Podcasts about brand stories

  • 931PODCASTS
  • 2,380EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Oct 6, 2025LATEST

POPULARITY

20172018201920202021202220232024

Categories



Best podcasts about brand stories

Show all podcasts related to brand stories

Latest podcast episodes about brand stories

The Storytelling Lab
Brand Stories Grab Attention, But Brand Narratives Build Movements

The Storytelling Lab

Play Episode Listen Later Oct 6, 2025 21:42


“A story is a singular arc of transformation. A narrative is the thread that ties all your stories together.” — Rain BennettIs telling your brand story enough to build a loyal audience?In this episode, Rain Bennett breaks down the essential but often misunderstood difference between brand story and brand narrative. While most marketers focus on crafting engaging stories, Rain explains why the real secret to lasting brand trust lies in building a clear, consistent narrative thread that connects everything you do, from vision to product to marketing and sales.He uses powerful metaphors—from Hamilton to the Bible to Christmas lights—to help you see the structure of your storytelling system in a new way.You'll also learn how the Chief Storytelling Officer is the guardian of that narrative, ensuring every department speaks in harmony. If you've ever felt like your content is scattered or your message is missing the mark, this episode will show you how to realign your storytelling, as well as your business.In this episode, you will learn to:Distinguish between brand story and brand narrative—and why both are essentialUse narrative as a strategic compass for every department in your businessBuild trust and loyalty by aligning all stories under one cohesive threadCreate a system (not just content) to sustain long-term brand impactStep into the Chief Storytelling Officer role and protect your narrative across platformsFor more storytelling tips and tricks,Visit my website rainbennett.com or thestorytellinglabpodcast.comFollow me on TikTok @rainbennett.storyellerFollow me on Twitter @rainbennettFollow me on Instagram @rainbennettFollow me on Facebook @thestorytellinglab Subscribe to my Youtube Channel Hosted on Acast. See acast.com/privacy for more information.

Brand Story
Transforming Brands ft. Simon Hill

Brand Story

Play Episode Listen Later Oct 2, 2025 40:30


Here's the truth about brand. It isn't one-dimensional. The strongest brands create experiences across every sense, building memories that last long after a purchase. In episode 97 of Brand Story, Simon Hill, President, FutureBrand North America, shares how the best brands stand out in markets where products often look the same. We explore the frameworks FutureBrand uses to align leaders and global teams, how emotion tips decisions, and why consistency across every sense matters more than ever.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/transforming-brandsContinue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on: Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketingChapters:(00:00) Introduction & Simon Hill Welcome(01:22) Leading the London 2012 Olympic Bid(04:50) Lessons from Global Brand Campaigns(09:10) Shifting from Advertising to Brand Strategy(13:05) Working Closely with CEOs & Leaders(15:53) Making Brands Experiential & Human(18:33) The Transformation Ladder(23:40) The Future of Branding & Human Experience(27:06) Being Open to The Power of Brand(29:16) The Power of Human Insight(32:48) Swimming the English Channel for Charity(34:10) Fear, Adventure & Resilience(36:30) Embracing Competition & Growth(38:07) This Chapter of Life Investment(38:58) Advice to My Younger Self

How Stories Happen
Coaching call: Jay develops the premise of an entrepreneur and coach

How Stories Happen

Play Episode Listen Later Oct 2, 2025 41:59


Very excited for this one, my friend: I'm releasing a recording of a coaching call I had with entrepreneur Michelle Florendo, who runs a business called Powered by Decisions. You'll hear us walk through frameworks you can use to turn messy or scattered thinking into a clear and differentiated premise Michelle can use to strengthen her messaging and thought leadership.First, I share a primer on premise development. What's a premise, and what makes a premise effective?Then, you'll hear the full call with me and Michelle.Michelle is a decision engineer, which is an entire academic field of research and knowledge which frankly most of us need to understand more about!This is a fascinating look inside my process with clients and the process of turning your expertise into repeatable, powerful IP.Learn more about Michelle's work at poweredbydecisions.com.***ABOUT MEHello! I'm Jay Acunzo. I help experts and service providers clarify their ideas and create sustainable momentum. Together, we turn your expertise into a distinct premise, clear message, owned IP, and signature speeches. Stop chasing attention. Become the one others seek.You've done lots of things. Now it's time to [be] a thing. It's time to stop chasing attention and become the one others seek.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comNow here's a technique called "laddering down your message" which I use with clients and my own message to the world. You can understand me in three simple phrases, in order. Try crafting your own!Don't market more. Matter more. (

ITSPmagazine | Technology. Cybersecurity. Society
How F-Secure Transformed from Endpoint Security to Predicting Scams Before They Happen | A Brand Story Conversation with Dmitri Vellikok, Product and Business Development at F-Secure

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Sep 26, 2025 36:23


The cybersecurity industry operates on a fundamental misconception: that consumers want to understand and manage their digital security. After 17 years at F-Secure and extensive consumer research, Dmitri Vellikok has reached a different conclusion—people simply want security problems to disappear without their involvement.This insight has driven F-Secure's transformation from traditional endpoint protection to what Vellikok calls "embedded ecosystem security." The company, which holds 55% global market share in operator-delivered consumer security, has moved beyond the conventional model of asking consumers to install and manage security software.F-Secure's approach centers on embedding security capabilities directly into applications and services consumers already use. Rather than expecting people to download separate security software, the company partners with telecom operators, insurance companies, and financial institutions to integrate protection into existing customer touchpoints.This embedded strategy addresses what Vellikok identifies as cybersecurity's biggest challenge: activation and engagement. Traditional security solutions fail when consumers don't install them, don't configure them properly, or abandon them due to complexity. By placing security within existing applications, F-Secure automatically reaches more consumers while reducing friction.The company's research reveals the extent of consumer overconfidence in digital security. Seventy percent of people believe they can easily spot scams, yet 43% of that same group admits to having been scammed. This disconnect between perception and reality drives F-Secure's focus on proactive, invisible protection rather than relying on consumer vigilance.Central to this approach is what F-Secure calls the "scam kill chain"—a framework for protecting consumers at every stage of fraudulent attempts. The company analyzes scam workflows to identify intervention points, from initial contact through trust-building phases to final exploitation. This comprehensive view enables multi-layered protection that doesn't depend on consumers recognizing threats.F-Secure's partnership with telecom operators provides unique advantages in this model. Operators see network traffic, website visits, SMS messages, and communication patterns, giving them visibility into threat landscapes that individual security solutions cannot match. However, operators typically don't communicate their protective actions to customers, creating an opportunity for F-Secure to bridge this gap.The company combines operator-level data with device-level protection and user interface elements that inform consumers about threats blocked on their behalf. This creates what Vellikok describes as a "protective ring" around users' digital lives while maintaining transparency about security actions taken.Artificial intelligence and machine learning have been core to F-Secure's operations for over a decade, but recent advances enable more sophisticated predictive capabilities. The company processes massive data volumes to identify patterns and predict threats before they materialize. Vellikok estimates that within 18 to 24 months, F-Secure will be able to warn consumers three days in advance about likely scam attempts.This predictive approach represents a fundamental shift from reactive security to proactive protection. Instead of waiting for threats to appear and then blocking them, the system identifies risk patterns and steers users away from dangerous situations before threats fully develop.The AI integration also serves as a translation layer between technical security events and consumer-friendly communications. Rather than presenting technical alerts about blocked URLs or filtered emails, the system provides context about threats in language consumers can understand and act upon.F-Secure's evolution reflects broader industry recognition that consumer cybersecurity requires different approaches than enterprise security. While businesses can mandate security training and complex protocols, consumers operate in environments where convenience and simplicity drive adoption. The embedded security model acknowledges this reality while maintaining protection effectiveness.The company's global reach through operator partnerships positions it to address cybersecurity as a systemic challenge rather than an individual consumer problem. By aggregating threat data across millions of users and multiple communication channels, F-Secure creates network effects that improve protection for all users as the system learns from new attack patterns.Looking forward, Vellikok anticipates cybersecurity challenges will continue evolving in waves. Current focus on scam protection will likely shift to AI-driven threats, followed by quantum computing challenges. The embedded security model provides a framework for adapting to these changes while maintaining consumer protection without requiring users to understand or manage evolving threat landscapes. Learn more about F-Secure: https://itspm.ag/f-secure-2748Note: This story contains promotional content. Learn more. Guest: Dmitri Vellikok, Product and Business Development at F-Secure  On LinkedIn: https://www.linkedin.com/in/dmitrivellikok/ResourcesCompany Directory:https://www.itspmagazine.com/directory/f-secure Learn more about creating content with Sean Martin & Marco Ciappelli:  https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

