Identification for a good or service
POPULARITY
Categories
If you've ever struggled to defend brand budget in a performance-obsessed company — this episode is for you.We sat down with Matt Maynard, VP of Brand Advertising & Comms at Asana, to break down how brand actually drives growth — and how to measure it properly inside a B2B business.This isn't theory. It's a practical framework for small teams trying to prove brand works.We unpack:- Why brand keeps losing to performance- Why “consideration” is usually measured wrong- How to use Category Entry Points (CEPs)- The 95:5 rule explained simply- And how to measure mental availability without a massive budgetTune in and learn:- Why growth is driven by memory, not persuasion- The 3 brand metrics every B2B team should track- How to turn brand into a performance engineIf you're in a B2B team trying to punch above your weight, this is mandatory viewing.-----------------------------------------------------
From the archive: This episode was originally recorded and published in 2023. Our interviews on Entrepreneurs On Fire are meant to be evergreen, and we do our best to confirm that all offers and URL's in these archive episodes are still relevant. Rudy Mawer is a serial entrepreneur who's raised millions, ran billion $ brands, big celebrity marketing campaigns & helped over 40,000 people grow their companies online! Top 3 Value Bombs 1. The biggest thing most people miss in becoming successful is creativity. 2. Adapting and changing your thinking will help you reach your goals and succeed. 3. Anything is possible if you commit and put your mind to it. Learn more about Rudy, The Man In Red - TheRedLife.com Sponsors HighLevel - The ultimate all-in-one platform for entrepreneurs, marketers, coaches, and agencies. Learn more at HighLevelFire.com. Thrivetime Show - Make 2026 your best year yet! Start your transformation by attending the world's highest rated business growth workshop taught personally by Clay Clark, featuring Football Star and Entrepreneur, Tim Tebow, and President Trump's Son, Eric Trump, at ThrivetimeShow.com/eofire! QuickBooks Bill Pay - Helps you keep your business growing, while you stay in your zone of genius. Learn more at QuickBooks.com/billpay. Terms apply. Money movement services are provided by Intuit Payments Inc., licensed as a Money Transmitter by the New York State Department of Financial Services.
Dutch Bros Reminds Us to Listen and LoveDutch Bros has tapped into Gen Z culture and tastes across their menu, marketing partnerships, and creative. This week, Doug Parks sits down with Debbie Beisswanger, SVP of Brand Marketing at Dutch Bros to discuss.
Editors and co-hosts Damian Fowler and Ilyse Liffreing uncover insights and inspiration from leaders at the world's most influential brands. New episodes drop every Wednesday on all podcasting platforms and YouTube. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.
Ignite Digital Marketing Podcast | Marketing Growth Tips | Alex Membrillo
AI tools are changing how patients search, but most healthcare brands are missing the real opportunity. In this episode, Caroline Adamek, Senior SEO Data Manager at BetterHelp, joins Ashley Petrochenko Cardinal's VP of Brand Marketing to break down what AI visibility actually requires and why strong SEO foundations matter more than ever. They unpack how patient search behavior is shifting across social, AI platforms, and Google, and what healthcare marketers must do to stay visible at high intent moments that drive real growth. You will learn • Why AI search rewards trusted brands, not keyword tricks • How patient discovery now starts on social and ends in Google • What makes content AI friendly and conversion ready • How to align SEO with real patient decision journeys If you want your brand to show up when patients are ready to act, this is the episode to listen to next. RELATED RESOURCES Connect with Caroline - https://www.linkedin.com/in/caroline-adamec-0962361ba/ Optimizing for AI Search: A New Era in Healthcare Marketing - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/optimizing-for-ai-search-a-new-era-in-healthcare-marketing/ How a Primary Care Provider Futureproofed Their SEO in an AI-Driven Search World -https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/search-content-strategy-ai-landscape/ How to Avoid Keyword Cannibalization Between Paid Search & SEO - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/avoid-keyword-cannibalization-between-paid-search-seo/ What is a Patient Journey? Examples to Grow Your Practice - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/what-is-a-patient-journey-grow-your-practice/
Buyers don't experience brands as funnels. They encounter them mid-scroll, mid-conversation, mid-doubt, mid-purchase, to name a few examples. So why does marketing still plan as if people move predictably from awareness to purchase?This episode's guest Jelena Veselinovic joins host Jack Ferguson to rally against this phenomenon while drawing on 25+ years of marketing experience, including 18 years at Coca-Cola and 3.5 years as Head of Brand Marketing at Miro. Now operating as a fractional Head of Brand, she blends classical marketing science with a philosophical background to challenge the deterministic assumptions still embedded in boardrooms. If the world behaves probabilistically, effective marketing must evolve accordingly.We cover:How Honey's overnight collapse is the best case study on brand promise riskWhy Costco removes marketing traps and caps marginsHow Coca-Cola institutionalised product as their brand coreHow Newtonian cause-and-effect thinking misreads buyer behaviourWhy marketing is better understood as shaping conditions rather than controlling behaviourHow brands lost narrative authority to reviews, creators, and AIWhy deterministic marketing is both disrespectful and ineffective How to build brands that thrive upon contact with realityHelpful Links:- Determinism - Quantum Mechanics - The Quantum State of Branding Article- Exposing the Honey Influencer Scam VideoWhere to find Jack:- LinkedIn- WebsiteWhere to find Jelena:- Rewire Your Mind Substack - LinkedInWhere to find The Push:- LinkedIn- YouTube- Instagram- TikTok- Website
