’s digital age. For venture capitalists, private equity professionals, and cryptocurrency investors, the message is clear: sophisticated, tailored cybersecurity and privacy protection is not an option but a necessity.</p><p>The insights provided in this episode of Brand Stories with BlackCloak offer a comprehensive look into the complexities of protecting high-net-worth individuals in the digital realm. It serves as a crucial resource for anyone involved in high-stakes investment sectors, highlighting the need for vigilance, sophisticated security measures, and a proactive approach to cybersecurity in the face of evolving threats.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more: https://www.itspmagazine.com/their-infosec-story</i></a></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong><br />Learn more about BlackCloak and their offering: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Mar 2024 21:21:07 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Marco Ciappelli, Sean Martin, Chris Pierson)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/blackcloak-exposes-a-surge-in-cyber-attacks-targeting-crypto-invested-venture-capital-and-private-equity-firms-a-blackcloak-brand-story-with-chris-pierson-iFk_DBiw</link>
      <content:encoded><![CDATA[<p>In the recent installment of Brand Stories with BlackCloak, co-hosts Marco Ciappelli and Sean take a journey into the escalating issue of cyber threats facing venture capitalists, private equity professionals, and affluent individuals invested in cryptocurrency. This episode stands out for its insightful analysis into how cybercriminals are increasingly targeting high-net-worth individuals, employing sophisticated strategies to breach their privacy and security and to steal their cryptocurrency. The discussion, enriched by the expertise of Chris Pierson, CEO and founder of BlackCloak, along with in-depth research from his team, highlights the imperative for tailored cybersecurity solutions in an era where financial investments intersect with digital vulnerability.</p><p>The conversation begins with an overview of the emerging trend where cybercriminals meticulously target individuals at the apex of financial and technological investments. Pierson’s input paints a detailed picture of the advanced tactics these nefarious actors use, ranging from social engineering to advanced phishing and hacking methods. These tactics are not random; they are precisely aimed at exploiting the unique lifestyles and the consequent vulnerabilities of high-net-worth individuals, making the need for customized cybersecurity measures more critical than ever.</p><p>A significant portion of the episode is dedicated to discussing the necessity of concierge-style cybersecurity services. Pierson emphasizes that BlackCloak’s approach is far from generic; it offers bespoke protection plans that cater to the individual’s specific lifestyle and risk profile. This personalized approach is crucial, as the assets and digital footprints of high-net-worth individuals are far from ordinary and require specialized protection strategies.</p><p>Pierson further outlines essential mitigating controls and risk reduction tactics that are pivotal in safeguarding against cyber-attacks. The focus here is on creating a multi-layered defense system that protects personal devices, secures network connections, and minimizes vulnerabilities related to one's digital presence. This strategy is not only about defending against current threats but also about being agile enough to adapt to new risks as they emerge.</p><p>A key insight from the discussion is BlackCloak’s proactive stance in anticipating future cybersecurity challenges. The cyber threat landscape is dynamic, with criminals continuously innovating to find new ways to breach defenses. BlackCloak’s methodology is centered on staying ahead of these threats through anticipation and preparation, ensuring their clients remain protected against both current and future vulnerabilities.</p><p>This episode goes beyond traditional cybersecurity discussions, focusing on the nuanced challenges faced by individuals whose financial success makes them prime targets for cybercriminals. It underscores the importance of investing in advanced, personalized cybersecurity solutions in today’s digital age. For venture capitalists, private equity professionals, and cryptocurrency investors, the message is clear: sophisticated, tailored cybersecurity and privacy protection is not an option but a necessity.</p><p>The insights provided in this episode of Brand Stories with BlackCloak offer a comprehensive look into the complexities of protecting high-net-worth individuals in the digital realm. It serves as a crucial resource for anyone involved in high-stakes investment sectors, highlighting the need for vigilance, sophisticated security measures, and a proactive approach to cybersecurity in the face of evolving threats.