How Stories Happen
Jordan Geary: Lessons from Sesame Workshop and an Emmy-Award Winning Producer

How Stories Happen

Play Episode Listen Later Sep 26, 2025 37:25


It's one thing for a solopreneur with a microphone to tell you to trust your own lived experiences to differentiate, resonate, and tell stronger stories. But what happens when there are millions of dollars at stake and millions of viewers consuming your work? Meet Jordan Geary, an Emmy Award-winning producer and storytelling expert. As the Senior Creative Producer of Current Series at Sesame Workshop, he helped shape iconic live-action and animated shows, including Ghostwriter and Helpsters for Apple TV+, Sesame Street Mecha Builders and Bea's Block for HBO Max, and over 300 Sesame Studios shorts for YouTube.In this episode, we hear and discuss a personal story of his, and you'll also hear:How Sesame Workshop ensures their stories connect (it actually involves ONE specific kind of moment they intentionally include each time)The questions you can ask yourself to resonate more consistentlyThe 1 thing Jordan previously believed about storytelling which his career experiences have forced him to rethinkLearn more about Jordan's work at jordangeary.com or follow him on Instagram.***ABOUT MEHello! I'm Jay Acunzo. I help experts and service providers clarify their ideas and create sustainable momentum. Together, we turn your expertise into a distinct premise, clear message, owned IP, and signature speeches. Stop chasing attention. Become the one others seek.You've done lots of things. Now it's time to [be] a thing. It's time to stop chasing attention and become the one others seek.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comNow here's a technique called "laddering down your message" which I use with clients and my own message to the world. You can understand me in three simple phrases, in order. Try crafting your own!Don't market more. Matter more. (

Personal Brand Story I Share your Story
Franziska Rengger I Von der Elevin zur Ballett-Flüsterin – mein Tanz durchs Leben

Personal Brand Story I Share your Story

Play Episode Listen Later Sep 26, 2025 67:41


In meinem Interview mit Franziska Rengger sprechen wir über ihr Leben für den Tanz. Mit sechs Jahren sieht sie in Basel den Nussknacker und ist sofort von der Zuckerfee verzaubert. Dort erlebt sie zum ersten Mal, was es heißt zu fallen – und wieder aufzustehen. Ihr Wunsch, selbst Ballett zu tanzen, ist geweckt, und ihre Eltern unterstützen sie dabei, diesen Traum zu verwirklichen.Franziska erzählt von ihren ersten Auftritten und dem Weg, der sie mit zwölf Jahren an die neu gegründete Ballett-Berufsschule in Zürich führt. Diese Zeit – und besonders ihre Mentorin – prägt sie nachhaltig. Vier Jahre später besteht sie die Aufnahmeprüfung an der Royal Ballet School in London und zieht in die englische Metropole. Wir sprechen darüber, was sie dort erlebte und wie es dazu kam, dass sie während eines Familienurlaubs in Berlin spontan in einer Company mittanzte. Der Leiter war begeistert und bot ihr direkt einen Hospitantenvertrag an.Mit nur 17 Jahren findet sich Franziska in der Berliner Compagnie zurecht, lernt schnell und erhält schon bald die Chance, im Nussknacker zu tanzen. Kurz darauf folgt ein Vertrag für die nächste Saison, und in wenigen Jahren interpretiert sie alle großen Klassiker. Doch als die Oper einen neuen Tanzdirektor bekommt, verändert sich das Klima. Franziska gerät in eine Essstörung und beschließt, diesen Weg nicht weiterzugehen.Sie stellt sich grundlegenden Fragen und ihren eigenen Glaubenssätzen. Nach verschiedenen Bewerbungen wechselt sie schließlich die Seite und beginnt eine Ausbildung zur Tanzpädagogin. Im Jahr 2000 eröffnet sie ihr eigenes Tanz- und Ballettstudio Zehlendorf, das sie nach ihren eigenen Vorstellungen aufbaut. Am 12. Oktober feiert sie das 25-jährige Jubiläum ihres Studios mit einer besonderen Tanzgala in der Urania Berlin – viele ehemalige Schüler reisen aus aller Welt an, um mitzutanzen.Im Gespräch erklärt Franziska, warum Tanz weit mehr ist als Bewegung: wie er Persönlichkeitsentwicklung fördert und echten Zusammenhalt schafft.Möchtest du mehr über Franziska und ihre Arbeit erfahren? Hier ist der Link zu ihrer Webseite und der zu der Tanzgala. Vernetz dich mit ihr auf LinkedIn und auf Instagram.Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auf meine Webseite oder vereinbare direkt einen Termin mit mir.Verpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunes Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram.Hier geht's zu den Shownotes Support the show

Leaders in Customer Loyalty, Powered by Loyalty360
#478: Leaders in Customer Loyalty: Brand Story | TELUS Transforms Loyalty by Delivering Value at Every Connection Point

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Sep 25, 2025 22:44 Transcription Available


Send us a textIn a rapidly evolving telecommunications landscape, where customer choice and switching costs continue to shift, TELUS is rising above the noise. As Canada's fastest-growing national telco, TELUS is redefining what it means to maintain loyalty—not just through connectivity, but by embedding value into every facet of the customer experience.  In this edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Jacob Pullia, who leads the national TELUS Rewards program. Pullia discusses the launch of the unified national program, the strategic partnerships driving deeper engagement, and how TELUS is adapting loyalty to match the needs of a price-sensitive, digitally enabled consumer base.  

The Master Your Business Podcast
143. How to Use Neuromarketing to Tell Brand Stories That Stick

The Master Your Business Podcast

Play Episode Listen Later Sep 23, 2025 21:43


Work with Deirdre to find, win and keep more of your ideal clients by creating your uniquely uncopyable brand strategy, story, offer, experience and more. —--How to Use Neuromarketing to Tell Brand Stories That StickMost stories don't sell. They don't even get remembered. They vanish. In this episode of the Master Your Business Podcast, I show you how to flip that script and engineer brand stories that actually stick using neuromarketing storytelling.You'll discover why some content disappears into the noise while others create unforgettable imprints in your client's mind. We're talking about harnessing the brain's chemicals… cortisol to grab attention, oxytocin to build trust, and dopamine to spark anticipation. This is the science behind stories that move people and make them buy.If you've been pouring energy into content marketing, LinkedIn posts, or small business visibility strategies and wondering why it's not landing, this episode is for you.

Behind The Thread
Caleb Ralston: How To Build A $1M Personal Brand People Obsess Over (FULL COURSE)

Behind The Thread

Play Episode Listen Later Sep 22, 2025 102:49


Get Auto DS for $1 for the next 30 days: https://platform.autods.com/register?ref=Mzg1Mjg2NA==Start your business today with Shopify: https://shopify.com/calumjohnsonDownload the "How to build a brand" workbook for the Caleb Ralston episode: https://calum.bio/pages/caleb-ralstonFollow Us!https://www.instagram.com/calumjohnson1/https://x.com/calum_johnson9https://www.instagram.com/calebralston/Timestamps00:00 Intro04:51 The biggest mistake with AI content (you sound like a robot!)09:56 The one lesson from Gary Vee that changed Caleb's career13:03 Alice in Wonderland & your brand's direction (powerful metaphor)15:27 How to reverse-engineer your brand outcome19:46 The Brand Journey Framework (4 must-ask questions)23:40 Why one clear goal beats chasing 10 outcomes25:14 The Brand Story Framework (3 steps to stand out)29:13 Find your contrarian belief (the secret sauce*)34:22 The exercise: flip industry clichés into your unique truth37:50 The power of polarizing beliefs40:09 Gary Vee's “Document, Don't Create” explained45:20 The 70/20/10 rule for testing content (and loving the flop)54:27 Why chasing virality traps most creators57:14 Storytelling 101: why vulnerability beats perfection1:02:40 Hooks that GRAB attention in 1 second1:06:50 How to find your audience's painful problem1:13:27 Every story needs this final piece (the storytelling framework)1:19:08 AI and the future of brand (what stays timeless)1:28:34 Why in-person connection is the ultimate moat1:33:00 What to focus on for the next 12 months (the one thing)1:36:00 Pushing through the “Dip” when you want to quitAbout Caleb RalstonCaleb Ralston has spent 16 years building brands, helping entrepreneurs like Gary Vaynerchuk and Alex Hormozi scale audiences of over 30 million followers and hundreds of millions in sales. In this episode, he shares the frameworks behind unforgettable personal brands: that includes the Brand Journey, the Brand Story framework, and the power of contrarian beliefs. From testing content that “flops” to building trust that converts, Caleb lays out a timeless playbook for anyone serious about standing out in a noisy, AI-driven world

Personal Brand Story I Share your Story
Pascal von Guérard I Meine größte Bremse war die Angst vorm Scheitern