What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Ben Ikwuagwu is a vocalist, performer, and entrepreneur who has spent over 15 years navigating the live events world. That firsthand experience, combined with a degree in operations and years working in corporate America, gives him a unique vantage point on what makes the industry run and where it breaks down. Now, as CEO & Co-Founder of Soundcheck Live, he is channeling both worlds into a single platform designed to simplify how live event professionals manage their work.What does an all-in-one operations platform for live events actually do? Soundcheck Live focuses on four core pillars: booking, scheduling, payments, and coordination. Ikwuagwu explains that every event, regardless of size, comes down to these four elements. The platform provides a centralized dashboard where teams can manage gig details, client communication, and payment information without juggling spreadsheets, text threads, and scattered documents.How is Soundcheck Live building differently? From day one, the team has built the product around its users. Pilots with bands, production companies, and venues shaped the tool from the ground up. With advances in AI, the feedback loop has accelerated dramatically. Focus group insights that once took weeks to implement now translate into working features in hours, giving users the feeling that the platform is being custom-built for their specific workflows.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTBen Ikwuagwu, CEO & Co-Founder of Soundcheck LiveOn LinkedIn: https://www.linkedin.com/in/benjaminikwuagwu/RESOURCESSoundcheck Live (Website): https://soundchecklive.io/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSBen Ikwuagwu, Soundcheck Live, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, live events, gig management, event operations, live music, booking platform, freelancer tools, event technology, live entertainment, artist management, talent agencies Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Ignite Digital Marketing Podcast | Marketing Growth Tips | Alex Membrillo
Referrals are no longer enough to secure patient volume, and healthcare marketers who ignore local trust signals are losing patients before the first appointment is ever booked. In this episode, Ashley Petrochenko, Cardinal's VP of Brand Marketing talks with Ashley Pollard, Practice Marketing Manager at United Digestive, a multi location, PE backed gastroenterology platform. With more than a decade inside a referral heavy specialty, Ashley shares how patient behavior has shifted and what growth focused teams must do to stay visible, credible, and chosen. This conversation makes it clear that modern patient acquisition is as much about reputation and access as it is about media. You will learn • Why referred patients still shop and how to win their trust locally • How to balance centralized marketing with hyperlocal credibility • Where AI driven search and reviews now influence patient choice • Which metrics actually connect marketing to kept appointments If you want your patient acquisition strategy to drive real visits and not just clicks, this is the episode to queue up next. RELATED RESOURCES Connect with Ashley- https://www.linkedin.com/in/ashley-pollard-a734825/ Why Capacity-Driven Marketing Is Non-Negotiable - https://www.cardinaldigitalmarketing.com/capacity-driven-marketing-media-investment-strategy/ Optimizing for AI Search: A New Era in Healthcare Marketing - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/optimizing-for-ai-search-a-new-era-in-healthcare-marketing/ How to Build a Full-Funnel Healthcare Marketing Strategy - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/healthcare-full-funnel-marketing-strategy/ Marketing + Operations: Why Total Alignment is Vital to Growth - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/healthcare-marketing-operations-alignment/
Intro: Theo Terris, CEO of Uncle ArniesUncle Arnie's is a California-born beverage company redefining the way people enjoy THC. Launched in 2020 with a mission to make cannabis approachable, affordable, and undeniably fun, Uncle Arnie's has quickly become one of the best-selling cannabis beverage brands in the U.S. IG unclearnies | unclearnies.comFrancesca Salac, Head of Brand Marketing North America of Minor FiguresMinor Figures is a global brand developing best-in-class plant-based beverages designed to take you on a taste trip. Founded by coffee-loving friends and baristas for a better planet, Minor Figures is creating a future worth saving — crafting tomorrow's beverage innovations with the biggest impact and smallest environmental footprint. IG minorfigures | us.minorfigures.comFind Me:IG + TikTok citrusdiaries.studiocitrusdiaries.com | hello@citrusdiaries.comCreate your podcast today! #madeonzencastr
What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
As emotional storytelling reshapes marketing, even legacy jewelers must evolve. Helzberg, a 109-year-old brand rooted in promotions, is shifting from price to purpose, embracing craftsmanship, legacy, and timeless connection. This week, Erin Everhart sits down with Vice President of Brand Marketing Jeanette Carter.
What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
What does it take to design a signature guitar from the ground up? Chris Buck sits down with Sean Martin at NAMM 2026 to talk about the journey of creating the Yamaha Revstar RS02CB, his first production signature model. Buck describes the experience as surreal, noting that the weight of joining Yamaha's legacy of signature artists continues to hit him in waves. The lengthy design process, he says, was about making sure every detail lived up to what the guitar could be.How did Chris Buck and Yamaha land on the right pickups for the RS02CB? Buck explains that the pickups were the centerpiece of the collaboration, with the team working through countless iterations of magnet types, wire specifications, and voicing options. The result is a set of custom P90-style pickups that deliver the dynamic, responsive tone he has built his sound around. The wraparound tailpiece, a feature less common on modern instruments, adds sustain and directness to the signal path, contributing to the guitar's massive volume and resonance.What makes the RS02CB stand apart from other Revstar models? Buck highlights a three-way pickup selector switch instead of the five-way found on the current generation of Revstars, along with custom inlays and his own signature squiggle on the back of the headstock. He caps the conversation by playing a lick that shows exactly what the guitar can do, leaving no doubt about the instrument's character and capability.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTChris Buck, Yamaha Signature Artist | On Instagram: @chrisbuckguitar | Website: https://www.chrisbuckguitar.shop/RESOURCESYamaha: https://usa.yamaha.com/Yamaha RS02CB Chris Buck Signature Revstar: https://usa.yamaha.com/products/musical_instruments/guitars_basses/el_guitars/rs02cb/index.htmlPart of ITSPmagazine's On Location Coverage at NAMM 2026.