</p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more: https://www.itspmagazine.com/their-infosec-story</i></a></p><p><strong>Guest: Chris Pierson</strong>, Founder and CEO of BlackCloak [<a href="https://twitter.com/BlackCloakCyber" target="_blank">@BlackCloakCyber</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/drchristopherpierson/" target="_blank">https://www.linkedin.com/in/drchristopherpierson/</a></p><p>On Twitter | <a href="https://twitter.com/drchrispierson" target="_blank">https://twitter.com/drchrispierson</a></p><p><strong>Resources</strong><br />Learn more about BlackCloak and their offering: <a href="https://itspm.ag/itspbcweb" target="_blank">https://itspm.ag/itspbcweb</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="30497629" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/1719f3f6-e99e-4e4e-a983-5bce31795620/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=1719f3f6-e99e-4e4e-a983-5bce31795620&amp;feed=kDNbmF_B"/>
      <itunes:title>BlackCloak Exposes a Surge in Cyber Attacks Targeting Crypto-Invested Venture Capital and Private Equity Firms | A BlackCloak Brand Story with Chris Pierson</itunes:title>
      <itunes:author>ITSPmagazine, Marco Ciappelli, Sean Martin, Chris Pierson</itunes:author>
      <itunes:duration>00:31:44</itunes:duration>
      <itunes:summary>Join us for an insightful episode of a new Brand Story with BlackCloak, as CEO Chris Pierson takes a closer look at risks for high-net-worth individuals in crypto investments to unveil the complex landscape of digital threats facing venture capitalists and cryptocurrency investors, emphasizing the need for bespoke cybersecurity solutions.</itunes:summary>
      <itunes:subtitle>Join us for an insightful episode of a new Brand Story with BlackCloak, as CEO Chris Pierson takes a closer look at risks for high-net-worth individuals in crypto investments to unveil the complex landscape of digital threats facing venture capitalists and cryptocurrency investors, emphasizing the need for bespoke cybersecurity solutions.</itunes:subtitle>
      <itunes:keywords>chris pierson, marco ciappelli, financial data protection, sean martin, cryptocurrency, blackcloak, cybersecurity, advanced hacking techniques, digital threats, privacy protection, cybercriminal tactics, personalized security, privacy concerns, risk reduction, high-net-worth individuals, black cloak, investment security, cyber risk management, cyber crime, concierge-style cybersecurity, digital asset security, phishing attacks, venture capitalists, social engineering, tailored cyber defense, cyber attack mitigation</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
    </item>
    <item>
      <guid isPermaLink="false">4e50a2cc-c23c-4cac-b306-bb584a20ecba</guid>
      <title>JavaScript is Often the Most Common Resource to be Compromised and Exploited | Let&apos;s See How Client-Side Security Can Help Successfully Navigate the Application Threat Landscape | An Imperva Brand Story with Lynn Marks: Sr. Product Manager</title>
      <description><![CDATA[<p>Understanding the complexities around client-side security is more important than ever. As businesses and individuals, we are all 'people of the web', and protecting web transactions and user-data becomes our collective responsibility. On this episode of the Brand Story Podcast, hosts Sean Martin and Marco Ciappelli discuss these complexities with Lynn Marks, Senior Product Manager from Imperva.</p><p>The conversation begins with a key question: What is client-side protection?</p><p>Marks explains that modern engineering teams often place much of the applicational logic into the client-side, utilizing third-party JavaScript extensively. But as the prevalence of JavaScript increases, so does its vulnerability to being hijacked. A major concern is ‘form-jacking,’ where bad actors compromise JavaScript to skim sensitive information one record at a time. Due to the slow, low, and under-the-radar nature of these attacks, they often go unnoticed, emphasizing the need for proactive detection and robust prevention methods.</p><p>Marks highlights that many organizations are currently blind to these client-side attacks and require visibility into their online activity. This is where Imperva’s Client-Side Protection product comes in. It enables organizations to start gaining visibility, insights, and the ability to either allow or block the execution of certain actions on their client-side applications. The goal is to streamline their compliance processes, manage the auditing stages effectively, and facilitate them to make data-driven, informed decisions.