Personal Brand Story I Share your Story

Play Episode Listen Later Sep 19, 2025 52:53


In meinem Interview mit Pascal von Guérard sprechen wir darüber, wie er mit der Leidenschaft seines Opas seine Berufung fand. Schon zu Beginn tauchen wir in ein spannendes Thema ein: die Herkunft seines Familiennamens. Zu dessen Namensgeber, seinem Vater, hat Pascal keinen Kontakt. Deshalb wurde schon früh sein Großvater zu seiner Leitfigur.Durch ihn entdeckt Pascal die Fotografie und fährt mit ihm kreuz und quer durch Nordrhein-Westfalen, um Straßenbahnen zu fotografieren. Als er sechs Jahre alt ist, schenkt ihm sein Opa die erste eigene Kamera. Nach dessen Tod landet die Kamera jedoch in der Ecke, bis Pascal bei der Berufswahl seine Liebe zur Kreativität neu entdeckt.Über Fan-Art nähert er sich digitaler Kunst und schließlich erneut der Fotografie, die nach dem Verlust des Großvaters eingeschlafen war. Er absolviert eine Ausbildung zum gestaltungstechnischen Assistenten, merkt aber schnell, dass er nicht als Angestellter arbeiten möchte. Aus seinem Jugendzimmer heraus macht er sich als Studio- und Porträtfotograf selbstständig.Pascal erzählt, wie er aus begrenzten Ressourcen das Beste herausholt. Wir sprechen über die Magie des ersten Auftrags, über Fehler und die Angst, neue Wege zu gehen.Mit der Zeit hört Pascal immer mehr Podcasts und startet schließlich einen eigenen Fotografie-Podcast. Begeistert von diesem Medium überzeugt er auch einen Freund, einen eigenen Podcast zu beginnen, übernimmt dessen Produktion und erkennt darin ein neues Geschäftsmodell.Wir sprechen über das Durchhaltevermögen von Podcaster, Themenfindung und Equipment. Zum Abschluss teilt Pascal seine wichtigsten Impulse: Findet eure Stimme und erzählt so viel wie möglich.Möchtest du mehr über Pascal und seine Arbeit erfahren? Hier ist der Link zu seiner Webseite. Vernetz dich mit ihm auf LinkedIn und folge seinem Podcast.Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auf meine Webseite oder vereinbare direkt einen Termin mit mir.Verpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunes Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram. Hier geht's zu den ShownotesSupport the show

Brand Story
The Devil Emails at Midnight ft. Mita Mallick

Brand Story

Play Episode Listen Later Sep 18, 2025 37:53


Bad bosses are everywhere. We've all worked with them, and if we're honest, we've all had moments where we've been them. In episode 96 of Brand Story, Mita Mallick, Wall Street Journal & USA Today Best Selling Author, returns to the podcast to talk about her new book, The Devil Emails at Midnight. We explore why toxic behaviors are so persistent in the workplace, how leaders can recognize when they're slipping into bad habits, and what it takes to build cultures that people actually want to be part of.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: https://www.gravitygroup.com/podcast/the-devil-emails-at-midnight/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on: Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) Introduction(2:37) Why Write About Bad Bosses(6:56) Owning Our Own Mistakes(9:00) The Archetypes of Bad Bosses - Spotlight Stealer(13:52) The Archetypes of Bad Bosses - Medusa(19:30) The Archetypes of Bad Bosses - The Grieving Boss(25:02) Common Behaviors of Bad Bosses - Toxic Positivity(30:25) The Devil Emails At Midnight(33:30) Self Awareness & Humility(35:43) What's Next & Final Takeaways

Leaders in Customer Loyalty, Powered by Loyalty360
#477: Leaders in Customer Loyalty: Brand Stories | Sephora's Emmy Brown Berlind on Innovation, Value, and Building Deeper Connections

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Sep 18, 2025 30:45 Transcription Available


Send us a textSephora has long been recognized as a leader in prestige beauty retail. Founded in France in the late 1960s, the brand introduced its now-famous open-selling concept that allowed shoppers to browse freely and test products across brands. Something unheard of in department store beauty counters of the time. When Sephora opened its first U.S. store in New York's Soho district in 1998, the concept was still relatively unknown. “Back then, few people knew who we were, and many brands didn't want to work with us as a newcomer,” recalls Emmy Brown Berlind, Senior Vice President, General Manager of Loyalty at Sephora. “So, we really built our business on creativity, differentiation, and the belief that beauty should be fun and inclusive, and that commitment continues to shape how Sephora connects with its clients.” That philosophy of inclusivity and discovery has powered Sephora's rise into the leading prestige beauty retailer in North America, with more than 700 stores and a vibrant digital ecosystem. A critical part of that growth has been the Beauty Insider loyalty program, launched in 2007. “The launch of our Beauty Insider program was part of a key differentiation that we were able to introduce to the market which led to a lot of loyalty with our clients and continues to support the growth of the business,” Berlind explains. 

Life After Corporate
229. Building Trust with Clients through Your Personal Brand Story With Mariana Henninger

Life After Corporate

Play Episode Listen Later Sep 16, 2025 34:47


What if the only thing standing between your business and rapid growth is the story you're telling—or not telling—about yourself?  In this episode of Life After Corporate, Deb Boulanger sits down with Mariana Henninger, Emmy award-winning filmmaker and emotion-led marketing expert, to reveal how women entrepreneurs can leverage emotion-led marketing and brand storytelling to create a magnetic personal branding presence. Whether you're overwhelmed by social media marketing or wondering how to harness video marketing to build trust in a crowded market, this conversation unpacks actionable trust-building strategies that help entrepreneurs become instantly recognizable and unforgettable.  Are you ready to transform your entrepreneur visibility and turn cold audiences into loyal clients with just one powerful story?   Go to LifeAfterCorporate.com/podcast for the full notes.   Connect with Deb Boulanger To Watch the Show, click HERE For Full Notes, Go to LifeAfterCorporate.com/podcast Connect with Deb on LinkedIn and Instagram,  Read More about Life After Corporate HERE     Connect with Mariana Henninger Website: http://brandmagnetic.com Instagram: http://instagram.com/brandmagnetic LinkedIn: Mariana Henninger | LinkedIn   More Episodes To Enjoy! Go to: LifeAfterCorporate.com/podcast 228. How to Scale to 7 Figures Without Burnout: A 90-Day Path with Sailynn Doyle 227. How Heidi Solomon-Orlick Built GirlzWhoSell and Redefined Success After 60 226. How Cinthia Pacheco Built a SEO-Driven Digital Marketing Agency   Tweetable Quotes from Mariana Henninger: “They should feel like you care about them individually as people and you care more than growing your business.” “Your story is not about you at this moment. You have all of the rest of your marketing to tell, all of your other anecdotes and stories.”   SUBSCRIBE & LEAVE A FIVE-STAR REVIEW and share this podcast to other growing entrepreneurs! Ready to turn insights into action? Don't just listen—join the movement! The Life After Corporate Community is where ambitious women like you connect, collaborate, and get the strategies, tools, and high-level support to grow a thriving, profitable business. Join us now and start making the powerful connections that will elevate your success! Connect with me on Instagram, LinkedIn, or checkout our website at www.lifeaftercorporatepodcast.com  

Leaders in Customer Loyalty, Powered by Loyalty360
#476: Leaders in Customer Loyalty: Brand Story | Building Loyalty Through Trust, Simplicity, and Scale: Inside ExxonMobil Egypt's Rewards+ Program

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Sep 11, 2025 29:29 Transcription Available


Send us a textFor over 120 years, ExxonMobil has been a trusted name in Egypt, offering high-quality lubricants and fuels through a vast network of more than 400 service stations and 250 Mobile One Centers. But as customer expectations evolve and convenience becomes king, ExxonMobil Egypt is leaning into customer loyalty as a competitive differentiator—transforming service stations from utilitarian fueling points into lifestyle destinations. In this edition of Loyalty360's Leaders in Customer Loyalty: Brand Stories, we speak with Karim Nour, Egypt Loyalty Head at ExxonMobil. Karim takes us inside the strategy behind Exxon Mobil Rewards+ program, shares insights on reaching digitally underserved segments, and explains why trust—not transactions—is the foundation of long-term loyalty in the Egyptian market. 