Dr. Juliane Apel ist Head of Brand Marketing & Research bei Yello. Sie arbeitet an der Schnittstelle aus Marke, Digitalisierung und Energiewende – und interessiert sich dabei weniger für glänzende Begriffe als für eine simple Frage: Was macht Menschen handlungsfähig?Mit Olli & Martin spricht sie darüber, wie sich ein Energiemarkt in Dauerbewegung anfühlt – und was andere Branchen daraus lernen können: strategisch klar bleiben, operativ beweglich werden. Es geht um Kund:innen, die plötzlich Prosumer sind, um Apps, die nicht nur Funktionen liefern sollen, sondern Orientierung. Und um den Anspruch, der alles zusammenhält: Ein digitaler Touchpoint darf sich nie schlechter anfühlen als menschlicher Kontakt.Juliane kommt aus führenden Agenturen, hat parallel promoviert und lehrt heute an der Hochschule der Medien. Bei Yello treibt sie eine Markenführung vom Produkt über Service bis zur Nachhaltigkeitsstrategie. Und sie zeigt, warum Leichtigkeit, Humor und ein gutes „Wie“ kein Beiwerk sind – sondern oft den Unterschied machen.Key Takeaways:Sustainability: Aufrichtig Anfangen. Ambitionen anziehen. Ein digitalisierter Touchpoint darf sich nie schlechter anfühlen als der menschliche Kontakt. “Prosumer”: markenadäquate App. Service mit Freude. Leichtigkeit. Menschlichkeit.Themen der Folge:Lektionen aus dem Energiemarkt?Energiewende von “Nachhaltigkeit-Immigranten”Digitale Wege der DifferenzierungLinkedIn:Dr. Juliane ApelOlli BuschMartin Boeing-MessingKeywords: Prosumer, dynamischer Stromtarif, Self-Service, Prognosefunktion, Sonnenbergs, Impact Factory, Corporate Coaching, Marketingemissionen, CO2-Zertifikate, Pina Earth, Klimaschutzbeitrag, FAQ-Videos, Nachrichtenumfelder Hosted on Acast. See acast.com/privacy for more information.
In this episode of The Speed of Culture podcast, Matt Britton speaks with Rachael Zaluzec, Chief Marketing Officer and Senior Vice President of Customer Experience and Brand Marketing at Volkswagen of America. Rachael explains how the Volkswagen ‘Drivers Wanted' campaign returns as a cultural statement about independence and identity. The conversation explores 2026 Automotive marketing trends, the role of AI in automotive customer experience, and how Volkswagen is blending heritage with modern technology while preparing for the future of autonomous driving Volkswagen strategy.Follow Suzy on Twitter: @AskSuzyBizFollow Rachael Zaluzec on LinkedInSubscribe to The Speed of Culture on your favorite podcast platform.And if you have a question or suggestions for the show, send us an email at suzy@suzy.com Hosted on Acast. See acast.com/privacy for more information.
In this episode, we talk to Ian Reeves. Ian is the Managing Director of Flourish CRM, an independent, specialist CRM agency with offices in both Bristol in the UK and Dubai, where they create award-winning campaigns for clients like Nissan and Samsung.We talk about how an agency like his is, if you'll pardon the obvious pun, flourishing in the febrile world of huge holding companies like Omnicom and WPP and a martech sector that is undergoing extraordinary change. External resources:Flourish website - CLICK HEREAudio-Visual assets:Imagery: Photo by Matthew Brodeur on UnsplashMusic: Hot Thang by Daniel Fridell. CLICK HEREMusic: Don't Lie by Will Harrison. CLICK HERE
Brands are a lot like people nowadays, they all have personalities. We talk about them, and there's a variety of different factors that make brands appealing to different generations of consumers, and that level of appeal can change quickly. When it comes to brand momentum the more established your brand is and the more trusted that is, the more brand equity your brand has the less difficult it is to achieve positive brand momentum while the less likely it is to experience random negative momentum. Hosted by Simplecast, an AdsWizz company. See https://pcm.adswizz.com for information about our collection and use of personal data for advertising.
למה חברה שנולדה כמאגר של מוזיקה וסטוקים ועוברת פיבוט משמעותי לעולמות ה-AI מחליטה דווקא עכשיו לפרסם בסופרבול? בפרק הזה אני מארח את לירן פרידמן, VP Brand Marketing של Artlist, לשיחה על מהלך חד ובלתי שגרתי: רכישת ספוט בסופרבול ימים ספורים לפני המשחק, והפקה מואצת של שלוש פרסומות מבוססות AI, שנוצרו אין־האוס, בזמן אמת, כחלק ממהלך קריאיטיבי יוצא דופן. דיברנו על הדרך שבה תהליכי הקריאייטיב משתנים, על האפשרות לייצר פרסומת שנראית כמו מיליון דולר מתוך מחשב בלבד ועל החלטה ללכת עד הסוף עם הרעיון ולהפוך את תהליך היצירה עצמו למסר. השיחה התרחבה אל המהלך כולו: איך בונים סיפור שחי מעבר לשידור הטלוויזיוני, איך מחברים סופרבול, סושיאל, PR וקהילה לרצף אחד, ואיך מנסים לבלוט בתוך אירוע שבו עשרות מותגים מתחרים על אותה תשומת לב. פרק על סופרבול כבמת הצהרה, על AI כמאיץ קריאייטיב, ועל הרגע שבו פרסומת הופכת להיות רק פרק אחד בסיפור גדול יותר. אפרופו מהלך גדול לסופרבול, כדאי להציץ על הרצאת הסופרבול השנתית שלי שמתמקדת הפעם באתגר הכי גדול היום של מחלקות השיווק: איך ליצור מהלכים מורכבים בדיגיטל ובסושיאל שמתחברים לרעיון גדול ובסופו ה-פרסומת בסופרבול: https://superbowl.creative-first.co.il./ קבלת רפרנסים מקצועיים, לשאול ״מי מכיר״ ועוד- לקבוצת הווצאפ החדשה של קריאייטיב פירסט> חדשות, קמפיינים מהעולם ומאמרי חובה- לעמוד האינסטגרם המתחדש> שיחות ביקורתיות, ניתוחי קמפיינים ומאמרים מקצועיים- לקבוצת הפייסבוק קריאייטיב פירסט מאמרים מקצועיים של מיטב הכותבים בענף- להצטרפות לניוזלטר הקיצר
