ITSPmagazine | Technology. Cybersecurity. Society

Follow ITSPmagazine | Technology. Cybersecurity. Society
Share on
Copy link to clipboard

ITSPmagazine is free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live. Delivered through articles, podcasts, webcasts,…

ITSPmagazine | Technology. Cybersecurity. Society.


    • Jan 18, 2026 LATEST EPISODE
    • weekdays NEW EPISODES
    • 34m AVG DURATION
    • 2,599 EPISODES

    Ivy Insights

    The ITSPmagazine | Technology. Cybersecurity. Society podcast is a highly informative and entertaining show that covers a wide range of topics in the cybersecurity field. The hosts do an excellent job of engaging with their guests and creating conversations that are both educational and enjoyable to listen to. Whether you're a beginner or an expert in cybersecurity, there is something for everyone in this podcast.

    One of the best aspects of this podcast is the diversity of subjects covered. The hosts interview experts from various backgrounds and discuss real problems in the cybersecurity field. This allows listeners to gain insight into different perspectives and stay up-to-date with current issues. Topics such as AI and technology, privacy, ethical hacking, and cyber safety are explored in depth, providing valuable information for anyone interested in these areas.

    Another great aspect of this podcast is its ability to engage with its audience. The hosts make an effort to be accessible and chat with everyone, creating a welcoming environment for listeners to interact and ask questions. This not only makes the podcast more enjoyable but also fosters a sense of community among cybersecurity enthusiasts.

    However, one potential downside of this podcast is that it can sometimes delve into technical jargon that may be difficult for beginners to understand. While it is aimed at both beginners and experts, those new to the field may find themselves getting lost during certain discussions. It would be helpful if the hosts could provide more context or explanations for complex concepts to make it more accessible for beginners.

    In conclusion, The ITSPmagazine | Technology. Cybersecurity. Society podcast is a highly valuable resource for anyone interested in cybersecurity, technology, and society's impact on these areas. The informative yet entertaining format keeps listeners engaged while providing them with valuable insights from experts in the field. Despite some technical jargon that may be challenging for beginners, this podcast offers a wealth of knowledge that will leave listeners wanting to learn more about these important topics.



    Search for episodes from ITSPmagazine | Technology. Cybersecurity. Society with a specific topic:

    Latest episodes from ITSPmagazine | Technology. Cybersecurity. Society

    Giannina The Cat | Written By Lucia & Marco Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And Dreamers Of All Ages

    Play Episode Listen Later Jan 18, 2026 10:15


    Giannina the Cat Giannina the cat lived in a house with a garden. The garden wall bordered a park where children gathered to play. The town was small but charming — from the windowsills of the houses, pots of geraniums and petunias tumbled down like colorful cascades. Her owner, Signora Mafalda, often took her around the town center. All the children knew her, and whenever they spotted her, they would run over and shower her with affection. Giannina was quite the little rascal. During the day she loved chasing lizards, hunting insects, butterflies, and anything that moved. To rest, she would stretch out in the sun on the warm stones, then cool off among the blades of grass. In the garden, among the pomegranate tree, the lemon tree, and the olive with its silvery leaves, she and Mafalda spent their afternoons playing together. But one day, Mafalda began to notice something strange. Giannina would leap to catch her prey, but she kept missing and ending up in the rose bushes. "Ow, ow, ow! I've pricked myself and my tail is tangled in the branches!" she meowed. She barely managed to dodge trees she used to climb with ease. She reached her food and water bowls with an uncertain gait. Worried, Mafalda took her to the Veterinarian. After listening to the little cat's strange adventures, the Doctor smiled and delivered his verdict with a wise air: "This little kitty can't see well. She needs glasses." No sooner said than done — in the blink of an eye, the veterinarian searched through a display case full of frames for pets and, finding the perfect one, exclaimed: "Here we are — a pair of glasses fit for an elegant lady!" As soon as they were placed on Giannina's sweet little snout, the cat looked around in wonder. She could see everything so clearly! She rubbed against the Veterinarian's legs and leaped into Mafalda's arms as if to thank her. The Doctor, touched by her sweetness, gave her a special gift: a golden chain with a small pearl at its center that glowed with its own light. Whispering, he told her: "If you close your eyes and touch this pearl with your little nose, you will gain magical powers that only you will have. They will help you help others." Giannina thought that perhaps this Veterinarian was also a Wizard, but she said nothing to Mafalda. It was a secret between her and the strange Doctor. On the way home, people turned to look at her, thinking: that cat seems mysterious — there's something glimmering around her. At home, Giannina's first wish was to climb onto a chair and gaze out the window. The flowers shone in their colors, and even the grass was a brilliant green, as if covered in dew. She smiled, happier than ever. Mafalda, sharing in her joy, decided to take her to the park. They arrived in no time. Squirrels scampered through the trees, birds sang as they flew from branch to branch. Small creatures popped out everywhere, and the children followed them with curiosity — they ran alongside the lizards, leaped with the butterflies dancing in the air, while red ladybugs landed on their skin like good luck charms. After chases, slides, and ring-around-the-rosy, the children sat down on the grass for their snack. From their colorful backpacks came tasty treats. That's when they arrived. "Vriiip! Vriiip! Vriiip!" At full speed, a platoon of ants zoomed in on rumbling mini-motorcycles. They wore shiny little helmets on their heads, round goggles over their eyes, and tiny boots on their feet. They braked sharply in front of the children, raising little clouds of dust. "Make way! We're here too!" shouted the lead ant, lifting her visor. "Can we collect the crumbs?" The children burst out laughing. "Yes, yes! Munch all the crumbs you want!" The ants parked their mini-motorcycles in a neat row, removed their helmets with theatrical gestures, and got to work carrying crumbs twice their size, singing a little marching song. In this joyful atmosphere, Giannina and Mafalda strolled along the pathways. And suddenly, as they passed, the trees bent their branches in a bow and their leaves rustled in greeting. The roses in the flower beds opened their petals and began to sing. The lizards beat their tails on the ground like drums: "Rattatatà! Rattatatà!" And the millipedes started tap dancing to the lively rhythm. "Oh my, what a wonderful commotion!" exclaimed Giannina, who was beginning to feel a mysterious aura around her. She couldn't help but think of the Wizard Veterinarian. What could these magical powers be? And what would happen if she touched the pearl with her little nose? She told Mafalda, who was carrying a book of fairy tales under her arm. They looked at each other and, understanding instantly, seized the moment. Giannina gathered the children in a circle. Some came quickly, others more shy joined in slowly. The ants too, their bellies full, put on their mini helmets again, did one last rumbling lap on their motorcycles, then climbed off and approached the group. It was the right moment. Giannina closed her eyes and touched the magic pearl with her little nose. A golden spark flashed in the air. She took the book from Mafalda's hands, opened it, and chose the tale that seemed to be waiting for her, glowing among the pages. In a gentle voice, she began to read. "Once upon a time, there was a little rabbit who lived in the woods. He kept tripping over tree roots and pebbles. At school, he made mistakes reading letters and numbers, so he didn't want to go anymore. When the teacher saw his drawings, she said: 'Well done!' His mom and dad said the same: 'Well done!' But to him, the colors seemed faded. The truth was, he couldn't see well, but instead of saying so, he would run away and hide in a burrow beneath a talking tree. And the tree, with the rustle of its leaves, whispered a secret: talk to your parents. So he did, and they helped him get glasses. And the world became beautiful again." Giannina closed the book. She understood: with the magic pearl, she could read the hearts of children, discovering emotions and secrets waiting to be brought to light. "You know," she said to her little listeners, "not long ago, I couldn't see well either. But I put on these glasses and poof! The world became clearer and more beautiful." A boy approached her, almost embarrassed, and whispered in her ear: "Maybe I need them too, like you." Giannina gently stroked him. "I helped you open your heart. Now talk to your parents, and everything will be fine." Just then, a little rabbit appeared suddenly from the bushes. He came up to Giannina, hugged her, and said: "You are magically magical!" And — you won't believe it — that little rabbit was wearing a lovely pair of colorful glasses. From that day on, Giannina took the children of the town by the paw, teaching them to believe in themselves and to have confidence. She became the mascot with the magic glasses, and everyone wanted to wear them just like her. But the true wonder was how she now saw the world from her window: brighter, more colorful, more alive. And every evening, before falling asleep, she would touch the pearl with her little nose and smile, knowing that the next day she would help someone else see the world with new eyes. It almost seemed like it had been a dream. But as we know, reality and fantasy often walk hand in hand. _— Written by Lucia & Marco Ciappelli_ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    CES 2026 Recap | AI, Robotics, Quantum, And Renewable Energy: The Future Is More Practical Than You Think | A Conversation with CTA Senior Director and Futurist Brian Comiskey | Redefining Society and Technology with Marco Ciappelli

    Play Episode Listen Later Jan 17, 2026 23:55


    CES 2026 Just Showed Us the Future. It's More Practical Than You Think.CES has always been part crystal ball, part carnival. But something shifted this year.I caught up with Brian Comiskey—Senior Director of Innovation and Trends at CTA and a futurist by trade—days after 148,000 people walked the Las Vegas floor. What he described wasn't the usual parade of flashy prototypes destined for tech graveyards. This was different. This was technology getting serious about actually being useful.Three mega trends defined the show: intelligent transformation, longevity, and engineering tomorrow. Fancy terms, but they translate to something concrete: AI that works, health tech that extends lives, and innovations that move us, power us, and feed us. Not technology for its own sake. Technology with a job to do.The AI conversation has matured. A year ago, generative AI was the headline—impressive demos, uncertain applications. Now the use cases are landing. Industrial AI is optimizing factory operations through digital twins. Agentic AI is handling enterprise workflows autonomously. And physical AI—robotics—is getting genuinely capable. Brian pointed to robotic vacuums that now have arms, wash floors, and mop. Not revolutionary in isolation, but symbolic of something larger: AI escaping the screen and entering the physical world.Humanoid robots took a visible leap. Companies like Sharpa and Real Hand showcased machines folding laundry, picking up papers, playing ping pong. The movement is becoming fluid, dexterous, human-like. LG even introduced a consumer-facing humanoid. We're past the novelty phase. The question now is integration—how these machines will collaborate, cowork, and coexist with humans.Then there's energy—the quiet enabler hiding behind the AI headlines.Korea Hydro Nuclear Power demonstrated small modular reactors. Next-generation nuclear that could cleanly power cities with minimal waste. A company called Flint Paper Battery showcased recyclable batteries using zinc instead of lithium and cobalt. These aren't sexy announcements. They're foundational.Brian framed it well: AI demands energy. Quantum computing demands energy. The future demands energy. Without solving that equation, everything else stalls. The good news? AI itself is being deployed for grid modernization, load balancing, and optimizing renewable cycles. The technologies aren't competing—they're converging.Quantum made the leap from theory to presence. CES launched a new area called Foundry this year, featuring innovations from D-Wave and Quantum Computing Inc. Brian still sees quantum as a 2030s defining technology, but we're in the back half of the 2020s now. The runway is shorter than we thought.His predictions for 2026: quantum goes more mainstream, humanoid robotics moves beyond enterprise into consumer markets, and space technologies start playing a bigger role in connectivity and research. The threads are weaving together.Technology conversations often drift toward dystopia—job displacement, surveillance, environmental cost. Brian sees it differently. The convergence of AI, quantum, and clean energy could push things toward something better. The pieces exist. The question is whether we assemble them wisely.CES is a snapshot. One moment in the relentless march. But this year's snapshot suggests technology is entering a phase where substance wins over spectacle.That's a future worth watching.This episode is part of the Redefining Society and Technology podcast's CES 2026 coverage. Subscribe to stay informed as technology and humanity continue to intersect.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.> https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Craft, Lineage, and Making Music That Holds | A Conversation with Singer, Songwriter, Guitarist, and She Rocks Awards 2026 Honoree, Margaret Glaspy | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin

    Play Episode Listen Later Jan 16, 2026 23:42


    Show NotesSinger, songwriter, and guitarist Margaret Glaspy joins Sean Martin and Marco Ciappelli for a Music Evolves conversation recorded in the context of the NAMM Show and the She Rocks Awards, where Glaspy is recognized as a 2026 honoree. The discussion centers on how artists develop a voice, how creative practice sustains a career, and why music functions as a form of public service rather than a commodity alone. Glaspy shares how growing up in a musically active household normalized creativity and removed the idea that music must be exceptional to be meaningful. Early immersion in Texas-style fiddle competitions, alongside exposure to jazz, songwriter traditions, and alternative rock, shapes a foundation rooted in lineage rather than trend. That sense of lineage continues to guide her current work, where influence is acknowledged openly rather than hidden.Songwriting, as Glaspy describes it, is a daily practice rather than an output-driven process. Writing consistently, sometimes a song a day, becomes a way to maintain agency in a career shaped by touring cycles, releases, and expectations. Albums emerge from accumulation and reflection, not from pre-defined concepts. This approach reframes productivity as presence, with creativity tied to well-being and continuity.The conversation also explores how artists navigate maturity. Early attempts to emulate heroes eventually give way to self-recognition. Glaspy speaks to the value of being a student of music, letting imitation serve as a bridge to personal expression rather than a destination. That perspective resists the myth of originality in isolation and places artists within an ongoing cultural thread.Recognition at the She Rocks Awards introduces another dimension. Glaspy views the honor with humility, emphasizing the importance of creating space to acknowledge women's contributions in music without turning the work itself into a competition. In that context, the NAMM Show represents the maker side of music, instrument builders, technologists, and craftspeople whose work enables creative expression.This episode positions music not as a product to be optimized, but as a practice to be protected, cultivated, and shared.GuestMargaret Glaspy, Singer, Songwriter, and Guitarist | Website: https://margaretglaspy.com/HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comResources2026 She Rocks Awards: https://sherocksawards.com/The NAMM Show 2026 is taking place from January 20-24, 2026 | Anaheim Convention Center • Southern California — Coverage provided by ITSPmagazine — Follow our coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026The NAMM Show 2026: https://www.namm.org/thenammshow/attendMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/Keywordsmargaret glaspy, sean martin, marco ciappelli, namm, she rocks awards, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast, singer, songwriter, guitarist, guitar playingMore From Sean MartinMore from Music Evolves: https://www.seanmartin.com/music-evolves-podcastMusic Evolves on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtWMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/On Location with Sean and Marco: https://www.itspmagazine.com/on-locationITSPmagazine YouTube Channel: https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Bass Is the Backbone of Music | A Conversation with Bass Magazine Editor in Chief, Jon D'Auria | The NAMM Show 2026 Event Coverage — Bass Magazine Awards | Music Evolves with Sean Martin

    Play Episode Listen Later Jan 15, 2026 38:28


    Show NotesBass rarely leads the conversation about music innovation, yet it quietly shapes how songs move, how bands connect, and how audiences feel rhythm in their bodies. In this episode of Music Evolves, hosts Sean Martin and Marco Ciappelli explore that idea with Jon D'Auria, Editor in Chief of Bass Magazine, through the lens of community, technology, and cultural relevance.D'Auria describes bass not as a background instrument, but as a stabilizing force. It anchors songs while allowing others to shine, a role mirrored by bass players themselves. That identity informs how the bass community operates: collaborative, inclusive, and deeply connected across generations. Events like the Bass Magazine Awards, held alongside the NAMM Show, are not about spectacle alone. They are about recognition, continuity, and shared lineage.Technology plays a central role in how this community grows. Digital publishing allowed Bass Magazine to expand reach beyond the limits of print, creating immediate access to news, gear releases, artist stories, and cultural moments. Social platforms now surface bass players from bedrooms and rehearsal spaces worldwide, creating opportunity while also reshaping how success is measured.Innovation, however, is not framed as progress for its own sake. The conversation questions where technology supports creativity and where it distracts from it. Lightweight amps, compact gear, and modeling tools solve real problems for working musicians. AI, on the other hand, introduces unresolved tension. While it lowers barriers to creation, it also challenges authorship, labor, and artistic value.Through it all, the episode reinforces a simple truth: music remains human at its core. Technology can amplify access, speed, and scale, but it does not replace intention, emotion, or community. Bass, often overlooked, becomes the perfect metaphor for that balance. Present, essential, and powerful without demanding the spotlight.This episode positions bass not just as an instrument, but as a signal of how music culture adapts while staying grounded in human connection.GuestJon D'Auria, Editor in Chief of Bass Magazine | On LinkedIn: https://www.linkedin.com/in/jon-d-auria-2a7b5089/HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comResourcesBass Magazine: https://bassmagazine.comBass Magazine Awards: https://bassmagazineawards.com/The NAMM Show 2026 is taking place from January 20-24, 2026 | Anaheim Convention Center • Southern California — Coverage provided by ITSPmagazine — Follow our coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026The NAMM Show 2026: https://www.namm.org/thenammshow/attendMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/Keywordssean martin, marco ciappelli, jon dauria, bass magazine, namm, bass, music, technology, community, creativity, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcastMore From Sean MartinMore from Music Evolves: https://www.seanmartin.com/music-evolves-podcastMusic Evolves on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtWMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/On Location with Sean and Marco: https://www.itspmagazine.com/on-locationITSPmagazine YouTube Channel: https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys

    Play Episode Listen Later Jan 13, 2026 6:37


    In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Leopoldo's Secret Library | Written By Marco Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And Dreamers Of All Ages

    Play Episode Listen Later Jan 12, 2026 13:18


    LEOPOLDO'S SECRET LIBRARYSome people are strange — they like to spend their evenings reading books.Others are even stranger — they believe in the magic found between pages, in fantastical adventures, in stories of impossible love, in ghosts that walk among the living, and they think that everything that doesn't exist — maybe does after all.In short, this story is for those who are a little strange, like you and me — you know, for those who.So… listen.If you take the road up the hill from the center of town, you'll find an old and noble villa, one that has been there for a very long time. It must be about 350 years now that it has stood there in silence, watching and breathing softly beneath the Tuscan sky.Enormous rooms filled with history, endless corridors, and windows as large as dreams — but now, instead of porcelain plates and figurines, it gives us stories on paper for those who wish to read them.Yes, now it's the town library — a bit out of the way, but so beautiful. Well, you can't have everything.Now, on a summer night, wrapped in a blanket of stars and the soft glow of delicate lanterns, the villa had filled with voices, music, smiles, and so many stories told and heard, spoken aloud or whispered, intertwining in the embrace of the celebration.A special evening already, no doubt, but pay attention, because something even more unusual was about to happen.Yes, because Elisa was there too. Eyes as wide as the sky, hair as dark as the night, and a book in her hand — as always.Despite everything happening around her, Elisa preferred to read.She was there, in the main corridor: between the garden and the inner courtyard, halfway between the certain and the perhaps, sitting in an armchair a little too big for her, lost in a mysterious and captivating story — in a world all her own.She turns a page, then another, adjusts her yellow glasses, and turns another page…When slowly, the echo of piano music reached her ears.She didn't pay much attention. Thinking it came from the courtyard, she turned another page — and then another.But before long she realized that the notes she heard were not coming from the villa's courtyard but from one of its corridors — carried by a gentle breeze, from faraway places outside of time.Without thinking too much, Elisa rose silently, tucked her book under her arm, and followed the music.She crossed ancient corridors and rooms with shelves full of volumes of every size and color imaginable — rainbows of thoughts and words lined up one by one that seemed to never end.As the music grew stronger, the light faded, the rooms she passed through began to appear forgotten, the stone stairs she climbed and descended worn by time, the side corridors were now dark passages lit only by torches on the walls, appearing and disappearing in the darkness like breaths.A staircase, a wooden door left ajar, another passage, another staircase, and still more rooms and shelves and books without end.Then, suddenly, a mist covered the floor like a gentle tide, and there, before her, a heavy curtain — half open.A little light showed through, and a few small wooden steps.She climbed them, those little stairs, and the music wrapped around her like an embrace.On the stage, candles floated in the air like fireflies on a timeless night. And there, at the center, seated before a tiny piano, was a mouse.But not just any mouse.Leopoldo wore a dark green tweed jacket, brown trousers pressed with care, and on his little snout, golden spectacles that gleamed with ancient and gentle wisdom.His fingers danced on the keys as if they were telling a secret."Welcome, Elisa," he said, without stopping his playing. "I've been waiting for you."Elisa blinked, enchanted. "How do you know my name?""Ah," Leopoldo smiled, letting the last note fade softly into the air, "those who love stories always recognize those who seek them."He stood, adjusted his jacket with an elegant gesture, and looked at her with eyes full of stars."Do you know where you are?""In the town library," Elisa answered, but her voice trembled a little, as if she knew the answer was something else."That one everyone knows," said Leopoldo, stepping down slowly from the stage. "Every town has one that everyone knows. But every town also has another — one that almost no one finds."He paused, his eyes gleaming."You have found the second."Leopoldo led her toward a large wooden door that Elisa could have sworn wasn't there a moment before. It opened slowly, without a sound, like a sigh held too long.And what she saw took her breath away.Endless shelves climbed upward, descended downward, stretched in every direction like spirals of galaxies made of paper and dreams. Candles floated everywhere, illuminating books that seemed to breathe, to pulse softly, like sleeping hearts."What is this place?" Elisa whispered."This," said Leopoldo, walking among the shelves, "is the library of books never written."Elisa followed, confused. "Books never written? But how can they exist?"Leopoldo stopped, turned, and looked at her with infinite gentleness."Every story ever dreamed exists, Elisa. Every adventure imagined before sleep. Every tale thought but never put to paper. They all live here, at the border between the world and the dream, waiting."They stopped before a shelf.Leopoldo pointed to a small book, bound in blue like a summer sky."Touch it," he said softly.Elisa reached out, hesitant, and brushed the cover.A gentle warmth passed through her fingers. And for an instant — just an instant — she heard a child's laughter, saw a dragon made of clouds, and a castle built of pillows and blankets."This," said Leopoldo, "was the dream of a six-year-old boy. A story he told his teddy bear every night. He never wrote it down. But it exists. You see? It exists."Elisa smiled, her heart light.They walked on, through corridors of silent stories, until Leopoldo stopped before another book.This one was different. Larger, bound in dark leather, with golden letters that seemed to tremble."And this one?" asked Elisa, quietly."This one," said Leopoldo, and his voice grew soft as a caress, "belonged to a grandmother."Elisa touched it.And she felt something different.Not laughter, this time. But a warm, distant voice, telling of a brave little girl who crossed an enchanted forest to bring light to a forgotten village."It was the story she wanted to leave her grandchildren," Leopoldo explained. "But time… time sometimes runs faster than dreams. She didn't have time to write it."Elisa felt her eyes sting."But it's here," she whispered."It's here," Leopoldo confirmed. "Forever."They continued walking, in silence, until they reached a shelf unlike the others.It was nearly empty. Only a few books, spaced apart, and so many open spaces, waiting.At the center, a book without a title.The cover was white, clean, like freshly fallen snow, like a page waiting for its first mark."May I?" asked Elisa.Leopoldo nodded.She touched it.Nothing. No warmth. No voice. Only silence. But a full silence, like a breath held."This book is empty," said Elisa, surprised."Not yet written," Leopoldo corrected. "Not even dreamed. Not yet. It waits for someone to find the courage to imagine it."He turned toward her, and his eyes shone like the candles floating around them."Perhaps it waits for you. Perhaps it waits for someone else. But it waits."Elisa stood still, looking at that white book.And she understood.She understood that every story she had ever imagined, every adventure invented before sleep, every dream she thought lost upon waking, existed somewhere.And she understood something else.That you don't have to be afraid to write.Because stories already exist — in the heart, in the mind, in dreams. Putting them on paper is not creating them from nothing. It is only opening a door and letting them out."I have to go, don't I?" said Elisa, softly.Leopoldo smiled. "Your world awaits you. But now you know this place exists. And you know that every story you dream will always have a place here, whether you write it or not."He paused."But if you do write it," he added with a sly smile, "it can live out there too. And that, my dear, is another kind of magic."Elisa found herself back in the villa's corridor, sitting in the armchair a little too big for her, the book still under her arm.The celebration went on, voices and music and laughter, as if no time had passed at all.But something had changed.She had changed.She opened the book she had been reading, looked at the pages, and smiled.Then she closed it.Because now she knew that the most beautiful stories are not only the ones we read.They are the ones we carry inside, the ones we dream with our eyes open, and the ones that one day, with a little courage, we dare to tell.— This story was written by Marco Ciappelli for "Storie Sotto Le Stelle"  Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Dave Tourjé on Art, Music, Skateboarding, Los Angeles and Never Selling Out | Stories, Storytelling & Storytellers | Audio Signals Podcast With Marco Ciappelli

    Play Episode Listen Later Jan 11, 2026 48:41


    Dave Tourjé: You Have to Destroy What You Create to Become FreeWhen Dave Tourjé was two years old, he had a box of wooden blocks. Every day he'd dump them on the floor, stack them into towers of color, admire what he built—then destroy it and start over.That ritual never stopped.Tourjé is a painter, a punk rock musician, a skateboarder, and a founding member of the California Locos—a collective of LA artists who represent the city's raw, multicultural energy. When he sat down with me for Audio Signals Podcast, we talked about survival, rebellion, and what it really takes to stay free as an artist."You have to learn to destroy what you're creating to really become free," Tourjé told me. "Otherwise you're gonna be trapped by your own creation."He calls himself a lucky survivor of the eighties. Born in 1960, raised in Los Angeles, he hit the punk rock scene at 19, got his first skateboard at 7, and was riding swimming pools by the time urethane wheels made it possible. He studied art on scholarship but quit when they asked him to do papier-mâché in college. "That was third grade for me," he said. "I just said, fuck this. I'm outta here."He's the only practicing artist from that program.When galleries started selling his concrete and steel furniture around the world, Tourjé thought they'd embrace his paintings too. Instead, they told him to stick with what was selling. When collectors wanted commissioned work in different colors, he walked away. "I was not built to do it," he said. "So I bowed out."Instead of finding a patron, he built one. A construction company that runs without him—a machine that pays him without requiring him to owe anything to anyone. "It's going to be my patron," he explained. "It's a similar model, but without all the social implications."That freedom let him focus on the California Locos, a collective he assembled around 2011 with friends who were all leaders in their own corners of LA culture—surf, skate, street art, tattoo, photography. "We are basically Los Angeles," he said. "A very honest reflection."Their book, Renaissance and Rebellion, tells the story from the sixties to now. It's published by Drago in Rome and distributed internationally. They're currently showing at the California Surf Museum in Oceanside, with museum shows lined up for 2027 and Spain on the horizon.But the moment that stuck with me came at the end of our conversation. We talked about how musicians destroy as they create—every live performance disappears the moment it's played. "It's like painting a painting that as soon as you put it down and you go to get the next paint, the paint is gone."And when someone looks at his paintings and sees something he never intended? He doesn't correct them. "The story is the painting," he said. "As soon as the artist says what it's about, everybody has to abide by the rules."He refuses to impose meaning. Once he's done, he becomes an observer. The work is no longer his—it's an object from the past. He's already onto the next thing.That's what freedom looks like after a lifetime of rebellion.Stay tuned. Subscribe. And remember—we are all made of stories.-- Marco_______________________________________________________________________________________Audio Signals Podcast

    Real-Time Protection Against AI-Driven Account Takeover Fraud | A Brand Highlight Conversation with Israel Mazin, Co-Founder and CEO of Memcyco

    Play Episode Listen Later Jan 8, 2026 5:34


    As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. Israel Mazin, Co-Founder and CEO of Memcyco, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.Memcyco is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, Memcyco identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.With an agentless deployment that takes just minutes to implement, Memcyco delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIsrael Mazin, Co-Founder and CEO of MemcycoOn LinkedIn: https://www.linkedin.com/in/israel-mazin-62215b/RESOURCESMemcyco: https://www.memcyco.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIsrael Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    CES 2026: Why NVIDIA's Jensen Huang Won IEEE Medal of Honor | A Conversation with Mary Ellen Randall, IEEE's 2026 President and CEO | Redefining Society and Technology with Marco Ciappelli

    Play Episode Listen Later Jan 8, 2026 24:46


    Jensen Huang Just Won IEEE's Highest Honor. The Reason Tells Us Everything About Where Tech Is Headed.IEEE announced Jensen Huang as its 2026 Medal of Honor recipient at CES this week. The NVIDIA founder joins a lineage stretching back to 1917—over a century of recognizing people who didn't just advance technology, but advanced humanity through technology.That distinction matters more than ever.I spoke with Mary Ellen Randall, IEEE's 2026 President and CEO, from the floor of CES Las Vegas. The timing felt significant. Here we are, surrounded by the latest gadgets and AI demonstrations, having a conversation about something deeper: what all this technology is actually for.IEEE isn't a small operation. It's the world's largest technical professional society—500,000 members across 190 countries, 38 technical societies, and 142 years of history that traces back to when the telegraph was connecting continents and electricity was the revolutionary new thing. Back then, engineers gathered to exchange ideas, challenge each other's thinking, and push innovation forward responsibly.The methods have evolved. The mission hasn't."We're dedicated to advancing technology for the benefit of humanity," Randall told me. Not advancing technology for its own sake. Not for quarterly earnings. For humanity. It sounds like a slogan until you realize it's been their operating principle since before radio existed.What struck me was her framing of this moment. Randall sees parallels to the Renaissance—painters working with sculptors, sharing ideas with scientists, cross-pollinating across disciplines to create explosive growth. "I believe we're in another time like that," she said. "And IEEE plays a crucial role because we are the way to get together and exchange ideas on a very rapid scale."The Jensen Huang selection reflects this philosophy. Yes, NVIDIA built the hardware that powers AI. But the Medal of Honor citation focuses on something broader—the entire ecosystem NVIDIA created that enables AI advancement across healthcare, autonomous systems, drug discovery, and beyond. It's not just about chips. It's about what the chips make possible.That ecosystem thinking matters when AI is moving faster than our ethical frameworks can keep pace. IEEE is developing standards to address bias in AI models. They've created certification programs for ethical AI development. They even have standards for protecting young people online—work that doesn't make headlines but shapes the digital environment we all inhabit."Technology is a double-edged sword," Randall acknowledged. "But we've worked very hard to move it forward in a very responsible and ethical way."What does responsible look like when everything is accelerating? IEEE's answer involves convening experts to challenge each other, peer-reviewing research to maintain trust, and developing standards that create guardrails without killing innovation. It's the slow, unglamorous work that lets the exciting breakthroughs happen safely.The organization includes 189,000 student members—the next generation of engineers who will inherit both the tools and the responsibilities we're creating now. "Engineering with purpose" is the phrase Randall kept returning to. People don't join IEEE just for career advancement. They join because they want to do good.I asked about the future. Her answer circled back to history: the Renaissance happened when different disciplines intersected and people exchanged ideas freely. We have better tools for that now—virtual conferences, global collaboration, instant communication. The question is whether we use them wisely.We live in a Hybrid Analog Digital Society where the choices engineers make today ripple through everything tomorrow. Organizations like IEEE exist to ensure those choices serve humanity, not just shareholder returns.Jensen Huang's Medal of Honor isn't just recognition of past achievement. It's a statement about what kind of innovation matters.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/Marco Ciappelli: https://www.marcociappelli.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox

    Play Episode Listen Later Jan 8, 2026 5:46


    In this Brand Highlight, we talk with Denny LeCompte, CEO and Co-Founder of Portnox, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.Note: This story contains promotional content. Learn more.GuestDenny LeCompte, CEO and Co-Founder of Portnoxhttps://www.linkedin.com/in/dennylecompte/ResourcesLearn more about Portnox: https://www.portnox.com/Are you interested in telling your story?Full Length Brand Story: https://www.studioc60.com/content-creation#fullBrand Spotlight Story: https://www.studioc60.com/content-creation#spotlightBrand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    It Fractured, Then Rebuilt Itself: The CISO Role Changed More in Five Years Than Ever Before, Setting the Stage for 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    Play Episode Listen Later Jan 3, 2026 15:42


    Across dozens of conversations centered on the CISO experience, one reality keeps surfacing: the role no longer exists to protect systems in isolation. It exists to protect the business itself.Today's CISO operates at the intersection of operational risk, executive decision-making, and organizational trust. The responsibility is not just to identify threats, but to help leadership understand which risks matter, when they matter, and why they deserve attention. This shift changes what success looks like. It also changes how pressure is felt.During the early years of this transition, CISOs carry accountability without authority. They are expected to influence outcomes without always having control over budgets, priorities, or timelines. That tension forces a new skill set to the forefront. Technical knowledge is assumed. The differentiator becomes communication, translation, and relationship-building across the business.As organizations mature, the conversation evolves again. Security stops being framed around individual threats and starts being framed as an operational discipline. CISOs focus on prioritization, tradeoffs, and clarity rather than coverage for everything. This requires judgment more than tooling.The role also becomes deeply human. Fear shows up quietly. Fear of pushing too hard. Fear of slowing the business. Fear of being seen as the blocker. CISOs who succeed do not eliminate that fear. They learn how to manage it while building credibility with executive peers.AI enters the picture not as a replacement, but as a force multiplier. Automation supports scale, but judgment remains human. Security programs increasingly deny by default and permit intentionally, which demands a deep understanding of how the business actually works. That understanding cannot be automated.What emerges is a clearer definition of modern security leadership. The CISO is no longer a gatekeeper. This is a risk advisor, a translator, and a strategist who helps the organization focus its limited resources where they matter most.The role has not become easier. It has become more meaningful.Read the full article: TBA________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website.Keywords: sean martin, marco ciappelli, steve katz, tim brown, jessica robinson, rob allen, rohit ghai, rich seiersen, steven j speer, chris pierson, mark lambert, jim manico, robin bylenga, redefining cybersecurity, cybersecurity podcast, redefining cybersecurity podcast, ciso, risk, leadership, ai, resilience, strategy Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Music, Meaning, and the Business of Being Heard: Why Authentic Music Travels Further Than Trends | A Conversation with Chris SD | Music Evolves with Sean Martin

    Play Episode Listen Later Jan 3, 2026 41:17


    Show NotesMusic placement has quietly become one of the most powerful engines shaping how audiences discover new artists. In this episode of Music Evolves, host Sean Martin speaks with Chris SD, music producer and founder focused on connecting independent songwriters with film, television, and media opportunities, about how music moves from personal creation into shared cultural moments.The conversation centers on sync licensing not as a shortcut, but as a parallel creative economy. Chris SD explains that music supervisors, the professionals responsible for sourcing music for screen, are not looking for imitation or trend chasing. They are listening for authenticity. Songs that already exist, written without a brief or a pitch in mind, often resonate more deeply because they carry emotional truth rather than calculated intent.Why Indie Music Wins Screen TimeIndependent artists play a critical role in modern film and television. Budget realities often make major label catalogs impractical, while independent creators offer flexibility, ownership clarity, and creative alignment. This shifts the opportunity structure. Artists who control their masters and publishing are easier to work with and faster to license, which matters in production schedules driven by speed.Exposure matters as much as payment. A single placement can introduce an artist to millions of viewers in a context that builds emotional association rather than passive listening. That connection often leads to discovery, touring opportunities, and long-term audience growth.Technology as a Tool, Not the AuthorThe episode also addresses the growing conversation around AI in music creation. Chris SD draws a clear distinction between technology as a production aid and technology as a replacement for human authorship. Current legal frameworks and copyright realities prevent fully AI-generated music from being licensed for film and television. More importantly, the emotional nuance required for storytelling still depends on human experience.The message is consistent throughout the discussion. Music that endures is not built on novelty or automation alone. It survives because it reflects something real. Sync licensing rewards that honesty rather than undermines it.For artists navigating visibility, rights, and sustainability, this conversation reframes placement not as selling out, but as participation in a larger storytelling ecosystem.GuestChris SD, Musician, Producer, and Founder of Sync Songwriter | On LinkedIn: https://www.linkedin.com/in/chris-sd/HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/ResourcesAttend The Sync Songwriter Music Supervisor Panel: coming soon...More From Sean MartinMore from Music Evolves: https://www.seanmartin.com/music-evolves-podcastMusic Evolves on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtWMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/Line of Sight Newsletter | https://www.linkedin.com/newsletters/7400591548452667392/ITSPmagazine YouTube Channel: https://www.youtube.com/@itspmagazineBe sure to share and subscribe!Keywordssean martin, chris sd, sync, licensing, music, film, television, independent, supervisors, creativity, art, artist, musician, music evolves, music podcast, music and technology podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Five Patterns From 152 Episodes That Reshaped How I Think About Security, Technology, and Work Heading into 2026 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    Play Episode Listen Later Jan 1, 2026 13:26


    Across 152 conversations this year, a set of recurring patterns kept surfacing, regardless of whether the discussion focused on application security, software supply chain risk, AI systems, or creative work. The industries varied. The roles varied. The challenges did not.One theme rises above the rest: visibility remains the foundation of everything else, yet organizations continue to accept blind spots as normal. Asset inventories are incomplete. Build systems are poorly understood. Dependencies change faster than teams can track them. The issue is not a lack of tools. It is a willingness to tolerate uncertainty because discovery feels hard or disruptive.Another pattern is equally consistent. Integration matters more than novelty. New features, including AI-driven ones, sound compelling until they fail to connect with what teams already rely on. Security programs fracture when tools operate in isolation. Coverage looks strong on paper while gaps quietly expand in practice. When tools fail to integrate into existing environments, they create complexity instead of reducing risk.Security also continues to struggle with how it shows up in daily work. Programs succeed when security is embedded into workflows, automated where possible, and invisible until it matters. They fail when security acts as a gate that arrives after decisions are already made. Teams either adopt security naturally or route around it entirely. There is no neutral middle ground.Context repeatedly separates effective leadership from noise. Risk only becomes meaningful when it is framed in terms of business operations, delivery speed, and real tradeoffs. Leaders who understand how the business actually functions communicate risk clearly and make better decisions under pressure.Finally, creativity remains undervalued in security conversations. Automation should remove repetitive tasks so people can focus on judgment, problem solving, and design. The same mindset that produces elegant guitars, photographs, or products applies directly to building resilient security programs.These five patterns are not independent ideas. Together, they describe a shift toward security that is visible, integrated, contextual, workflow-driven, and human-centered.Read the full article: https://www.linkedin.com/pulse/five-patterns-from-152-podcast-episodes-2025-changed-i-martin-cissp-st1ge________This story represents the results of an interactive collaboration between Human Cognition and Artificial Intelligence.Enjoy, think, share with others, and subscribe to "The Future of Cybersecurity" newsletter on LinkedIn: https://itspm.ag/future-of-cybersecuritySincerely, Sean Martin and TAPE9________Sean Martin is a life-long musician and the host of the Music Evolves Podcast; a career technologist, cybersecurity professional, and host of the Redefining CyberSecurity Podcast; and is also the co-host of the On Location Event Coverage Podcast. These shows are all part of ITSPmagazine—which he co-founded with his good friend Marco Ciappelli, to explore and discuss topics at The Intersection of Technology, Cybersecurity, and Society.™️Would you like Sean to work with you on a topic/series to help you tell your story? Visit his services page to learn more: https://www.seanmartin.com/servicesWant to connect with Sean and Marco On Location at an event or conference near you? See where they will be next: https://www.itspmagazine.com/on-locationTo learn more about Sean, visit his personal website. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Building Visibility, Community, and Momentum for Women in Music | A Conversation with Laura Whitmore, Founder of The Women's International Music Network | The NAMM Show 2026 Event Coverage | Music Evolves with Sean Martin

    Play Episode Listen Later Dec 30, 2025 34:04


    Show NotesMusic careers are often discussed through the lens of performance, technology, or commercial success. Less visible is the connective tissue that sustains those careers: community, advocacy, and long-term support systems. In this episode of Music Evolves: Sonic Frontiers, the conversation centers on how structured networks and intentional recognition shape opportunity across the music industry.Laura Whitmore, Founder of The Women's International Music Network and Senior Vice President of Marketing at Positive Grid, shares how the organization was created to address a simple but persistent issue: women working across music often operate in parallel, rarely connected despite facing similar challenges. The network focuses on bridging that gap by creating shared spaces for visibility, mentorship, and collaboration across roles including artists, executives, engineers, marketers, and legal professionals.A central anchor of that effort is the She Rocks Awards, now in its fourteenth year. The awards, taking place during The NAMM Show 2026, highlight women contributing across all layers of the industry, not only those on stage. The emphasis is on storytelling and presence, giving space for honorees to speak openly about career paths, obstacles, and resilience. That visibility has a ripple effect, normalizing leadership diversity and encouraging others to see themselves as part of the industry's future.The discussion also addresses how technology fits into this ecosystem. From AI-assisted music tools to digital platforms that broaden access, innovation plays a role when it amplifies creativity rather than replacing it. The focus remains on preserving human expression while using technology to remove friction and expand reach.Another recurring theme is generational continuity. Younger creators and professionals bring new perspectives on consumption, creation, and community. Engaging them early, listening closely, and building inclusive pathways ensures the industry remains relevant and sustainable.This episode frames music not only as art or business, but as a shared cultural system. Networks like this one reinforce that progress does not happen automatically. It is built through intentional connection, recognition, and sustained effort.GuestLaura Whitmore, Founder of The Women's International Music Network and Senior Vice President of Marketing at Positive Grid | On LinkedIn: https://www.linkedin.com/in/laurabwhitmore/HostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/ResourcesThe Women's International Music Network: https://thewimn.com/2026 She Rocks Awards: https://sherocksawards.com/The NAMM Show 2026 is taking place from January 20-24, 2026 | Anaheim Convention Center • Southern California — Coverage provided by ITSPmagazine — Follow our coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026The NAMM Show 2026: https://www.namm.org/thenammshow/attendMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/Keywordssean martin, laura whitmore, women's international music network, she rocks awards, positive grid, namm, music advocacy, music marketing, women in music, music leadership, music, creativity, art, artist, musician, music evolves, music podcast, music and technology podcastMore From Sean MartinMore from Music Evolves: https://www.seanmartin.com/music-evolves-podcastMusic Evolves on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTRJ5du7hFDXjiugu-uNPtWMusic Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/On Location with Sean and Marco: https://www.itspmagazine.com/on-locationITSPmagazine YouTube Channel: https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    When AI Guesses and Security Pays: Choosing the Right Model for the Right Security Decision | A Brand Story Highlight Conversation with Michael Roytman, CTO of Empirical Security

    Play Episode Listen Later Dec 30, 2025 7:58


    In this Brand Highlight, we talk with Michael Roytman, CTO of Empirical Security, about a problem many security teams quietly struggle with: using general purpose AI tools for decisions that demand precision, forecasting, and accountability.Michael explains why large language models are often misapplied in security programs. LLMs excel at summarization, classification, and pattern extraction, but they are not designed to predict future outcomes like exploitation likelihood or operational risk. Treating them as universal problem solvers creates confidence gaps, not clarity.At Empirical, the focus is on preventative security through purpose built modeling. That means probabilistic forecasting, enterprise specific risk models, and continuous retraining using real telemetry from security operations. Instead of relying on a single model or generic scoring system, Empirical applies ensembles of models tuned to specific tasks, from vulnerability exploitation probability to identifying malicious code patterns.Michael also highlights why retraining matters as much as training. Threat conditions, environments, and attacker behavior change constantly. Models that are not continuously updated lose relevance quickly. Building that feedback loop across hundreds of customers is as much an engineering and operations challenge as it is a data science one.The conversation reinforces a simple but often ignored idea: better security outcomes come from using the right tools for the right questions, not from chasing whatever AI technique happens to be popular. This episode offers a grounded perspective for leaders trying to separate signal from noise in AI driven security decision making.Note: This story contains promotional content. Learn more.GUESTMichael Roytman, CTO of Empirical Security | On LinkedIn: https://www.linkedin.com/in/michael-roytman/RESOURCESLearn more about Empirical Security: https://www.empiricalsecurity.com/LinkedIn Post: https://www.linkedin.com/posts/bellis_a-lot-of-people-are-talking-about-generative-activity-7394418706388402178-uZjB/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, michael roytman, ed beis, empirical security, cybersecurity, ai, machinelearning, vulnerability, risk, forecasting, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Where Has Santa Claus Gone? | A Short Christmas Story Written By Marco e Lucia Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

    Play Episode Listen Later Dec 17, 2025 9:44


    Where has Santa Claus gone?Once upon a time there was Santa Claus's Village — but Santa Claus wasn't there. He had been missing for days and days… actually for months. Who would prepare and deliver gifts to the children as they did every year?That part of the North Pole which was usually very busy had become strangely silent — not an Elf could be seen around, no sounds of bells, the sleighs were covered in snow and all the reindeer dozed about confused.If you looked into his house you couldn't see a trace of life. The fireplace cold, the rocking chair covered in cobwebs, an empty cup on the wooden table and a candle stub burnt out long ago.Many were the rumours that had spread about Santa Claus's absence. Some said he was on another planet in a far, far away galaxy, some on the Moon, some on the vast oceans — and someone even said he had opened a bakery in Buenos Aires.The mystery was thick. Nobody could make sense of it and everything was silent and still.Meanwhile, many miles away, in the Southern Seas, a group of seagulls who spent their days fluttering above the bay spotted a small sailing boat in the distance. There was only one sailor on board who was hoisting the main sail up the creaking mast.The eldest seagull couldn't believe his eyes. He did a couple of acrobatics in the air, pulled out his spyglass, looked more carefully and said: "But I know him! That sailor comes from distant lands!"Turning to the other seagulls he told them: "One day, during one of my long journeys, I lost my way and found myself on the frozen rooftops of a village at the North Pole. I landed right on the house of that long-bearded man you see on the boat. He heard me calling for help, came to fetch me, fed me and told me about his work. I think this meeting has something magical about it. Our next adventure is about to begin."Gliding down, they headed towards the boat and all landed on the bow. The seagull and the sailor greeted each other like old friends.Shortly after, a group of dolphins arrived near the sailing boat, curious. They swam in circles around the boat, jumping out of the water.The youngest dolphin noticed something strange. "Look! Wood shavings are coming out of the hold and floating! And you can see little lights below deck."The long-bearded sailor smiled. "Come," he said in a warm voice, "I'll show you what I've done all these months."He opened the hatch to the hold and inside, by the light of two swaying lanterns, you could see a floating workshop full of wonders. With a sharp plane he had worked pieces of wood recovered from the sea, transforming them into toys — and he had done the same with shells, coconuts, cork stoppers, glass bottles, starfish and golden threads that had arrived from who knows where."I travelled to learn new ways of bringing joy," the sailor explained. "But there's so much work to do and Christmas is coming. Would you help me finish?"And so they all set to work together. The dolphins brought special shells from the bottom of the sea. The seagulls gathered coloured feathers. The objects transformed into gifts were placed in large canvas sacks.The days passed quickly.On the first of December the captain, wearing his red warm hat with his pipe in his mouth, looked at the starry sky and said: "It's time to leave."The dolphins lifted the sailing boat until it rose above the waves. The sails filled with wind and it took flight, whilst the flock of seagulls guided it through the clouds following dreams. Together they continued the journey heading north, flying through the endless blue.Night fell quickly and in the sky full of stars one shone brighter than all the others. It was the North Star which with its light accompanied the sailing boat's descent to earth.By magic, as it approached the village, the sailing boat transformed into a sleigh loaded with gifts. The presents built in the hold arrived in the workshop to be delivered together with all the other parcels.When it landed on the roof of his house, a tinkling of bells was heard in the distance. The Elves looked out of their doors and shouted: "It's him! It's him! It's Santa Claus! He's back!"The red-nosed reindeer woke up suddenly and began polishing the sleighs, decorating them with bows and coloured pine cones.Life in the village awakened all at once. The tree branches shook as if they were being tickled. A group of penguins, who had arrived at the North Pole to lend a hand, sliding on the ice sheets at great speed, ended up inside snowdrifts and came out like bouncing balls.“You are so funny! We'll hang you on the Christmas tree as decorations!" the village animals shouted.But the penguins, freeing themselves from the snow, ran towards Santa Claus's house to help with the preparations.In the village absolutely everyone got moving. The reindeer rushed to the Post Office and filled the sacks with letters, then carried them to the workshop. The Elves with the help of the penguins were ready for work.That morning, when the bells rang out in celebration, foxes, squirrels, hares and bears came running from every corner of the forest to celebrate Santa Claus's return. There was so much to do for the joy of all the children in the world.The air smelt of fir trees and homemade biscuits. The Christmas trees sparkled with icicles like stars. The animals chased each other happily with their noses turned upwards.The preparations began in earnest. Throughout the month of December they worked together — saws that sang, hammers that played, coloured paper that flew. Santa Claus told stories of his journey whilst he hammered and sanded.And when the 24th of December arrived, everything was ready. The presents were loaded onto the sleigh and Santa Claus set off on his most important journey.The seagulls flew away towards new horizons, leaving their footprints on the snowy rooftops.Since that Christmas it is said that Santa Claus never left the North Pole again."What if it was only a tale? Is it true, or not? The final decision is yours!" — Written by Lucia & Marco CiappelliFor the Italian version and many more stories to read and listen to: https://www.storiesottolestelle.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    AI Adoption Without Readiness: When AI Ambition Collides With Data Reality | A TrustedTech Brand Story Conversation with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech

    Play Episode Listen Later Dec 17, 2025 34:16


    As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinformation.Julian shares that most organizations are eager to activate tools like AI agents and copilots, yet few have addressed the underlying condition of their environments. Unstructured data sprawl, fragmented cloud architectures, and legacy systems create blind spots that AI does not fix. Instead, AI accelerates whatever already exists, good or bad.A central theme of the conversation is readiness. Julian explains that AI success depends on disciplined data classification, permission hygiene, and governance before automation begins. Without that groundwork, organizations risk exposing sensitive financial, HR, or executive data to unintended audiences simply because an AI system can surface it.The discussion also explores the operational reality beneath the surface. Most environments are a patchwork of Azure, AWS, on-prem infrastructure, SaaS platforms, and custom applications, often shaped by multiple IT leaders over time. When AI is layered onto this complexity without architectural clarity, inaccurate outputs and flawed business decisions quickly follow.Sean and Julian also examine how AI initiatives often emerge from unexpected places. Legal teams, business units, and individual contributors now build their own AI workflows using low-code and no-code tools, frequently outside formal IT oversight. At the same time, founders and CFOs push for rapid AI adoption while resisting the investment required to clean and secure the foundation.The episode highlights why AI programs are never one-and-done projects. Ongoing maintenance, data validation, and security oversight are essential as inputs change and systems evolve. Julian emphasizes that organizations must treat AI as a permanent capability on the roadmap, not a short-term experiment.Ultimately, the conversation frames AI not as a shortcut, but as a force multiplier. When paired with disciplined architecture and trusted guidance, AI enables scale, speed, and confidence. Without that discipline, it simply magnifies existing problems.Note: This story contains promotional content. Learn more.GUESTJulian Hamood, Founder and Chief Visionary Officer at TrustedTech | On LinkedIn: https://www.linkedin.com/in/julian-hamood/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, julian hamood, trusted tech, ai readiness, data governance, ai security, enterprise ai, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Music, People, and the Energy That Moves an Industry | The NAMM Show 2026 Event Coverage with John Mlynczak, President and CEO at NAMM | On Location with Sean Martin and Marco Ciappelli

    Play Episode Listen Later Dec 16, 2025 35:02


    As NAMM approaches its 125th year, the conversation around The NAMM Show 2026 centers less on products alone and more on the people, relationships, and creative energy that sustain the music industry. In this episode, John Mlynczak, President and CEO of NAMM, joins Sean Martin and Marco Ciappelli to frame the upcoming show as a moment shaped by resilience, adaptation, and shared purpose.Mlynczak positions NAMM's history as a long record of responding to disruption. Musical genres shift. Technologies rise and fall. Companies appear and disappear. Music itself remains. That continuity shapes how NAMM views its role today, particularly amid global trade pressures and ongoing debates around AI in music creation. These pressures are not framed as endpoints, but as forces the industry has encountered many times before, each eventually reshaped into opportunity.A major theme is the renewed emphasis on human connection. While innovation remains central, differentiation increasingly comes through artists, creators, and authentic storytelling. Product launches are no longer just technical showcases. They are expressions of identity, collaboration, and trust between musicians and the tools they choose. According to Mlynczak, this shift is driving a larger presence of artists and creators at The NAMM Show 2026, reinforcing the idea that brands are ultimately represented by people, not specifications.Education also plays a defining role. With more than 200 sessions planned, alongside new half-day and full-day summits, The NAMM Show 2026 expands its commitment to learning across experience levels and professional communities. Retailers, educators, engineers, marketers, and performers each have distinct paths through the show, designed intentionally rather than left to chance. Data-driven planning allows NAMM to understand how attendees engage, enabling more tailored experiences now and in the years ahead.Underlying it all is energy. Not hype, but momentum built through in-person connection. The NAMM Show is described as a space where competitors share ideas, musicians find inspiration, and creativity compounds simply by being present. For those who attend, The NAMM Show 2026 serves as a springboard into the year ahead, shaped by music's enduring ability to connect, adapt, and move people forward.The NAMM Show 2026 is taking place from January 20-24, 2026 | Anaheim Convention Center • Southern California — Coverage provided by ITSPmagazine — Follow our coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026GUEST:Guest: John Mlynczak, President and CEO of NAMM | View Website | Visit NAMMHOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comNAMM Organization: https://www.namm.org/The NAMM Show 2026: https://www.namm.org/thenammshow/attendCatch more stories from NAMM Show 2026 coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/the-namm-show-2026Music Evolves: Sonic Frontiers Newsletter | https://www.linkedin.com/newsletters/7290890771828719616/More from Marco Ciappelli on Redefining Society and Technology Podcast: https://redefiningsocietyandtechnologypodcast.com/Want to share an Event Briefing as part of our event coverage? Learn More

    The Hidden Risk Inside Your Build Pipeline: When Open Source Becomes an Attack Vector | A Conversation with Paul McCarty | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Dec 16, 2025 40:14


    ⬥EPISODE NOTES⬥Modern application development depends on open source packages moving at extraordinary speed. Paul McCarty, Offensive Security Specialist focused on software supply chain threats, explains why that speed has quietly reshaped risk across development pipelines, developer laptops, and CI environments.JavaScript dominates modern software delivery, and the npm registry has become the largest package ecosystem in the world. Millions of packages, thousands of daily updates, and deeply nested dependency chainsഴ് often exceeding a thousand indirect dependencies per application. That scale creates opportunity, not only for innovation, but for adversaries who understand how developers actually build software.This conversation focuses on a shift that security leaders can no longer ignore. Malicious packages are not exploiting accidental coding errors. They are intentionally engineered to steal credentials, exfiltrate secrets, and compromise environments long before traditional security tools see anything wrong. Attacks increasingly begin on developer machines through social engineering and poisoned repositories, then propagate into CI pipelines where access density and sensitive credentials converge.Paul outlines why many existing security approaches fall short. Vulnerability databases were built for mistakes, not hostile code. AppSec teams are overloaded burning down backlogs. Security operations teams rarely receive meaningful telemetry from build systems. The result is a visibility gap where malicious code can run, disappear, and leave organizations unsure what was touched or stolen.The episode also explores why simple advice like “only use vetted packages” fails in practice. Open source ecosystems move too fast for manual approval models, and internal package repositories often collapse under friction. Meanwhile, attackers exploit maintainer accounts, typosquatting domains, and ecosystem trust to reach billions of downstream installations in a single event.This discussion challenges security leaders to rethink how software supply chain risk is defined, detected, and owned. The problem is no longer theoretical, and it no longer lives only in development teams. It sits at the intersection of intellectual property, identity, and delivery velocity, demanding attention from anyone responsible for protecting modern software-driven organizations.⬥GUEST⬥Paul McCarty, NPM Hacker and Software Supply Chain Researcher  | On LinkedIn: https://www.linkedin.com/in/mccartypaul/⬥HOST⬥Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥LinkedIn Post: https://www.linkedin.com/posts/mccartypaul_i-want-to-introduce-you-to-my-latest-project-activity-7396297753196363776-1N-TOpen Source Malware Database: https://opensourcemalware.comOpenSSF Scorecard Project: https://securityscorecards.dev⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    Mastering The Art of Risk Management Without Losing Your Mind | A CyXcel Brand Story Conversation with Megha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk

    Play Episode Listen Later Dec 16, 2025 44:13


    Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by complexity.Kumar shares how digital resilience is no longer a technical problem alone. Regulations, infrastructure dependencies, geopolitical tensions, supply chain exposure, and emerging technologies such as AI now converge into a single operational reality. Organizations that treat these as isolated issues often miss the real picture, where one decision quietly amplifies risk across multiple domains.A central theme of the conversation is proportion. Kumar emphasizes that risk management is not about eliminating uncertainty, but aligning effort with value. Not every threat matters equally to every organization. Understanding who you are, where you operate, and where you are going determines which signals deserve attention and which are simply noise.The discussion also reframes geopolitics as a daily business concern rather than a distant policy issue. Companies operate inside global power dynamics whether they acknowledge it or not. Technology choices, supplier relationships, and market expansion decisions increasingly carry political and regulatory consequences that surface quickly and without warning.Rather than advocating for massive new departments or rigid frameworks, Kumar outlines a practical approach. Organizations can decide whether to avoid, mitigate, transfer, or tolerate risk, then revisit those decisions as conditions change. This mindset supports growth and innovation while avoiding the false comfort of static checklists.The episode closes on culture. Effective risk management depends on listening across roles, disciplines, and seniority. Internal dissent, diverse viewpoints, and external validation are presented as assets, not obstacles. In a world where uncertainty is constant, resilience comes from clarity, not control.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.GUESTMegha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk at CyXcel | On LinkedIn: https://www.linkedin.com/in/drmeghakumarcyxcel/RESOURCESLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Black Hat Europe 2025 Wrap-Up: Suzy Pallett on Global Expansion, AI Threats, and Defending Together | On Location Coverage With Sean Martin & Marco Ciappelli

    Play Episode Listen Later Dec 13, 2025 19:19


    ____________Guests:Suzy PallettPresident, Black Hat. Cybersecurity.On LinkedIn: https://www.linkedin.com/in/suzy-pallett-60710132/The Cybersecurity Community Finds Its Footing in Uncertain TimesThere is something almost paradoxical about the cybersecurity industry. It exists because of threats, yet it thrives on trust. It deals in technical complexity, yet its beating heart is fundamentally human: people gathering, sharing knowledge, and collectively deciding that defending each other matters more than protecting proprietary advantage.This tension—and this hope—was on full display at Black Hat Europe 2025 in London, which just wrapped up at the ExCel Centre with attendance growing more than 25 percent over last year. For Suzy Pallett, the newly appointed President of Black Hat, the numbers tell only part of the story."What I've found from this week is the knowledge sharing, the insights, the open source tools that we've shared, the demonstrations that have happened—they've been so instrumental," Pallett shared in a conversation with ITSPmagazine. "Cybersecurity is unlike any other industry I've ever been close to in the strength of that collaboration."Pallett took the helm in September after Steve Wylie stepped down following eleven years leading the brand through significant growth. Her background spans over two decades in global events, most recently with Money20/20, the fintech conference series. But she speaks of Black Hat not as a business to be managed but as a community to be served.The event itself reflected the year's dominant concerns. AI agents and supply chain vulnerabilities emerged as central themes, continuing conversations that dominated Black Hat USA in Las Vegas just months earlier. But Europe brought its own character. Keynotes ranged from Max Meets examining whether ransomware can actually be stopped, to Linus Neumann questioning whether compliance checklists might actually expose organizations to greater risk rather than protecting them."He was saying that the compliance checklists that we're all being stressed with are actually where the vulnerabilities lie," Pallett explained. "How can we work more collaboratively together so that it's not just a compliance checklist that we get?"This is the kind of question that sits at the intersection of technology and policy, technical reality and bureaucratic aspiration. It is also the kind of question that rarely gets asked in vendor halls but deserves space in our collective thinking.Joe Tidy, the BBC journalist behind the EvilCorp podcast, delivered a record-breaking keynote attendance on day two, signaling the growing appetite for cybersecurity stories that reach beyond the practitioner community into broader public consciousness. Louise Marie Harrell spoke on technical capacity and international accountability—a reminder that cyber threats respect no borders and neither can our responses.What makes Black Hat distinct, Pallett noted, is that the conversations happening on the business hall floor are not typical expo fare. "You have the product teams, you have the engineers, you have the developers on those stands, and it's still product conversations and technical conversations."Looking ahead, Pallett's priorities center on listening. Review boards, advisory boards, pastoral programs, scholarships—these are the mechanisms through which she intends to ensure Black Hat remains, in her words, "a platform for them and by them."The cybersecurity industry faces a peculiar burden. What used to happen in twelve years now happens in two days, as Pallett put it. The pace is exhausting. The threats keep evolving. The cat-and-mouse game shows no signs of ending.But perhaps that is precisely why events like this matter. Not because they offer solutions to every problem, but because they remind an industry under constant pressure that it is not alone in the fight. That collaboration is not weakness. That sharing knowledge freely is not naïve—it is strategic.Black Hat Europe 2025 may have ended, but the conversations it sparked will carry forward into 2026 and beyond.____________HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

    Oscar-Nominated Filmmaker Pen Densham on Writing, Cinematography, Photography, Creativity and the Freedom of Breaking the Rules | Audio Signals Podcast With Marco Ciappelli

    Play Episode Listen Later Dec 11, 2025 46:24


    Oscar-Nominated Filmmaker Pen Densham on Writing, Cinematography, Photography, Creativity and the Freedom of Breaking the Rules There's a particular kind of magic that happens when a storyteller stops trying to please the market and starts listening to their soul. Pen Densham knows this better than most—he's lived it across three different mediums, each time learning to let go a little more. Densham's creative journey spans decades and disciplines: from screenwriting to cinematography to, now, impressionist photography. When I sat down with him for Audio Signals Podcast, we didn't dwell on credits or awards. We talked about the vulnerability of creativity, the courage it takes to break the rules, and the freedom that comes when you stop asking for permission. "Those scripts that I wrote out of passion, even though they didn't seem necessary to fit the market, got made more frequently than the ones I wrote when I was architecting to hit goals for a studio," Densham told me. It's a paradox he's discovered over and over: the work born from genuine emotional need resonates in ways that calculated formulas never can. His thinking has been shaped by extraordinary influences. He studied with Marshall McLuhan, who opened his eyes to the biology of storytelling—how audiences enter a trance state, mirroring the characters on screen, processing strategies through their neurons. He found resonance in Joseph Campbell's work on myth. "We're the shamans of our age," Densham reflects. "We're trying to interpret society in ways that people can learn and change." But what struck me most was how Densham, after mastering the craft of writing and the machinery of cinematography, has circled back to the simplest tool: a camera. Not to capture perfect images, but to create what he calls "visual music." He moves his camera deliberately during long exposures. He shoots koi through blinding sunlight. He photographs waves at dusk until they fragment into impressionistic dances of light and motion. "The biggest effort was letting go of self-criticism," he admitted. "Thinking 'this is stupid, these aren't real photographs.' But I'm making images that blow my mind." This is the thread that runs through Densham's entire creative life: the willingness to unlearn. In writing, he learned to trust his instincts over studio formulas. In cinematography, he learned that visual storytelling could carry emotional weight beyond dialogue. And now, in photography, he's learned that breaking every rule he ever absorbed—holding the camera still, getting the exposure right, capturing a "correct" image—has unlocked something entirely new. There's a lesson here for anyone who creates. We absorb rules unconsciously—what a proper screenplay looks like, how a film should be shot, what makes a "real" photograph. And sometimes those rules serve us. But sometimes they become cages. Densham's journey is proof that the most profound creative freedom comes not from mastering the rules, but from having the courage to abandon them. "I'm not smarter than anybody else," he said. "But like Einstein said, I stay at things longer." We left the door open for more—AI, the creator economy, the future of storytelling. But for now, there's something powerful in Densham's path across writing, cinematography, and photography: a reminder that creativity is not a destination but a continuous act of letting go.Stay tuned. Subscribe. And remember—we are all made of stories. Learn more about Pen Densham: https://pendenshamphotography.comLearn more about my work and podcasts at marcociappelli.com and audiosignalspodcast.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Rethinking Public Health Workflows Through Automation and Governance: Why Data Modernization May Be The Key | A Conversation with Jim St. Clair | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Dec 9, 2025 44:06


    ⬥EPISODE NOTES⬥Artificial intelligence is reshaping how public health organizations manage data, interpret trends, and support decision-making. In this episode, Sean Martin talks with Jim St. Clair, Vice President of Public Health Systems at a major public health research institute, Altarum, about what AI adoption really looks like across federal, state, and local agencies.Public health continues to face pressure from shifting budgets, aging infrastructure, and growing expectations around timely reporting. Jim highlights how initiatives launched after the pandemic pushed agencies toward modernized systems, new interoperability standards, and a stronger foundation for automated reporting. Interoperability and data accessibility remain central themes, especially as agencies work to retire manual processes and unify fragmented registries, surveillance systems, and reporting pipelines.AI enters the picture as a multiplier rather than a replacement. Jim outlines practical use cases that public health agencies can act on now, from community health communication tools and emergency response coordination to predictive analytics for population health. These approaches support faster interpretation of data, targeted outreach to communities, and improved visibility into ongoing health activity.At the same time, CISOs and security leaders are navigating a new risk environment as agencies explore generative AI, open models, and multi-agent systems. Sean and Jim discuss the importance of applying disciplined data governance, aligning AI with FedRAMP and state-level controls, and ensuring that any model running inside an organization's environment is treated with the same rigor as traditional systems.The conversation closes with a look at where AI is headed. Jim notes that multi-agent frameworks and smaller, purpose-built models will shape the next wave of public health technology. These systems introduce new opportunities for automation and decision support, but also require thoughtful implementation to ensure trust, reliability, and safety.This episode presents a realistic, forward-looking view of how AI can strengthen the future of public health and the cybersecurity responsibilities that follow.⬥GUEST⬥Jim St. Clair, Vice President, Public Health Systems, Altarum  | On LinkedIn: https://www.linkedin.com/in/jimstclair/⬥HOST⬥Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥N/A⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    Nothing Has Changed in Cybersecurity Since the 80s — And That's the Real Problem | A Conversation with Steve Mancini | Redefining Society and Technology with Marco Ciappelli

    Play Episode Listen Later Dec 7, 2025 43:03


    Dr. Steve Mancini: https://www.linkedin.com/in/dr-steve-m-b59a525/Marco Ciappelli: https://www.marcociappelli.com/Nothing Has Changed in Cybersecurity Since War Games — And That's Why We're in Trouble"Nothing has changed."That's not what you expect to hear from someone with four decades in cybersecurity. The industry thrives on selling the next revolution, the newest threat, the latest solution. But Dr. Steve Mancini—cybersecurity professor, Homeland Security veteran, and Italy's Honorary Consul in Pittsburgh—wasn't buying any of it. And honestly? Neither was I.He took me back to his Commodore 64 days, writing basic war dialers after watching War Games. The method? Dial numbers, find an open line, try passwords until one works. Translate that to today: run an Nmap scan, find an open port, brute force your way in. The principle is identical. Only the speed has changed.This resonated deeply with how I think about our Hybrid Analog Digital Society. We're so consumed with the digital evolution—the folding screens, the AI assistants, the cloud computing—that we forget the human vulnerabilities underneath remain stubbornly analog. Social engineering worked in the 1930s, it worked when I was a kid in Florence, and it works today in your inbox.Steve shared a story about a family member who received a scam call. The caller asked if their social security number "had a six in it." A one-in-nine guess. Yet that simple psychological trick led to remote software being installed on their computer. Technology gets smarter; human psychology stays the same.What struck me most was his observation about his students—a generation so immersed in technology that they've become numb to breaches. "So what?" has become the default response. The data sells, the breaches happen, you get two years of free credit monitoring, and life goes on. Groundhog Day.But the deeper concern isn't the breaches. It's what this technological immersion is doing to our capacity for critical thinking, for human instinct. Steve pointed out something that should unsettle us: the algorithms feeding content to young minds are designed for addiction, manipulating brain chemistry with endorphin kicks from endless scrolling. We won't know the full effects of a generation raised on smartphones until they're forty, having scrolled through social media for thirty years.I asked what we can do. His answer was simple but profound: humans need to decide how much they want technology in their lives. Parents putting smartphones in six-year-olds' hands might want to reconsider. Schools clinging to the idea that they're "teaching technology" miss the point—students already know the apps better than their professors. What they don't know is how to think without them.He's gone back to paper and pencil tests. Old school. Because when the power goes out—literally or metaphorically—you need a brain that works independently.Ancient cultures, Steve reminded me, built civilizations with nothing but their minds, parchment, and each other. They were, in many ways, a thousand times smarter than us because they had no crutches. Now we call our smartphones "smart" while they make us incrementally dumber.This isn't anti-technology doom-saying. Neither Steve nor I oppose technological progress. The conversation acknowledged AI's genuine benefits in medicine, in solving specific problems. But this relentless push for the "easy button"—the promise that you don't have to think, just click—that's where we lose something essential.The ultimate breach, we concluded, isn't someone stealing your data. It's breaching the mind itself. When we can no longer think, reason, or function without the device in our pocket, the hackers have already won—and they didn't need to write a single line of code.Subscribe to the Redefining Society and Technology podcast. Stay curious. Stay human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco Ciappelli

    Play Episode Listen Later Dec 3, 2025 26:22


    What Security Congress Reveals About the State of CybersecurityThis discussion focuses on what ISC2 Security Congress represents for practitioners, leaders, and organizations navigating constant technological change. Jon France, Chief Information Security Officer at ISC2, shares how the event brings together thousands of cybersecurity practitioners, certification holders, chapter leaders, and future professionals to exchange ideas on the issues shaping the field today.  Themes That Stand OutAI remains a central point of attention. France notes that organizations are grappling not only with adoption but with the shift in speed it introduces. Sessions highlight how analysts are beginning to work alongside automated systems that sift through massive data sets and surface early indicators of compromise. Rather than replacing entry-level roles, AI changes how they operate and accelerates the decision-making path. Quantum computing receives a growing share of focus as well. Attendees hear about timelines, standards emerging from NIST, and what preparedness looks like as cryptographic models shift.  Identity-based attacks and authorization failures also surface throughout the program. With machine-driven compromises becoming easier to scale, the community explores new defenses, stronger controls, and the practical realities of machine-to-machine trust. Operational technology, zero trust, and machine-speed threats create additional urgency around modernizing security operations centers and rethinking human-to-machine workflows.  A Place for Every Stage of the CareerFrance describes Security Congress as a cross-section of the profession: entry-level newcomers, certification candidates, hands-on practitioners, and CISOs who attend for leadership development. Workshops explore communication, business alignment, and critical thinking skills that help professionals grow beyond technical execution and into more strategic responsibilities.  Looking Ahead to the Next CongressThe next ISC2 Security Congress will be held in October in the Denver/Aurora area. France expects AI and quantum to remain key themes, along with contributions shaped by the call-for-papers process. What keeps the event relevant each year is the mix of education, networking, community stories, and real-world problem-solving that attendees bring with them.The ISC2 Security Congress 2025 is a hybrid event taking place from October 28 to 30, 2025 Coverage provided by ITSPmagazineGUEST:Jon France, Chief Information Security Officer at ISC2 | On LinkedIn: https://www.linkedin.com/in/jonfrance/HOST:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comFollow our ISC2 Security Congress coverage: https://www.itspmagazine.com/cybersecurity-technology-society-events/isc2-security-congress-2025Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageISC2 Security Congress: https://www.isc2.orgNIST Post-Quantum Cryptography Standards: https://csrc.nist.gov/projects/post-quantum-cryptographyISC2 Chapters: https://www.isc2.org/chaptersWant to share an Event Briefing as part of our event coverage? Learn More

    Book: Spy's Mate | A Conversation with Bradley W. Buchanan About Chess, Cold War Espionage, and His Journey Into Writing This Story | Audio Signals Podcast With Marco Ciappelli

    Play Episode Listen Later Nov 28, 2025 44:22


    Spy's Mate: A Conversation with Bradley W. Buchanan About Chess, Cold War Intrigue, and the Stories That Save UsAfter a few months away, I couldn't stay silent. Audio Signals is back, and I'm thrilled that this conversation marks the official return.The truth is, I tried to let it go. I thought maybe I'd hang up the mic and focus solely on my work exploring technology and society. But my passion for storytellers and storytelling—it cannot be tamed. We are made of stories, after all, and some of us choose to write them, sing them, photograph them, or bring them to life on screen. Brad Buchanan writes them, and his story brought me back.I'll admit something upfront: I'm not particularly good at chess. I love the game—the strategy, the mythology, the beautiful complexity of it all—but I'm no grandmaster. That's what made this conversation so fascinating. Brad has created an entire fictional world where chess isn't just a game; it's a matter of life and death, set against the backdrop of Cold War espionage and Soviet propaganda.His debut novel, Spy's Mate, weaves together two worlds I find endlessly intriguing: the intellectual battlefield of competitive chess and the shadow games of international espionage. But what makes this book truly compelling isn't just the plot—it's the man behind it.Brad is a retired English professor from Sacramento State, a two-time blood cancer survivor, and what he calls a "chimera"—someone whose DNA was literally altered by a stem cell transplant from his brother. He was blind for a year and a half. He nearly died multiple times. And through it all, he held onto this story, this passion for chess that manifested in literal dreams where the pieces hunted him across the board.When we spoke, what struck me most was how deeply personal this novel is beneath its spy thriller exterior. The protagonist, Yasha, is an Armenian chess prodigy whose mother teaches him the game before falling gravely ill. In a moment that breaks your heart, young Yasha asks his mother to promise she'll live long enough to see him become world chess champion—an impossible promise that drives the entire narrative.Brad wrote Spy's Mate after his own mother's death from blood cancer in 2021. When he told me he was crying while writing the final pages, I understood something essential about storytelling: we write to process what life won't let us finish. He gave Yasha the closure he wished he'd had with his own mother.But this isn't just a meditation on loss. Brad brings genuine chess expertise and meticulous historical research to create a world where the KGB manipulates tournaments, computers calculate moves at the glacial pace of one per hour, and Soviet chess dominance serves as proof of communist superiority. He recreates famous chess games with diagrams so readers can follow the battlefield. He fictionalizes Soviet leaders (his Gorbachev character is named "Ogar," his Putin figure has "the nose of a proboscis monkey") but keeps the oppressive atmosphere authentic.What I love about Brad's approach is that he wrote this novel almost like a screenplay—action and dialogue, visual and kinematic, built for the screen. Having taught Virginia Woolf while secretly wanting to write page-turning thrillers tells you everything about the tension between academic life and creative passion. Now, finally free to write full-time after early retirement due to his medical challenges, he's doing what he always wanted.We talked about the hero's journey, about Joseph Campbell's mythical structure that still works because it mirrors how our minds work. We reminisced about the 1982 World Cup and Marco Tardelli's iconic scream (we're the same generation, watching from different continents). We discussed whether characters should plot their own paths or whether writers should map everything from the beginning.As someone who writes short, magical stories with my mother, I understand the pull toward something bigger, something that requires more than 1,200 words can contain. Brad waited 55 years to publish his first novel. I'm 56 and still working up to it. There's hope for all of us yet.Spy's Mate is available now, with an audiobook coming after Thanksgiving. And yes, I can absolutely see this as a Netflix series—chess looks incredibly sexy on screen when the stakes are high and the lighting is good.Welcome back to Audio Signals. Let's keep telling stories.Learn more about Bradley and get his book: https://www.bradthechimera.comLearn more about my work and podcasts at marcociappelli.com and audiosignalspodcast.com Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor Petersson

    Play Episode Listen Later Nov 25, 2025 17:48


    This episode focuses on a security incident that prompts an honest discussion about transparency, preparedness, and the importance of strong processes. Sean Martin speaks with Viktor Petersson, Founder and CEO of Screenly, who shares how his team approaches digital signage security and how a recent alert from their bug bounty program helped validate the strength of their culture and workflows.Screenly provides a secure digital signage platform used by organizations that care deeply about device integrity, uptime, and lifecycle management. Healthcare facilities, financial services, and even NASA rely on these displays, which makes the security posture supporting them a priority. Viktor outlines why security functions best when embedded into culture rather than treated as a compliance checkbox. His team actively invests in continuous testing, including a structured bug bounty program that generates a steady flow of findings.The conversation centers on a real event: a report claiming that more than a thousand user accounts appeared in a public leak repository. Instead of assuming the worst or dismissing the claim, the team mobilized within hours. They validated the dataset, built correlation tooling, analyzed how many records were legitimate, and immediately reset affected accounts. Once they ruled out a breach of their systems, they traced the issue to compromised end user devices associated with previously known credential harvesting incidents.This scenario demonstrates how a strong internal process helps guide the team through verification, containment, and communication. Viktor emphasizes that optional security features only work when customers use them, which is why Screenly is moving to passwordless authentication using magic links. Removing passwords eliminates the attack vector entirely, improving security for customers without adding friction.For listeners, this episode offers a clear look at what rapid response discipline looks like, how bug bounty reports can add meaningful value, and why passwordless authentication is becoming a practical way forward for SaaS platforms. It is a timely reminder that transparency builds trust, and security culture determines how confidently a team can navigate unexpected events.Learn more about Screenly: https://itspm.ag/screenly1oNote: This story contains promotional content. Learn more.GUESTViktor Petersson, Co-founder of Screenly | On LinkedIn: https://www.linkedin.com/in/vpetersson/RESOURCESLearn more and catch more stories from Screenly: https://www.itspmagazine.com/directory/screenlyLinkedIn Post: https://www.linkedin.com/posts/vpetersson_screenly-security-incident-response-how-activity-7393741638918971392-otkkBlog: Security Incident Response: How We Investigated a Data Leak and What We're Doing Next: https://www.screenly.io/blog/2025/11/10/security-incident-response-magic-links/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlightKeywords: sean martin, marco ciappelli, viktor petersson, security, authentication, bugbounty, signage, incidentresponse, breaches, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Nov 25, 2025 47:10


    ⬥EPISODE NOTES⬥Understanding the Startup Engine Behind CybersecurityThis episode brings Sean Martin together with Ross Haleliuk, author, investor, product leader, and creator of Venture Insecurity, for a candid look at the forces shaping cybersecurity startups today. Ross shares how his decade of product leadership and long involvement in the security community give him a unique perspective on what drives founders, what creates market gaps, and why new companies keep entering a space already full of tools.Why Security Produces So Many ProductsRoss explains that the large number of security tools is not evidence of an industry losing control. Instead, it reflects a technology ecosystem where entrepreneurship has become easier and where attackers, not practitioners, define what defenders need. Because threats shift constantly, security leaders must always look for clues on what could fail next. That constant uncertainty fuels innovation.What Motivates FoundersDespite outside assumptions, Ross observes that most founders are motivated by the problems they have lived themselves. Some come from enterprise teams. Others come from military backgrounds. Many find traction with early open source work. Few come into cybersecurity to chase quick wins, and most do not survive long enough to chase profits even if they wanted to.Security as Business EnablementSean and Ross discuss the role of security as a business driver. In regulated sectors, companies invest because they must. In technology companies, strong security is a sales enabler that gives customers confidence to use their products. Outside of tech, the priority is more about resilience and operational continuity.How Buyers Should Think About StartupsRoss outlines the tradeoffs. Startups deliver speed, responsiveness, fresh architecture, and modern user experience. Large vendors provide stability, predictability, and broad coverage. Neither is perfect. Security leaders should decide based on the importance of the capability, the level of influence they want, and the outcomes they need.This conversation highlights the practical realities behind the security products organizations choose and the people who build them. Listeners will hear both the optimism and the honesty that define today's cybersecurity innovation economy.⬥GUEST⬥Ross Haleliuk, Security product leader, author, advisor, board member and investor | On LinkedIn: https://www.linkedin.com/in/rosshaleliuk/⬥HOST⬥Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥Inspiring Blog: https://ventureinsecurity.net/p/not-every-security-leader-works-at⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    Author Kate O'Neill's Book "What Matters Next": AI, Meaning, and Why We Can't Delegate Creativity | Redefining Society and Technology with Marco Ciappelli

    Play Episode Listen Later Nov 24, 2025 48:35


    Author Kate O'Neill's Book "What Matters Next": AI, Meaning, and Why We Can't Delegate Creativity | Redefining Society and Technology with Marco CiappelliKate O'Neill: https://www.koinsights.com/books/what-matters-next-book/Marco Ciappelli: https://www.marcociappelli.com/ When Kate O'Neill tells me that AI's most statistically probable outcome is actually its least meaningful one, I realize we're talking about something information theory has known for decades - but nobody's applying to the way we're using ChatGPT.She's a linguist who became a tech pioneer, one of Netflix's first hundred employees, someone who saw the first graphical web browser and got chills knowing everything was about to change. Her new book "What Matters Next" isn't another panic piece about AI or a blind celebration of automation. It's asking the question nobody seems to want to answer: what happens when we optimize for probability instead of meaning?I've been wrestling with this myself. The more I use AI tools for content, analysis, brainstorming - the more I notice something's missing. The creativity isn't there. It's brilliant for summarization, execution, repetitive tasks. But there's a flatness to it, a regression to the mean that strips away the very thing that makes human communication worth having.Kate puts it plainly: "There is nothing more human than meaning-making. From semantic meaning all the way out to the philosophical, cosmic worldview - what matters and why we're here."Every time we hit "generate" and just accept what the algorithm produces, we're choosing efficiency over meaning. We're delegating the creative process to a system optimized for statistical likelihood, not significance.She laughs when I tell her about my own paradox - that AI sometimes takes MORE time, not less. There's this old developer concept called "yak shaving," where you spend ten times longer writing a program to automate five steps instead of just doing them. But the real insight isn't about time management. It's about understanding the relationship between our thoughts and the tools we use to express them.In her book "What Matters Next," Kate's message is that we need to stay in the loop. Use AI for ugly first drafts, sure. Let it expedite workflow. But keep going back and forth, inserting yourself, bringing meaning and purpose back into the process. Otherwise, we create what she calls "garbage that none of us want to exist in the world with."I wrote recently about the paradox of learning when we rely entirely on machines. If AI only knows what we've done in the past, and we don't inject new meaning into that loop, it becomes closed. It's like doomscrolling through algorithms that only feed you what you already like - you never discover anything new, never grow, never challenge yourself.We're living in a Hybrid Analog Digital Society where these tools are unavoidable and genuinely powerful. The question isn't whether to use them. It's how to use them in ways that amplify human creativity rather than flatten it, that enhance meaning rather than optimize it away.The dominant narrative right now is efficiency, productivity, automation. But what if the real value isn't doing things faster - it's doing things that actually matter? Technology should serve humanity's purpose. Not the other way around. And that purpose can't be dictated by algorithms trained on statistical likelihood. It has to come from us, from the messy, unpredictable, meaningful work of being human.My Newsletter? Yes, of course, it is here: https://www.linkedin.com/newsletters/7079849705156870144/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Solar EV That Never Needs Charging w/ Robert Hoevers (Squad Mobility) | Brand Highlight Story

    Play Episode Listen Later Nov 22, 2025 6:02


    The Solar Car That Charges Itself While You Live Your LifeGrowing up, I always wondered: why can't cars just recharge themselves as we drive? Turns out, someone finally built exactly that.Robert Hoevers and his team at Squad Mobility created a solar-powered city car that does something brilliantly simple—it charges itself. There's a solar panel on the roof that continuously feeds the battery whether you're parked at the grocery store, sitting in your driveway, or cruising around town.The engineering is impressive, but the user experience is even better. For most people living in sunny climates—anywhere between 45 degrees north and 45 degrees south latitude (roughly Spain to South Africa)—you'll never need to find a charging station. Ever.Here's the reality: the average person drives about 12 kilometers a day for daily errands. School runs, grocery shopping, meeting friends. The Squad solar car has a 150-kilometer maximum range, and the sun replenishes what you use. You just drive it, park it, and forget about charging infrastructure entirely.This is what smart urban mobility looks like. It's street legal with proper crash structures, seat belts, and rollover protection. It tops out at 45 or 70 kilometers per hour depending on which model you choose—fast enough for city streets, not built for highways. In Europe, you only need a moped license for the slower version.The design sits somewhere between a golf cart and a Smart car, which makes perfect sense. Squad isn't trying to replace your family vehicle. They're solving the "second car" problem—those short daily trips where driving a massive SUV feels ridiculous.The market is responding. Squad Mobility has over 5,300 pre-orders and secured 1.5 million euros in European subsidies. They're currently crowdfunding on Republic to bridge the final gap before production starts in about a year.What surprised me most? Ten percent of their pre-orders come from American gated communities and golf cart neighborhoods. These communities already understand the value of compact, efficient vehicles for daily errands. Squad just made them solar-powered and street legal.Yes, you need consistent sunlight. If you live in perpetually cloudy climates, you'll still need to plug in occasionally. But for millions of people in sunny regions tired of hunting for charging stations or paying electricity bills to charge their second car, Squad Mobility built the obvious solution that somehow nobody else did.Sometimes innovation isn't about reinventing the wheel. It's about putting a solar panel on the roof and letting the sun do the work.This is the future of urban mobility, and it's arriving next year. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Nov 19, 2025 36:25


    ⬥EPISODE NOTES⬥Understanding Beg Bounties and Their Growing ImpactThis episode examines an issue that many organizations have begun to notice, yet often do not know how to interpret. Sean Martin is joined by Casey Ellis, Founder of Bugcrowd and Co-Founder of disclose.io, to break down what a “beg bounty” is, why it is increasing, and how security leaders should think about it in the context of responsible vulnerability handling.Bug Bounty vs. Beg BountyCasey explains the core principles of a traditional bug bounty program. At its core, a bug bounty is a structured engagement in which an organization invites security researchers to identify vulnerabilities and pays rewards based on severity and impact. It is scoped, governed, and linked to an established policy. The process is predictable, defensible, and aligned with responsible disclosure norms.A beg bounty is something entirely different. It occurs when an unsolicited researcher claims to have found a vulnerability and immediately asks whether the organization offers incentives or rewards. In many cases, the claim is vague or unsupported and is often based on automated scanner output rather than meaningful research. Casey notes that these interactions can feel like unsolicited street windshield washing, where the person provides an unrequested service and then asks for payment.Why It Matters for CISOs and Security TeamsSecurity leaders face a difficult challenge. These messages appear serious on the surface, yet most offer no actionable details. Responding to each one triggers incident response workflows, consumes time, and raises unnecessary internal concern. Casey warns that these interactions can create confusion about legality, expectations, and even the risk of extortion.At the same time, ignoring every inbound message is not a realistic long-term strategy. Some communications may contain legitimate findings from well-intentioned researchers who lack guidance. Casey emphasizes the importance of process, clarity, and policy.How Organizations Can PrepareAccording to Casey, the most effective approach is to establish a clear vulnerability disclosure policy. This becomes a lightning rod for inbound security information. By directing researchers to a defined path, organizations reduce noise, set boundaries, and reinforce safe communication practices.The episode highlights the need for community norms, internal readiness, and a shared understanding between researchers and defenders. Casey stresses that good-faith researchers should never introduce payment into the first contact. Organizations should likewise be prepared to distinguish between noise and meaningful security input.This conversation offers valuable context for CISOs, security leaders, and business owners navigating the growing wave of unsolicited bug claims and seeking practical ways to address them.⬥GUEST⬥Casey Ellis, Founder and Advisor at Bugcrowd | On LinkedIn: https://www.linkedin.com/in/caseyjohnellis/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/caseyjohnellis_im-thinking-we-should-start-charging-bug-activity-7383974061464453120-caEWDisclose.io: https://disclose.io/⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    AI in Healthcare: Who Benefits, Who Pays, and Who's at Risk in Our Hybrid Analog Digital Society | Experts Panel With Marco Ciappelli & Sean Martin

    Play Episode Listen Later Nov 15, 2025 60:08


    The New Copyright and Rights Battle: Who Owns the Sound of AI When Machines Make Music? | A Panel Conversation with  Chandler Lawn, Michael Sheldrick, Drew Thurlow, Puya Partow-Navid, and Marco Ciappelli | Music Evolves with Sean Martin

    Play Episode Listen Later Nov 13, 2025 52:31


    Show NotesAs artificial intelligence begins generating music from vast datasets of human art, a fundamental question emerges: who truly owns the sound of AI? This episode of Music Evolves brings together a law student and former musician Chandler Lawn, music industry executive and professor Drew Thurlow, Michael Sheldrick, Co-Founder of Global Citizen, and intellectual property attorney Puya Partow-Navid, alongside hosts Sean Martin and Marco Ciappelli, to examine how AI is reshaping authorship, licensing, and the meaning of originality.The panel explores how AI democratizes creation while exposing deep ethical and economic gaps. Lawn raises the issue of whether artists whose works trained AI models deserve compensation, asking if innovation can be ethical when built on uncompensated labor. Thurlow highlights how, despite fears of automation, generative AI music accounts for less than 1% of streaming royalties—suggesting opportunity, not replacement.Sheldrick connects the conversation to a broader global context, describing how music's economic potential could drive sustainable development if nations modernize copyright frameworks. He views this shift as a rare chance to position creative industries as engines for jobs and growth.Partow-Navid grounds the discussion in legal precedent, pointing to landmark cases—from Two Live Crew to George R. R. Martin—as markers of how courts may interpret fair use, causality, and global jurisdiction in AI-driven creation.Together, the guests agree that the debate extends beyond legality. It's about the emotional authenticity that makes music human. As Chandler notes, “We connect through imperfection.” Marco adds that live performance may ultimately anchor value in a world saturated by digital replication.This conversation captures the tension—and promise—of a future where music, technology, and law must learn to play in harmony.GuestsChandler Lawn, AI Innovation and Law Fellow at The University of Texas School of Law | On LinkedIn: https://www.linkedin.com/in/chandlerlawn/Drew Thurlow, Adjunct Professor at Berklee College of Music | On LinkedIn: https://www.linkedin.com/in/drewthurlow/Michael Sheldrick, Co-Founder and Chief Policy, Impact and Government Affairs Officer at Global Citizen | On LinkedIn: https://www.linkedin.com/in/michael-sheldrick-30364051/Puya Partow-Navid, Partner at Seyfarth Shaw LLP | On LinkedIn: https://www.linkedin.com/in/puyapartow/Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comHostSean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/ResourcesLegal Publication: You Can't Alway Get What You Want: A Survey of AI-related Copyright Considerations for the Music Industry published in Vol. 32, No. 3 of the Texas State Bar Entertainment and Sports Law Journal.BOOK: Machine Music: How AI Is Transforming Music's Next Act by Drew Thurlow: https://www.routledge.com/Machine-Music-How-AI-is-Transforming-Musics-Next-Act/Thurlow/p/book/9781032425242BOOK: From Ideas to Impact: A Playbook for Influencing and Implementing Change in a Divided World by Michael Sheldrick: https://www.fromideastoimpact.com/AI and Copyright Blogs:https://www.gadgetsgigabytesandgoodwill.com/category/ai/https://www.gadgetsgigabytesandgoodwill.com/2025/11/dr-thaler-is-right-in-part/https://www.gadgetsgigabytesandgoodwill.com/2025/07/californias-ai-law-has-set-rules-for-generative-ai-are-you-ready/https://www.gadgetsgigabytesandgoodwill.com/2025/06/copyright-office-firings-spark-constitutional-concerns-amid-ai-policy-tensions/Newsletter (Article, Video, Podcast): The Human Touch in a Synthetic Age: Why AI-Created Music Raises More Than Just Eyebrows: https://www.linkedin.com/pulse/human-touch-synthetic-age-why-ai-created-music-raises-martin-cissp-s9m7e/Article — Universal and Sony Music partner with new platform to detect AI music copyright theft using ‘groundbreaking neural fingerprinting' technology: https://www.musicbusinessworldwide.com/universal-and-sony-music-partner-with-new-platform-to-detect-ai-music-copyright-theft-using-groundbreaking-neural-fingerprinting-technology/Article: When Virtual Reality Is A Commodity, Will True Reality Come At A Premium: https://sean-martin.medium.com/when-virtual-reality-is-a-commodity-will-true-reality-come-at-a-premium-4a97bccb4d72Global Citizen: https://www.globalcitizen.org/Gallo Music (Gallo Records, South Africa): https://www.gallo.co.za/Global Citizen Festival: https://www.globalcitizen.org/en/festival/Andy Warhol Foundation v. Goldsmith (Shepard Fairey / “Hope” poster context): https://supreme.justia.com/cases/federal/us/598/21-869/case.pdfGeorge R. R. Martin / Authors Guild v. OpenAI (current AI training lawsuit): https://authorsguild.org/news/ag-and-authors-file-class-action-suit-against-openai/Campbell v. Acuff-Rose Music, Inc. (2 Live Crew “Pretty Woman”): https://supreme.justia.com/cases/federal/us/510/569/Vanilla Ice / “Under Pressure” Sampling Case: https://blogs.law.gwu.edu/mcir/case/queen-david-bowie-v-vanilla-ice/MIDiA Research — AI in Music Reports: https://www.midiaresearch.com/reports/ai-and-the-future-of-music-the-future-is-already-hereMerlin (Global Independent Rights Organization): https://www.merlinnetwork.org/Instagram Reel re: Spotify Terms: https://www.instagram.com/reel/DOrgbUNCYj_/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    THE SEASONS IN A BREATH | A Short Bedtime Story Written By Marco e Lucia Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

    Play Episode Listen Later Nov 12, 2025 4:40


    THE SEASONS IN A BREATHAutumn appeared at the window and looked around— it was November."The leaves are yellow and red.The swallows fly away in flocks over the rooftops.The crisp air smells of roasted chestnuts and burning wood.I like it this way,"Autumn exclaimed.Winter opened the door and looked around— it was January."The snow and the freezing wind.In the woods, mistletoe on branches beneath a blanket of ice.The marmot sleeps in her covered den, dreaming of the stars.How lovely it is to be warm and cozy!"Winter exclaimed.Spring stepped out onto the terrace and looked around— it was April."The flowers bloom and the birds chirp, returning to their nests.With the mild temperature, joyful life vibrates in the air.How wonderful!"Spring exclaimed.Summer went into the garden and looked around— it was July.A cat rests in the shade of a pine tree.The air smells of cut grass and ripe fruit.The butterflies dance carefree to the song of the cicadas.The sun makes me smile!"Summer exclaimed.The months pass and the year spins at great speed,but they will always bring something beautiful. Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    New Event | Global Space Awards 2025 Honors Captain James Lovell Legacy at Natural History Museum London | A conversation with Sanjeev Gordhan | Redefining Society And Technology Podcast With Marco Ciappelli

    Play Episode Listen Later Nov 11, 2025 27:14


    ____________Podcast Redefining Society and Technology Podcast With Marco Ciappellihttps://redefiningsocietyandtechnologypodcast.com  ____________Host Marco CiappelliCo-Founder & CMO @ITSPmagazine | Master Degree in Political Science - Sociology of Communication l Branding & Marketing Advisor | Journalist | Writer | Podcast Host | #Technology #Cybersecurity #Society

    How to Make One SOC Analyst Work Like Ten: Stop Normalizing Everything—Start Solving Something | A Crogl Brand Story Conversation with CEO, Monzy Merza

    Play Episode Listen Later Nov 11, 2025 39:06


    When “Normal” Doesn't Work: Rethinking Data and the Role of the SOC AnalystMonzy Merza, Co-Founder and CEO of Crogl, joins Sean Martin and Marco Ciappelli to discuss how cybersecurity teams can finally move beyond the treadmill of normalization, alert fatigue, and brittle playbooks that keep analysts from doing what they signed up to do—find and stop bad actors.Merza draws from his experience across research, security operations, and leadership roles at Splunk, Databricks, and one of the world's largest banks. His message is clear: the industry's long-standing approach of forcing all data into one format before analysis has reached its limit. Organizations are spending millions trying to normalize data that constantly changes, and analysts are paying the price—buried under alerts they can't meaningfully investigate.The conversation highlights the human side of this issue. Analysts often join the field to protect their organizations, but instead find themselves working on repetitive tickets with little context, limited feedback loops, and an impossible expectation to know everything—from email headers to endpoint logs. They are firefighters answering endless 911 calls, most of which turn out to be false alarms.Crogl's approach replaces that normalization-first mindset with an analyst-first model. By operating directly on data where it lives—without requiring migration or schema alignment—it allows every analyst to investigate deeper, faster, and more consistently. Each action taken by one team member becomes shared knowledge for the next, creating an adaptive, AI-driven system that evolves with the organization.For CISOs, this means measurable consistency, auditability, and trust in outcomes. For analysts, it means rediscovering purpose—focusing on meaningful investigations instead of administrative noise.The result is a more capable, connected SOC where AI augments human reasoning rather than replacing it. As Merza puts it, the new normal is no normalization—just real work, done better.Watch the full interview and product demo: https://youtu.be/7C4zOvF9sdkLearn more about CROGL: https://itspm.ag/crogl-103909Note: This story contains promotional content. Learn more.GUESTMonzy Merza, Founder and CEO of CROGL | On LinkedIn: https://www.linkedin.com/in/monzymerza/RESOURCESLearn more and catch more stories from CROGL: https://www.itspmagazine.com/directory/croglBrand Spotlight: The Schema Strikes Back: Killing the Normalization Tax on the SOC: https://brand-stories-podcast.simplecast.com/episodes/the-schema-strikes-back-killing-the-normalization-tax-on-the-soc-a-corgl-spotlight-brand-story-conversation-with-cory-wallace [Video: https://youtu.be/Kx2JEE_tYq0]Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    The Schema Strikes Back: Killing the Normalization Tax on the SOC | A Corgl Spotlight Brand Story Conversation with Cory Wallace

    Play Episode Listen Later Nov 11, 2025 20:23


    Breaking Free from Data Normalization: A Smarter Path for Security TeamsTraditional security models were built on a simple idea: collect data, normalize it, and analyze it. But as Director of Product Marketing Cory Wallace explains in this conversation with Sean Martin, that model no longer fits the reality of modern security operations. Data now lives across systems, clouds, and lakes—making normalization an inefficient, error-prone step that slows teams down and risks critical blind spots.Rethinking How Analysts Work with DataCory describes how schema drift, inconsistent field naming, and vendor-specific query languages have turned the analyst's job into a maze of manual mapping and guesswork. Each product update or schema change introduces a chance to miss something important—something an attacker is counting on. Crogl's new patent eliminates this problem by enabling search and correlation across unnormalized data, creating a unified analytical view without forcing everything into one rigid format.From Data Chaos to Analyst EmpowermentThis shift isn't just technical—it's cultural. Instead of treating SOC analysts as passive alert closers, Crogl's model empowers them with meaningful context from the start. Alerts now come with historical data, cross-referenced fields, and prebuilt queries, giving analysts the information they need to make decisions faster and more confidently.Efficiency with IntelligenceWallace explains how this approach saves time, reduces training burdens, and cuts dependency on multiple query languages. It helps overworked teams move from reactive triage to proactive investigation. By removing unnecessary layers of data transformation, organizations can accelerate incident resolution, minimize risk, and help analysts focus on what matters most—catching what others miss.At its core, the conversation highlights how removing the barriers of data normalization can redefine what's possible in modern security operations.Watch the full interview: https://youtu.be/Kx2JEE_tYq0Learn more about CROGL: https://itspm.ag/crogl-103909Note: This story contains promotional content. Learn more.GUESTCory Wallace, Director of Product Marketing at CROGL | On LinkedIn: https://www.linkedin.com/in/corywallacecrogl/RESOURCESLearn more and catch more stories from CROGL: https://www.itspmagazine.com/directory/croglPress Release: https://www.globenewswire.com/news-release/2025/11/05/3181815/0/en/Crogl-Granted-Patent-for-Analyzing-Non-Normalized-Data-for-Security.htmlForbes Article: https://www.forbes.com/sites/justinwarren/2025/11/05/tackling-cybersecurity-data-sprawl-without-normalizing-everything/LinkedIn Post: https://www.linkedin.com/posts/activity-7391913358817517569-QaCHAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    Play Episode Listen Later Nov 6, 2025 2:24


    Most organizations have security champions. Few have a real security culture.In this episode of AppSec Contradictions, Sean Martin explores why AppSec awareness efforts stall, why champion programs struggle to gain traction, and what leaders can do to turn intent into impact.

    Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia's CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Nov 5, 2025 52:14


    ⬥GUEST⬥Andrew Morgan, Chief Information Security Officer | On LinkedIn: https://www.linkedin.com/in/andrewmorgancism/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥The cybersecurity community has long recognized an uncomfortable truth: the gap between well-resourced enterprises and underfunded organizations keeps widening. This divide isn't just about money; it's about survivability. When a small business, school, or healthcare provider is hit with a major breach, the likelihood of permanent closure is exponentially higher than for a large enterprise.As host of the Redefining CyberSecurity Podcast, I've seen this imbalance repeatedly — and the conversation with Andrew Morgan underscores why it persists and what can be done about it.The Problem: Structural ImbalanceLarge enterprises operate with defined budgets, mature governance, and integrated security operations centers. They can afford redundancy, talent, and tooling. Meanwhile, small and mid-sized organizations are often left with fragmented controls, minimal staff, and reliance on external vendors or managed providers.The result is a “have and have not” world. The “haves” can detect, contain, and recover. The “have nots” often cannot. When they are compromised, the impact isn't just reputational — it can mean financial collapse or service disruption that directly affects communities.The Hidden Costs of ComplexityEven when smaller organizations invest in technology, they often fall into the trap of overtooling without strategy. Multiple, overlapping systems create noise, false confidence, and operational fatigue. Morgan describes this as a symptom of viewing cybersecurity as a subset of IT rather than as a business enabler.Simplification is key. A rationalized platform approach — even if not best-of-breed — can deliver better visibility and sustainability than a patchwork of disconnected tools. The goal should not be perfection; it should be proportionate protection aligned with business risk.The Solution: Culture, Collaboration, and ContinuityCyber resilience starts with people and culture. As Morgan puts it, programs must be driven by culture, informed by risk, and delivered through people, process, and technology. Security can't succeed in isolation from the organization's purpose or its people.The Australian CISO Tribe provides a real-world model for collaboration. Its members share threat intelligence, peer validation, and practical experiences — a living example of collective defense in action. Whether formalized or ad-hoc, these networks give security leaders context, community, and shared strength.Getting Back to BasicsPractical resilience isn't glamorous. It's about getting the basics right — consistent patching, logging, phishing-resistant authentication, verified backups, and tested recovery plans. It's about ensuring that, if everything fails, you can still get back up.When security becomes a business-as-usual practice rather than a project, organizations begin to move from reactive defense to proactive resilience.The TakeawayBridging the cybersecurity divide doesn't require endless budgets. It requires prioritization, simplification, and partnership. The “have nots” may never mirror enterprise scale, but they can adopt enterprise discipline — and that can make all the difference between temporary disruption and permanent failure.⬥RESOURCES⬥Inspiring Post: https://www.linkedin.com/posts/andrewmorgancism_last-night-i-was-fortunate-enough-to-spend-activity-7383972144507994112-V3Zr/⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

    Play Episode Listen Later Nov 3, 2025 30:24


    How to Market to Cybersecurity's Most Elusive Buyers: AI, Emotion, and the Human Touch - Interview with Gianna Whitver and Maria Velasquez | Cyber Marketing Con 2025 Coverage | On Location with Sean Martin and Marco CiappelliCyberMarketingCon 2025 In Person & Virtual https://www.cybermarketingconference.comDec 7-10, 2025 in Austin, Texas Why Cybersecurity Marketing Demands a Different PlaybookThe cybersecurity industry presents a paradox for marketers. While practitioners work with cutting-edge technology, traditional marketing approaches consistently fall flat. Gianna Whitver and Maria Velasquez, co-founders of the Cybersecurity Marketing Society, have spent six years understanding why—and they're sharing those insights at CyberMarketingCon 2025 this December in Austin.The challenge begins with the audience itself. Security professionals operate under constant pressure, actively preventing threats while juggling competing priorities. This stress creates an environment where patience for marketing noise evaporates instantly. Unlike other industries where buyers might browse vendor websites or respond to cold outreach, cybersecurity practitioners have both the technical sophistication to evade tracking and the motivation to control their own buying journey."Our buyer is highly elusive," Whitver explains. "They're saving the world and their companies from threats. When vendors reach out, it's an interruption to critical work." This dynamic forces marketers to rethink fundamental assumptions about how business gets done.The numbers tell part of the story. With over 5,000 cybersecurity vendors flooding the market, standing out based solely on technical specifications has become nearly impossible. Many solutions address similar problems with comparable features. The differentiator, Velasquez argues, isn't in the technology itself but in how that technology transforms the buyer's daily experience."We have to shed that technical layer and go for the emotion," Velasquez says. "If they buy our product, how is it gonna make them feel? Are they gonna get their weekends back with family? Are they actually gonna go to sleep without stress?" This human-centered approach represents a fundamental shift from the feeds-and-speeds messaging that dominated cybersecurity marketing for years.The industry is witnessing what Velasquez calls an "evolution slash revolution" in marketing tactics. Humor, entertainment, and authentic storytelling are replacing dense whitepapers as the first touch point. The goal isn't to dumb down complex technology but to create space for meaningful engagement by first addressing the emotional reality of a stressful profession.Trust remains the currency that matters most. Peer recommendations carry exponentially more weight than any advertising campaign. Security professionals rely on trusted networks to validate purchasing decisions, making community building and genuine thought leadership more valuable than aggressive outreach. Word-of-mouth referrals from colleagues who have seen real results trump even the most sophisticated demand generation campaigns.The emergence of AI as a marketing buzzword presents both opportunity and risk. Whitver notes that countless vendors now position themselves as "AI-native" or "agentic AI" solutions without articulating meaningful differentiation. "If that's what you remember about their product, what do you actually do?" she asks. The challenge for marketers is communicating AI's business value without contributing to the noise.CyberMarketingCon 2025 addresses these challenges head-on. Running December 7-10 in Austin, the conference brings together more than 550 marketing professionals for hands-on workshops, peer learning, and practical strategy sessions. Dedicated tracks cover brand, demand generation, operations, communications, and product marketing, with special summits for CEOs and sales leaders.Hands-on AI workshops represent a conference highlight. Attendees can build marketing agents using n8n, explore Clay for go-to-market planning, or participate in a marketer-focused capture-the-flag hacking exercise. The "Marketing Time Machine" theme balances timeless fundamentals with forward-looking innovation, acknowledging that effective marketing requires both solid foundations and experimental thinking.What sets CyberMarketingCon apart is its community-first philosophy. Despite 40-50% year-over-year growth, organizers prioritize maintaining an intimate, reunion-style atmosphere. Many CMOs bring entire teams for what becomes a working offsite, with different members attending specialized sessions then synthesizing insights into unified strategies.The conference's success metric reflects this philosophy. "Our KPI is: is it worth your time?" Whitver says. In an industry where time represents the scarcest resource, that might be the most important question of all.For cybersecurity marketers navigating an increasingly complex landscape, CyberMarketingCon offers something rare—a chance to learn from peers facing identical challenges, build practical skills, and remember that even in a technical industry, it's humans talking to humans. CyberMarketingCon 2025 In Person & Virtual https://www.cybermarketingconference.comDec 7-10, 2025 in Austin, Texas GUEST:Gianna WhitverCo-Founder & CEO, Cybersecurity Marketing Society | Cybersecurity GTM Industry Resource | Cybersecurity Marketing | Bees & Cybersecurity | Podcast Host | Community | (I like to build things & laugh a lot & tell jokes)Maria Velasquez

    How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Oct 30, 2025 40:24


    ⬥GUEST⬥Eric O'Neill, Keynote Speaker, Cybersecurity Expert, Spy Hunter, Bestselling Author. Attorney | On Linkedin: https://www.linkedin.com/in/eric-m-oneill/⬥HOST⬥Host: Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥In this episode of the Redefining CyberSecurity Podcast, host Sean Martin reconnects with Eric O'Neill, National Security Strategist at NeXasure and former FBI counterintelligence operative. Together, they explore how cybercrime has matured into a global economy—and why organizations of every size must learn to compete, not just defend.O'Neill draws from decades of undercover work and corporate investigation to reveal that cybercriminals now operate like modern businesses: they innovate, specialize, and scale. The difference? Their product is your data. He argues that resilience—not prevention—is the true marker of readiness. Companies can't assume they're too small or too obscure to be targeted. “It's just a matter of numbers,” he says. “At some point, you will get struck. You need to be able to take the punch and keep moving.”The discussion covers the practical realities facing small and midsize businesses: limited budgets, fragmented tools, and misplaced confidence. O'Neill explains why so many organizations over-invest in overlapping technologies while under-investing in strategy. His firm helps clients identify these inefficiencies and replace tool sprawl with coordinated defense.Preparation, O'Neill says, should follow his PAID methodology—Prepare, Assess, Investigate, Decide. The goal is to plan ahead, detect fast, and act decisively. Those that do not prepare spend ten times more responding after an incident than they would have spent preventing it.Martin and O'Neill also examine how storytelling bridges the gap between security teams and executive boards. Using relatable analogies—like house fires and insurance—O'Neill makes cybersecurity human. His message is simple: security is not a technical decision; it's a business one.Listen to hear how the business of cybercrime mirrors legitimate enterprise—and why understanding that truth might be your best defense.⬥RESOURCES⬥Book: Spies, Lies, and Cybercrime by Eric O'Neill – Book linkBook: Gray Day by Eric O'Neill – Book linkFree, Weekly Newsletter: spies-lies-cybercrime.ericoneill.netPodcast: Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us: https://redefiningsocietyandtechnologypodcast.com/episodes/new-book-spies-lies-and-cyber-crime-former-fbi-spy-hunter-eric-oneill-explains-how-cybercriminals-use-espionage-techniques-to-attack-us-redefining-society-and-technology-podcast-with-marco-ciappelli⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    New Book | STREAMING WARS: How Getting Everything We Want Changed Entertainment Forever | Journalist Charlotte Henry Explains How Streaming Changed Entertainment Forever | Redefining Society And Technology Podcast With Marco Ciappelli

    Play Episode Listen Later Oct 30, 2025 34:21


    CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE

    Play Episode Listen Later Oct 29, 2025 3:38


    Organizations pour millions into protecting running applications—yet attackers are targeting the delivery path itself.This episode of AppSec Contradictions reveals why CI/CD and cloud pipelines are becoming the new frontline in cybersecurity.

    Halloween over Florence: THE MARKET OF GHOSTS | A Short Story Written By Marco Ciappelli (English Version) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

    Play Episode Listen Later Oct 28, 2025 13:02


    Halloween over Florence: THE MARKET OF GHOSTSSeverino lived in the bell tower on the hill — the one next to the ancient Basilica of San Miniato al Monte.Every evening, at sunset, he would lock the gate at the base of the entrance stairway and before climbing back up, he would pause to watch Florence color itself amber.And so he did today as well. The tourists had left. Time stopped and silence became sacred again.Through the rusted bars the city stood there motionless — perhaps since forever; with its red roofs, marble facades and the Arno flowing between its stones like a glittering silver ribbon.Domes and towers trembling with light, almost suspended in the air, as if everything and everyone were holding their breath waiting for twilight — and for the night that would cover it with shadows, stars and dreams.One more glance, then he turned on his transistor radio that he had found a few years ago and the notes of Duke Ellington's 'Don't Get Around Much Anymore' filled the autumn evening.Silence may be sacred for the monks, but for Severino music was more so. Seven, his raven, didn't need to be called and at the first notes launched himself from the cypresses of the cemetery above, circled in front of the imposing facade of the Basilica and suddenly glided down along the stairway, to land gently on his left shoulder."Hey Seven, had a good day?""Yes. Could have been worse — Let's settle for that."At which, Severino smiled, turned up the radio's volume and began climbing resolutely toward le Porte del Cielo, while Jazz music echoed among the ancient stones.Nine years ago, on this same day in the month of October, the Olivetan monks residing in the Abbey found a child on the steps of the Basilica.He was there, wrapped in fog, silent as the night, eyes curious as the wind, without name and without past. They called him Severino — I don't know why — and he grew up among prayers and silences. He played in ancient rooms and discovered his world, surrounded by books, tombs, art and mysteries never revealed. At night a raven and a black cat accompanied him, illuminated by the moon, in the Cimitero delle Porte Sante, wandering among imposing crypts and motionless statues that whispered memories and mysteries.But on Halloween nights the whispers transform into screams and endless laments. Secrets manifest themselves, legends become reality, and dreams disguised as nightmares knock on doors lit by candles. And that full moon night was precisely this night: October 31st — and remember, whether you believe in spirits or not, nothing changes: the ghosts will come.And Severino was up there, right there waiting for them to arrive. Leaning out the highest window of the bell tower, calm, looking at Florence from above. While Thelonious Monk's 'Round Midnight' played on his radio, he watched — tapping time with one foot and waited.At the second of the twelve strokes of the midnight bells, something began to happen. On the Arno formed a dense fog that pulsed with spectral green. It began to rise and slide slow but inexorable over the bridges like fingers of cold hands of impatient ghosts. It slid over the Ponte Vecchio and rolled through the streets of Oltrarno until reaching San Niccolò, where it climbed up the hill swallowing everything it found in its path.When it reached the gate of San Miniato, it slipped through the bars and climbed up the stairs until it covered, like a high luminous tide, the entire square in front of the church. It climbed up the marble facade and wrapped also the Cimitero delle Porte Sante, covering the entire hill in a cloak of mystery. Then slowly, as if by enchantment, the fog began to dissolve rising toward the sky and when the last cloud melted into the night air, the square was no longer empty.Small jack-o'-lanterns with flickering lights floated in the air smiling with teeth of fire. Black candles sprouted from nowhere, illuminating spectral stalls full of everything and nothing. Bats that seemed made of paper but were alive fluttered among the lights with wings of black velvet, while autumn leaves danced without wind, sparkling with gold and copper. Pumpkins of every shape filled the stands, some carved with funny faces, others covered with silver spiderwebs that shone like threads of moon. Witch hats swirled in the air like flying umbrellas rotating slow on themselves. Roasted chestnuts perfumed the air with cinnamon and mystery, while small dancing skeletons tinkled like ice bells.And finally in the Cimitero delle Porte Sante, the Portal opened. Like every Halloween, for centuries, spirits from all over the world congregated in Florence for their annual meeting. A spectral river of ghosts poured into the square, each heading toward their own stall, and each with their impossible merchandise to sell or trade. The spirits had arrived and Severino observed them from above. A carnival of other worlds, made of sounds, colors and unimaginable stories.The deserted square had transformed into the Market of Ghosts. Stalls kept materializing from nowhere, carved and glowing pumpkins told each other stories of Halloweens past, present and future laughing malicious among the perfumes of lost memories, past centuries, tomorrow's candles and fallen stardust. The sky above the Tuscan hills and above Florence was full of ghosts arriving from everywhere to search for the unfindable. But no human eye could see this spectacle. No one except Severino, who descended from the tower enchanted by that spectacle and immersed himself in the crowd pulsating with otherworldly life. Seven circled above him observing with attentive eyes and cawing a bit nervous. Some ghosts looked at him with curiosity and recognized him. Someone greeted him and many others whispered his name in forgotten languages."There he is," murmured a witch from Prague."The child of time," sighed a Norman knight."He's returned, I told you so." laughed a Caribbean pirate.But Severino paid them no attention because there were ghosts selling: dreams of sleeping dragons, laughter of northern gnomes, tears of mermaids in love, the last breath of dinosaurs, shadows of unicorns. And even fears from past Halloweens — two for the price of one, but only for tonight. The ghost of a pirate who died during a boarding gone not so well shouted: "Storm bottles! Lightning in jars!" A witch from Salem whispered: "Love potions that last three lifetimes…" A medieval knight showed swords that cut fear, A Chinese spirit waved kites that fly into the past.The spectral crowd grew and thickened, laughed and bargained, while Severino walked amazed and fascinated among the impossible stalls of the Halloween Market. Seven cawed restless from above and Eleven, the black cat with orange eyes, jumped from one tent to another not losing sight of a single movement of Severino and the hundreds of souls circling around him.A ghost monk from an era that never existed saw him and smiled at him from behind a stall full of ancient radios adorned with mysterious symbols. Severino approached, fascinated."How wonderful! Do they all work?""Oh yes, certainly" replied the monk. "These transmit on the waves of past, present, and future time. But you don't need to buy one."The other ghosts stopped. They ceased selling, buying and bartering. They looked at Severino with respect and listened to what the collector of frequencies told him."The transistor radio you already have is more special than you think. But to discover its true secrets, you'll have to search in the ancient crypts where everything began."And suddenly the first lights of dawn began to illuminate the sky behind San Miniato with pink. In rush and hurry the ghosts said goodbye flying away in the wind. "Until next Halloween!" They told each other crossing in the sky. The stalls vanished. Lanterns and candles went out. The Market of Ghosts dissolved like a dream.Severino found himself alone in the empty square, Seven on his shoulder and Eleven sitting on the low wallLooking at Florence illuminating itself in the day of All Saints. He observed his old radio with new eyes and from the ancient crypts of San Miniato, something seemed to call him. He turned it on, turned up the volume and descended the stairway in time to Chet Baker's version of 'Autumn Leaves'.It was time to throw open the gate of the Basilica of San Miniato al Monte.___________________We will continue this story.... For now a Happy Halloween to all of you, may you always believe in magic!Story written by Marco Ciappelli for "Stories Under The Stars" Halloween 2025___________________Listen to Severino's Playlist for the songs that accompany this story and subscribe to discover new music with every adventure.

    New Book: SPIES, LIES, AND CYBER CRIME | Former FBI Spy Hunter Eric O'Neill Explains How Cybercriminals Use Espionage techniques to Attack Us | Redefining Society And Technology Podcast With Marco Ciappelli

    Play Episode Listen Later Oct 21, 2025 48:16


    Sampling, Stealing, or Something Else Entirely: Who Gets the Credit When AI Creates the Song? | A Conversation with  Marco Ciappelli | Music Evolves with Sean Martin

    Play Episode Listen Later Oct 17, 2025 29:57


    Guest and HostGuest: Marco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comHost: Sean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/Show NotesIn this candid episode of Music Evolves, Sean Martin and Marco Ciappelli unpack the creative, ethical, and deeply personal tensions surrounding AI-generated music—where it fits, where it falters, and where it crosses the line.Sean opens with a clear position: AI can support the creative process, but its outputs shouldn't be commercialized unless the ingredients—i.e., training data—are ethically sourced and properly licensed. His concern is grounded in authorship and consent. If a model learns from unlicensed tracks, even indirectly, is it sampling without credit?Marco responds by acknowledging how deeply embedded influence is in all creative acts. As a writer and musician, he often discovers melodies or storylines in his own work that echo familiar structures—not out of theft, but because of lived experience. “We are made of what we absorb,” he says, drawing parallels between human memory and how AI models are trained.But the critical difference? Humans feel. They reinterpret. They falter. They declare their intent. AI does none of that—at least, not yet.The discussion isn't anti-technology. Instead, it's about boundaries. Both Sean and Marco agree that tools like neural networks can be fascinating collaborators. But when those tools start to blur authorship or generate perfect replicas of a human's imperfection—say, the crackle of a vinyl or the slide of a finger across a string—what are we really listening to? And who, if anyone, should profit from it?They wrestle with questions of transparency (“Did you write that… or did AI?”), authorship (“If you like it but don't know it's AI, does it matter?”), and commercialization (“Is it still your art if someone else feeds it to a machine?”). And perhaps most importantly, they invite you to answer for yourself.

    From Sampling to Scraping: AI Music, Rights, and the Return of Creative Control | A Musing On The Connection Between Music, Technology, and Creativity | Music Evolves: Sonic Frontiers with Sean Martin and TAPE9 | Read by TAPE9

    Play Episode Listen Later Oct 16, 2025 10:18


    Show NotesIn this episode, we unpack the core ideas behind the Sonic Frontiers article “From Sampling to Scraping: AI Music, Rights, and the Return of Creative Control.” As AI-generated music floods streaming platforms, rights holders are deploying new tools like neural fingerprinting to detect derivative works — even when no direct sampling occurs. But what does it mean to “detect influence,” and can algorithms truly distinguish theft from inspiration?We explore the implications for artists who want to experiment with AI without being replaced by it, and the shifting desires of listeners who may soon prefer human-made music the way some still seek out vinyl, film cameras, or wooden roller coasters — not for efficiency, but for the feel.The article also touches on the burden of rights enforcement in this new age. While major labels can embed detection systems, who protects the independent artist? And if AI enables anyone to create, does it also require everyone to monitor?This episode invites you to reflect on what we value in music: speed and volume, or craft and control?

    The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean Martin

    Play Episode Listen Later Oct 16, 2025 38:21


    ⬥GUEST⬥Walter Haydock, Founder, StackAware | On Linkedin: https://www.linkedin.com/in/walter-haydock/⬥HOST⬥Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | On LinkedIn: https://www.linkedin.com/in/imsmartin/ | Website: https://www.seanmartin.com⬥EPISODE NOTES⬥No-Code Meets AI: Who's Really in Control?As AI gets embedded deeper into business workflows, a new player has entered the security conversation: no-code automation tools. In this episode of Redefining CyberSecurity, host Sean Martin speaks with Walter Haydock, founder of StackAware, about the emerging risks when AI, automation, and business users collide—often without traditional IT or security oversight.Haydock shares how organizations are increasingly using tools like Zapier and Microsoft Copilot Studio to connect systems, automate tasks, and boost productivity—all without writing a single line of code. While this democratization of development can accelerate innovation, it also introduces serious risks when systems are built and deployed without governance, testing, or visibility.The conversation surfaces critical blind spots. Business users may be automating sensitive workflows involving customer data, proprietary systems, or third-party APIs—without realizing the implications. AI prompts gone wrong can trigger mass emails, delete databases, or unintentionally expose confidential records. Recursion loops, poor authentication, and ambiguous access rights are all too easy to introduce when development moves this fast and loose.Haydock emphasizes that this isn't just a technology issue—it's an organizational one. Companies need to decide: who owns risk when anyone can build and deploy a business process? He encourages a layered approach, including lightweight approval processes, human-in-the-loop checkpoints for sensitive actions, and upfront evaluations of tools for legal compliance and data residency.Security teams, he notes, must resist the urge to block no-code outright. Instead, they should enable safer adoption through clear guidelines, tool allowlists, training, and risk scoring systems. Meanwhile, business leaders must engage early with compliance and risk stakeholders to ensure their productivity gains don't come at the expense of long-term exposure.For organizations embracing AI-powered automation, this episode offers a clear takeaway: treat no-code like production code—because that's exactly what it is.⬥ADDITIONAL INFORMATION⬥✨ More Redefining CyberSecurity Podcast: 

    Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9

    Play Episode Listen Later Oct 16, 2025 8:26


    What does it really take to be a CISO the business can rely on? In this episode, Sean Martin shares insights from a recent conversation with Tim Brown, CISO at SolarWinds, following his keynote at AISA CyberCon and his role in leading a CISO Bootcamp for current and future security leaders. The article at the heart of this episode focuses not on technical skills or frameworks, but on the leadership qualities that matter most: context, perspective, communication, and trust.Tim's candid reflections — including the personal toll of leading through a crisis — remind us that clarity doesn't come from control. It comes from connection. CISOs must communicate risk in ways that resonate across teams and business leaders. They need to build trusted relationships before they're tested and create space for themselves and their teams to process pressure in healthy, sustainable ways.Whether you're already in the seat or working toward it, this conversation invites you to rethink what preparation really looks like. It also leaves you with two key questions: Where do you get your clarity, and who are you learning from? Tune in, reflect, and join the conversation.

    First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

    Play Episode Listen Later Oct 15, 2025 26:54


    First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Tim Brown's job changed overnight. December 11th, he was the CISO at SolarWinds managing security operations. December 12th, he was leading the response to one of the most scrutinized cybersecurity incidents in history.Connecting from New York and Florence to Melbourne, Sean Martin and Marco Ciappelli caught up with their longtime friend ahead of his keynote at AISA CyberCon. The conversation reveals what actually happens when a CISO faces the unthinkable—and why the relationships you build before crisis hits determine whether you survive it.Tim became the first CISO ever charged by the SEC, a distinction nobody wants but one that shaped his mission: if sharing his experience helps even one security leader prepare better, then the entire saga becomes worthwhile. He's candid about the settlement process still underway, the emotional weight of having strangers ask for selfies, and the mental toll that landed him in a Zurich hospital with a heart attack the week his SEC charges were announced."For them to hear something and hear the context—to hear us taking six months off development, 400 engineers focused completely on security for six months in pure focus—when you say it with emotion, it conveys the real cost," Tim explained. Written communication failed during the incident. People needed to talk, to hear, to feel the weight of decisions being made in real time.What saved SolarWinds wasn't just technical capability. It was implicit trust. The war room team operated without second-guessing each other. The CIO handled deployment and investigation. Engineering figured out how the build system was compromised. Marketing and legal managed their domains. Tim didn't waste cycles checking their work because trust was already built."If we didn't have that, we would've been second-guessing what other people did," he said. That trust came from relationships established long before December 2020, from a culture where people knew their roles and respected each other's expertise.Now Tim's focused on mentoring the next generation through the RSA Conference CSO Bootcamp, helping aspiring CISOs and security leaders at smaller companies build the knowledge, community, and relationships they'll need when—not if—their own December 12th arrives. He tailors every talk to his audience, never delivering the same speech twice. Context matters in crisis, but it matters in communication too.Australia played a significant role during SolarWinds' incident response, with the Australian government partnering closely in January 2021. Tim hadn't been back in a decade, making his return to Melbourne for CyberCon particularly meaningful. He's there to share lessons earned the hardest way possible, and to remind security leaders that stress management, safe spaces, and knowing when to compartmentalize aren't luxuries—they're survival skills.His keynote covers the different stages of incident response, how culture drives crisis outcomes, and why the teams that step up matter more than the ones that run away. For anyone leading security teams, Tim's message is clear: build trust now, before you need it.AISA CyberCon Melbourne runs October 15-17, 2025 Coverage provided by ITSPmagazineGUEST:Tim Brown, CISO at SolarWinds | On LinkedIn: https://www.linkedin.com/in/tim-brown-ciso/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

    Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco Ciappelli

    Play Episode Listen Later Oct 13, 2025 28:05


    Everyone Is Protecting My Password, But Who Is Protecting My Toilet Paper? - Interview with Amberley Brady | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliAISA CyberCon Melbourne | October 15-17, 2025Empty shelves trigger something primal in us now. We've lived through the panic, the uncertainty, the realization that our food supply isn't as secure as we thought. Amberley Brady hasn't forgotten that feeling, and she's turned it into action.Speaking with her from Florence to Sydney ahead of AISA CyberCon in Melbourne, I discovered someone who came to cybersecurity through an unexpected path—studying law, working in policy, but driven by a singular passion for food security. When COVID-19 hit Australia in 2019 and grocery store shelves emptied, Amberley couldn't shake the question: what happens if this keeps happening?Her answer was to build realfoodprice.com.au, a platform tracking food pricing transparency across Australia's supply chain. It's based on the Hungarian model, which within three months saved consumers 50 million euros simply by making prices visible from farmer to wholesaler to consumer. The markup disappeared almost overnight when transparency arrived."Once you demonstrate transparency along the supply chain, you see where the markup is," Amberley explained. She gave me an example that hit home: watermelon farmers were getting paid 40 cents per kilo while their production costs ran between $1.00 to $1.50. Meanwhile, consumers paid $2.50 to $2.99 year-round. Someone in the middle was profiting while farmers lost money on every harvest.But this isn't just about fair pricing—it's about critical infrastructure that nobody's protecting. Australia produces food for 70 million people, far more than its own population needs. That food moves through systems, across borders, through supply chains that depend entirely on technology most farmers never think about in cybersecurity terms.The new autonomous tractors collecting soil data? That information goes somewhere. The sensors monitoring crop conditions? Those connect to systems someone else controls. China recognized this vulnerability years ago—with 20% of the world's population but only 7% of arable land, they understood that food security is national security.At CyberCon, Amberley is presenting two sessions that challenge the cybersecurity community to expand their thinking. "Don't Outsource Your Thinking" tackles what she calls "complacency creep"—our growing trust in AI that makes us stop questioning, stop analyzing with our gut instinct. She argues for an Essential Nine in Australia's cybersecurity framework, adding the human firewall to the technical Essential Eight.Her second talk, cheekily titled "Everyone is Protecting My Password, But No One's Protecting My Toilet Paper," addresses food security directly. It's provocative, but that's the point. We saw what happened in Japan recently with the rice crisis—the same panic buying, the same distrust, the same empty shelves that COVID taught us to fear."We will run to the store," Amberley said. "That's going to be human behavior because we've lived through that time." And here's the cybersecurity angle: those panics can be manufactured. A fake image of empty shelves, an AI-generated video, strategic disinformation—all it takes is triggering that collective memory.Amberley describes herself as an early disruptor in the agritech cybersecurity space, and she's right. Most cybersecurity professionals think about hospitals, utilities, financial systems. They don't think about the autonomous vehicles in fields, the sensor networks in soil, the supply chain software moving food across continents.But she's starting the conversation, and CyberCon's audience—increasingly diverse, including people from HR, risk management, and policy—is ready for it. Because at the end of the day, everyone has to eat. And if we don't start thinking about the cyber vulnerabilities in how we grow, move, and price food, we're leaving our most basic need unprotected.AISA CyberCon Melbourne runs October 15-17, 2025 Virtual coverage provided by ITSPmagazineGUEST:Amberley Brady, Food Security & Cybersecurity Advocate, Founder of realfoodprice.com.au | On LinkedIn: https://www.linkedin.com/in/amberley-b-a62022353/HOSTS:Sean Martin, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder, ITSPmagazine and Studio C60 | Website: https://www.marcociappelli.comCatch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to share an Event Briefing as part of our event coverage? Learn More

    Claim ITSPmagazine | Technology. Cybersecurity. Society

    In order to claim this podcast we'll send an email to with a verification link. Simply click the link and you will be able to edit tags, request a refresh, and other features to take control of your podcast page!

    Claim Cancel