</p><p>Marks also discusses the importance of adhering to PCI-DSS (Payment Card Industry Data Security Standard)—specifically version 4.0. As this standard applies to all organizations processing payment information, it plays a significant role in helping organizations build programs capable of combating these attacks. Imperva’s Client-Side Protection product aligns with this framework, providing necessary visibility and insights while streamlining the auditing and compliance processes.</p><p>For Imperva WAF customers, the Imperva client-side solution can be activated with just one click, removing any constraints and giving back control to the security teams. As organizations implement these security measures into their regular processes, they gain the ability to forecast and manage potential threats better.</p><p>Maintaining client-side security is undoubtedly a complex task, especially with the ever-increasing and evolving use of JavaScript. However, with comprehensive visibility, robust solutions, and readily-available compliance with industry standards, organizations can efficiently manage these threats and ultimately protect the end-users. By fostering a proactive stance towards cybersecurity, we can maintain the integrity of our online experiences and embrace our roles as responsible people of the web.</p><p>Top Questions Addressed</p><ul><li>What is client-side protection?</li><li>How can an organization protect itself against client-side attacks?</li><li>What is the role of Imperva's Client Side Protection product in combating client-side security threats?</li></ul><p> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Lynn Marks</strong>, Senior Product Manager at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/lynnmarks1/" target="_blank">https://www.linkedin.com/in/lynnmarks1/</a></p><p>Blog | <a href="https://thenewstack.io/author/lynn-marks/" target="_blank">https://thenewstack.io/author/lynn-marks/</a></p><p><strong>Resources</strong></p><p>Learn more about Imperva and their offering: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p>Guide: The Role of Client-Side Protection: <a href="https://itspm.ag/impervlttq" target="_blank">https://itspm.ag/impervlttq</a></p><p>Catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></description>
      <pubDate>Thu, 21 Mar 2024 21:18:27 +0000</pubDate>
      <author>contact@itspmagazine.com (ITSPmagazine, Sean Martin, Marco Ciappelli, Lynn Marks)</author>
      <link>https://brand-stories-podcast.simplecast.com/episodes/javascript-is-often-the-most-common-resource-to-be-compromised-and-exploited-lets-see-how-client-side-security-can-help-successfully-navigate-the-application-threat-landscape-an-imperva-brand-story-with-lynn-marks-sr-product-manager-Z2uImZhc</link>
      <content:encoded><![CDATA[<p>Understanding the complexities around client-side security is more important than ever. As businesses and individuals, we are all 'people of the web', and protecting web transactions and user-data becomes our collective responsibility. On this episode of the Brand Story Podcast, hosts Sean Martin and Marco Ciappelli discuss these complexities with Lynn Marks, Senior Product Manager from Imperva.</p><p>The conversation begins with a key question: What is client-side protection?</p><p>Marks explains that modern engineering teams often place much of the applicational logic into the client-side, utilizing third-party JavaScript extensively. But as the prevalence of JavaScript increases, so does its vulnerability to being hijacked. A major concern is ‘form-jacking,’ where bad actors compromise JavaScript to skim sensitive information one record at a time. Due to the slow, low, and under-the-radar nature of these attacks, they often go unnoticed, emphasizing the need for proactive detection and robust prevention methods.</p><p>Marks highlights that many organizations are currently blind to these client-side attacks and require visibility into their online activity. This is where Imperva’s Client-Side Protection product comes in. It enables organizations to start gaining visibility, insights, and the ability to either allow or block the execution of certain actions on their client-side applications. The goal is to streamline their compliance processes, manage the auditing stages effectively, and facilitate them to make data-driven, informed decisions.</p><p>Marks also discusses the importance of adhering to PCI-DSS (Payment Card Industry Data Security Standard)—specifically version 4.0. As this standard applies to all organizations processing payment information, it plays a significant role in helping organizations build programs capable of combating these attacks. Imperva’s Client-Side Protection product aligns with this framework, providing necessary visibility and insights while streamlining the auditing and compliance processes.