How Stories Happen
Neen James: how to create visual frameworks to elevate business

How Stories Happen

Play Episode Listen Later Sep 10, 2025 37:32


If you're an expert in something, chances are, you share content about that something. But so does everyone around you. Merely sharing your expertise makes you a commodity. I can get it anywhere, and I guess you're anywhere. That's why I routinely say, you need to stop creating content and start creating IP. Your IP is built on top of your premise, the core idea informing the rest, but more experts should also develop their signature frameworks, or what our guest today calls "contextual models." Your contextual models help turn complexity into simplicity, so people go, "Wow, I get it, and I see how much more there is to know. Take me through it."Today's wonderful guest (and a master of contextual modeling) is Neen James. She's a leadership strategist who has worked with brands like Viacom, Comcast, and the Four Seasons, a fantastic keynote speaker, and the author of multiple books, including Folding Time, Attention Pays, and her latest: Exceptional Experiences: Five Luxury Levers to Elevate Every Aspect of Your Business.In our episode, Neen shares how she develops her frameworks, then delivers a signature story from her speeches and her new book which we dissect and celebrate piece by piece.This is a rare and generous look at the process of one of my favorite business authors and speakers.***ABOUT ME - IN 3 PHRASESDon't market more. Matter more. (

Brand Story
Building Brand Loyalty ft. Phyllis Rothschild

Brand Story

Play Episode Listen Later Sep 4, 2025 38:43


How do you stand out in a crowded market where products all look the same? By building a brand that's authentic, consistent, and audience-first.In episode 95 of Brand Story, we speak with Phyllis Rothschild, CMO of Pete & Gerry's Organics, to explore how she helped turn a commodity into a mission-driven brand that people trust and stay loyal to. From redefining what loyalty really means to balancing creativity with consistency, this conversation highlights the marketing principles that make any brand stronger.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/building-brand-loyaltyContinue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on: Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) From Consulting to CMO(04:42) The Heart of Brand Loyalty(07:23) Mission Meets Marketing(11:44) Packaging & Brand Identity(13:19) Two Brands, One Family(16:26) Consumer Experience & Health Consciousness(18:52) Cutting Through Confusion(21:52) Educating at Shelf(24:25) Opportunities & Threats in Premium Eggs(29:00) Building Loyalty Beyond Discounts(30:34) Navigating Risk & Adventure in Marketing(34:55) Finding Joy in the Journey

How Stories Happen
Chris Ducker: why you need a catalyst story to increase influence

How Stories Happen

Play Episode Listen Later Sep 4, 2025 34:45


One of the hallmarks of great business storytellers is something called the catalyst story. They don't just shove their expertise at you like a wall of smarts. They take you on a journey. Often, in a speech, a book, or even just a single piece or post, they can retrace their own journey of discovery to ensure the audience cares and understands. Because you might be at letter Z of your understanding of something, but others start at A. You need to meet them in that reality, then move them to something better, beat by beat. That often starts at the start, with a story to catalyze it all. Today, we'll hear and analyze a great one, shared with us by the great Chris Ducker. Chris is a serial entrepreneur most known for founding the business Youpreneuer and his book, Rise of the Youpreneur, which helped people become known leaders in their industries.Over the past two decades, Chris has started, grown, bought, and sold a number of multi-million pound businesses, and his latest book is The Long-Haul Leader: The Strategies to Work Smarter, Live Better, and Achieve Lasting Success.He's spoken on countless stages, guested on infinite shows, and created a huge body of work online, but today, it's a closer look at his process like never before.***ABOUT ME - IN 3 PHRASESDon't market more. Matter more. (

Leaders in Customer Loyalty, Powered by Loyalty360
#473: Leaders in Customer Loyalty: Brand Story | From Scratch to Strategy: Building Loyalty at Church's Texas Chicken

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Sep 4, 2025 29:06 Transcription Available


Send us a textWhen Jay Jhun joined Church's Texas Chicken® three years ago, he stepped into a 73-year old legacy brand with a fiercely loyal guest base—but without a formal loyalty program in place. What followed was a fast-paced, ground-up effort to create a digital and loyalty ecosystem that could serve both the brand's long-standing values and its evolving customer expectations. Today, Jhun leads loyalty and digital strategy for the brand as Senior Director, and in less than a year since launching the brand's "Real Rewards" loyalty program, Church's has already seen measurable success in both digital engagement and emotional guest connection. 

Leaders in Customer Loyalty, Powered by Loyalty360
#474: Leaders in Customer Loyalty Brand Story | Red Carpet Loyalty: Cameo's Bold Bet on Experience-Driven Engagement

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Sep 4, 2025 26:02 Transcription Available


Send us a textIn an era where personalized experiences are rapidly becoming the cornerstone of customer loyalty, Steven Galanis and the team at Cameo are creating new opportunities for fans to engage with their favorite talent. As CEO and co-founder, Galanis has spearheaded a unique business that blends entertainment, technology, and loyalty innovation. "Cameo is a marketplace where you can book personalized video messages from tens of thousands of the most interesting people in pop culture," Galanis explains. "We started the business in 2017 with the idea that the selfie was the new autograph." From that simple premise, Cameo has grown into a platform with a 4.9-star rating in the App Store, millions of videos sold, and a dedicated base of super fans. Yet, Galanis admits the opportunity is still much larger than the current footprint. "People ask, 'Did you ever think Cameo would be this big?' And the truth is, I look at it every day, and I can't believe we're this small," he says. "We believe there's about 50 million people in the world that could be professional creators on Cameo. Today, we have 60,000." 

Billion Dollar Backstory
113: Why Mixing Up Job Stories and Brand Stories Hurts Your Pitch | Story Snacks Series

Billion Dollar Backstory

Play Episode Listen Later Sep 3, 2025 9:30


You've got your pitch deck. Your talking points. Your “why us” slide.But if you're telling the wrong story in meetings, none of that matters.In this episode, Stacy's diving into the two MVPs of storytelling for fund managers: the job story and the brand story. Think of them like the hammer and wrench in your toolbox, you need both, but you've gotta know when to use each.Inside this bite-sized episode, you'll learn: • What makes a job story different from a brand story (and why that mix-up matters) • Why every fund or strategy deserves its own tailored story • How constantly tweaking your brand story for the room can make your message… fuzzyThis is Story Snacks, a bite-sized, jam-packed series for fund managers who are ready to master strategic storytelling in under 20 minutes a week.Want More Help With Storytelling? +  Subscribe to my newsletter to get a weekly email that helps you use your words to power your growth:https://www.stacyhavener.com/subscribe  - - -Make The Boutique Investment Collective part of your Billion Dollar Backstory. Gain access to invaluable resources, expert coaches, and a supportive community of other boutique founders, fund managers, and investment pros. Join Havener Capital's exclusive membership. ---Running a fund is hard enough.Ops shouldn't be.Meet the team that makes it easier. | billiondollarbackstory.com/ultimus

Delivering Marketing Joy Webshow
DMJ Ep 563 - Crafting Compelling Brand Stories

Delivering Marketing Joy Webshow

Play Episode Listen Later Sep 3, 2025 14:09


In this weeks episode of Delivering #marketingjoy Kirby Hasseman sits down with Greg Logan to discuss the power of emotional connection in branding, crafting compelling brand stories, the connection that movies have to marketing, and the role of conflict in marketing. Watch now!

Stretch Marks
Allison Keating - The Psychology Behind Reclaiming the Family Meal Time

Stretch Marks

Play Episode Listen Later Sep 3, 2025 53:04


Bonus Episode for your September Reset:Eating together as a family (at least a few nights a week) builds stability, safety and connection and healthy food habits - and according to my guest Psychologist Allison Keating, the connection starts long before the first bite.Yes we had a summer of eating on the go but autumn, school and routine is here and its time to settle back in to the kitchen table - and here Bestselling Author Psychologist Allison Keating explains why.New research from HelloFresh reveals that family dinners in Ireland are in decline.The desire to reverse that trend is strong, with 85% wishing they could enjoy more family meals together. The biggest barriers are a lack oftime (58%), children's busy schedules (30%) and the sheer overwhelm of weeknight chores (23%).As the pressure to “do it all” mounts with the return to school, parents admit that dinnertime hasbecome less a cherished ritual and more a daily chore they struggle to keep up with. More than 80% ofthose aged 25 to 34 say they spend less time at family dinners than they did in the past, highlightinghow quickly the tradition is fading in households with young children.Here we talk about practical solutions to reduce the overwhelm of mealtimes, why children benefit from being involved in the prep and the psychological benefits (along with nutritive) for sharing a balanced meal as many evenings as you can manage together.Supported by Hello Fresh, Ireland's No1 Recipe BoxGet 50% off your First box HERE"The 40's Stretch" is a Stretch Marks Production,Hosted by Sinéad O'Moore, produced by The Brand Story and sound edited by Alan Breslin.Contact: stretchmarkspod@gmail.com Hosted on Acast. See acast.com/privacy for more information.