What happens when artificial intelligence enters the arena of ethical hacking? Laurie Mercer, Senior Director of Solutions Engineering at HackerOne, joins Sean Martin for a look inside the ninth annual Hacker-Powered Security Report, where the headline is clear: the bionic hacker has arrived. HackerOne connects the global security research community with enterprises, open source projects, and major organizations, all working toward a shared mission of building a safer internet by finding, fixing, and rewarding the discovery of vulnerabilities.How is AI reshaping the bug bounty landscape? Mercer describes a dramatic shift unfolding on the HackerOne platform. For the first time, autonomous AI agents are operating alongside human researchers, growing from a single agent to more than ten competing on the leaderboard. At the same time, customers are driving change from the other side, with a 270% increase in organizations placing AI models within the scope of their bug bounty programs. The platform has paid out a record $81 million in bounty rewards over the past 12 months, with an average payout of roughly $1,000 per vulnerability, underscoring the sheer volume of valid findings flowing through the system.What makes these findings so significant? Of the reports submitted, 23,700 are rated critical or high severity, representing vulnerabilities capable of causing serious data breaches. HackerOne estimates these remediations have helped organizations avoid up to $3 billion in potential breach costs. The collectives participating on the platform range from venture-capital-backed startups building AI-powered offensive tools to informal groups of researchers pooling resources for greater efficiency. Mercer highlights three vulnerability categories that have surged over the past year: prompt injection, sensitive information exposure through large language models, and insecure plugin design. For any organization deploying AI-powered tools, these represent the most urgent areas to assess and secure.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTLaurie Mercer, Senior Director of Solutions Engineering at HackerOneOn LinkedIn: https://www.linkedin.com/in/lauriemercer/RESOURCESLearn more about HackerOne: https://www.hackerone.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSLaurie Mercer, HackerOne, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, bug bounty, ethical hacking, bionic hacker, AI agents, autonomous hacking, vulnerability discovery, hacker-powered security, offensive security, prompt injection, insecure plugin design, LLM security, AI vulnerability, cybersecurity, breach avoidance, bug bounty platform, responsible disclosure Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
If you are still trying to curate the perfect "aesthetic" feed, you are leaving money on the table. The era of the polished influencer is over. Welcome to The Great Brand Reset. In this episode, I sit down with the one and only Ka5sh, mastermind behind nation-wide rave moment, Shrek Rave, and the founder of the Cool is Dead. Ka5sh went from sleeping on the beach in LA with $300 in his pocket to building a nationwide touring empire that sells out venues like Red Rocks by embracing the "cringe."We dive deep into why "trust" is the new currency, why traditional marketing is failing, and how to build a cult-like community by simply being your weirdest, most authentic self.If you are a creator, founder, or brand builder trying to survive the 2026 landscape, this is the playbook you need.
131 years. Still handcrafted in Nashville. Still changing music.At NAMM 2026, Sean Martin and Marco Ciappelli sat down with Jeff Stempka, Global Brand & Marketing at Gibson & Gibson Custom, to talk about what makes this brand untouchable—the craftsmanship, the artist connection, and why people will stretch their budget just to hold one.From the Les Paul Studio Double Trouble to the ES-335 Fifties and Sixties refresh, Gibson is honoring its legacy while pushing forward.Jeff said it best: "These are tools that enable incredible musicians to take the instruments and do something we never intended."
If you want to understand how LinkedIn really works in B2B,this episode is essential.In this conversation with a LinkedIn insider, we break down how LinkedIn actually drives B2B growth, why most LinkedIn strategies fail, and how smart brands use LinkedIn to staymemorable, not just visible. If you're using LinkedIn for marketing, sales, personalbranding, or business growth, this will change how you think about LinkedIn. In this episode, you'll learn: - Why LinkedIn is more about memory than conversion - How LinkedIn shapes B2B buying decisions - The real role of LinkedIn in long-term business growth Whether you're a founder, marketer, consultant, or agencyowner, this episode shows how to use LinkedIn strategically, not randomly. Go follow Jenny! ➡️ https://www.linkedin.com/in/jennifer-shaw-sweet-7134a56/Chapters: (00:00) - How B2B Brands Actually Grow (LinkedIn InsiderExplains) (00:55) - Journey into Advertising and Marketing (04:51) - Transition to LinkedIn and the B2B Institute (10:05) - Challenges and Opportunities in B2B Marketing (15:15) - The Importance of Branding in B2B Marketing (16:09) - The Role of Research in B2B Marketing (17:32) - Developing a Five-Year Marketing Plan (23:19) - The Power of Brand Marketing (23:41) - The Role of Brand and Performance Marketing (29:04) - Career Insights and Advice (32:20) - Final Thoughts and Contact Information
Shopify Masters | The ecommerce business and marketing podcast for ambitious entrepreneurs
How Ouai became a $300M brand by turning customer comments into marketing gold. Subscribe and watch Shopify Masters on YouTube!Sign up for your FREE Shopify Trial here.