</p><p>For Imperva WAF customers, the Imperva client-side solution can be activated with just one click, removing any constraints and giving back control to the security teams. As organizations implement these security measures into their regular processes, they gain the ability to forecast and manage potential threats better.</p><p>Maintaining client-side security is undoubtedly a complex task, especially with the ever-increasing and evolving use of JavaScript. However, with comprehensive visibility, robust solutions, and readily-available compliance with industry standards, organizations can efficiently manage these threats and ultimately protect the end-users. By fostering a proactive stance towards cybersecurity, we can maintain the integrity of our online experiences and embrace our roles as responsible people of the web.</p><p>Top Questions Addressed</p><ul><li>What is client-side protection?</li><li>How can an organization protect itself against client-side attacks?</li><li>What is the role of Imperva's Client Side Protection product in combating client-side security threats?</li></ul><p> </p><p><i>Note: This story contains promotional content. </i><a href="https://www.itspmagazine.com/their-infosec-story" target="_blank"><i>Learn more</i></a><i>.</i></p><p> </p><p><strong>Guest: Lynn Marks</strong>, Senior Product Manager at Imperva [<a href="https://twitter.com/Imperva" target="_blank">@Imperva</a>]</p><p>On Linkedin | <a href="https://www.linkedin.com/in/lynnmarks1/" target="_blank">https://www.linkedin.com/in/lynnmarks1/</a></p><p>Blog | <a href="https://thenewstack.io/author/lynn-marks/" target="_blank">https://thenewstack.io/author/lynn-marks/</a></p><p><strong>Resources</strong></p><p>Learn more about Imperva and their offering: <a href="https://itspm.ag/imperva277117988" target="_blank">https://itspm.ag/imperva277117988</a></p><p>Guide: The Role of Client-Side Protection: <a href="https://itspm.ag/impervlttq" target="_blank">https://itspm.ag/impervlttq</a></p><p>Catch more stories from Imperva at <a href="https://www.itspmagazine.com/directory/imperva" target="_blank">https://www.itspmagazine.com/directory/imperva</a></p><p>Are you interested in telling your story?<br /><a href="https://www.itspmagazine.com/telling-your-story"><strong>https://www.itspmagazine.com/telling-your-story</strong></a></p><br/> <p>Hosted by Simplecast, an AdsWizz company. See <a href="https://pcm.adswizz.com">pcm.adswizz.com</a> for information about our collection and use of personal data for advertising.</p>]]></content:encoded>
      <enclosure length="42942700" type="audio/mpeg" url="https://afp-110348-injected.calisto.simplecastaudio.com/224fc367-739d-44b7-b07e-44801ad01737/episodes/c03073b1-60cd-41ec-adab-f2e4bbd7f560/audio/128/default.mp3?aid=rss_feed&amp;awCollectionId=224fc367-739d-44b7-b07e-44801ad01737&amp;awEpisodeId=c03073b1-60cd-41ec-adab-f2e4bbd7f560&amp;feed=kDNbmF_B"/>
      <itunes:title>JavaScript is Often the Most Common Resource to be Compromised and Exploited | Let&apos;s See How Client-Side Security Can Help Successfully Navigate the Application Threat Landscape | An Imperva Brand Story with Lynn Marks: Sr. Product Manager</itunes:title>
      <itunes:author>ITSPmagazine, Sean Martin, Marco Ciappelli, Lynn Marks</itunes:author>
      <itunes:duration>00:44:41</itunes:duration>
      <itunes:summary>In this new Brand Story Podcast, Lynn Marks from Imperva unravels the intricacies and evolving threats of client-side attacks, providing listeners with an in-depth understanding of how to safeguard their data. Discover how solutions like Imperva&apos;s Client Side Protection product are transforming ways to secure transactions, protect user-data, while also streamlining compliance processes.</itunes:summary>
      <itunes:subtitle>In this new Brand Story Podcast, Lynn Marks from Imperva unravels the intricacies and evolving threats of client-side attacks, providing listeners with an in-depth understanding of how to safeguard their data. Discover how solutions like Imperva&apos;s Client Side Protection product are transforming ways to secure transactions, protect user-data, while also streamlining compliance processes.</itunes:subtitle>
      <itunes:keywords>data breaches, javascript, infosec, cybersecurity, magecart attacks, imperva&apos;s products, form-jacking, online security, digital threats, data protection, cyber attackers, lynn marks, client-side security, imperva, web applications, client side protection, pci dss, third party javascript, brand story podcast, web vulnerability</itunes:keywords>
      <itunes:explicit>false</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
    </item>
  </channel>
</rss>