Leaders in Customer Loyalty, Powered by Loyalty360
#471: Leaders in Customer Loyalty: Brand Stories | Blain's Farm & Fleet: Cultivating Loyalty Through Customer Insight, Private Brands, and Purpose-Driven Innovation

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Aug 28, 2025 35:13 Transcription Available


Send us a textFor nearly 70 years, Blain's Farm & Fleet has stood as a trusted destination for rural and suburban consumers across the Midwest—earning its reputation as the “modern general store” through a steadfast commitment to community, convenience, and customer loyalty. In this edition of Leaders in Customer Loyalty: Brand Stories, we sat down with Aly Blawat, who leads Customer Research, Insights, Personalization Strategy, and Loyalty at Blain's Farm & Fleet, to learn more about how the brand continues to evolve its value proposition, listen deeply to its customers, and execute a loyalty strategy that's both personal and purpose-driven. 

Brand Story
Authentic Storytelling ft. Toby Myles

Brand Story

Play Episode Listen Later Aug 21, 2025 34:58


Toby Myles, Strategic Copywriter, knows the power of a good story, and she's built her business on helping others tell theirs. In episode 94 of Brand Story, she talks about why storytelling is the most human (and effective) marketing tool we have and how to spot stories hiding in plain sight. From her Spoonful of Comfort email marketing story to her Core 8 Story Hub framework, Toby offers insight on building genuine connections, creating empathetic campaigns, and making space for the moments that matter most.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: https://www.gravitygroup.com/podcast/authentic-storytelling/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on: Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) Introduction to Toby Myles(02:21) The Journey from Corporate to Entrepreneurship(06:25) Storytelling Roots and the Power of Listening(10:47) The Email That Changed Everything(14:47) Building the Core 8 Story Hub(20:20) Launching Her Origin Story(25:54) Rewriting the Rules of Work and Life(29:14) Fear, Adventure, and Doing It Her Way(31:37) This Chapter of Toby's Life

How Stories Happen
Jessica Abel: Author of my favorite book on storytelling ever

How Stories Happen

Play Episode Listen Later Aug 19, 2025 32:18


There are 2 books I recommend most often to others who say they want to be a stronger storyteller: one is from a world-famous legend, and the other is from our guest today. It's Jessica Abel, author of Out on the Wire: The Storytelling Secrets of the New Masters of Radio. This exceptional book just celebrated its ten-year anniversary.This book takes you inside the storytelling processes of the makers of This American Life, Serial, Radiolab, The Moth, Planet Money, and Snap Judgment, and the two voices taking you through the book (in cartoon narrator forms) are Jessica and ... Ira Glass!Today, Jessica operates under the brand the Autonomous Creative, where she offers coaching and education to creative entrepreneurs who need stronger business fundamentals (but delivered in a way appealing to creative minds).In this episode, we talk about:Rejecting the great lie creatives are told their whole lives, which only hurt your entrepreneurial endeavors The tension between creating art, creating a revenue engine, and the relationship between themWhat Jessica really endured (and how it broke her) to create my all-time favorite book about storytelling.Learn more about Jessica on her website or LinkedIn, and be sure to get your copy of Out on the Wire.MY MESSAGE TO YOU:Don't market more. Matter more. (

ITSPmagazine | Technology. Cybersecurity. Society
Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & More | Brand Story with ThreatLocker from Black Hat USA 2025

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 15, 2025 8:07


Event Recap: Kieran Human at Black Hat USA 2025 — ThreatLocker Unveils Configuration Defense, Achieves FedRAMP Status & MoreThreatLocker introduced DAC configuration monitoring and achieved FedRAMP certification at Black Hat 2025, strengthening zero trust capabilities while expanding government market access through practical security solutions.Zero trust security continues evolving beyond theoretical frameworks into practical business solutions, as demonstrated by ThreatLocker's latest announcements at Black Hat USA 2025. The company introduced Defense Against Configuration (DAC), a monitoring tool addressing a critical gap in zero trust implementations.Kieran Human, Special Projects Engineer at ThreatLocker, explained the challenge driving DAC's development. Organizations implementing zero trust often struggle with configuration management, potentially leaving systems vulnerable despite security investments. DAC monitors configurations continuously, alerting administrators to potential security issues and mapping findings to compliance frameworks including Essential 8.The tool addresses human factors in security implementation. Technical staff sometimes create overly permissive rules to minimize user complaints, compromising security posture. DAC provides weekly reports to executives, ensuring oversight of configuration decisions and maintaining security standards across the organization.ThreatLocker's approach distinguishes itself through "denied by default, allowed by exception" methodology, contrasting with traditional endpoint detection and response solutions that permit by default and block threats reactively. This fundamental difference requires careful implementation to avoid business disruption.The company's learning mode capabilities address deployment concerns. With over 10,000 built-in application profiles, ThreatLocker automates policy creation while learning organizational workflows. This reduces manual configuration requirements that previously made zero trust implementations tedious and time-intensive.FedRAMP certification represents another significant milestone, opening government sector opportunities. Federal compliance requirements previously excluded ThreatLocker from certain contracts, despite strong customer demand for their zero trust capabilities. This certification enables expansion into highly regulated environments requiring stringent security controls.Customer testimonials continue validating the approach. One user reported preventing three breaches after implementing ThreatLocker's zero trust solution, demonstrating measurable security improvements. Such feedback reinforces the practical value of properly implemented zero trust architecture.The balance between security and business functionality remains crucial. Organizations need security solutions that protect assets without hampering productivity. ThreatLocker's principle of least privilege implementation focuses on enabling business requirements with minimal necessary permissions rather than creating restrictive environments that impede operations.Human described working closely with CEO Danny Jenkins, emphasizing the collaborative environment that drives product innovation. His engineering perspective provides valuable insights into customer needs while maintaining focus on practical security solutions that work in real-world environments.As zero trust adoption accelerates across industries, tools like DAC become essential for maintaining security posture while meeting business demands. The combination of automated learning, configuration monitoring, and compliance mapping addresses practical implementation challenges facing security teams today.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Kieran Human, Special Project Engineer at ThreatLocker | On LinkedIn | https://www.linkedin.com/in/kieran-human-5495ab170/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Access Roulette: How to Stop Betting Your Security on Standing Privileges | A Brand Story with Ofir Stein, CTO and Co-Founder of Apono | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 15, 2025 18:19


At Black Hat 2025, Sean Martin sits down with Ofir Stein, CTO and Co-Founder of Apono, to discuss the pressing challenges of identity and access management in today's hybrid, AI-driven environments. Stein's background in technology infrastructure and DevOps, paired with his co-founder's deep cybersecurity expertise, positions the company to address one of the most common yet critical problems in enterprise security: how to secure permissions without slowing the pace of business.Organizations often face a tug-of-war between security teams seeking to minimize risk and engineering or business units pushing for rapid access to systems. Stein explains that traditional approaches to access control — where permissions are either always on or granted through manual processes — create friction and risk. Over-provisioned accounts become prime targets for attackers, while delayed access slows innovation.Apono addresses this through a Zero Standing Privilege approach, where no user — human or non-human — retains permanent permissions. Instead, access is dynamically granted based on business context and automatically revoked when no longer needed. This ensures engineers and systems get the right access at the right time, without exposing unnecessary attack surfaces.The platform integrates seamlessly with existing identity providers, governance systems, and IT workflows, allowing organizations to centralize visibility and control without replacing existing tools. Dynamic, context-based policies replace static rules, enabling access that adapts to changing conditions, including the unpredictable needs of AI agents and automated workflows.Stein also highlights continuous discovery and anomaly detection capabilities, enabling organizations to see and act on changes in privilege usage in real time. By coupling visibility with automated policy enforcement, organizations can not only identify over-privileged accounts but also remediate them immediately — avoiding the cycle of one-off audits followed by privilege creep.The result is a solution that scales with modern enterprise needs, reduces risk, and empowers both security teams and end users. As Stein notes, giving engineers control over their own access — including the ability to revoke it — fosters a culture of shared responsibility for security, rather than one of gatekeeping.Learn more about Apono: https://itspm.ag/apono-1034Note: This story contains promotional content. Learn more.Guest:Ofir Stein, CTO and Co-Founder of Apono | On LinkedIn: https://www.linkedin.com/in/ofir-stein/ResourcesLearn more and catch more stories from Apono: https://www.itspmagazine.com/directory/aponoLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, ofir stein, apono, zero standing privilege, access management, identity security, privilege creep, just in time access, ai security, governance, cloud security, black hat, black hat usa 2025, cybersecurity, permissions

ITSPmagazine | Technology. Cybersecurity. Society
Data Kidnapping: Because File Encryption Is So 2020 | A Brand Story with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 21:11


At Black Hat USA 2025, Sean Martin, co-founder of ITSPmagazine, sat down with Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, to discuss the findings from the company's latest ransomware report. Over the past five years, the research has tracked how attack patterns, targets, and business models have shifted—most notably from file encryption to data theft and extortion.Brett explains that many ransomware groups now find it more profitable—and less risky—to steal sensitive data and threaten to leak it unless paid, rather than encrypt files and disrupt operations. This change also allows attackers to stay out of the headlines and avoid immediate law enforcement pressure, while still extracting massive payouts. One case saw a Fortune 50 company pay $75 million to prevent the leak of 100 terabytes of sensitive medical data—without a single file being encrypted.The report highlights variation in attacker methods. Some groups focus on single large targets; others, like the group “LOP,” exploit vulnerabilities in widely used file transfer applications, making supply chain compromise a preferred tactic. Once inside, attackers validate their claims by providing file trees and sample data—proving the theft is real.Certain industries remain disproportionately affected. Healthcare, manufacturing, and technology are perennial top targets, with oil and gas seeing a sharp increase this year. Many victims operate with legacy systems, slow to adopt modern security measures, making them vulnerable. Geographically, the U.S. continues to be hit hardest, accounting for roughly half of all observed ransomware incidents.The conversation also addresses why organizations fail to detect such massive data theft—sometimes hundreds of gigabytes per day over weeks. Poor monitoring, limited security staffing, and alert fatigue all contribute. Brett emphasizes that reducing exposure starts with eliminating unnecessary internet-facing services and embracing zero trust architectures to prevent lateral movement.The ransomware report serves not just as a data source but as a practical guide. By mapping observed attacker behaviors to defensive strategies, organizations can better identify and close their most dangerous gaps—before becoming another statistic in next year's findings.Learn more about Zscaler: https://itspm.ag/zscaler-327152Note: This story contains promotional content. Learn more.Guest:Brett Stone-Gross, Senior Director of Threat Intelligence at Zscaler, | On LinkedIn: https://www.linkedin.com/in/brett-stone-gross/ResourcesLearn more and catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscalerLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, brett stone-gross, ransomware, data extortion, cyber attacks, zero trust security, threat intelligence, data breach, cyber defense, network security, file transfer vulnerability, data protection, black hat, black hat usa 2025, zscaler

ITSPmagazine | Technology. Cybersecurity. Society
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are | A Brand Story with Deidre Diamond, Founder and CEO of CyberSN, and Carraig Stanwyck, CEO and Former Fortune 200 CISO | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 21:45


In an industry where technology often takes the spotlight, Deidre Diamond, Founder and CEO of CyberSN, and Carraig Stanwyck, CEO and former Fortune 200 CISO, are making the case for a shift in focus—one where people, not just tools, drive operational success.Deidre's journey began in cyber talent matching, where she saw firsthand the persistent workforce challenges organizations face—burnout, retention struggles, and a lack of career planning. These challenges inspired the creation of a workforce risk management practice designed to quantify and address the human side of cybersecurity. The approach goes beyond staffing—it maps skills, capabilities, and job alignment in real time, enabling leaders to strategically plan their workforce instead of reacting to turnover.Carraig's perspective as a leader building teams across government, startup, and enterprise environments reinforces the message: “If you get the people right, everything else comes together.” Even leaders already committed to employee engagement often lack the visibility to fully understand capability gaps, skill utilization, and role misalignment. Carraig describes how moving from static spreadsheets to a dynamic platform revealed hidden opportunities—such as repositioning talent into roles that better matched their strengths—while also giving executives a clear capability-to-staffing view.This real-time insight changes everything. Leaders can create accurate job descriptions based on actual needs, build stronger business cases for budgets, and proactively plan for growth. The results aren't just operational—employees feel invested in, leading to greater fulfillment, better retention, and improved professional efficacy.Both Deidre and Carraig emphasize that this approach isn't just about solving today's staffing needs. It's about preparing for a future where emotional intelligence, creative collaboration, and adaptability will be more critical than ever. As AI takes on repeatable tasks, the human ability to think strategically, work cohesively, and innovate will define success.The takeaway is clear: cybersecurity's greatest asset isn't a piece of technology—it's a workforce that's understood, empowered, and aligned with the mission.Learn more about CyberSN: https://itspm.ag/cybersn-476941Note: This story contains promotional content. Learn more.Guests:Deidre Diamond, Founder and CEO of CyberSN | On LinkedIn: https://www.linkedin.com/in/deidrediamond/Carraig Stanwyck, CEO at 3 Tree Tech and former Fortune 200 CISO | On LinkedIn: https://www.linkedin.com/in/carraig-stanwyck/ResourcesLearn more and catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersnLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: marco ciappelli, deidre diamond, carraig stanwyck, cybersecurity, workforce management, talent retention, job descriptions, skills gap, leadership, employee engagement, career development, black hat, black hat usa, black hat 2025, workforce risk management

ITSPmagazine | Technology. Cybersecurity. Society
How to Automate Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M. | A Brand Story with Mike Wayne, Vice President, Global Sales at BlinkOps | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 19:46


Mike Wayne, responsible for global sales at BlinkOps, joins ITSPmagazine host Sean Martin to discuss how organizations can harness agentic AI to transform security operations—and much more.The conversation begins with a clear reality: business processes are complex, and when security is added into the mix, orchestrating workflows efficiently becomes even more challenging. BlinkOps addresses this by providing a platform that not only automates security tasks but also extends across HR, finance, sales, and marketing. By enabling automation in areas like employee onboarding/offboarding or access management, the platform helps organizations improve efficiency, reduce risk, and free human talent for higher-value work.Mike explains that while traditional SOAR tools require heavy scripting and ongoing maintenance, BlinkOps takes a different approach. Its security co-pilot allows users to describe automations in plain language, which are then generated—90% complete—by the system. Whether the user is a SOC analyst or an HR manager, the platform supports low-code and no-code capabilities, making automation accessible to “citizen developers” across the organization.The concept of micro agents is central. Instead of relying on large, complex AI models that can hallucinate or act unpredictably, BlinkOps uses focused, purpose-built agents with smaller context windows. These agents handle specific tasks—such as enriching security alerts—within larger workflows, ensuring accuracy and control.The benefits are tangible. One customer's triage agent processed 400 alerts in just eight days without direct human intervention, while another saved $1.8 million in manual endpoint deployment costs over a single month. Outcomes like reduced mean time to respond (MTTR) and faster time to automation are key drivers for adoption, especially when facing zero-day vulnerabilities where speed is critical.BlinkOps runs as SaaS, hybrid, or in secure environments like GovCloud, making it adaptable for organizations of all sizes and compliance requirements.The takeaway is clear: AI-driven automation doesn't just improve security operations—it creates new efficiencies across the enterprise. As Mike puts it, when a process can be automated, “just blink it.”Learn more about BlinkOps: https://itspm.ag/blinkops-942780Note: This story contains promotional content. Learn more.Guest: Mike Wayne, Vice President, Global Sales at BlinkOps | On Linkedin: https://www.linkedin.com/in/mikejwayne/ResourcesLearn more and catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkopsLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: sean martin, mike wayne, blink ops, ai automation, agentic ai, micro agents, security automation, soc automation, workflow automation, zero day response, alert triage, enrichment agent, low code automation, cyber security ai, enterprise automation, black hat usa, black hat 2025

ITSPmagazine | Technology. Cybersecurity. Society
Your Business Apps Are Bringing Friends You Didn't Invite | A Brand Story with Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 14, 2025 28:03


In an era where organizations depend heavily on commercial applications to run their operations, the integrity of those applications has become a top security concern. Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital, shares how protecting the software supply chain now extends far beyond open source risk.Zdjelar outlines how modern applications are built from a mix of first-party, contracted, open source, and proprietary third-party components. By the time software reaches production, its lineage spans geographies, development teams, and sometimes even AI-generated code. Incidents like SolarWinds, Kaseya, and CircleCI demonstrate that trusted vendors are no longer immune to compromise, and commercial software can introduce critical vulnerabilities or malicious payloads deep into enterprise systems.Regulatory drivers are increasing scrutiny. Executive Order 14028, Europe's Cyber Resilience Act, DORA, and U.S. Department of Defense software sourcing restrictions all require greater transparency, such as a Software Bill of Materials (SBOM). However, Zdjelar cautions that SBOMs—while valuable—are like ingredient lists without recipes: they don't reveal if a product is secure, just what's in it.ReversingLabs addresses this gap with a no-compromise analysis engine capable of deconstructing any file, of any size or complexity, to assess its safety. This capability enables organizations to make risk-based decisions, continuously monitor for unexpected changes between software versions, and operationalize controls at points such as procurement, SCCM deployments, or file transfers into critical environments.For CISOs, this represents a true technical control where previously only contractual clauses, questionnaires, or insurance policies existed. By placing analysis at the front of the software lifecycle, organizations can reduce reliance on costly manual testing and sandboxing, improve detection of tampering or hidden behavior, and even influence cyber insurance rates.The takeaway is clear: software supply chain security is a board-level concern, and the focus must expand beyond open source. With the right controls, organizations can avoid becoming the next headline-making breach and maintain trust with customers, partners, and regulators.Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57bNote: This story contains promotional content. Learn more.Guest: Saša Zdjelar, Chief Trust Officer at ReversingLabs and Operating Partner at Crosspoint Capital | On Linkedin: https://www.linkedin.com/in/sasazdjelar/ResourcesLearn more and catch more stories from ReversingLabs: https://www.itspmagazine.com/directory/reversinglabsLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: Black Hat 2025, Black Hat USA, sean martin, saša zdjelar, software supply chain security, commercial software risk, binary analysis, software bill of materials, sbom security, malicious code detection, ciso strategies, third party software risk, software tampering detection, malware analysis tools, devsecops security, application security testing, cybersecurity compliance

ITSPmagazine | Technology. Cybersecurity. Society
Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in Cybersecurity | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 13, 2025 19:05


Black Hat 2025: Crogl's CEO Monzy Merza Explains How AI Can Help Eliminate Alert Fatigue in CybersecurityCrogl CEO Monzy Merza discusses how AI-driven security platforms automate alert investigation using enterprise knowledge graphs, enabling analysts to focus on threat hunting while maintaining data privacy.Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At Black Hat USA 2025, Crogl CEO Monzy Merza revealed how his company is tackling one of cybersecurity's most persistent challenges: the overwhelming volume of security alerts that leaves analysts either ignoring potential threats or burning out from investigation fatigue.The problem runs deeper than most organizations realize. Merza observed analysts routinely closing hundreds of alerts with a single click, not from laziness or malice, but from sheer necessity. "When you look at the history of breaches, the signal of the breach was there. And somebody ignored it," he explained during his ITSPmagazine interview, highlighting a critical gap between alert generation and meaningful investigation.Traditional approaches have failed because they expect human analysts to become "unicorns" - experts capable of mastering multiple data platforms simultaneously while remembering complex query languages and schemas. This unrealistic expectation has created what Merza calls the "human unicorn challenge," where organizations struggle to find personnel who can effectively navigate their increasingly complex security infrastructure.Crogl's solution fundamentally reimagines the relationship between human intuition and machine automation. Rather than forcing analysts to adapt to multiple tools, the platform creates a semantic knowledge graph that maps data relationships across an organization's entire security ecosystem. When alerts arrive, the system automatically conducts investigations using established kill chain methodologies, freeing analysts to focus on higher-value activities like threat hunting and strategic security initiatives.The privacy-first architecture addresses growing concerns about data sovereignty. Operating as a completely self-contained system with no internet dependencies, Crogl can run air-gapped in the most sensitive environments, including defense intelligence communities. The platform connects to existing tools through APIs without requiring data movement, duplication, or transformation.Real-world results demonstrate the platform's versatility. One customer discovered their analysts were using Crogl for fraud detection - an application never intended by the original design. The system's ability to process natural language descriptions and convert them into executable security processes has reduced response times from weeks to minutes for complex threat hunting operations.For security leaders evaluating AI integration, Merza advocates an experimental approach. Rather than attempting comprehensive transformation, he suggests starting with focused pilot programs that address specific pain points. This measured strategy allows organizations to validate AI's value while maintaining operational stability.The broader implications extend beyond security operations. By removing technical barriers and emphasizing domain expertise over tool competency, platforms like Crogl enable security teams to become strategic business enablers rather than reactive alert processors. Organizations gain the flexibility to maintain their preferred data architectures while ensuring comprehensive security coverage across distributed environments.As cyber threats continue evolving, the industry's response must prioritize both technological capability and human potential. Solutions that enhance analyst intuition while automating routine tasks represent a sustainable path forward for security operations at scale. Watch the full interview: https://youtu.be/0GqPtPXD2ik Learn more about CROGL: https://itspm.ag/crogl-103909Note: This story contains promotional content. Learn more.Guest: Monzy Merza, Founder and CEO of CROGL | On Linkedin: https://www.linkedin.com/in/monzymerza/ResourcesLearn more and catch more stories from CROGL: https://www.itspmagazine.com/directory/croglAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability Management | A Brand Story with HD Moore, Founder and CEO of RunZero | A Black Hat USA 2025 Conference On Location Brand Story

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 13, 2025 20:21


The often-overlooked truth in cybersecurity: Seeing the Unseen in Vulnerability ManagementIn this episode, Sean Martin speaks with HD Moore, Founder and CEO of RunZero, about the often-overlooked truth in cybersecurity: the greatest risks are usually the things you don't know exist in your environment.Moore's career has spanned decades of penetration testing, tool creation, and product development, including leading the creation of Metasploit. That background shapes his approach at RunZero—applying attacker-grade discovery techniques to uncover devices, networks, and vulnerabilities that traditional tools miss. Why Discovery Matters MostThrough repeated penetration tests for high-security organizations, Moore observed a consistent pattern: breaches rarely occurred because defenders ignored known issues, but rather because attackers exploited unknown assets. These unknowns often bypassed mitigation strategies simply because they weren't on the organization's radar. Beyond CVEsMoore emphasizes that an overreliance on CVE lists leaves organizations blind to real-world risks. Many breaches stem from misconfigurations, weak credentials, or overlooked systems—problems that can be exploited within days of a vulnerability being announced. The answer, he says, is to focus on exposure and attack paths in real time, not just lists of patchable flaws. Revealing the GapsRunZero's approach often doubles the asset count organizations believe they have, uncovering systems outside existing scanning or endpoint management coverage. By leveraging unauthenticated discovery techniques, they detect exploitable conditions from an attacker's perspective—identifying forgotten hardware, outdated firmware, and network segmentation issues that open dangerous pathways. Changing the GameThis depth of discovery enables security teams to prioritize the small subset of issues that pose the highest business risk, rather than drowning in thousands of low-impact findings. It also helps organizations rebuild their security programs from the ground up—ensuring that every device is accounted for, properly segmented, and monitored. Collaboration and CommunityMoore also shares his ongoing contributions to open source through Project Discovery, integrating and enhancing tools like the nuclei scanner to accelerate vulnerability detection for everyone—not just paying customers. The message is clear: if you want to close the gaps, you first need to know exactly where they are—and that requires a new level of visibility most teams have never had.Learn more about runZero: https://itspm.ag/runzero-5733Note: This story contains promotional content. Learn more.Guest: HD Moore, Founder and CEO of RunZero | On Linkedin: https://www.linkedin.com/in/hdmoore/ResourcesLearn more and catch more stories from runZero: https://www.itspmagazine.com/directory/runzeroAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

How Stories Happen
Why some people earn passionate fans and others don't

How Stories Happen

Play Episode Listen Later Aug 13, 2025 21:10


Advice from experts feels like it's getting aggressive. This is why, and also what we can do to show up better.Happily, this is the difference between constantly pushing and hyping and, instead, actually communicating in ways that get a positive, passionate response despite the noise.MY MESSAGE TO YOU:Don't market more. Matter more. (

ITSPmagazine | Technology. Cybersecurity. Society
Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 | A Stellar Cyber Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Subo Guha

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 12, 2025 17:40


Stellar Cyber Revolutionizes SOC Cybersecurity Operations with Human-Augmented Autonomous Platform at Black Hat 2025 A Stellar Cyber Event Coverage of Black Hat USA 2025 Las VegasAn ITSPmagazine Brand Story with Subo Guha, Senior Vice President Product, Stellar Cyber____________________________Security operations centers face an unprecedented challenge: thousands of daily alerts overwhelming analyst teams while sophisticated threats demand immediate response. At Black Hat USA 2025 in Las Vegas, Stellar Cyber presented a revolutionary approach that fundamentally reimagines how SOCs operate in the age of AI-driven threats.Speaking with ITSPmagazine's Sean Martin, Subo Guha, Senior Vice President of Products at Stellar Cyber, outlined the company's vision for transforming security operations through their human-augmented autonomous SOC platform. Unlike traditional approaches that simply pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise.The platform's three-layer architecture ingests data from any source – network devices, applications, identities, and endpoints – while maintaining vendor neutrality through open EDR integration. Organizations can seamlessly work with CrowdStrike, SentinelOne, Sophos, or other preferred solutions without vendor lock-in. This flexibility proves crucial for enterprises navigating complex security ecosystems where different departments may have invested in various endpoint protection solutions.What sets Stellar Cyber apart is their autonomous SOC concept, which dramatically reduces alert volume from hundreds of thousands to manageable numbers within days rather than weeks. The platform's AI-driven auto-triage capability identifies true positives among thousands of false alarms, presenting analysts with prioritized "verdicts" that demand attention. This transformation addresses one of security operations' most persistent challenges: alert fatigue that leads to missed threats and burned-out analysts.The revolutionary AI Investigator copilot enables natural language interaction, allowing analysts to query the system conversationally. An analyst can simply ask, "Show me all impossible travel incidents between midnight and 4 AM," and receive actionable intelligence immediately. This democratization of security operations means junior analysts can perform at senior levels without extensive coding knowledge or years of experience navigating complex query languages.Identity threat detection and response (ITDR) emerged as another critical focus area during the Black Hat presentation. With identity becoming the new perimeter, Stellar Cyber integrated sophisticated user and entity behavior analytics (UEBA) directly into the platform. The system detects impossible travel scenarios, credential attacks, and lateral movement patterns that indicate compromise. For instance, when a user logs in from Portland at 11 PM and then appears in Moscow 30 minutes later, the platform immediately flags this physical impossibility.The identity protection extends beyond human users to encompass non-human identities, addressing the growing threat of automated attacks powered by large language models. Hackers now leverage generative AI to create credential attacks at unprecedented scale and sophistication, making robust identity security more critical than ever.Guha emphasized that AI augmentation doesn't displace security professionals but elevates them. By automating mundane tasks, analysts focus on strategic decision-making and complex threat hunting. MSSPs report dramatic efficiency gains, scaling operations without proportionally increasing headcount. Where previously a hundred thousand alerts might take weeks to process, requiring extensive junior analyst teams, the platform now delivers actionable insights within days with smaller, more focused teams.The platform's unified approach eliminates tool sprawl, providing CISOs with real-time visualization of their security posture. Executive reporting becomes instantaneous, with high-priority verdicts clearly displayed for rapid decision-making. This visualization capability transforms how security teams communicate with leadership, replacing lengthy reports with dynamic dashboards that convey risk and response status at a glance.Real-world deployments demonstrate significant operational improvements. Organizations report faster mean time to detection and response, reduced false positive rates, and improved analyst satisfaction. The platform's learning capabilities mean it becomes more intelligent over time, adapting to each organization's unique threat landscape and operational patterns.As organizations face increasingly sophisticated threats powered by generative AI, Stellar Cyber's human-augmented approach represents a paradigm shift. By combining AI intelligence with human intuition, the platform delivers faster threat detection, reduced false positives, and empowered security teams ready for tomorrow's challenges. The company's commitment to continuous innovation, evidenced by rapid feature releases between RSA and Black Hat, positions them at the forefront of next-generation security operations. Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947Note: This story contains promotional content. Learn more.Guest: Subo Guha, Senior Vice President Product, Stellar Cyber | https://www.linkedin.com/in/suboguha/ResourcesLearn more and catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyberLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
When Bots Rewrite the Buyer's Journey: Protecting Brand Value in the Age of AI Agents | An Akamai Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 19:58


At Black Hat USA 2025, Rupesh Chokshi, Senior Vice President and General Manager at Akamai Technologies, connected with ITSPmagazine's Sean Martin to discuss the dual realities shaping enterprise AI adoption—tremendous opportunity and significant risk.AI is driving a seismic transformation in business operations, with executive teams rapidly deploying proof-of-concept projects to capture competitive advantage. Yet, as Chokshi notes, many of these initiatives race ahead without fully integrating security teams into the process. While budgets for AI are expanding, funding for AI-specific security measures often lags behind, leaving organizations exposed.One of the most pressing concerns is the rise of AI bots—Akamai observes 150 billion such bots traversing networks daily. These bots scrape valuable digital content, train models on it, and, in some cases, replace direct customer interactions with summarized answers. The result? Lost marketing leads, disrupted sales funnels, and even manipulated product recommendations—all without traditional “breach” indicators.This is not just a security problem; it's a business continuity challenge. Organizations must develop strategies to block or manage scraping, including commercial agreements for content usage. Beyond this, the proliferation of conversational AI agents—whether for booking tickets, providing mortgage information, or recommending products—introduces new attack surfaces. Threat actors exploit prompt injections, jailbreaks, and code execution vulnerabilities to compromise these interfaces, risking both customer trust and brand reputation.Akamai's response includes capabilities such as Firewall for AI, providing in-line visibility and control over AI-driven sessions, and bot mitigation technologies that protect high-value content. By offering real-time threat intelligence tailored to customer environments, Akamai helps enterprises maintain agility without sacrificing protection.Chokshi's call to action is clear: every company is now an AI company, and security must be embedded from the outset. Boards should view security not as a budget line item, but as the foundation for innovation velocity, brand integrity, and long-term competitiveness.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
From Boardroom to Living Room: Securing the Modern Executive | A BlackCloak Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 22:38


In today's connected world, corporate executives and board members live in a digital space that extends far beyond their company's networks. Chris Pierson, CEO and Founder of BlackCloak, explains how protecting leaders requires more than traditional enterprise security—it calls for securing their personal digital lives.The threat landscape for high-profile individuals includes everything from compromised personal email accounts and hacked home networks to deepfake attacks and targeted identity theft. These risks not only threaten the individual but can cause significant financial and reputational damage to the companies they represent.BlackCloak addresses this by providing digital executive protection—securing executives, their families, and their homes with a blend of technology, privacy measures, and concierge-level service. This includes monitoring and removing data from brokers, detecting threats in the dark web, safeguarding home IoT devices, and even protecting yachts, jets, and vacation properties. The company also acts as an on-call cybersecurity and privacy advisor 24/7/365.A key component is the BlackCloak app, which serves as a security dashboard and communication hub. Through it, clients can see privacy risks being addressed in real time, receive alerts, and contact their dedicated concierge team. Behind the scenes, deception networks and active monitoring provide an extra layer of defense.Pierson highlights the growing convergence of cyber and physical threats. High-profile attacks and incidents in recent years underscore the importance of integrating cybersecurity with physical security, particularly for executives who are constantly in the public eye. With AI accelerating both the speed and sophistication of attacks, organizations need to consider a holistic approach—protecting not only networks and devices but the digital personas of their people.Ultimately, Pierson sees this as part of a broader shift toward making security a lifestyle component for executives, much like comprehensive healthcare benefits. It's about creating an always-on layer of protection that travels with them—whether they're in the office, at home, or halfway around the world.Learn more about BlackCloak: https://itspm.ag/itspbcwebNote: This story contains promotional content.Learn more.Guest:Chris Pierson, Founder & CEO, BlackCloak | https://www.linkedin.com/in/drchristopherpierson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations

ITSPmagazine | Technology. Cybersecurity. Society
Simplifying Security Without Sacrificing Control | A ThreatLocker Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Danny Jenkins

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 11, 2025 19:25


At Black Hat USA 2025, Danny Jenkins, CEO of ThreatLocker, shares how his team is proving that effective cybersecurity doesn't have to be overly complex. The conversation centers on a straightforward yet powerful principle: security should be simple enough to implement quickly and consistently, while still addressing the evolving needs of diverse organizations.Jenkins emphasizes that the industry has moved beyond selling “magic” solutions that promise to find every threat. Instead, customers are demanding tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. ThreatLocker's platform is built on this premise, enabling over 54,000 organizations worldwide to maintain a secure environment without slowing business operations.A highlight from the event is ThreatLocker's Defense Against Configurations (DAC) module. This feature performs 170 daily checks on every endpoint, aligning them with compliance frameworks like NIST and FedRAMP. It not only detects misconfigurations but also explains why they matter and how to fix them. Jenkins admits the tool even revealed gaps in ThreatLocker's own environment—issues that were resolved in minutes—proving its practical value.The discussion also touches on the company's recent FedRAMP authorization process, a rigorous journey that validates both the product's and the company's security maturity. For federal agencies and contractors, this means faster compliance with CMMC and NIST requirements. For commercial clients, it's an assurance that they're working with a partner whose internal security practices meet some of the highest standards in the industry.As ThreatLocker expands its integrations and modules, Jenkins stresses that simplicity remains the guiding principle. This is achieved through constant engagement with customers—at trade shows, in the field, and within the company's own managed services operations. By actively using their own products at scale, the team identifies friction points and smooths them out before customers encounter them.In short, the message from the booth at Black Hat is clear: effective security comes from strong fundamentals, simplified management, and a relentless focus on the user experience.Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content. Learn more.Guest: Danny Jenkins, CEO of ThreatLocker | On LinkedIn | https://www.linkedin.com/in/dannyjenkinscyber/ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerLearn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Origin Story with Anders Søborg, