Podcasts about brand marketing

Identification for a good or service

  • 1,213PODCASTS
  • 2,336EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • May 29, 2025LATEST
brand marketing

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about brand marketing

Show all podcasts related to brand marketing

Latest podcast episodes about brand marketing

ITSPmagazine | Technology. Cybersecurity. Society
From AppSec Training to AI Standards: Teaching AI to Code Securely | A Brand Story with Jim Manico from Manicode Security | An OWASP Global AppSec EU 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 29, 2025 18:10


Jim Manico's passion for secure coding has always been rooted in deeply technical practices—methods that matter most to developers writing code day in and day out. At OWASP Global AppSec EU 2025 Conference in Barcelona, Manico brings that same precision and care to a broader conversation around the intersection of application security and artificial intelligence.While many are still just beginning to assess how AI impacts application development, Manico has been preparing for this moment for years. Two and a half years ago, he saw a shift—traditional low-level technical bugs were being mitigated effectively by mature organizations. The new challenge? Business logic flaws and access control issues that scanners can't easily detect. This change signaled a new direction, prompting him to dive into AI security long before it became fashionable.Now, Manico is delivering AI-flavored AppSec training, helping developers understand the risks of insecure code generated by large language models. His research shows that even the best AI coding tools—from Claude to Copilot—still generate insecure code out of the box. That's where his work becomes transformative: by developing detailed, framework-specific prompts grounded in decades of secure coding knowledge, he has trained these tools to write safer code, using React, Django, Vue, and more.Beyond teaching, he's building. With 200 volunteers, he's leading the creation of the Artificial Intelligence Security Verification Standard (AISVS), a new OWASP project inspired by the well-known Application Security Verification Standard (ASVS). Generated with both AI and human collaboration, the AISVS already has a v0.1 release and aims for a major update by summer.For Manico, this isn't just a technical evolution—it's a personal renaissance. His deep catalog of secure coding techniques, once used primarily for human education, is now fueling a new generation of AI-assisted development. And he's just getting started.This episode isn't just about where AppSec is going. It's a call to developers and security professionals to rethink how we teach, how we build, and how we can use AI to enhance—not endanger—the software we create.Learn more about Manicode: https://itspm.ag/manicode-security-7q8iNote: This story contains promotional content. Learn more.Guest: Jim Manico, Founder and Secure Coding Educator at Manicode Security | On Linkedin: https://www.linkedin.com/in/jmanico/ResourcesJim's OWASP Session: https://owasp2025globalappseceu.sched.com/event/1wfpM/leveraging-ai-for-secure-react-development-with-effective-prompt-engineeringDownload the Course Catalog: https://itspm.ag/manicode-x684Learn more and catch more stories from Manicode Security: https://www.itspmagazine.com/directory/manicode-securityAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: jim manico, sean martin, appsec, ai, owasp, securecoding, developers, aisvs, training, react, brand story, brand marketing, marketing podcast, brand story podcast

The Influencer Marketing Factory Podcast
How FP Movement Builds Impact w/ Courtney Weis

The Influencer Marketing Factory Podcast

Play Episode Listen Later May 28, 2025 26:33


In this episode of The Influence Factor, Alessandro Bogliari speaks with Courtney Weis, Managing Director of Brand Marketing at FP Movement. Their conversation explores the brand's commitment to empowering women through activewear, the vital role of community involvement, and the dynamic shifts within influencer marketing. Courtney offers valuable perspectives on FP Movement's collaborations with athletes and creators, highlights the power of storytelling in brand marketing, and provides a preview of the brand's upcoming campaigns and activations.

The Retail Whore
EP 202: LEADING A RETAIL REVIVAL WITH STEVEN HENKE

The Retail Whore

Play Episode Listen Later May 28, 2025 45:50


Steven Henke is the Chief of Brand Marketing at DAP Health. DAP Health (DAP) is an advocacy-based health center in Palm Springs, CA, serving over 8,000 patients, offering medical and mental healthcare, STI testing and treatment, dentistry, pharmacy, and lab. A variety of wraparound services enable patients to experience optimal health, including social services, support groups, alternative therapies, and other wellness services. DAP opened one of California's first COVID clinics and hotlines to offer screening, testing, and treatment. DAP is also working to address social determinants of health that are causing negative health outcomes during this pandemic, like food and housing insecurity, joblessness, isolation, and access to ongoing healthcare.DAP's sexual health clinic offers STI testing and treatment, Pre-Exposure Prophylaxis (PrEP), Post-Exposure Prophylaxis (PEP), and HIV and HCV testing. DAP has also earned Charity Navigator's highest rating for the twelfth consecutive year—landing DAP in the top 6% of nonprofits rated. At DAP, Steven plans and implements brand marketing and PR strategies with various stakeholder communities, including businesses, chambers of commerce, volunteers, donors, retail, and media. Steven's primary areas of focus include visual, written, and digital storytelling on behalf of DAP Health, Revivals Stores, Resource Development events, annual giving, major gifts, planned giving, and capital campaign communications.Here, Steven shares how DAP's Revivals Stores serve as a “gateway drug” to life-changing healthcare services. He dives into his career journey from working part-time retail jobs, landing a position at Target Corporate, and eventually making his way to DAP in Palm Springs. Steven also shares details about the annual Revivals After Dark event, how he curates the furniture collection at each store, and the most unique and noteworthy donations. MC Design Academy is designed to be a space where I get to share my expertise with you, where you'll get to learn all about visual merchandising, design, display, retail, and everything in between. Come along as I practice my craft and be sure to like, subscribe, and follow our socials to keep updated. See you in the merchandising land of MC Design Academy!What's Inside: How DAP's Revivals Stores introduce customers to life-changing healthcare servicesHow Steven curates the furniture collections at each Revivals locationStories about some of the most unique donations at RevivalsMentioned In This Episode:DAP Health on InstagramDAP Health on FacebookRevival Stores on InstagramRevivalsstores.comRevivals Stores on FacebookRevivals Stores on YouTube

ITSPmagazine | Technology. Cybersecurity. Society
What Helps You Sleep Better at Night: A Practical Take on Zero Trust | A Brand Story with Rob Allen from ThreatLocker | An Infosecurity Europe 2025 Pre-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 22, 2025 23:03


As InfoSecurity Europe prepares to welcome cybersecurity professionals from across the globe, Rob Allen, Chief Product Officer at ThreatLocker, shares why this moment—and this location—matters. Allen doesn't frame the conversation around hype or headlines. Instead, he focuses on a universal truth: organizations want to sleep better at night knowing their environments are secure.ThreatLocker's mission is grounded in achieving Zero Trust in a simple, operationally feasible way. But more than that, Allen emphasizes their value as enablers of peace of mind. Whether helping customers prevent ransomware attacks or meet regional regulatory requirements like GDPR or Australia's Essential Eight, the company is working toward real-world solutions that reduce complexity without sacrificing security. Their presence at events like InfoSecurity Europe is key—not just for outreach, but to hear directly from customers and partners about what's working and where they need help.Why Being There MattersDifferent regions have different pressures. In Australia, adoption surged without any local team initially on the ground—driven purely by alignment with the Essential Eight framework. In the UK, it's conversations about Cyber Essentials that shape booth discussions. Regulations aren't just compliance checklists; they're also conversation starters that change how organizations prioritize security.The ThreatLocker team doesn't rely on generic demos or vague promises. They bring targeted examples to the booth—like asking attendees if they know what software can be run on their machines without alerting anyone. If tools like remote desktop applications or archive utilities can be freely executed, attackers can use them too. This is where ThreatLocker steps in: controlling what runs, identifying what's necessary, and blocking what isn't.Booth D90 and BeyondRob Allen invites anyone—whether they're new to ThreatLocker or longtime users—to visit booth D90. The team, built with a mix of technical skill and humor (ask about the “second-best beard” in the company), is there to listen and help. It's not just about showcasing technology; it's about building relationships and reinforcing a shared goal: practical, proactive cybersecurity that makes a measurable difference.If you're at InfoSecurity Europe, stop by. If you're not, this episode offers a meaningful glimpse into why showing up—both physically and philosophically—matters in cybersecurity.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerCyber Essentials Guide: https://threatlocker.kb.help/threatlocker-and-cyber-essentials-compliance/?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interview_rob&utm_term=podcastAustralia's Essential Eight Guide: https://www.threatlocker.com/whitepaper/australia-essential-eight?utm_source=itsp&utm_medium=sponsor&utm_campaign=infosec_europe_pre_interview_rob_q2_25&utm_content=infosec_europe_pre_interviLearn more and catch more event coverage stories from Infosecurity Europe 2025 in London: https://www.itspmagazine.com/infosec25 ______________________Keywords:sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, infosec, compliance, ransomware, endpoint, regulation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

The eCommerce Toolbox: Expert Perspectives
Rebrand or Replatform? Why Doing Both at Once Can Break Your Ecommerce Stack

The eCommerce Toolbox: Expert Perspectives

Play Episode Listen Later May 21, 2025 20:27


What happens when you rebrand and replatform at the same time? Chaos. Unless you know what you're doing. In this episode, Corin Mills, Director of Ecommerce and Brand Marketing at MOO, shares how the global print brand scaled smarter by separating transformation timelines, optimizing for conversion with tactile touchpoints like sample packs and smart mail, and building a hybrid tech stack that supports both B2B complexity and self-serve simplicity. If you're navigating a major brand or tech overhaul, this episode shows how to keep your growth strategy sharp, grounded, and revenue-focused.

ITSPmagazine | Technology. Cybersecurity. Society
Why Community Could Be the Strongest Defense in Cybersecurity | A Brand Story with Rob Clyde from ISACA | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 21, 2025 23:41


At RSAC 2025, the most urgent signals weren't necessarily the loudest. As ISACA board member and cybersecurity veteran Rob Clyde joins Sean Martin and Marco Ciappelli for a post-conference recap, it's clear that conversations about the future of the profession—and its people—mattered just as much as discussions on AI and cryptography.More Than a Job: Why Community MattersRob Clyde shares his long-standing involvement with ISACA and reflects on the powerful role that professional associations play in cybersecurity careers. It's not just about certifications—though Clyde notes that employers often value them more than degrees—it's also about community, mentorship, and mutual support. When asked how many people landed a job because of someone in their local ISACA chapter, half the room raised their hands. That kind of connection is difficult to overstate.Clyde urges cybersecurity professionals to look beyond their company roles and invest in something that gives back—whether through volunteering, speaking, or simply showing up. “It's your career,” he says. “Take back control.”Facing Burnout and Legal Risk Head-OnThe group also addresses a growing issue: burnout. ISACA's latest research shows 66% of cybersecurity professionals are feeling more burned out than last year. For CISOs in particular, that pressure is compounded by personal liability—as in the case of former SolarWinds CISO Tim Brown being sued by the SEC. Clyde warns that such actions have a chilling effect, discouraging internal risk discussions and openness.To counteract that, he emphasizes the need for continuous learning and peer support as a defense, not only against burnout, but also isolation and fear.The Silent Threat of QuantumWhile AI dominated RSAC's headlines, Clyde raises a quieter but equally pressing concern: quantum computing. ISACA chose to focus its latest poll on this topic, revealing a significant gap between awareness and action. Despite widespread recognition that a breakthrough could “break the internet,” only 5% of respondents are taking proactive steps. Clyde sees this as a wake-up call. “The algorithms exist. Q Day is coming. We just don't know when.”From mental health to quantum readiness, this conversation makes it clear: cybersecurity isn't just a technology issue—it's a people issue. Listen to the full episode to hear what else we're missing.Learn more about ISACA: https://itspm.ag/isaca-96808⸻Guest: Rob Clyde, Board Director, Chair, Past Chair of the Board Directors at ISACA | https://www.linkedin.com/in/robclyde/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaStay tuned for an upcoming ITSPmagazine Webinar with ISACA: https://www.itspmagazine.com/webinarsISACA Quantum Pulse Poll 2025 and related resources: https://www.isaca.org/quantum-pulse-pollISACA State of Cybersecurity 2024 survey report: https://www.isaca.org/resources/reports/state-of-cybersecurity-2024Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob clyde, rsac2025, burnout, quantum, cryptography, certification, isaca, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Why Simplicity Might Be the Missing Ingredient in Your Zero Trust Strategy | A Brand Story with Rob Allen from ThreatLocker | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 21, 2025 17:29