Snowboards and Guitars: Circle Strings x Burton at NAMM 2026Some collaborations make you stop and ask how nobody thought of this before.At NAMM Media Day 2026, Sean Martin caught up with Adam Buchwald and William Hylton from Circle Strings, a Vermont-based guitar company, to talk about their partnership with Burton. The concept is deceptively simple: matching snowboards and custom guitars built from the same materials.But the execution is anything but simple.Buchwald owns a wood company in Vermont. He had an entire tree of figured mahogany set aside, waiting for the right project. When Burton agreed to collaborate, he knew exactly what to do with it. The wood became the centerpiece—the visual and sonic foundation of everything that followed.Then William Hylton got to work.Hylton, Circle Strings' designer and CNC specialist, is a backcountry snowboarder. He chose Burton's Alakazam powder board shape as his starting point, drawn to its distinctive tail curve. That curve, he realized, was already guitar-esque. So he wove it through the entire instrument—the fingerboard extension, the pickguard, the bridge tips. The snowboard's DNA lives in every contour.But here's where it gets interesting.The core of a Burton snowboard is wood. Lightweight, durable, designed for performance. Hylton took that same core material and built a guitar body from it. The result feels right in your hands—balanced, resonant, purposeful. It's not a gimmick. It's a genuine instrument built from materials engineered to perform.The acoustic model features a sound hole that mirrors the snowboard's design. Inlays are crafted from Burton's core material, tying everything together visually and conceptually. Both guitars showcase snowflake inlays inspired by Snowflake Bentley, the Vermont photographer who first captured snowflakes in their true crystalline form over a century ago.It's a detail that says everything about how Circle Strings approaches their work. History. Craft. Place.Vermont runs through this collaboration. Buchwald and Hylton are snowboarders. They source their wood locally. They build instruments that reflect where they come from. Burton, also rooted in Vermont's snow culture, was a natural partner.The Burton team, according to Hylton, is thrilled. Many of them are musicians. Some are fans of the artists Circle Strings builds for. The connection was already there—this project just made it tangible.What strikes me about this collaboration is the underlying philosophy. Snowboards and guitars aren't that different when you strip them down. Both are built from wood. Both demand precision. Both exist to help someone express themselves—whether carving powder or carving a melody.Circle Strings and Burton understand this. They didn't force a partnership. They found the common thread and followed it.The result is a set of instruments that belong in a museum and on a stage. Objects that tell a story about craft, place, and the people who refuse to separate their passions.Snowboards and guitars. Same wood. Same craft. Different ride.Sean Martin reports from NAMM 2026 for ITSPmagazine.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSAdam Buchwald and William HyltonRESOURCESLearn more about Circle Strings Guitars: https://circlestrings.comLearn more about Burton Snowboards: https://www.burton.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, Burton, Circle Strings, custom guitars, snowboard guitar, handmade guitars, Vermont, guitar collaboration, Burton snowboards, NAMM, luthier, unique guitars Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Vintage Dreams, Modern Hands: A Conversation with PRS Guitars at NAMM 2026They were literally closing down the show floor when I grabbed Alex Chadwick from PRS Guitars for a conversation I wasn't willing to miss.We'd been talking off-mic about something that kept nagging at me—this tension between technology and creativity that runs through everything in the music world right now. So I hit record, security guards circling, and asked him straight: Is technology helping musicians become better artists, or do you still need to learn the hard way?His answer was refreshingly honest. Technology isn't inherently good or bad. It's a tool. When it helps people be more expressive, more creative—that's the win. When it gets in the way of that expression? That's when we have a problem.It's the kind of nuance that gets lost in the usual gear coverage.PRS brought some beautiful new instruments to NAMM this year. The John Mayer Wild Blue Silver Sky stopped people in their tracks—a sharp turquoise finish with the first matching headstock ever produced from their Maryland factory on a Silver Sky. Limited to a thousand pieces worldwide. For Mayer fans and Silver Sky devotees alike, this one feels special.Then there's the Ed Sheeran Semi-Hollow Piezo Baritone. A 27.7-inch scale instrument tuned a fifth below standard, with discrete outputs for both magnetic and piezo elements. But here's what got me: each guitar ships with a signed print of Sheeran's original artwork that appears on the body. He's a visual artist too. The instrument becomes a canvas for multiple creative expressions at once.But the conversation that really stuck with me was about vintage guitars and why we romanticize them so much.Those 1950s and 60s instruments—the ones on posters, in documentaries, making the music that shaped entire generations—they've become holy relics. And the ones that actually sound magical? They cost as much as a house now. So how does anyone access that?Chadwick explained something about PRS's philosophy that I found genuinely compelling. They don't go back to the fifties. They go back to 1985. That gives them freedom—they can draw inspiration from those holy grail instruments without being trapped by their quirks, their inconsistent tolerances, their aged components. They can take what made those guitars legendary and build it into something repeatable, accessible, and comfortable.The goal, he said, is to create instruments that get out of the way. Guitars that let the person be more expressive instead of fighting against limitations.That phrase has been echoing in my head since I left Anaheim. Instruments that get out of the way.Because that's really what this is about, isn't it? All the gear, all the technology, all the innovation—it only matters if it helps someone find their voice. Make their own music. Tell their own story.PRS seems to understand that. In a world obsessed with vintage nostalgia and spec-sheet comparisons, they're building for expression.And that's worth a conversation, even when security is showing you the door.Marco Ciappelli reports from NAMM 2026 for ITSPmagazine, exploring the intersection of technology, creativity, and the humans who make music possible.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlexander ChadwickPRS GuitarsRESOURCESLearn more about PRS GUITARS: https://prsguitars.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, PRS Guitars, John Mayer Silver Sky, Ed Sheeran guitar, PRS Wild Blue, baritone guitar, guitar gear, new guitars 2026, PRS limited edition, guitar innovation, NAMM Show, musician interviews Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Vincent Stoffer, Field Chief Technology Officer at Corelight, shares his predictions for 2026 and what security teams should prepare for in the coming year. With nearly a decade at Corelight and a background in network and security engineering, Stoffer brings a unique perspective on where the industry is heading.The conversation explores the emergence of the agentic SOC, where AI agents work alongside human analysts to accelerate detection, response, and incident resolution. Stoffer explains that while the protocols and tools have been in development, 2026 is the year organizations will finally see these capabilities deliver real results. The key differentiator, he notes, is data quality. Tools that provide rich, detailed, and comprehensive network evidence will thrive in this AI-enabled environment.Stoffer also addresses the persistent threat from nation-state actors, particularly China's Typhoon campaigns targeting critical infrastructure. From energy and telecoms to international partners, these threats continue to expand with AI-powered acceleration. Understanding your environment and detecting anomalous behavior remains essential for organizations facing these sophisticated adversaries.The discussion concludes with a look at post-quantum readiness. While quantum computing threats may be 10 to 20 years away, Stoffer emphasizes the importance of understanding cryptographic assets now. Corelight has published a white paper detailing how NDR provides the network visibility needed to locate cryptographic assets and plan migration to quantum-ready cipher suites.This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTVincent Stoffer, Field Chief Technology Officer at CorelightOn LinkedIn: https://www.linkedin.com/in/vincent-stoffer-07057827/RESOURCESLearn more about Corelight: https://corelight.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSVincent Stoffer, Corelight, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, agentic SOC, network detection and response, NDR, critical infrastructure security, nation-state threats, China Typhoon campaigns, Salt Typhoon, Volt Typhoon, post-quantum cryptography, quantum readiness, AI in cybersecurity, security operations, incident response, network visibility, Zeek Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Shopify Masters | The ecommerce business and marketing podcast for ambitious entrepreneurs
MANSCAPED, the men's grooming brand that pioneered below-the-belt care, sold out its first product in two weeks and scaled to $300 million in just three years. Founder Paul Tran shares how rapid iteration, customer feedback, and a razor-sharp focus turned a taboo idea into a global brand.For more on MANSCAPED and show notes click here Subscribe and watch Shopify Masters on YouTube!Sign up for your FREE Shopify Trial here.
The renewable energy sector faces a critical cybersecurity gap. As wind farms, solar installations, and battery energy storage systems proliferate across the globe, they create a decentralized network of digitally controlled assets that remain largely unprotected. Rafael Narezzi, Co-Founder and CEO of Cyber Energia, brings more than two decades of technology leadership experience to address this growing vulnerability in critical infrastructure.Cyber Energia takes a fundamentally different approach to OT security. While most cybersecurity companies stop at identifying risks through CVE scores and vulnerability assessments, Cyber Energia starts from the risk and translates it into financial terms that executives can act upon. The platform connects technical findings to compliance frameworks including NIS 2.0, IEC 62443, and NERC CIP, providing asset owners with a clear maturity landscape and actionable intelligence.Rafael Narezzi explains that asset owners in the renewable sector operate differently than traditional IT environments. Financial companies often acquire energy assets as investments without maintaining technical staff on-site. When compliance regulations now hold these owners personally liable for cybersecurity failures, they need tools that speak their language: dollars, risk, and return on investment. Cyber Energia prices its services per megawatt, demonstrating its commitment to speaking the language of energy.The decentralization of energy generation presents unique challenges. Rafael Narezzi points to recent cyber attacks on Poland's distributed grid as evidence that threat actors understand how to manipulate multiple remote locations simultaneously to destabilize power networks. Battery energy storage systems present particular risks, as compromised dispatch commands could create grid imbalances similar to the fictional scenario depicted in Ocean's 11. Yet many sites lack even basic cyber hygiene protections.Cyber Energia helps customers understand the financial impact of potential attacks. A 98-megawatt wind turbine site, for example, could lose 1.9 million dollars from just one week of downtime. This quantification enables executives to make informed decisions about relatively modest security investments that significantly reduce their risk exposure. The platform provides a single-view dashboard for organizations managing hundreds of sites across different regions, technologies, and regulatory environments.Rafael Narezzi observes that a CEO before a cyber attack is fundamentally different from a CEO after one. Organizations often underestimate digital risks compared to physical ones, despite living in an increasingly connected world. Regulations like NIS 2.0 now impose personal liability on directors and can revoke operating licenses, removing any excuse for neglecting cybersecurity. The awareness is changing, but Cyber Energia continues working to close the gap between compliance requirements and actual security posture across the renewable energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO of Cyber Energiahttps://www.linkedin.com/in/narezzi/RESOURCESCyber Energiahttps://cyberenergia.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Cyber Energia, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT cybersecurity, renewable energy security, critical infrastructure protection, NIS 2.0 compliance, IEC 62443, wind farm cybersecurity, solar energy security, battery energy storage systems, BESS security, decentralized energy grid, cyber risk quantification, energy sector compliance, NERC CIP, operational technology security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Ignite Digital Marketing Podcast | Marketing Growth Tips | Alex Membrillo
Scaling healthcare brands shouldn't mean sacrificing local trust, but for many growing systems, that's exactly what happens. On this episode of Ignite, Ashley Petrochenko, Cardinal's VP of Brand Marketing, sits down with Kim Craven, Director of Field Marketing at Ethos Veterinary Health, to unpack how multi-location healthcare organizations can scale sustainably without losing the local relevance patients rely on. Drawing from her work supporting 140+ specialty and emergency hospitals, Kim shares how strong marketing foundations, not shiny tactics, are what actually unlock growth at scale. The conversation breaks down why centralized data and attribution matter, how local storytelling builds confidence in moments of anxiety, and where AI fits once the basics are done right. The stakes are real. As budgets tighten and expectations rise, healthcare marketers need strategies that drive growth while protecting trust and experience. You will learn: How to scale local healthcare brands without diluting credibility Why patient stories outperform generic brand messaging What a frictionless digital front door really looks like How attribution and AI support smarter growth decisions If scaling without breaking trust is on your roadmap, this is the episode to queue up next. RELATED RESOURCES Connect with Kim - https://www.linkedin.com/in/kimberly-craven/ Is Your Organization Actually Ready for Marketing? - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/marketing-readiness/ Marketing + Operations: Why Total Alignment is Vital to Growth - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/healthcare-marketing-operations-alignment/ Why Capacity-Driven Marketing Is Non-Negotiable - https://www.cardinaldigitalmarketing.com/capacity-driven-marketing-media-investment-strategy/ Optimizing for AI Search: A New Era in Healthcare Marketing - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/optimizing-for-ai-search-a-new-era-in-healthcare-marketing/
In this episode of the Market Mentors podcast, Matt Dodgson speaks with Michelle Huff, CMO of Alteryx, about her extensive career in B2B SaaS marketing. They discuss the evolution of brand building, the importance of customer advocacy, and the challenges of making data analytics compelling. Michelle shares insights on leveraging AI in marketing strategies and offers practical advice for B2B marketers looking to enhance their careers in the rapidly changing landscape of technology.We cover:Michelle Huff's Career Journey in B2B SaaSSaaS Brand BuildingNavigating Customer Advocacy and Brand LoveLeveraging AI in Marketing and SalesThe Future of Marketing: Embracing AIAdvice for B2B Marketers in 2025Market Mentors is brought to you by Matt Dodgson, Co-Founder of Market Recruitment. Market Recruitment is a recruitment agency that connects B2B Tech & SaaS businesses with world class marketers to help them grow.If you'd like to be a future guest on the Market Mentors podcast, you can apply here.
In this special Best of 2025 episode of Time for a Reset: Insights from Global Brand Marketers, brought to you by Overline, we revisit the most defining marketing conversations of 2025 from eight global marketing leaders across CPG, retail, media, and technology. The episode explores what it truly means to reset marketing for sustainable growth. From rebalancing data with storytelling and fixing broken brand safety systems to evolving legacy brands, rethinking retail media, and refocusing digital advertising on real people. While each insight challenges conventional wisdom, this is where marketing leaders across industries need to be today. Together, these perspectives capture the ideas that shaped the year and point toward a more human, impactful future for marketing.Meet the guests:Lucas Mack: Senior Director of Brand Marketing & Communications, Kubota North AmericaNorm Johnston: SVP, Global Head of Advertising Strategy, News CorpVictoria Lozano: Chief Marketing Officer, CrayolaMo Kingston: Global Marketing Strategies Lead, NestléPaul Stafford: Former Head of Retail Media, Superdrug (now Head of Very Media Group)Mario Mijares: VP Marketing, Loyalty & Monetization Platforms, 7-ElevenAriela Nerubay Turndorf: Chief Marketing Officer, Grupo JumexPaul Wright: Head of EMEA, Uber AdvertisingIf you enjoyed this episode, be sure to subscribe, rate, and review on Apple Podcasts, Spotify, and YouTube. Instructions on how to do this are available here.Support the show
In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Ignite Digital Marketing Podcast | Marketing Growth Tips | Alex Membrillo
Most healthcare marketing breaks down when patient demand outpaces real clinical capacity. On this episode of Ignite, Ashley Petrochenko, Cardinal's VP of Brand Marketing, sits down with Joseph McLean, Director of B2C Marketing at Synergy Health Partners, to explore why patient acquisition only works when it is built around provider availability, operational reality, and access. Joseph shares how aligning marketing spend with physician schedules, clinic capacity, and patient urgency creates more predictable growth and less wasted budget. The conversation unpacks how capacity-driven marketing changes everything from bidding strategy to channel mix, and why close collaboration with operations and scheduling teams is essential for scalable patient acquisition. You will learn: How to align patient acquisition with real provider availability Ways to reduce wasted ad spend when schedules are full Why capacity visibility should guide media strategy and budgets How reviews, access, and outcomes influence booking decisions If patient acquisition feels unpredictable or inefficient, this episode will change how growth is approached. RELATED RESOURCES Connect with Joseph - https://www.linkedin.com/in/josephmaclean/ Why Capacity-Driven Marketing Is Non-Negotiable - https://www.cardinaldigitalmarketing.com/capacity-driven-marketing-media-investment-strategy/ How to Build a Full-Funnel Healthcare Marketing Strategy - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/healthcare-full-funnel-marketing-strategy/ 5-Step Paid Media Strategy to Attract Your Ideal Patients - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/paid-media-patient-acquisition-guide/ Marketing + Operations: Why Total Alignment is Vital to Growth - https://www.cardinaldigitalmarketing.com/healthcare-resources/blog/healthcare-marketing-operations-alignment/
For six years, I've used my personal brand to drive millions in revenue, but I kept hitting two major walls: I became the bottleneck when client work piled up, and I burned out from repetitively talking about the same niche topics. My breakthrough this year was finally decoupling my personal identity from my business's identity—allowing me to create content about whatever I'm obsessed with (like neurodiversity or general entrepreneurship) while my team mines that content to extract and repackage the specific pieces needed for our marketing. This shift has not only made content creation fun and sustainable again but has also removed the "assembly line" feeling and uncapped our growth potential.//Welcome to Repeatable Revenue, hosted by strategic growth advisor , Ray J. Green.About Ray:→ Former Managing Director of National Small & Midsize Business at the U.S. Chamber of Commerce, where he doubled revenue per sale in fundraising, led the first increase in SMB membership, co-built a national Mid-Market sales channel, and more.→ Former CEO operator for several investor groups where he led turnarounds of recently acquired small businesses.→ Current founder of MSP Sales Partners, where we currently help IT companies scale sales: www.MSPSalesPartners.com→ Current Sales & Sales Management Expert in Residence at the world's largest IT business mastermind.→ Current Managing Partner of Repeatable Revenue Ventures, where we scale B2B companies we have equity in: www.RayJGreen.com//Follow Ray on:YouTube | LinkedIn | Facebook | Twitter | Instagram
As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. Israel Mazin, Co-Founder and CEO of Memcyco, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.Memcyco is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, Memcyco identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.With an agentless deployment that takes just minutes to implement, Memcyco delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIsrael Mazin, Co-Founder and CEO of MemcycoOn LinkedIn: https://www.linkedin.com/in/israel-mazin-62215b/RESOURCESMemcyco: https://www.memcyco.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIsrael Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
In this Brand Highlight, we talk with Denny LeCompte, CEO and Co-Founder of Portnox, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.Note: This story contains promotional content. Learn more.GuestDenny LeCompte, CEO and Co-Founder of Portnoxhttps://www.linkedin.com/in/dennylecompte/ResourcesLearn more about Portnox: https://www.portnox.com/Are you interested in telling your story?Full Length Brand Story: https://www.studioc60.com/content-creation#fullBrand Spotlight Story: https://www.studioc60.com/content-creation#spotlightBrand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Does the outdoor industry overindex on brand? Alex Maier, President of OnWater, joins the show to challenge one of the outdoor industry's biggest assumptions: that brand marketing alone drives growth. Drawing from his experience in SaaS and outdoor, Alex breaks down why product marketing is the missing link for many brands, how listening to customers actually fuels innovation, and what outdoor companies can learn from software when it comes to adoption, retention, and trust. We unpack the difference between brand and product marketing, why emotion still matters in utility-driven storytelling, and how ignoring customer pain points leads to "zombie brands." About: This podcast is produced by Port Side, a creative production studio creating content strategy + production for active brands, rooted in emotion. Enjoy this episode and discover other resources below: Slack Community | Tired of brainstorming with ChatGPT? Join us! Insight Deck | Want 20 of our favorite insights shared on the show? Booklist | Here's our curated list of recommended books over the years. LinkedIn | Join the conversation and share ideas with other industry peers. Apple Podcast | Want to help us out? Leave us a review on Apple. Guest List | Have a Guest in Mind? Share them with us here.
In this Brand Highlight, we talk with Michael Roytman, CTO of Empirical Security, about a problem many security teams quietly struggle with: using general purpose AI tools for decisions that demand precision, forecasting, and accountability.Michael explains why large language models are often misapplied in security programs. LLMs excel at summarization, classification, and pattern extraction, but they are not designed to predict future outcomes like exploitation likelihood or operational risk. Treating them as universal problem solvers creates confidence gaps, not clarity.At Empirical, the focus is on preventative security through purpose built modeling. That means probabilistic forecasting, enterprise specific risk models, and continuous retraining using real telemetry from security operations. Instead of relying on a single model or generic scoring system, Empirical applies ensembles of models tuned to specific tasks, from vulnerability exploitation probability to identifying malicious code patterns.Michael also highlights why retraining matters as much as training. Threat conditions, environments, and attacker behavior change constantly. Models that are not continuously updated lose relevance quickly. Building that feedback loop across hundreds of customers is as much an engineering and operations challenge as it is a data science one.The conversation reinforces a simple but often ignored idea: better security outcomes come from using the right tools for the right questions, not from chasing whatever AI technique happens to be popular. This episode offers a grounded perspective for leaders trying to separate signal from noise in AI driven security decision making.Note: This story contains promotional content. Learn more.GUESTMichael Roytman, CTO of Empirical Security | On LinkedIn: https://www.linkedin.com/in/michael-roytman/RESOURCESLearn more about Empirical Security: https://www.empiricalsecurity.com/LinkedIn Post: https://www.linkedin.com/posts/bellis_a-lot-of-people-are-talking-about-generative-activity-7394418706388402178-uZjB/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, michael roytman, ed beis, empirical security, cybersecurity, ai, machinelearning, vulnerability, risk, forecasting, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinformation.Julian shares that most organizations are eager to activate tools like AI agents and copilots, yet few have addressed the underlying condition of their environments. Unstructured data sprawl, fragmented cloud architectures, and legacy systems create blind spots that AI does not fix. Instead, AI accelerates whatever already exists, good or bad.A central theme of the conversation is readiness. Julian explains that AI success depends on disciplined data classification, permission hygiene, and governance before automation begins. Without that groundwork, organizations risk exposing sensitive financial, HR, or executive data to unintended audiences simply because an AI system can surface it.The discussion also explores the operational reality beneath the surface. Most environments are a patchwork of Azure, AWS, on-prem infrastructure, SaaS platforms, and custom applications, often shaped by multiple IT leaders over time. When AI is layered onto this complexity without architectural clarity, inaccurate outputs and flawed business decisions quickly follow.Sean and Julian also examine how AI initiatives often emerge from unexpected places. Legal teams, business units, and individual contributors now build their own AI workflows using low-code and no-code tools, frequently outside formal IT oversight. At the same time, founders and CFOs push for rapid AI adoption while resisting the investment required to clean and secure the foundation.The episode highlights why AI programs are never one-and-done projects. Ongoing maintenance, data validation, and security oversight are essential as inputs change and systems evolve. Julian emphasizes that organizations must treat AI as a permanent capability on the roadmap, not a short-term experiment.Ultimately, the conversation frames AI not as a shortcut, but as a force multiplier. When paired with disciplined architecture and trusted guidance, AI enables scale, speed, and confidence. Without that discipline, it simply magnifies existing problems.Note: This story contains promotional content. Learn more.GUESTJulian Hamood, Founder and Chief Visionary Officer at TrustedTech | On LinkedIn: https://www.linkedin.com/in/julian-hamood/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, julian hamood, trusted tech, ai readiness, data governance, ai security, enterprise ai, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by complexity.Kumar shares how digital resilience is no longer a technical problem alone. Regulations, infrastructure dependencies, geopolitical tensions, supply chain exposure, and emerging technologies such as AI now converge into a single operational reality. Organizations that treat these as isolated issues often miss the real picture, where one decision quietly amplifies risk across multiple domains.A central theme of the conversation is proportion. Kumar emphasizes that risk management is not about eliminating uncertainty, but aligning effort with value. Not every threat matters equally to every organization. Understanding who you are, where you operate, and where you are going determines which signals deserve attention and which are simply noise.The discussion also reframes geopolitics as a daily business concern rather than a distant policy issue. Companies operate inside global power dynamics whether they acknowledge it or not. Technology choices, supplier relationships, and market expansion decisions increasingly carry political and regulatory consequences that surface quickly and without warning.Rather than advocating for massive new departments or rigid frameworks, Kumar outlines a practical approach. Organizations can decide whether to avoid, mitigate, transfer, or tolerate risk, then revisit those decisions as conditions change. This mindset supports growth and innovation while avoiding the false comfort of static checklists.The episode closes on culture. Effective risk management depends on listening across roles, disciplines, and seniority. Internal dissent, diverse viewpoints, and external validation are presented as assets, not obstacles. In a world where uncertainty is constant, resilience comes from clarity, not control.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.GUESTMegha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk at CyXcel | On LinkedIn: https://www.linkedin.com/in/drmeghakumarcyxcel/RESOURCESLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.