At RSAC Conference 2025, the conversation with Rob Allen, Chief Product Officer at ThreatLocker, centered on something deceptively simple: making cybersecurity effective by making it manageable.During this on-location recap episode, Rob shares how ThreatLocker cut through the noise of flashy booths and AI buzzwords by focusing on meaningful, face-to-face conversations with customers and prospects. Their booth was an open, no-frills space—designed for real dialogue, not distractions. What caught people's attention, though, wasn't the booth layout—it was a live demonstration of a PowerShell-based attack using a rubber ducky device. It visually captured how traditional tools often miss malicious scripts and how ThreatLocker's controls shut it down immediately. That kind of simplicity, Rob explains, is the real differentiator.Zero Trust Is a Journey—But It Doesn't Have to Be ComplicatedOne key message Rob emphasizes is that true security doesn't come from piling on more tools. Too many organizations rely on overlapping detection and response solutions, which leads to confusion and technical debt. “If you have five different jackets and they're all winter coats, you're not prepared for summer,” Sean Martin jokes, reinforcing Rob's point that layers should be distinct, not redundant.ThreatLocker's approach simplifies Zero Trust by focusing on proactive control—limiting what can execute or communicate in the first place. Rob also points to the importance of vendor consolidation—not just from a purchasing standpoint but from an operational one. With ThreatLocker, multiple security capabilities are built natively into a single platform with one agent and one portal, avoiding the chaos of disjointed systems.From Technical Wins to Human ConnectionsThe conversation wraps with a reminder that cybersecurity isn't just about tools—it's about the people and community that make the work worthwhile. Rob, Marco Ciappelli, and Sean Martin reflect on their shared experiences around the event and even the lessons learned over a slice of Detroit-style pizza. While the crust may have been debatable, the camaraderie and commitment to doing security better were not.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974⸻Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob allen, cybersecurity, zero trust, threat prevention, powerShell, vendor consolidation, rsac2025, endpoint security, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Why AI Needs Context, Not Just Hype | A Conversation With Steve Schlarman, Senior Director, Product Management at Archer | An RSAC Conference 2025 Post-Event Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 21, 2025 7:31


In this post-RSAC 2025 Brand Story, Marco Ciappelli catches up with Steve Schlarman, Senior Director of Product Management at Archer, to discuss the evolving intersection of GRC, AI, and business value. From regulatory overload to AI-enhanced policy generation, this conversation explores how meaningful innovation—grounded in real customer needs—is shaping the future of risk and compliance.Not All AI Is Created Equal: The Archer ApproachRSAC 2025 was buzzing with innovation, but for Steve Schlarman and the Archer team, it wasn't about showing off shiny new toys—it was about proving that AI, when used with purpose and context, can truly enhance the risk and compliance function.Steve, Senior Director of Product Management at Archer, breaks down how Archer Evolve and the recent integration of Compliance.ai are helping organizations address regulatory change in a more holistic, automated, and scalable way. With silos still slowing down many companies, the need for tools that actually do something is more urgent than ever.From Policy Generation to Risk NarrativesOne of the most practical applications discussed? Using AI not just to detect risk, but to help write better risk statements, control documentation, and even policy language that actually communicates clearly. Steve explains how Archer is focused on closing the loop between data and business impact—translating technical risk outputs into narratives the business can actually act on.AI with a Human TouchAs Marco notes, AI in cybersecurity has moved from hype to hesitation to strategy. Steve is candid: some customers are still on the fence. But when AI is delivered in a contextual way, backed by customer-driven innovation, it becomes a bridge—not a wedge—between people and process. The key is not AI for the sake of AI, but for solving real, grounded problems.What's Next in Risk? Better ConversationsLooking ahead, Schlarman sees a shift from “no, we can't” to “yes, and here's how.” With a better grasp on loss exposure and control costs, the business conversation is changing. AI-powered storytelling and smart interfaces might just help risk teams have their most effective conversations yet.From regulatory change to real-time translation of risk data, this is where tech meets trust.⸻Guest: Steve Schlarman, Senior Director, Product Management, Archert | https://www.linkedin.com/in/steveschlarman/ResourcesLearn more and catch more stories from Archer: https://www.itspmagazine.com/directory/archerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:steve schlarman, marco ciappelli, rsac2025, archer evolve, compliance.ai, regulatory change, grc, risk management, ai storytelling, cybersecurity, compliance, brand story, rsa conference, cybersecurity strategy, risk communication, ai in compliance, automation, contextual ai, integrated risk management, business risk narrative, itspmagazine______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Stacking Your Team: Growing Teams and Team Building for Female Entrepreneurs | Women in Business | Small Business Owners
366: Beyond the Desk, How Workspace Design Attracts A Players: Insights with Jenni Egger & Lindsay Martin

Stacking Your Team: Growing Teams and Team Building for Female Entrepreneurs | Women in Business | Small Business Owners

Play Episode Listen Later May 20, 2025 48:57


Your workplace is so much more than just four walls. It can be a true magnet for top talent.  In this episode, I sit down with JennI Egger, the visionary CEO and founder of JennI Egger Designs, along with her Director of Brand Marketing, Lindsay Martin. Together, we pull back the curtain on their inspiring office space at 23 East in Indianapolis. Their space is not only beautiful and distinctive, but also intentionally designed to fuel creativity, collaboration, and joy. Jenni shares how her unique approach to crafting “not your typical 9-to-5” office vibes has helped her scale the business, attract top-tier talent, and build a culture that everyone wants to be a part of. Your workspace can be an asset for the entire team, not just a background for client meetings. If you've ever wondered if your office could do more for your recruiting, retention, and overall business impact, you won't want to miss this episode.   Connect with Jenni Egger: JED Website LinkedIn Instagram Episode 269: Leading a Premier Design Firm with Jenni Egger Work with Shelli Warren: Book a call with Shelli to talk about how coaching can help you elevate your leadership capability. Apply to join the Leadership Lab. Confidence Starts Here: Get the Ask Shelli scripts to know what to say and how to say it. Free Resources: Click here to get the guide on positioning your role as their next best career move. Click here to get our list of red flags to watch for during interviews. Click here for 12 ways to motivate your team without a pay raise. Click here to access essential coaching questions for impactful 1:1 meetings. Connect with Shelli Warren: Email: leader@stackingyourteam.com Instagram LinkedIn Subscribe to the Stacking Your Team Newsletter

The Powell Movement Action Sports Podcast
TPM Episode 435: Klaus Obermeyer, Skier, inventor, Entrepreneur, Legend, Part 2

The Powell Movement Action Sports Podcast

Play Episode Listen Later May 19, 2025 43:47


Klaus Obermeyer has had a bigger impact on skiing than any man alive, and when he wasn't innovating the sport, he was in Aspen or traveling the world to ski. He was often found surrounded by a harem of beautiful women. In part 2 of his podcast, we talk about inventing sunscreen, mirrored sunglasses, ski brakes, the down jacket, and so much more.  It's crazy the innovations and the fun that Klaus has brought to skiing over his 105 years Klaus Obermeyer Show Notes Part 2: 4:00:  Aspen, 1947 ski school, Freedle Pfieffer, inventing a new ski boot, inventing sun block, raising money, inventing the down jacket,   18:30:  Liquid Force, Feel the Pull and get 15% off your LF Purchase by using the code Powell15 at checkout Stanley:  The brand that invented the category! Only the best for Powell Movement listeners.  Check out Stanley1913.com   Best Day Brewing:  All of the flavor of your favorite IPA or Kolsch, without the alcohol, the calories, or sugar. 22:00:  Inventing the mirrored sunglass, inventing the ski brake, inventing aluminum ski poles, patents, Snowmass, and Spider Sabich   34:00: Elan Skis:  Over 75 years of innovation that makes you better. Outdoor Research:  Click here for 25% off Outdoor Research products (not valid on sale items or pro products) 36:30:  Athletes, snowboarding, working a lot, and life  

Home Designs for Life:  Remodeling ideas to increase safety, function, and accessibility in the home.
Innovating Kitchen Safety and Comfort with Sharp Home Appliances

Home Designs for Life: Remodeling ideas to increase safety, function, and accessibility in the home.

Play Episode Listen Later May 15, 2025 53:43 Transcription Available


Send us a text. We love to hear from our fans.SummaryIn this episode, Janet Engel interviews Peter Weedfald, Senior VP Sales and Brand Marketing and Harry Hessen, Associate VP Product Development and Design from Sharp Home Appliances, discussing their innovative products designed with universal design principles and aging in place in mind. They delve into the history and evolution of the microwave drawer, the introduction of the superheated steam oven, and the features of the radiant cooktop, emphasizing safety, convenience, and ergonomics for all users, especially the elderly.TakeawaysSharp focuses on universal design and aging in place.The microwave drawer was invented by Sharp to enhance kitchen safety.Products are designed to be user-friendly for all ages.Superheated steam cooking preserves nutrients in food.Low physical effort is a key design principle.Sharp has a strong commitment to innovation and quality.The microwave drawer has become a popular kitchen appliance.Ergonomics play a crucial role in product design.Sharp's products are made in Memphis, Tennessee.The company aims to educate consumers and designers about their products.Chapters00:00 Introduction to Sharp Home Appliances02:11 Understanding Universal Design and Aging in Place09:03 The Microwave Drawer: A Game Changer18:39 Innovations in Kitchen Appliances25:32 Market Trends and Consumer Insights31:10 Understanding Sharp's Market Position32:00 The Superheated Steam Oven: A Game Changer38:02 Innovative Cooking Techniques and Health Benefits43:02 Exploring the Radiant Cooktop Technology48:54 Universal Design and Aging in Place SolutionsSharp Appliance Video: https://riverside.fm/shared/exported-clip/d284929400423149e466Support the showwebsite: https://homedesignsforlife.com/Email: homedesignsforlife@gmail.com

The Chase Jarvis LIVE Show
How Taking More Risks Can Unlock the Life You Actually Want

The Chase Jarvis LIVE Show

Play Episode Listen Later May 14, 2025 47:58


In this episode, I share how not playing it safe can be the most powerful decision you make—for your creativity, your career, and your life. I open up about scrapping a nearly finished book to write something bolder and truer, and why embracing discomfort is the path to fulfillment and impact. This is a syndicate episode from the LinkedIn Speaker Series, where I sit down with Ashley Levy, Senior Director of Brand Marketing at LinkedIn, for a deep conversation about my latest book Never Play It Safe. We talk about trusting intuition, the myth of the linear career path, and the hidden cost of living by someone else's script. If you've ever felt stuck in “shoulds” or worried that taking a leap is too risky, this one's for you. Some highlights we explore: The yellow sticky note that sparked the idea behind Never Play It Safe. Why playing it safe is actually the riskiest move you can make. The #1 shared trait of top performers from my 1,000+ podcast interviews. How attention, not time, is your most valuable creative asset. Enjoy!

ITSPmagazine | Technology. Cybersecurity. Society
Fixing the Detection Disconnect and Rethinking Detection: From Static Rules to Living Signals | A Brand Story with Fred Wilmot from Detecteam | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2025 21:33


Fred Wilmot, CEO and co-founder of Detecteam, and Sebastien Tricaud, CTO and co-founder, bring a candid and critical take on cybersecurity's detection and response problem. Drawing on their collective experience—from roles at Splunk, Devo, and time spent in defense and offensive operations—they raise a core question: does any of the content, detections, or tooling security teams deploy actually work?The Detecteam founders challenge the industry's obsession with metrics like mean time to detect or respond, pointing out that these often measure operational efficiency—not true risk readiness. Instead, they propose a shift in thinking: stop optimizing broken processes and start creating better ones.At the heart of their work is a new approach to detection engineering—one that continuously generates and validates detections based on actual behavior, environmental context, and adversary tactics. It's about moving away from one-size-fits-all IOCs toward purpose-built, context-aware detections that evolve as threats do.Sebastien highlights the absurdity of relying on static, signature-based detection in a world of dynamic threats. Adversaries constantly change tactics, yet detection rules often sit unchanged for months. The platform they've built breaks detection down into a testable, iterative process—closing the gap between intel, engineering, and operations. Teams no longer need to rely on hope or external content packs—they can build, test, and validate detections in minutes.Fred explains the benefit in terms any CISO can understand: this isn't just detection—it's readiness. If a team can build a working detection in under 15 minutes, they beat the average breakout time of many attackers. That's a tangible advantage, especially when operating with limited personnel.This conversation isn't about a silver bullet or more noise—it's about clarity. What's working? What's not? And how do you know? For organizations seeking real impact in their security operations—not just activity—this episode explores a path forward that's faster, smarter, and grounded in reality.Learn more about Detecteam: https://itspm.ag/detecteam-21686Note: This story contains promotional content. Learn more.Guests: Fred Wilmot, Co-Founder & CEO, Detecteam | https://www.linkedin.com/in/fredwilmot/Sebastien Tricaud, Co-Founder & CTO, Detecteam | https://www.linkedin.com/in/tricaud/ResourcesLearn more and catch more stories from Detecteam: https://www.itspmagazine.com/directory/detecteamWebinar: Rethink, Don't Just Optimize: A New Philosophy for Intelligent Detection and Response — An ITSPmagazine Webinar with Detecteam | https://www.crowdcast.io/c/rethink-dont-just-optimize-a-new-philosophy-for-intelligent-detection-and-response-an-itspmagazine-webinar-with-detecteam-314ca046e634Learn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, fred wilmot, sebastien tricaud, detecteam, detection, cybersecurity, behavior, automation, red team, blue team, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
From Tools to Trust: Why Integration Beats Innovation Hype in Cybersecurity | A Brand Story with Vivin Sathyan from ManageEngine | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2025 20:05


Organizations are demanding more from their IT management platforms—not just toolsets, but tailored systems that meet specific business and security objectives. Vivin Sathyan, Senior Technology Evangelist at ManageEngine, shares how the company is responding with an integrated approach that connects IT, security, and business outcomes.ManageEngine, a division of Zoho Corporation, now offers a suite of over 60 products that span identity and access management, SIEM, endpoint protection, service management, and analytics. These components don't just coexist—they interact contextually. Vivin outlines a real-world example from the healthcare sector, where a SIM tool detects abnormal login behavior, triggers an identity system to challenge access, and then logs the incident for IT service resolution. This integrated chain reflects a philosophy where response is not just fast, but connected and accountable.At the heart of the platform's effectiveness is contextual intelligence—layered between artificial intelligence and business insights—to power decision-making that aligns with enterprise risk and compliance needs. Whether it's SOC analysts triaging events, CIS admins handling system hygiene, or CISOs aligning actions with corporate goals, the tools are tailored to fit roles, not just generic functions. According to Vivin, this role-based approach is critical to eliminating silos and ensuring teams speak the same operational and risk language.AI continues to play a role in enhancing that coordination, but ManageEngine is cautious not to follow hype for its own sake. The company has invested in its own AI and ML capabilities since 2012, and recently launched an agent studio—but only after evaluating how new models can meaningfully add value. Vivin points out that enterprise use cases often benefit more from small, purpose-built language models than from massive general-purpose ones.Perhaps most compelling is ManageEngine's global-first strategy. With operations in nearly 190 countries and 18+ of its own data centers, the company prioritizes proximity to customers—not just for technical support, but for cultural understanding and local compliance. That closeness informs both product design and customer trust, especially as regulations around data sovereignty intensify.This episode challenges listeners to consider whether their tools are merely present—or actually connected. Are you enabling collaboration through context, or just stitching systems together and calling it a platform?Learn more about ManageEngine: https://itspm.ag/manageen-631623Note: This story contains promotional content. Learn more.Guest: Vivin Sathyan, Senior Technology Evangelist, ManageEngine | https://www.linkedin.com/in/vivin-sathyan/ResourcesLearn more and catch more stories from ManageEngine: https://www.itspmagazine.com/directory/manageengineLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, vivin sathyan, cybersecurity, ai, siem, identity, analytics, integration, platform, risk, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Cybersecurity Operations at Scale: Automation with a Human Touch | A Brand Story with Subo Guha from Stellar Cyber | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 7, 2025 19:38


In this episode, Subo Guha, Vice President of Product Management at Stellar Cyber, shares how the company is reshaping cybersecurity operations for managed service providers (MSPs) and their customers. Stellar Cyber's mission is to simplify security without compromising depth—making advanced cybersecurity capabilities accessible to organizations without enterprise-level resources.Subo walks through the foundations of their open XDR platform, which allows customers to retain the endpoint and network tools they already use—such as CrowdStrike or SentinelOne—without being locked into a single ecosystem. This flexibility proves especially valuable to MSSPs managing dozens or hundreds of customers with diverse toolsets, including those that have grown through acquisitions. The platform's modular sensor technology supports IT, OT, and hybrid environments, offering deep packet inspection, network detection, and even user behavior analytics to flag potential lateral movement or anomalous activity.One of the most compelling updates from the conversation is the introduction of their autonomous SOC capability. Subo emphasizes this is not about replacing humans but amplifying their efforts. The platform groups alerts into actionable cases, reducing noise and allowing analysts to respond faster. Built-in machine learning and threat intelligence feeds enrich data as it enters the system, helping determine if something is benign or a real threat.The episode also highlights new program launches like Infinity, which enhances business development and peer collaboration for MSSP partners, and their Cybersecurity Alliance, which deepens integration across a wide variety of security tools. These efforts reflect Stellar Cyber's strong commitment to ecosystem support and customer-centric growth.Subo closes by reinforcing the importance of scalability and affordability. Stellar Cyber offers a single platform with unified licensing to help MSSPs grow without adding complexity or cost. It's a clear statement: powerful security doesn't need to be out of reach for smaller teams or companies.This episode offers a practical view into what it takes to operationalize cybersecurity across diverse environments—and why automation with human collaboration is the path forward.Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, subo guha, xdr, mssp, cybersecurity, automation, soc, ai, ot, threat detection, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

The Marketing Meetup Podcast
How to measure and track brand marketing - Dan Fleming, Tracksuit

The Marketing Meetup Podcast

Play Episode Listen Later May 7, 2025 58:00


Brand marketing can feel like a leap of faith – especially when your CEO wants numbers, your budget's tight, and you're juggling 15 other things. This session is for every marketer who's ever struggled to prove that brand work is more than just vibes. Tracksuit's country lead Dan Fleming will help you with:- Practical KPIs for brand – What to measure (beyond just reach and impressions) when you're short on time and budget.- Making brand measurable – Simple frameworks for linking brand activity to business impact, even if attribution is messy.- Tracking depending on spend – Low-cost to premium ways to track your brand over time and show progress to stakeholders.00:00 – Intro: Why brand tracking matters01:44 – Dan's story: From VC to brand believer04:11 – What we'll cover in this session05:00 – What is brand marketing today?10:05 – What metrics actually matter?12:57 – TikTok study: Impressions ≠ awareness16:25 – Brand vs performance: Why it's not either/or20:00 – The phone test: Future vs current demand22:00 – Making the case to your CFO27:30 – What to do when budgets are cut30:55 – Brand as delayed-response marketing33:20 – Tools for tracking brand at different stages40:10 – RealReal case study: Brand = $15m uplift43:00 – Founders and brand trust47:20 – How to build brand with a small team

ITSPmagazine | Technology. Cybersecurity. Society
From Term Sheets to Trust: What Mergers & Acquisitions Trends Reveal About Cybersecurity's Future | An On Location RSAC Conference 2025 Conversation with Yair Geva

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2025 20:18


In this on-location conversation recorded during RSAC 2025, attorney, investor, and strategic advisor Yair Geva shares a global perspective shaped by years of legal counsel, venture investing, and deal-making across Israel, Europe, and the U.S. Geva offers unique insight into how cybersecurity, AI, and M&A are not only intersecting—but actively reshaping—the tech ecosystem.More than just a legal expert, Geva advises early-stage founders and institutional investors across markets, helping them navigate cultural, legal, and strategic gaps. With over 50 personal investments and a strong focus on cybersecurity in recent institutional activity, his perspective reflects where real momentum is building—and how smart capital is being deployed.AI Acceleration and M&A HesitationAccording to Geva, the accelerating capabilities of AI have created a strange paradox: in some sectors, VCs are hesitant to invest because the pace of change undermines long-term confidence. Yet in cybersecurity, AI is acting as a catalyst, not a caution. Cyber-AI combinations are among the few domains where deals are still moving quickly. He points to recent acquisitions—such as Palo Alto Networks' move on Protect AI—as a sign that strategic consolidation is alive and well, even if overall deal volume remains lighter than expected.Cyber Due Diligence Is Now Table StakesAcross all industries, cybersecurity evaluations have become a non-negotiable part of M&A. Whether acquiring a fashion brand or a software firm, buyers now expect a clear security posture, detailed risk management plans, and full disclosure of any prior breaches. Geva notes that incident response experience, when managed professionally, can actually serve as a confidence builder in the eyes of strategic buyers.From Global Hubs to Human ConnectionsWhile San Francisco remains a major force, Geva sees increasing momentum in New York, London, and Tel Aviv. Yet across all markets, he emphasizes that human relationships—trust, cultural understanding, and cross-border collaboration—ultimately drive deal success more than any legal document or term sheet.With a front-row seat to innovation and a hand in building the bridges that power global tech growth, Yair Geva is helping define the next chapter of cybersecurity, AI, and strategic investment.Listen to the full conversation to hear what's shaping the deals behind tomorrow's cybersecurity innovations.Note: This story contains promotional content. Learn more.Guest: Yair Geva, Attorney and Investor | https://www.linkedin.com/in/yairgeva/ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, yair geva, cybersecurity, investment, ai, m&a, venture, resilience, innovation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
This is what Happens When Security Stops Chasing Threats and Starts Managing Risk | A Brand Story with Rich Seiersen from Qualys | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2025 24:58


In this episode, Sean Martin speaks with Richard Seiersen, Chief Risk Technology Officer at Qualys, about a new way to think about cybersecurity—one that puts value and business resilience at the center, not just threats.Richard shares the thinking behind Qualys' Risk Operations Center, a new approach that responds directly to a common pain point: organizations struggling to manage vast amounts of telemetry from dozens of security tools without clear direction on how to act. Instead of forcing companies to build and maintain massive internal platforms just to piece together asset, vulnerability, and threat data, Qualys is creating a system to operationalize risk as a real-time, measurable business function.With a background that includes serving as Chief Risk Officer at a cyber insurance firm and co-authoring foundational books like How to Measure Anything in Cybersecurity Risk and The Metrics Manifesto, Richard frames the conversation in practical business terms. He emphasizes that success is not just about detecting threats, but about understanding where value exists in the business, and how to protect it efficiently.From Security Operations to Risk OperationsWhile a traditional SOC focuses on attack surface and compromise detection, the Risk Operations Center is designed to understand, prioritize, and mitigate value at risk. Richard describes how this involves normalizing data across environments, connecting asset identities—including ephemeral and composite digital assets—and aligning technical activity to business impact.The Risk Operations Center enables teams to think in terms of risk surface, not just threat surface, by giving security leaders visibility into what matters most—and the tools to act accordingly. And importantly, it does so without increasing headcount.A CISO's Role in the Business of RiskRichard challenges security leaders to break away from purely tactical work and lean into business alignment. He argues that boards want CISOs who think strategically—who can talk about capital reserves, residual risk, and how mitigation and transfer can be measured against business outcomes. In his words, “A successful business is in the business of exposing more value to more people… security must understand and support that mission.”This episode is packed with ideas worth listening to and sharing. What would your version of a Risk Operations Center look like?Learn more about Qualys: https://itspm.ag/qualys-908446Note: This story contains promotional content. Learn more.Guest: Rich Seiersen, Chief Risk Technology Officer, Qualys | https://www.linkedin.com/in/richardseiersen/ResourcesLearn more and catch more stories from Qualys: https://www.itspmagazine.com/directory/qualysLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, richard seiersen, risk, cybersecurity, data, resilience, telemetry, automation, ciso, soc, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Not So Contained: When Container Isolation Is Just an Illusion | A Brand Story with Emily Long from Edera | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2025 29:52


Kubernetes revolutionized the way software is built, deployed, and managed, offering engineers unprecedented agility and portability. But as Edera co-founder and CEO Emily Long shares, the speed and flexibility of containerization came with overlooked tradeoffs—especially in security. What started as a developer-driven movement to accelerate software delivery has now left security and infrastructure teams scrambling to contain risks that were never part of Kubernetes' original design.Emily outlines a critical flaw: Kubernetes wasn't built for multi-tenancy. As a result, shared kernels across workloads—whether across customers or internal environments—introduce lateral movement risks. In her words, “A container isn't real—it's just a set of processes.” And when containers share a kernel, a single exploit can become a system-wide threat.Edera addresses this gap by rethinking how containers are run—not rebuilt. Drawing from hypervisor tech like Xen and modernizing it with memory-safe Rust, Edera creates isolated “zones” for containers that enforce true separation without the overhead and complexity of traditional virtual machines. This isolation doesn't disrupt developer workflows, integrates easily at the infrastructure layer, and doesn't require retraining or restructuring CI/CD pipelines. It's secure by design, without compromising performance or portability.The impact is significant. Infrastructure teams gain the ability to enforce security policies without sacrificing cost efficiency. Developers keep their flow. And security professionals get something rare in today's ecosystem: true prevention. Instead of chasing billions of alerts and layering multiple observability tools in hopes of finding the needle in the haystack, teams using Edera can reduce the noise and gain context that actually matters.Emily also touches on the future—including the role of AI and “vibe coding,” and why true infrastructure-level security is essential as code generation becomes more automated and complex. With GPU security on their radar and a hardware-agnostic architecture, Edera is preparing not just for today's container sprawl, but tomorrow's AI-powered compute environments.This is more than a product pitch—it's a reframing of how we define and implement security at the container level. The full conversation reveals what's possible when performance, portability, and protection are no longer at odds.Learn more about Edera: https://itspm.ag/edera-434868Note: This story contains promotional content. Learn more.Guest: Emily Long, Founder and CEO, Edera | https://www.linkedin.com/in/emily-long-7a194b4/ResourcesLearn more and catch more stories from Edera: https://www.itspmagazine.com/directory/ederaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, emily long, containers, kubernetes, hypervisor, multi-tenancy, devsecops, infrastructure, virtualization, cybersecurity, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
From Red Teams to Real Impact: Bringing Artistry and Precision to Cybersecurity Programs | A Brand Story with Charles Henderson from Coalfire | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 6, 2025 28:21


Charles Henderson, who leads the cybersecurity services division at Coalfire, shares how the company is reimagining offensive and defensive operations through a programmatic lens that prioritizes outcomes over checkboxes. His team, made up of practitioners with deep experience and creative drive, brings offensive testing and exposure management together with defensive services and managed offerings to address full-spectrum cybersecurity needs. The focus isn't on commoditized services—it's on what actually makes a difference.At the heart of the conversation is the idea that cybersecurity is a team sport. Henderson draws parallels between the improvisation of music and the tactics of both attackers and defenders. Both require rhythm, creativity, and cohesion. The myth of the lone hero doesn't hold up anymore—effective cybersecurity programs are driven by collaboration across specialties and by combining services in ways that amplify their value.Coalfire's evolution reflects this shift. It's not just about running a penetration test or red team operation in isolation. It's about integrating those efforts into a broader mission-focused program, tailored to real threats and measured against what matters most. Henderson emphasizes that CISOs are no longer content with piecemeal assessments; they're seeking simplified, strategic programs with measurable outcomes.The conversation also touches on the importance of storytelling in cybersecurity reporting. Henderson underscores the need for findings to be communicated in ways that resonate with technical teams, security leaders, and the board. It's about enabling CISOs to own the narrative, armed with context, clarity, and confidence.Henderson's reflections on the early days of hacker culture—when gatherings like HoCon and early Def Cons were more about curiosity and camaraderie than business—bring a human dimension to the discussion. That same passion still fuels many practitioners today, and Coalfire is committed to nurturing it through talent development and internships, helping the next generation find their voice, their challenge, and yes, even their hacker handle.This episode offers a look at how to build programs, teams, and mindsets that are ready to lead—not follow—on the cybersecurity front.Learn more about Coalfire: https://itspm.ag/coalfire-yj4wNote: This story contains promotional content. Learn more.Guest: Charles Henderson, Executive Vice President of Cyber Security Services, Coalfire | https://www.linkedin.com/in/angustx/ResourcesLearn more and catch more stories from Coalfire: https://www.itspmagazine.com/directory/coalfireLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:charles henderson, sean martin, coalfire, red teaming, penetration testing, cybersecurity services, exposure management, ciso, threat intelligence, hacker culture, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Growth Talks
Our Favorite Growth Non Hacks 2025 | Insights from Top Marketing Leaders

Growth Talks

Play Episode Listen Later May 6, 2025 9:03


"It's not just about selling a product. It's about creating a feeling people remember—and humor makes it unforgettable.” In this special episode of Growth Talks with Krystina Rubino, we highlight our favorite growth non-hacks: the timeless strategies that drive real results, not just quick wins. It's packed with smart insights, fresh perspectives, and valuable lessons for building lasting success. Hear from marketing leaders like Chiyong Jones (VP of Brand Marketing, Kajabi), Deanna Dong (Former Head of Product Marketing, Writer AI), Ian Yung (Former SVP of Revenue, Tonal), Laura Brooks (Co-founder, Foundation Collective), and Shane Pittson (Co-founder, So-and-So Venture Studio) as they break down what it takes to drive real growth in today's environment.

ITSPmagazine | Technology. Cybersecurity. Society
From Reactive to Proactive: Building Guardrails That Actually Protect | A Brand Story with Rob Allen from ThreatLocker | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 21:05


In this on-location episode recorded at the RSAC Conference, Sean Martin and Marco Ciappelli sit down once again with Rob Allen, Chief Product Officer at ThreatLocker, to unpack what Zero Trust really looks like in practice—and how organizations can actually get started without feeling buried by complexity.Rather than focusing on theory or buzzwords, Rob lays out a clear path that begins with visibility. “You can't control what you can't see,” he explains. The first step toward Zero Trust is deploying lightweight agents that automatically build a view of the software running across your environment. From there, policies can be crafted to default-deny unknown applications, while still enabling legitimate business needs through controlled exceptions.The Zero Trust Mindset: Assume Breach, Limit AccessRob echoes the federal mandate definition of Zero Trust: assume a breach has already occurred and limit access to only what is needed. This assumption flips the defensive posture from reactive to proactive. It's not about waiting to detect bad behavior—it's about blocking the behavior before it starts.The ThreatLocker approach stands out because it focuses on removing the traditional “heavy lift” often associated with Zero Trust implementations. Rob highlights how some organizations have spent years trying (and failing) to activate overly complex systems, only to end up stuck with unused tools and endless false positives. ThreatLocker's automation is designed to lower that barrier and get organizations to meaningful control faster.Modern Threats, Simplified DefensesAs AI accelerates the creation of polymorphic malware and low-code attack scripts, Zero Trust offers a counterweight. Deny-by-default policies don't require knowing every new threat—just clear guardrails that prevent unauthorized activity, no matter how it's created. Whether it's PowerShell scripts exfiltrating data or AI-generated exploits, proactive controls make it harder for attackers to operate undetected.This episode reframes Zero Trust from an overwhelming project into a series of achievable, common-sense steps. If you're ready to hear what it takes to stop chasing false positives and start building a safer, more controlled environment, this conversation is for you.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, rob allen, zero trust, cybersecurity, visibility, access control, proactive defense, ai threats, policy automation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
Security at the Edge of Change: Preparing for the Cryptographic and AI Tipping Point | A Brand Story with Marc Manzano from SandboxAQ | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 20:11


Quantum computing and AI are no longer theoretical concepts for tomorrow—they're shaping how organizations must secure their infrastructure today. In this episode of the podcast, Marc Manzano, General Manager of Cybersecurity at SandboxAQ, joins the conversation to share how his team is helping organizations confront some of the most urgent and complex cybersecurity shifts of our time.SandboxAQ, a company spun out of Alphabet, operates at the intersection of quantum technology and artificial intelligence. Manzano highlights two immediate challenges that demand new approaches: the looming need for quantum-resistant cryptography and the unchecked proliferation of AI agents across enterprise systems.Post-Quantum Migration and Cryptographic AgilityManzano describes an industry-wide need for massive cryptographic migration in response to the quantum threat. But rather than treating it as a one-time fix, SandboxAQ promotes cryptographic agility—a framework that enables organizations to dynamically and automatically rotate credentials, replace algorithms, and manage certificates in real-time. Their approach replaces decades of static key management practices with a modern, policy-driven control plane. It's not just about surviving the post-quantum era—it's about staying ready for whatever comes next.Taming the Complexity of AI Agents and Non-Human IdentitiesThe second challenge is the surge of non-human identities—AI agents, machine workloads, and ephemeral cloud infrastructure. SandboxAQ's platform provides continuous visibility and control over what software is running, who or what it communicates with, and whether it adheres to security policies. This approach helps teams move beyond manual, one-off audits to real-time monitoring, dramatically improving how organizations manage software supply chain risks.Real Use Cases with Measurable ImpactManzano shares practical examples of how SandboxAQ's technology is being used in complex environments like large banks—where decades of M&A activity have created fragmented infrastructure. Their platform unifies cryptographic and identity management through a single pane of glass, helping security teams act faster with less friction. Another use case? Reducing vendor risk assessment from months to minutes, allowing security teams to assess software posture quickly and continuously.Whether it's quantum cryptography, AI risk, or identity control—this isn't a vision for 2030. It's a call to action for today.Learn more about SandboxAQ: https://itspm.ag/sandboxaq-j2enNote: This story contains promotional content. Learn more.Guest: Marc Manzano, General Manager of Cybersecurity at SandboxAQ | https://www.linkedin.com/in/marcmanzano/ResourcesLearn more and catch more stories from SandboxAQ: https://www.itspmagazine.com/directory/sandboxaqLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:marc manzano, marco ciappelli, sean martin, cryptography, quantum, ai, cybersecurity, nonhuman, keymanagement, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
When Ransomware Strikes, Will Your Backups Hold the Line? | A Brand Story with Sterling Wilson from Object First | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 17:57


In today's threat environment, it's not enough to back up your data—you have to be able to trust that those backups will be there when you need them. That's the message from Sterling Wilson, Field CTO at Object First, during his conversation at RSAC Conference 2025.Object First is purpose-built for Veeam environments, offering out-of-the-box immutability (OOTBI) with a hardened, on-premises appliance. The goal is simple but critical: make backup security both powerful and practical. With backup credentials often doubling as access credentials for storage infrastructure, organizations expose themselves to unnecessary risk. Object First separates those duties by design, reducing the attack surface and protecting data even when attackers have admin credentials in hand.Immutability as a Foundation—Not a FeatureThe conversation highlights data from a recent ESG study showing that 81% of respondents recognize immutable object storage as the most secure way to protect backup data. True immutability means data cannot be modified or deleted until a set retention period expires—an essential safeguard when facing ransomware or insider threats. But Sterling emphasizes that immutability alone isn't enough. Backup policies, storage access, and data workflows must be segmented and secured.Zero Trust for Backup InfrastructureZero trust principles—verify explicitly, assume breach, enforce least privilege—have gained ground across networks and applications. But few organizations extend those principles into the backup layer. Object First applies zero trust directly to backup infrastructure through what they call zero trust data resilience. That includes verifying credentials at every step and ensuring backup jobs can't alter storage configurations.A Real-World Test: Marysville School DistrictWhen Marysville School District suffered a ransomware attack, nearly every system was compromised—except the Object First appliance. The attacker had administrative credentials, but couldn't access or encrypt the immutable backups. Thanks to the secure design and separation of permissions, recovery was possible—demonstrating that trust in your backups can't be assumed; it must be enforced by design.Meeting Customers Where They AreTo support both partners and end customers, Object First now offers OOTBI through a consumption-based model. Whether organizations are managing remote offices or scaling their environments quickly, the new model provides flexibility without compromising security or simplicity.Learn more about Object First: https://itspm.ag/object-first-2gjlNote: This story contains promotional content. Learn more.Guest: Sterling Wilson, Field CTO, Object First | https://www.linkedin.com/in/sterling-wilson/ResourcesLearn more and catch more stories from Object First: https://www.itspmagazine.com/directory/object-firstLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, sterling wilson, ransomware, immutability, backups, cybersecurity, zero trust, data protection, veeam, recovery, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
From Overhead to Advantage: Turning Compliance into a Strategic Asset | A Brand Story with Steve Schlarman from Archer | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 15:33


In this RSAC 2025 episode, Sean Martin sits down with Steve Schlarman, Senior Director of Product Management at Archer Integrated Risk Management, to explore how organizations are rethinking compliance and risk—not just as a box to check, but as a business enabler.At the center of the conversation is Archer Evolve, a new platform intentionally designed to move beyond legacy GRC workflows. Built on years of insight from customers and aligned with the company's post-RSA independence, Evolve aims to modernize how compliance and risk teams operate. That includes automating burdensome regulatory processes, surfacing business-relevant risk insights, and supporting more strategic decision-making.One standout capability comes from Archer's integration of Compliance.ai, a regulatory tech firm the company acquired to accelerate its transformation. By applying AI tuned specifically for the language of compliance, Archer can now help customers reduce review time per regulatory obligation from 100 hours to just a few. That's more than a productivity gain—it's a structural shift in how companies adapt to nonstop regulatory change.Another critical area is quantifying risk. Rather than relying on subjective heat maps, Archer enables organizations to calculate loss exposure in real terms. This creates a foundation for executive conversations rooted in financial and operational impact, not just abstract threat levels. That same quantitative view can be applied to understanding the cost of controls—ensuring that investments align with real business risk, rather than piling on complexity for the sake of coverage.The conversation closes on a powerful shift: risk and compliance teams freeing up time and brainpower to collaborate directly with the business. With the manual grunt work automated and controls mapped more intelligently, these teams can help shape new services and strategic initiatives—safely and confidently.This episode isn't just about software or frameworks. It's about what happens when governance becomes a driver of value, not just a reaction to fear.Listen in to hear how Archer is helping turn risk and compliance from operational drag into business advantage.Learn more about Archer Integrated Risk Management: https://itspm.ag/rsaarchwebNote: This story contains promotional content. Learn more.Guest: Steve Schlarman, Senior Director, Product Management, Archer Integrated Risk Management | https://www.linkedin.com/in/steveschlarman/ResourcesLearn more and catch more stories from Archer Integrated Risk Management: https://www.itspmagazine.com/directory/archerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, steve schlarman, risk, compliance, ai, governance, grc, quantification, controls, automation, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
The New Front Line: Runtime Protection for AI and API-Driven Attacks | A Brand Story with Rupesh Chokshi from Akamai | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 5, 2025 17:29


At RSAC Conference 2025, Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, joined ITSPmagazine to share critical insights into the dual role AI is playing in cybersecurity today—and what Akamai is doing about it.Chokshi lays out the landscape with clarity: while AI is unlocking powerful new capabilities for defenders, it's also accelerating innovation for attackers. From bot mitigation and behavioral DDoS to adaptive security engines, Akamai has used machine learning for over a decade to enhance protection, but the scale and complexity of threats have entered a new era.The API and Web Application Threat SurgeReferencing Akamai's latest State of the Internet report, Chokshi cites a 33% year-over-year rise in web application and API attacks—topping 311 billion threats. More than 150 billion of these were API-related. The reason is simple: APIs are the backbone of modern applications, yet many organizations lack visibility into how many they have or where they're exposed. Shadow and zombie APIs are quietly expanding attack surfaces without sufficient monitoring or defense.Chokshi shares that in early customer discovery sessions, organizations often uncover tens of thousands of APIs they weren't actively tracking—making them easy targets for business logic abuse, credential theft, and data exfiltration.Introducing Akamai's Firewall for AIAkamai is addressing another critical gap with the launch of its new Firewall for AI. Designed for both internal and customer-facing generative AI applications, this solution focuses on securing runtime environments. It detects and blocks issues like prompt injection, PII leakage, and toxic language using scalable, automated analysis at the edge—reducing friction for deployment while enhancing visibility and governance.In early testing, Akamai found that 6% of traffic to a single LLM-based customer chatbot involved suspicious activity. That volume—within just 100,000 requests—highlights the urgency of runtime protections for AI workloads.Enabling Security LeadershipChokshi emphasizes that modern security teams must engage collaboratively with business and data teams. As AI adoption outpaces security budgets, CISOs are looking for trusted, easy-to-deploy solutions that enable—not hinder—innovation. Akamai's goal: deliver scalable protections with minimal disruption, while helping security leaders shoulder the growing burden of AI risk.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guest: Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, rupesh chokshi, akamai, rsac, ai, security, cisos, api, firewall, llm, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Marketing Espresso
Why brand marketing matters with Stephanie Brown

Marketing Espresso

Play Episode Listen Later May 5, 2025 21:34


Send us a textWhy Brand Marketing Isn't Dead (And Might Just Be Making a Comeback)You know that feeling when you know you're onto something, but the whole industry seems to be sprinting in the opposite direction? That's been me with brand marketing lately. I've been shouting into the LinkedIn void about how we've lost touch with the art (and power) of building a brand.So I called in back-up - Stephanie Brown. She's a career coach for marketers and creatives, ex-Nike and Apple, and she knows the ins and outs of what's actually going on inside marketing teams right now. Spoiler: if you're feeling disillusioned by the performance-first, always-track-everything world of modern marketing... you're not alone.In this episode, we dive deep into where brand marketing went, why performance took over, and why the pendulum is finally swinging back.Here's what we covered:The rise (and fall?) of performance marketing: Why marketing became all about numbers—and the downside of only chasing short-term ROI.Brand roles are disappearing—and that's a problem: Steph shares insights from inside the industry about how many traditional marketing roles have vanished... and what that means for the next generation of marketers.Why great brand marketers are more needed (and rare) than ever: If you've been trained in brand strategy, storytelling, and human connection—you might just be in high demand again.“Brand marketing is an art form—and the world's just starting to remember that.”Let's keep the convo goingIf you loved this episode, I'd really appreciate a rating or review. It helps me know what's landing and keeps the good stuff coming your way.Steph helps ambitious Marketers and Creatives identify their career purpose and land their next perfect role faster.Connect with Stephanie:LinkedInWebsiteDOWNLOAD MY CONTENT PLANNER - https://becchappell.com.au/content-planner/Instagram @bec_chappellLinkedIn – Bec Chappell If you're ready to work together, I'm ready to work with you and your team.How to work with me:1. Marketing foundations and strategy consultation 2. Marketing Coaching/ Whispering for you a marketing leader or your team who you want to develop into marketing leaders3. Book me as a speaker or advisor for your organisation4. Get me on your podcastThis podcast has been produced and edited by Snappystreet Creative

ITSPmagazine | Technology. Cybersecurity. Society
Home Is Where the Threat Is: Protecting Executives in Their Personal Lives | A Brand Story with Chris Pierson from BlackCloak | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 1, 2025 24:14


When it comes to cybersecurity, corporate executives are often the most targeted individuals—but their greatest vulnerabilities may lie beyond the office walls. In this episode recorded live at RSAC Conference 2025, Dr. Chris Pierson, Founder and CEO of BlackCloak, joins hosts Sean Martin and Marco Ciappelli to unpack why digital executive protection is now a business necessity, not a luxury.Dr. Pierson—a former two-time CISO, DHS cybersecurity advisor, and chief privacy officer—explains how BlackCloak addresses a long-ignored problem: the personal digital exposure of high-profile individuals and their families. From compromised home networks and identity theft to impersonation scams powered by deepfake technology, today's cyber threats easily bypass corporate defenses by exploiting softer targets at home.Digital Protection That Mirrors Physical SecurityJust as companies rely on third-party providers for health insurance or physical executive protection, Dr. Pierson advocates for a dedicated, privacy-conscious solution for securing personal digital lives. BlackCloak functions as a concierge-style service, guiding individuals through essential steps like securing high-risk accounts, managing privacy settings, shrinking their attack surface, and implementing a modern, multifactor verification system to prevent impersonation attacks.A Framework for ActionAt RSAC, Dr. Pierson unveiled BlackCloak's Digital Executive Protection Framework—a practical tool that includes 14 tenets and over 100 specific actions to assess and improve personal digital security maturity. The goal: help organizations prioritize what matters most. Instead of trying to secure every account or device equally, the framework focuses attention on high-value targets like banking credentials, communication platforms, and personal data exposed via data brokers.From Deepfakes to Real-World ConsequencesPierson also highlights the alarming growth of AI-powered impersonation attacks. With 42% of surveyed CISOs reporting executive-targeted deepfake incidents, and financial losses climbing, companies must think differently. It's not just about technology—it's about trust, relationships, and verification at every level of communication.This episode sheds light on how executive protection is evolving—and why your organization should consider extending its security strategy beyond the boardroom. To see how BlackCloak is redefining protection for the C-suite and their families, listen to the full episode.Learn more about BlackCloak: https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more.Guest: Chris Pierson, Founder & CEO, BlackCloak | https://www.linkedin.com/in/drchristopherpierson/ ResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, marco ciappelli, chris pierson, cybersecurity, privacy, deepfakes, identity, executives, framework, protection, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
From Certification to Confidence: The Future of Cybersecurity Starts with the First Job | A Brand Story with Jamie Norton from ISACA | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later May 1, 2025 21:22


The cybersecurity workforce shortage isn't a new problem—but according to Jamie Norton, Board Director at ISACA, it's one that's getting worse. In this on-location conversation during RSAC Conference 2025, Norton shares how ISACA is not only acknowledging this persistent gap but actively building pathways to close it, especially for early-career professionals.While many know ISACA for its certifications and events, Norton emphasizes that the organization's mission goes much deeper—supporting digital trust through education, community, and career development. One key area of focus: helping individuals navigate every phase of their professional journey, from new graduates to seasoned leaders. That includes new offerings like the Certified Cyber Operations Analyst (CCOA) credential, designed specifically to meet the growing demand for technical, hands-on skills in security operations roles.What's driving this shift? Norton points to employer demand for candidates who can walk into SOC and technical analyst roles with practical experience. The CCOA was created based on feedback from ISACA's 185,000+ global members and a wide network of hiring organizations, all highlighting the same pain point: early-stage roles are difficult to fill, not because people aren't interested, but because too many can't prove their skills in ways hiring managers understand.ISACA's response is both strategic and community-driven. Certification development is rooted in large-scale data analysis and enhanced by input from members around the world, ensuring each program reflects real-world needs. At the same time, ISACA recognizes that certifications alone don't create confidence. Community and mentorship matter—especially for those struggling with imposter syndrome or breaking into the field from non-traditional backgrounds.Looking ahead, ISACA is investing in career journey tools, AI-focused certifications, and guidance for post-quantum readiness—all while continuing to support members through local chapters and global programs.For those hiring, job-seeking, or guiding others into the field, this episode offers a grounded, forward-looking view into how one organization is equipping the cybersecurity workforce for the work that matters now—and what's coming next.Learn more about ISACA: https://itspm.ag/isaca-96808Note: This story contains promotional content. Learn more.Guest: Jamie Norton, Director Board of Directors, ISACA | https://www.linkedin.com/in/jamienorton/ResourcesLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:jamie norton, sean martin, marco ciappelli, cybersecurity, certifications, workforce, skills, governance, community, careers, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
When Every Second Counts: Building Cyber Resilience Through A Smarter Approach to Data Protection | A Brand Story with Eric Herzog from Infinidat | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 30, 2025 19:05


Storage often sits in the background of cybersecurity conversations—but not at Infinidat. In this episode, Eric Herzog, Chief Marketing Officer of Infinidat, joins Sean Martin to challenge the notion that storage is simply infrastructure. With decades of experience at IBM and EMC before joining Infinidat, Herzog explains why storage needs to be both operationally efficient and cyber-aware.Cyber Resilience, Not Just StorageAccording to Herzog, today's enterprise buyers—especially those in the Global Fortune 2000—aren't just asking how to store data. They're asking how to protect it when things go wrong. That's why Infinidat integrates automated cyber protection directly into its storage platforms, working with tools like Splunk, Microsoft Sentinel, and IBM QRadar. The goal: remove the silos between infrastructure and cybersecurity teams and eliminate the need for manual intervention during an attack or compromise.Built-In Defense and Blazing-Fast RecoveryThe integration isn't cosmetic. Infinidat offers immutable snapshots, forensic environments, and logical air gaps as part of its storage operating system—no additional hardware or third-party tools required. When a threat is detected, the system can automatically trigger actions and even guarantee data recovery in under one minute for primary storage and under 20 minutes for backups—regardless of the dataset size. And yes, those guarantees are provided in writing.Real-World Scenarios, Real Business OutcomesHerzog shares examples from finance, healthcare, and manufacturing customers—one of which performs immutable snapshots every 15 minutes and scans data twice a week to proactively detect threats. Another customer reduced from 288 all-flash storage floor tiles to just 61 with Infinidat, freeing up 11 storage admins to address other business needs—not to cut staff, but to solve the IT skills shortage in more strategic ways.Simplified Operations, Smarter SecurityThe message is clear: storage can't be an afterthought in enterprise cybersecurity strategies. Infinidat is proving that security features need to be embedded, not bolted on—and that automation, integration, and performance can all coexist. For organizations juggling compliance requirements, sprawling infrastructure, and lean security teams, this approach delivers both peace of mind and measurable business value.Learn more about Infinidat: https://itspm.ag/infini3o5dNote: This story contains promotional content. Learn more.Guest: Eric Herzog, Chief Marketing Officer, Infinidat | https://www.linkedin.com/in/erherzog/ResourcesLearn more and catch more stories from Infinidat: https://www.itspmagazine.com/directory/infinidatLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, eric herzog, storage, cybersecurity, automation, resilience, ransomware, recovery, enterprise, soc, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
From Overwhelmed to Informed: The Future of Threat Detection Isn't Just Faster—It's Strategic | A Brand Story with Hugh Njemanze from Anomali | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 30, 2025 21:09


In this On Location Brand Story episode, Sean Martin speaks with Hugh Njemanze, Founder and CEO of Anomali, who has been at the center of cybersecurity operations since the early days of SIEM. Known for his prior work at ArcSight and now leading Anomali, Hugh shares what's driving a dramatic shift in how security teams access, analyze, and act on data.Anomali's latest offering—a native cloud-based next-generation SIEM—goes beyond traditional detection. It combines high-performance threat intelligence with agentic AI to deliver answers and take action in ways that legacy platforms simply cannot. Rather than querying data manually or relying on slow pipelines, the system dynamically spins up thousands of cloud resources to answer complex security questions in seconds.Agentic AI Meets Threat IntelligenceHugh walks through how agentic AI, purpose-built for security, breaks new ground. Unlike general-purpose models, Anomali's AI operates within a secure, bounded dataset tailored to the customer's environment. It can ingest a hundred-page threat briefing, extract references to actors and tactics, map those to the MITRE ATT&CK framework, and assess the organization's specific exposure—all in moments. Then it goes a step further: evaluating past events, checking defenses, and recommending mitigations. This isn't just contextual awareness—it's operational intelligence at speed and scale.Making Security More Human-CentricOne clear theme emerges: the democratization of security tools. With Anomali's design, teams no longer need to rely on a few highly trained specialists. Broader teams can engage directly with the platform, reducing burnout and turnover, and increasing organizational resilience. Managers and security leaders now shift focus to prioritization, strategic decision-making, and meaningful business conversations—like aligning defenses to M&A activity or reporting to the board with clarity on risk.Real-World Results and Risk InsightsCustomers are already seeing measurable benefits: an 88% reduction in incidents and an increase in team-wide tool adoption. Anomali's system doesn't just detect—it correlates attack surface data with threat activity to highlight what's both vulnerable and actively targeted. This enables targeted response, cost-effective scaling, and better use of resources.Learn more about Anomali: https://itspm.ag/anomali-bdz393Note: This story contains promotional content. Learn more.Guest: Hugh Njemanze, Founder and President at Anomali | https://www.linkedin.com/in/hugh-njemanze-603721/ResourcesLearn more and catch more stories from Anomali: https://www.itspmagazine.com/directory/anomaliLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, hugh njemanze, siem, cybersecurity, ai, threat intelligence, agentic ai, risk management, soc, cloud security, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

ITSPmagazine | Technology. Cybersecurity. Society
What Endpoint Security Isn't Catching: Why Network Visibility Still Matters | A Brand Story with Brian Dye from Corelight | An On Location RSAC Conference 2025 Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 30, 2025 18:49


At RSAC Conference 2025, Sean Martin catches up with Brian Dye, CEO of Corelight, to explore a recurring truth in cybersecurity: attackers adapt, and defenders must follow suit. In this episode, Dye lays out why traditional perimeter defenses and endpoint controls alone are no longer sufficient—and why it's time for security teams to look back toward the network for answers.Beyond the Perimeter: Visibility as a Force MultiplierAccording to Dye, many organizations are still relying on security architectures that were top-of-the-line a decade ago. But attackers have already moved on. They're bypassing endpoint detection and response (EDR) tools, exploiting unmanaged devices, IoT, and edge vulnerabilities. What's left exposed is the network itself—and that's where Corelight positions itself: providing what Dye calls “ground truth” through network-based visibility.Rather than rearchitecting environments or pushing intrusive solutions, Corelight integrates passively through out-of-line methods like packet brokers or traffic mirroring. The goal? Rich, contextual, retrospective visibility—without disrupting the network. This capability has proven essential for responding to advanced threats, including lateral movement and ransomware campaigns where knowing exactly what happened and when can mean the difference between paying a ransom or proving there's no real damage.Three Layers of Network InsightDye outlines a layered approach to detection:1. Baseline Network Activity – High-fidelity summaries of what's happening.2. Raw Detections – Behavioral rules, signatures, and machine learning.3. Anomaly Detection – Identifying “new and unusual” activity with clustering math that filters out noise and highlights what truly matters.This model supports teams who need to correlate signals across endpoints, identities, and cloud environments—especially as AI-driven operations expand the attack surface with non-human behavior patterns.The Metrics That MatterDye points to three critical success metrics for teams:• Visibility coverage over time.• MITRE ATT&CK coverage, especially around lateral movement.• The percentage of unresolved cases—those embarrassing unknowns that drain time and confidence.As Dye shares, organizations that prioritize network-level visibility not only reduce uncertainty, but also strengthen every other layer of their detection and response strategy.Learn more about Corelight: https://itspm.ag/coreligh-954270Note: This story contains promotional content. Learn more.Guest: Brian Dye, Chief Executive Officer, Corelight | https://www.linkedin.com/in/brdye/ResourcesLearn more and catch more stories from Corelight: https://www.itspmagazine.com/directory/corelightLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:sean martin, brian dye, network, visibility, ransomware, detection, cybersecurity, soc, anomalies, baselining, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

Marketing Espresso
Brand Marketing Case Studies

Marketing Espresso

Play Episode Listen Later Apr 30, 2025 14:08


Send us a textBrand marketing - yep, despite being inundated for years with digital marketing trends, brand marketing is coming back! (And so it should!)Today I am discussing the resurgence of influencer marketing and how it's being influenced by current digital trends. I am going to chat through some recent specific campaigns that have been launched, which use brand marketing and influencer marketing incredibly well together - bonds anyone?So what matters when you're finding the intersection of brand marketing, digital marketing and influencer marketing? Well the importance of cohesive branding and strategic alignments. Bonds' recent campaign leveraging Australian icon Robert Irwin and Nike's female empowerment run are great examples of effective brand marketing strategies beyond traditional digital metrics. Think creatively about collaborations and community engagement to amplify your own brand's presence. Tune in for insightful tips on making your brand stand out in a saturated market.DOWNLOAD MY CONTENT PLANNER - https://becchappell.com.au/content-planner/Instagram @bec_chappellLinkedIn – Bec Chappell If you're ready to work together, I'm ready to work with you and your team.How to work with me:1. Marketing foundations and strategy consultation 2. Marketing Coaching/ Whispering for you a marketing leader or your team who you want to develop into marketing leaders3. Book me as a speaker or advisor for your organisation4. Get me on your podcastThis podcast has been produced and edited by Snappystreet Creative

ITSPmagazine | Technology. Cybersecurity. Society
Rethinking Container Security from the Kernel Up | A Brand Story with Emily Long and Kaylin Trychon from Edera | An RSAC Conference 2025 Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 29, 2025 11:29


In this pre-event Brand Story On Location conversation recorded live from RSAC Conference 2025, Emily Long, Co-Founder and CEO of Edera, and Kaylin Trychon, Head of Communications, introduce a new approach to container security—one that doesn't just patch problems, but prevents them entirely.Edera, just over a year old, is focused on reimagining how containers are built and run by taking a hardware-up approach rather than layering security on from the top down. Their system eliminates lateral movement and living-off-the-land attacks from the outset by operating below the kernel, resulting in simplified, proactive protection across cloud and on-premises environments.What's notable is not just the technology, but the philosophy behind it. As Emily explains, organizations have grown accustomed to the limitations of containerization and the technical debt that comes with it. Edera challenges this assumption by revisiting foundational virtualization principles, drawing inspiration from technologies like Xen hypervisors, and applying them in modern ways to support today's use cases, including AI and GPU-driven environments.Kaylin adds that this design-first approach means security isn't bolted on later—it's embedded from the start. And yet, it's done without disruption. Teams don't need to scrap what they have or undertake complex rebuilds. The system works with existing environments to reduce complexity and ease compliance burdens like FedRAMP.For those grappling with infrastructure pain points—whether you're in product security, DevOps, or infrastructure—this conversation is worth a listen. Edera's vision is bold, but their delivery is practical. And yes, you'll find them roaming the show floor in bold pink—“mobile booth,” zero fluff.Listen to the episode to hear what it really means to be “secure by design” in the age of AI and container sprawl.Learn more about Edera: https://itspm.ag/edera-434868Note: This story contains promotional content. Learn more.Guests: Emily Long, Founder and CEO, Edera | https://www.linkedin.com/in/emily-long-7a194b4/Kaylin Trychon, Head of Communications, Edera | https://www.linkedin.com/in/kaylintrychon/ResourcesLearn more and catch more stories from Edera: https://www.itspmagazine.com/directory/ederaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsac25______________________Keywords:emily long, kaylin trychon, sean martin, marco ciappelli, containers, virtualization, cloud, infrastructure, security, fedramp, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More 

The Twenty Minute VC: Venture Capital | Startup Funding | The Pitch
20Growth: Inside Kraken's $1.5BN Growth Playbook: What Works, What Doesn't and What No Founders Understand About Growth That Will Change Their Company with Mayur Gupta

The Twenty Minute VC: Venture Capital | Startup Funding | The Pitch

Play Episode Listen Later Apr 25, 2025 52:50


Mayur Gupta is currently the CMO at Kraken, one of the largest crypto platforms in the world. Prior to that, he lead Marketing, Business Transformation and Growth at Gannett - USA Today Network, led Growth at Spotify and was the CMO at Freshly which eventually got acquired by Nestle. He was the first ever Chief Marketing Technologist at Kimberly Clark. In Today's Episode We Discuss: 03:25 Biggest Growth Lessons from Spotify 08:21 Role of Marketing in Product-Led Companies 13:35 How to Build a Growth Engine 20:40 Organic vs. Paid Growth Strategies 27:36 The Branding Dilemma: Performance vs. Brand Marketing 28:37 Creating Demand: The Role of Upper Funnel Marketing 29:35 Balancing Investment: Immediate vs Long Term Bets 30:03 Channel Saturation and Experimentation 31:42 Growth Strategies and Performance Metrics 34:54 Growth: Big Swings or Moving % Points 40:04 Successful Growth Experiments and Tactics 44:56 Quick Fire Questions and Final Thoughts  

UBC News World
London : Los Angeles Among World's Top Brand Marketing Firms: A+ BBB Rating

UBC News World

Play Episode Listen Later Apr 25, 2025 2:30


An A+ rating with the Better Business Bureau reflects the highest levels of trust and customer satisfaction, which is just another reason why London : Los Angeles is the world's leading brand management agency. Go to https://www.thelolaagency.com/post/lo-la-receives-bbb-a-rating for more information. London : Los Angeles (LO:LA) City: El Segundo Address: 840 Apollo Street Website: https://www.thelolaagency.com

The Creative Soulpreneur Podcast with Nick Demos
155. Understanding Authentic Branding with Julie Nemitz

The Creative Soulpreneur Podcast with Nick Demos

Play Episode Listen Later Apr 24, 2025 33:14


Understanding Authentic Branding with Julie Nemitz   Episode #155   Welcome back to The Creative Soulpreneur. In today's episode, we reconnect with an extraordinary guest, Julie Nimitz. Julie's journey from a theater kid in Michigan, mentored by influential figures and inspired by a vibrant local theater scene, has taken her through a compelling career in corporate marketing. She merged her love for theater and her expertise in marketing to help small theaters amplify their stories in innovative ways. Now, Julie's entrepreneurial spirit and fearless nature have led her to work with individual artists, guiding them to authentically market themselves and their creative endeavors. Join us as we explore Julie's inspiring path, her transformational pivot from corporate to self-driven success, and her passion for making a meaningful impact in the arts community. This episode is packed with insights on blending creativity with strategy to leave a lasting legacy in the world of arts and theater.   Takeaways: Embrace the Pivot: Julie transitioned from a career in theater to corporate marketing, eventually founding the Theater Marketing Lab and Broad Impact Network. Her journey emphasizes the importance of fearlessly trying new things and pivoting when necessary. Personal Branding Matters: Both Julie and Nick highlight the importance of personal branding for artists and entrepreneurs. Knowing and authentically presenting who you are can open doors and create meaningful connections. Building Community for Impact: Julie's vision for the Broad Impact Network focuses on empowering female artists and advocates to create together and drive social change. This initiative underscores the power of community in making a difference.   Julie Website For Women in the Arts: Broad Impact Network   Julie Nemitz is a marketing mastermind who's shaking things up in the world of the performing arts. She is the founder of Theatre Marketing Lab, a consultancy dedicated to helping thousands of theatre artists and organizations grow audiences and amplify their work in the digital space –with a big dose of content marketing magic and a whole lot ofinnovative brand strategy. Julie is passionate about working with theatremakers, coaching them to harness the power of the internet to build brands. Since 2019, over 2,800 theaters have benefitted from training with the Theatre Marketing Lab where theatermakers can take self-guided training, group coaching sessions or collaborate one-on-one with Julie. Her signature programs Sell The Show! and Merrily We Roll Out: The Season Reveal Launch Plan have impacted local theatre marketing strategies from Glasgow to Melbourne and everywhere in between. Julie's newest project, Broad Impact Network, will launch in 2025. The program is a membership-based platform and community for women passionate about entertainment and the creative arts. Whether they are active contributors to the industry or avid supporters, Broad Impact Network empowers its members to celebrate, support, and shape the future of the arts. Our mission is to build a robust and engaged community of women who actively support female-identifying artists, advocate for freedom of artistic expression, and provide funding for women-led film, television, music, and theatre projects. Through community-driven initiatives—such as the Broad Impact Grant Program, in-person events Broads Night Out and Broads Night In, and a gamified engagement system—members wield their collective influence to amplify and celebrate women in the arts. Prior to the launch of Theatre Marketing Lab in 2019, Julie had a nearly fifteen-year career in sales and marketing with some of the top publishers and media companies, including Playbill, People Magazine, Meredith Dash Dot/Parents.com, and ScholasticPublishers. As a Vice President of Partnership Marketing at Triad Retail Media, she led her team to develop award-winning e-commerce content for Walmart.com. Julie travels the country (and the internet) speaking about marketing and the theatre industry for organizations such as the American Association of Community Theatre and The National Presenters Association and on numerous podcasts. She is also adjunct faculty at Western Michigan University, teaching Theatre Arts Marketing to the next generation of artists. In her spare time, Julie produces theatrical productions centered on the female experience including co-creating the original theatrical work “Does Anybody Have A Map? Motherhood In Stories and Song” which premiered in 2020 and moved into a social media content success story during the pandemic.   Nick Demos is a Tony and Olivier Award winning Broadway producer, documentary filmmaker, conscious business coach and manifestation expert. With over 15 years of teaching pranayama (breath work), yoga and creativity as well as thirty years in the entertainment industry, he has travelled from the Tony Awards to ashrams and run a multi-million dollar business in between. Nick helps you clear blocks and tap into your creative intuition so you can tell your stories and manifest the business and life of your dreams creating wealth and impact.  

Content Disrupted: Bold Takes on Brand Marketing
What Breakthrough Brands Do Differently with Skullcandy CEO Brian Garofalow

Content Disrupted: Bold Takes on Brand Marketing

Play Episode Listen Later Apr 24, 2025 37:24


How do you build a culture-led brand that stands out in an oversaturated market? Skullcandy CEO Brian Garofalow shares how brands like Igloo and Skullcandy thrive by merging counterculture with commerce, balancing operational discipline with creativity, and leaning into brand identity to punch above their weight in crowded market categories.

ITSPmagazine | Technology. Cybersecurity. Society
Community, Certification, and the Questions That Matter Most in Quantum Readiness and AI Governance | A Brand Story with Mary Carmichael and Dooshima Dabo'Adzuana from ISACA | A RSAC Conference 2025 Brand Story Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 23, 2025 23:26


As anticipation builds for the RSAC Conference 2025, ISACA leaders Mary Carmichael and Dooshima Dabo'Adzuana join Sean Martin and Marco Ciappelli to preview what the global technology and cybersecurity association has in store for attendees this year. With a focus on expanding community, AI governance, and professional development, their conversation reveals how ISACA is showing up with both timely insights and tangible resources.Mary Carmichael, President of ISACA's Vancouver Chapter and a CPA focused on cybersecurity risk and governance, highlights the session she's co-presenting with Dooshima Dabo'Adzuana: Third-Party AI: What Are You Really Buying? Their talk will explore the increasing complexity of evaluating AI solutions procured from vendors—especially those embedding large language models. Topics include due diligence during procurement, monitoring post-deployment, and assessing whether vendor practices align with internal risk and privacy requirements.Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter, shares how ISACA members across regions are grappling with similar questions: What does AI mean for my organization? What risks do third-party integrations introduce? She emphasizes the importance of frameworks and educational tools—resources that ISACA is making readily available at their booth (South Expo #2268) and through new certification tracks in AI audit and security.Alongside the AI focus, visitors to the booth can explore results from ISACA's Quantum Pulse Poll and access guidance on encryption readiness for a post-quantum future. The booth will also feature a selfie station and serve as a meeting point for the diverse ISACA community, with members from over 220 chapters worldwide.The conversation rounds out with a critical discussion on cybersecurity career development. Both Mary and Dooshima share personal stories of transitioning into the field—Mary from accounting, Dooshima from insurance—and call for broader recognition of transferable skills. They point to global tools, such as career pathway frameworks supported by ISACA and the UK Cyber Security Council, as essential for addressing the persistent workforce gap.This episode offers a preview of how ISACA is connecting global conversations on AI, quantum, and professional development—making RSAC Conference 2025 not just a tech showcase, but a community gathering rooted in learning and action.Stop by booth 2268 in the South Expo to explore how ISACA are equipping professionals with practical tools for AI governance, quantum readiness, and cybersecurity career growth—and how your organization can benefit from a stronger, more connected community.Learn more about ISACA: https://itspm.ag/isaca-96808Guests:Mary Carmichael, President of ISACA's Vancouver Chapter | https://www.linkedin.com/in/carmichaelmary/Dooshima Dabo'Adzuana, a researcher at Boise State University and leader from ISACA's Abuja Chapter | https://www.linkedin.com/in/dooshima-dabo-adzuana/ResourcesMary and Dooshima's session at RSA Conference: https://path.rsaconference.com/flow/rsac/us25/FullAgenda/page/catalog/session/1737642290064001tqyqLearn more about ISACA's AI resources: https://www.isaca.org/resources/artificial-intelligenceLearn more about ISACA's credentials: https://www.isaca.org/credentialingLearn more and catch more stories from ISACA: https://www.itspmagazine.com/directory/isacaLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Keywords: ai, quantum, cybersecurity, risk, governance, audit, certification, encryption, rsa, rsac, third-party, compliance, career, skills, education, community, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
What's Driving the Next Generation of Risk Management? | A Brand Story with Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | A RSAC Conference 2025 Brand Story Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 21, 2025 22:10


Ahead of the RSAC Conference, Sean Martin and Marco Ciappelli sit down with Steve Schlarman, Director of Product Management at Archer, to talk risk, regulation, and where governance fits into the broader cybersecurity conversation.Steve represents a company that's been at the center of governance, risk, and compliance (GRC) for nearly 25 years. But don't mistake tenure for inertia—Archer is actively reshaping how organizations think about integrated risk management, especially through its latest platform, Archer Evolv. Steve shares how his team is focused on rethinking compliance not as a checkbox, but as a foundation for smarter, more strategic business decisions.What sets Archer Evolv apart? For one, the platform doesn't just cater to full-time risk professionals. It's built for anyone in the organization who touches compliance—even occasionally. Steve explains how the user experience has been redesigned to make it easier for non-experts to contribute, pulling in relevant data without bogging down daily operations.AI also plays a major role. After acquiring Compliance.AI, Archer has embedded large language models and automation into its compliance workflows—cutting down the time it takes to process regulatory updates and map controls. This means compliance professionals can spend less time scanning documents and more time advising the business.But this isn't about technology for technology's sake. Steve underscores the bigger question facing companies today: how much risk are they truly willing to accept? Regulation might kickstart the conversation, but it's risk management that sustains it—and that requires clarity, context, and collaboration across the business.Archer's team will be on site at RSAC, ready to demo the platform and share stories from the field. With over 1,200 customers worldwide, the company has no shortage of real-world examples to pull from. From frontline vulnerability assessments to strategic compliance mapping, Archer's approach is centered on enabling better decisions—not just better dashboards.Stop by booth 3117 (https://itspm.ag/archervn5f) to see how they're turning compliance into an engine for risk-aware growth—and how your team might benefit from a more purposeful approach to GRC.Learn more about Archer: https://itspm.ag/rsaarchwebGuest: Steve Schlarman, Senior Director, Product Management at Archer Integrated Risk Management | https://www.linkedin.com/in/steveschlarman/ResourcesLearn more and catch more stories from Archer: https://www.itspmagazine.com/directory/archerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Keywords: risk, compliance, governance, cybersecurity, ai, automation, regulation, grc, audit, resilience, controls, workflow, data, business continuity, product management, rsa, rsac2025, brand story, brand marketing, marketing podcast, brand story podcast______________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
Why “Permit by Exception” Might Be the Key to Business Resilience | A Brand Story with Rob Allen, Chief Product Officer at ThreatLocker | A RSAC Conference 2025 Brand Story Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 21, 2025 18:58


At this year's RSAC Conference, the team from ThreatLocker isn't just bringing tech—they're bringing a challenge. Rob Allen, Chief Product Officer at ThreatLocker, joins Sean Martin and Marco Ciappelli for a lively pre-conference episode that previews what attendees can expect at booth #854 in the South Expo Hall.From rubber ducky hacks to reframing how we think about Zero Trust, the conversation highlights the ways ThreatLocker moves beyond the industry's typical focus on reactive detection. Allen shares how most cybersecurity approaches still default to allowing access unless a threat is known, and why that mindset continues to leave organizations vulnerable. Instead, ThreatLocker's philosophy is to “deny by default and permit by exception”—a strategy that, when managed effectively, provides maximum protection without slowing down business operations.ThreatLocker's presence at the conference will feature live demos, short presentations, and hands-on challenges—including their popular Ducky Challenge, where participants test whether their endpoint defenses can prevent a rogue USB (disguised as a keyboard) from stealing their data. If your system passes, you win the rubber ducky. If it doesn't? They (temporarily) get your data. It's a simple but powerful reminder that what you think is secure might not be.The booth won't just be about tech. The team is focused on conversations—reconnecting with customers, engaging new audiences, and exploring how the community is responding to a threat landscape that's growing more sophisticated by the day. Allen emphasizes the importance of in-person dialogue, not only to share what ThreatLocker is building but to learn how security leaders are adapting and where gaps still exist.And yes, there will be merch—high-quality socks, t-shirts, and even a few surprise giveaways dropped at hotel doors (if you resist the temptation to open the envelope before visiting the booth).For those looking to rethink endpoint protection or better understand how proactive controls can complement detection-based tools, this episode is your preview into a very different kind of cybersecurity conversation—one that starts with a challenge and ends with community.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Guest: Rob Allen, Chief Product Officer, ThreatLocker | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverage______________________Keywords: rsac conference, cybersecurity, endpoint, zero trust, rubber ducky, threat detection, data exfiltration, security strategy, deny by default, permit by exception, proactive security, security demos, usb attack, cyber resilience, network control, security mindset, rsac 2025, event coverage, on location, conference____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

ITSPmagazine | Technology. Cybersecurity. Society
From Phishing to Full Compromise in Under an Hour: Automation Is Fueling the Next Wave of Cyber Threats | A LevelBlue Brand Story with Kenneth Ng

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 18, 2025 36:02


LevelBlue's latest Threat Trends Report pulls no punches: phishing, malware, and ransomware attacks are not just continuing—they're accelerating. In this episode of ITSPmagazine's Brand Story podcast, hosts Sean Martin and Marco Ciappelli are joined by Kenneth Ng, a threat hunter and lead incident responder on LevelBlue's Managed Detection and Response (MDR) team, to unpack the findings and recommendations from the report.Phishing as a Service and the Surge in Email CompromisesOne of the most alarming trends highlighted by Kenneth is the widespread availability of Phishing-as-a-Service (PhaaS) kits, including names like RaccoonO365, Mamba 2FA, and Greatness. These kits allow attackers with little to no technical skill to launch sophisticated campaigns that bypass multi-factor authentication (MFA) by hijacking session tokens. With phishing attacks now leading to full enterprise compromises, often through seemingly innocuous Microsoft 365 access, the threat is more serious than ever.Malware Is Smarter, Simpler—and It's Spreading FastMalware, particularly fake browser updates and credential stealers like Lumma Stealer, is also seeing a rise in usage. Kenneth points out the troubling trend of malware campaigns that rely on basic user interactions—like copying and pasting text—leading to full compromise through PowerShell or command prompt access. Basic group policy configurations (like blocking script execution for non-admin users) are still underutilized defenses.Ransomware: Faster and More Automated Than EverThe speed of ransomware attacks has increased dramatically. Kenneth shares real-world examples where attackers go from initial access to full domain control in under an hour—sometimes in as little as ten minutes—thanks to automation, remote access tools, and credential harvesting. This rapid escalation leaves defenders with very little room to respond unless robust detection and prevention measures are in place ahead of time.Why This Report MattersRather than presenting raw data, LevelBlue focuses on actionable insights. Each major finding comes with recommendations that can be implemented regardless of company size or maturity level. The report is a resource not just for LevelBlue customers, but for any organization looking to strengthen its defenses.Be sure to check out the full conversation and grab the first edition of the Threat Trends Report ahead of LevelBlue's next release this August—and stay tuned for their updated Futures Report launching at RSA Conference on April 28.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Kenneth Ng, threat hunter and lead incident responder on LevelBlue's Managed Detection and Response (MDR) team | On LinkedIn: https://www.linkedin.com/in/ngkencyber/ResourcesDownload the LevelBlue Threat Trends Report | Edition One: https://itspm.ag/levelbyqdpLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
AI, Security, and the Hybrid World: Akamai's Vision for RSAC 2025 With Rupesh Chokshi, SVP & GM Application Security Akamai | A RSAC Conference 2025 Brand Story Pre-Event Conversation

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 18, 2025 21:50


The RSA Conference has long served as a meeting point for innovation and collaboration in cybersecurity—and in this pre-RSAC episode, ITSPmagazine co-founders Marco Ciappelli and Sean Martin welcome Akamai's Rupesh Chokshi to the conversation. With RSAC 2025 on the horizon, they discuss Akamai's presence at the event and dig into the challenges and opportunities surrounding AI, threat intelligence, and enterprise security.Chokshi, who leads Akamai's Application Security business, describes a landscape marked by explosive growth in web and API attacks—and a parallel shift as enterprises embrace generative AI. The double-edged nature of AI is central to the discussion: while it offers breakthrough productivity and automation, it also creates new vulnerabilities. Akamai's dual focus, says Chokshi, is both using AI to strengthen defenses and securing AI-powered applications themselves.The conversation touches on the scale and sophistication of modern threats, including an eye-opening stat: Akamai is now tracking over 500 million large language model (LLM)-driven scraping requests per day. As these threats extend from e-commerce to healthcare and beyond, Chokshi emphasizes the need for layered defense strategies and real-time adaptability.Ciappelli brings a sociological lens to the AI discussion, noting the hype-to-reality shift the industry is experiencing. “We're no longer asking if AI will change the game,” he suggests. “We're asking how to implement it responsibly—and how to protect it.”At RSAC 2025, Akamai will showcase a range of innovations, including updates to its Guardicore platform and new App & API Protection Hybrid solutions. Their booth (6245) will feature interactive demos, theater sessions, and one-on-one briefings. The Akamai team will also release a new edition of their State of the Internet report, packed with actionable threat data and insights.The episode closes with a reminder: in a world that's both accelerating and fragmenting, cybersecurity must serve not just as a barrier—but as a catalyst. “Security,” says Chokshi, “has to enable innovation, not hinder it.”⸻Keywords: RSAC 2025, Akamai, cybersecurity, generative AI, API protection, web attacks, application security, LLM scraping, Guardicore, State of the Internet report, Zero Trust, hybrid digital world, enterprise resilience, AI security, threat intelligence, prompt injection, data privacy, RSA Conference, Sean Martin, Marco Ciappelli______________________Guest: Rupesh Chokshi, SVP & GM, Akamai https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine:  https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsAKAMAI:https://itspm.ag/akamailbwc____________________________ResourcesLearn more and catch more stories from RSA Conference 2025 coverage: https://www.itspmagazine.com/rsa-conference-usa-2025-rsac-san-francisco-usa-cybersecurity-event-infosec-conference-coverageRupesh Chokshi Session at RSAC 2025The New Attack Frontier: Research Shows Apps & APIs Are the Targets - [PART1-W09]____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More

Believe in Banking
Naming, Identity, and Influence with EastRise Credit Union

Believe in Banking

Play Episode Listen Later Apr 16, 2025 28:01


In Part 2 of their special guest episode of the Believe in Banking podcast, Gina and Juliet welcome back Yvonne Garand, Chief Brand and Marketing Officer and Jevonne McLaughlin, Vice President of Brand Marketing, from EastRise Credit Union. In their conversation, Yvonne and Jevonne describe the rebranding process following the merger between New England Federal Credit Union and Vermont State Employees Credit Union. They discuss the process of selecting a new name and the formation of the brand identity for the organization, and how data was key to their decision making and consensus building. Fundamentally, they credit the successful transition to EastRise to their strong commitment to reflecting the values of the merged organization. And finally, Yvonne and Jevonne discuss the evolution of the credit union's culture and reflect on managing change across the organization – a journey grounded in time, trust, and transparency. This podcast is hosted by ZenCast.fm

ITSPmagazine | Technology. Cybersecurity. Society
From Chaos to Control: What If Your Cyber Program Helped You Sleep at Night? | A ThreatLocker Brand Story with Rob Allen

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Apr 15, 2025 38:59


In this Brand Story episode, Sean Martin and Marco Ciappelli sit down with Rob Allen, Chief Product Officer at ThreatLocker, to unpack how the company is reshaping endpoint security through a unique, control-first approach. Rob shares how ThreatLocker is challenging long-held assumptions about trust, visibility, and control in enterprise environments—and why the traditional “trust but verify” model is no longer good enough.From Default Permit to Default DenyThreatLocker's philosophy centers on a fundamental shift: moving from a default permit posture to a default deny stance. This approach, according to Rob, doesn't hinder operations—it creates boundaries that allow organizations to function safely and efficiently. It's not about locking systems down; it's about granting permissions with precision, so users can operate without even noticing security is present.Product Innovation Driven by Real FeedbackThe conversation highlights how customer input—and CEO Danny Jenkins' relentless presence at industry events—drives product development. New solutions like Web Control and Patch Management are designed as logical extensions of existing tools, allowing security teams to reduce risk without creating friction for end users. The addition of a software store, suggested by enterprise customers, gives users clarity on what's approved while reducing IT support tickets.Insights and the Detect DashboardRob also explains how ThreatLocker is unlocking the value of big data. With billions of data points collected every hour, their new Insights platform aggregates and analyzes cross-customer trends to better inform security decisions. Combined with the Detect Dashboard, teams now gain not only visibility but actionable intelligence—supported by polished visuals and streamlined workflows.More Than Just Tech—It's Peace of MindWhile the technology is impressive, Rob says the most rewarding feedback is simple: “ThreatLocker helps me sleep at night.” For many customers, that level of confidence is priceless. And in unexpected situations—like a blue-screen incident caused by third-party software—ThreatLocker has even been used to mitigate impacts in creative ways.Whether you're leading a global IT team or managing a growing MSP, this episode will make you think differently about how security fits into your operational strategy. Tune in to hear how ThreatLocker is turning bold ideas into real-world control.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Rob Allen, Chief Product Officer at ThreatLockerOn LinkedIn | https://www.linkedin.com/in/threatlockerrob/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

Ecommerce Brain Trust
Moving From the 5% to the 95% - The Principles of Demand Generation With Pat Petriello - Episode 388

Ecommerce Brain Trust

Play Episode Listen Later Apr 15, 2025 32:52


Welcome to The Ecommerce Braintrust podcast, brought to you by Julie Spear, Head of Retail Marketplace Services, and Jordan Ripley, Director of Retail Operations. Today we're bringing back our very own Director of Retail Marketplace Strategy, Pat Petriello, to discuss how the savviest brands are balancing the needs of brand vs. performance marketing, how to avoid a life sentence in ROAS Jail, and the all-important 95/5 rule.  Tune in to find out more!   KEY TAKEAWAYS In this episode, Julie, Jordan, and Pat discuss: Introduction to ROAS Jail: Pat Patriello explains the concept of "ROAS jail," where marketers focus solely on Return on Advertising Spend (ROAS), leading to inefficiencies and short-term growth strategies. The 95-5 Rule: Only 5% of consumers are in the market for any given product at any time. The focus should be on brand building for the 95% who are not currently shopping. 60-40 Rule: Introduced by Pat as a guideline, suggesting a budget allocation of 60% towards brand-building and 40% towards performance marketing. This ratio helps balance short-term sales goals with long-term brand equity. Brand vs. Performance Marketing: Discussion on how these strategies differ and the importance of emotional connection through branding to attract long-term customers. Amazon's Role: Insight into how Amazon is transitioning to accommodate brand building alongside its historical strength in direct sales and conversion. Practical Recommendations: Tips for business leaders on how to integrate brand marketing into existing performance-focused strategies without necessarily increasing overall spending. Examples of Effective Brand Building: Brands like Patagonia are highlighted as successfully creating emotional connections that lead consumers directly to their products, bypassing competitive marketplace auctions.

The Marketing Millennials
321 - How to Think Long Term in Marketing with Andrew LeRay, Director of Brand Marketing at National Women's Soccer League

The Marketing Millennials

Play Episode Listen Later Apr 11, 2025 35:23


Have you noticed more and more people are watching women's sports?  This episode's guest, Andrew LeRay of the National Women's Soccer League, is on a mission to grow the league through brand, product, and more. How do you sell tickets and merchandise to people who may not know the league exists? Andrew suggests that education and brand awareness are the two concepts driving people to think about the NWSL.  What are some ways Andrew has changed targeting strategies for the brand? Since coming into the role about two years ago, Andrew talks about how strategies back then were about retention and how the focus is now on creating messaging to welcome new viewers.   Plus, the NWSL has ties with US Soccer and other national teams. How do you leverage the popularity of more famous players in the league when they're away from their national teams? With the retirements of Alex Morgan and Megan Rapinoe, there's a new set of players to be on the lookout for. Women's soccer doesn't just happen at the World Cup or the Olympics, so the league is THE place to watch it while you wait for the next tournament.  If you're a marketer who wants to learn more about growing or reshaping a brand, this is the episode for you.  Follow Andrew: LinkedIn: https://www.linkedin.com/in/andrewleray/ Follow Daniel: YouTube: https://www.youtube.com/@themarketingmillennials/featured Twitter: https://www.twitter.com/Dmurr68 LinkedIn: https://www.linkedin.com/in/daniel-murray-marketing Sign up for The Marketing Millennials newsletter: www.workweek.com/brand/the-marketing-millennials Daniel is a Workweek friend, working to produce amazing podcasts. To find out more, visit: www.workweek.com

Inclusion and Marketing
158. Creating inclusive video marketing at Wistia, with Taylor Corrado

Inclusion and Marketing

Play Episode Listen Later Apr 10, 2025 25:39


One thing I've learned that is often helpful, especially during the early stages of getting started on a new journey – like inclusive marketing, is to hear how others who are in your shoes or similar approach it. Learning about how others think about a problem, the challenges they've experienced, and how they've gone about achieving success — can do wonders to move you forward and much closer to your goals. So to help facilitate that type of learning from you, one of my goals for the show is to bring you more conversations with marketing leaders at various brands to uncover their approach to inclusive marketing. In this episode, you'll hear my super fun conversation with Taylor Corrado, Senior Director of Brand Marketing at Wistia — a video marketing platform for businesses. And as a fun aside – because of Taylor's work, she's obviously really well-versed in video marketing. So, as part of our chat, you'll also hear Taylor's thoughts on how to make your video marketing more inclusive. Get the Inclusion & Marketing Newsletter Wistia Wistia State of Video Report Wild Terrains - Women Only Tours

Marketing Happy Hour
Turning Community and Experiences into Brand Loyalty | Courtney Weis of FP Movement

Marketing Happy Hour

Play Episode Listen Later Apr 3, 2025 37:12


Get job openings + marketing updates direct to your inbox, every Thursday: Join the email listHow do you take a brand from a category extension to a powerhouse of its own? Courtney Weis, Managing Director of Brand Marketing at FP Movement, joins us to break down how the brand evolved from Free People's activewear line into a standalone force with over 50 stores. She shares the key strategies behind building brand momentum, crafting authentic influencer partnerships, and leveraging experiential activations to deepen customer loyalty. Plus, we dive into what it takes to cut through the noise in today's crowded market, test and refine marketing strategies, and turn in-person experiences into measurable brand impact. Key Takeaways:// Scaling with Intention – How FP Movement positioned itself as an independent brand while staying true to Free People's DNA.// Beyond the Feed – FP Movement's approach to influencer marketing that actually drives conversation and ROI.// IRL Impact in a Digital World – Why experiential marketing still matters, how FP Movement measures success, and the role of data in shaping future campaigns.Connect with Courtney: LinkedIn | InstagramLearn more about FP Movement: Website | Events Calendar | Run Day in Your CityThe Corner Nordstrom Pop-Up (through April 27, 2025)FP Movement Studios:AustinChicagoNew York____Say hi! DM me on Instagram and let us know what content you want to hear on the show - I can't wait to hear from you! Please also consider rating the show and leaving a review, as that helps us tremendously as we move forward in this Marketing Happy Hour journey and create more content for all of you. ⁠Join our FREE Open Jobs group on LinkedIn: ⁠Join now⁠Get the latest from MHH, straight to your inbox: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Join our email list!⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Follow MHH on Social: ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Instagram⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠LinkedIn⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ |⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠TikTok⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠ | ⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠Facebook⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠⁠

Retail Retold
Retail Retold Replay - Stuck-ey'd on a roadside icon

Retail Retold

Play Episode Listen Later Apr 2, 2025 38:45


What does it take to revive a retail brand? And, have you heard the most incredible grassroots approach to site selection?In this episode of Retail Retold, host Chris Ressa speaks with Stephanie Stuckey, CEO of Stuckey's, about her journey and the rich history of the iconic roadside retailer from its 1937 to its peak during the Great American Road Trip era. She discusses her plans for expansion, the importance of branding and marketing, and the unique roadside experience that Stuckey's offers. The conversation highlights the challenges and opportunities in the retail landscape, emphasizing the nostalgic connection that customers have with the brand.This episode was initially released on September 10, 2020. TakeawaysStephanie Stuckey invested her life savings to buy Stuckey's.Stuckey's has a rich history aligned with America's road trip culture.The brand is focusing on standalone stores to enhance its identity.Marketing and branding are top priorities for Stuckey's moving forward.Stuckey's offers a unique product line that differentiates it from convenience stores.Customer feedback is taken seriously, with Stephanie personally responding to reviews.The company is exploring franchise expansion while maintaining brand integrity.Nostalgia plays a significant role in Stuckey's appeal to customers.The original design elements of Stuckey's stores are being preserved in new builds.Stephanie aims to revive the great American road trip experience.Chapters00:00 Introduction to Stuckey's and Stephanie Stuckey04:54 The Evolution of Stuckey's: A Family Legacy10:43 Reviving the Brand: Marketing and Expansion Plans16:12 The Roadside Retail Experience: Differentiation and Nostalgia24:02 Future Vision: Store Design and Growth Strategy32:58 Retail Wisdom: Insights and Advice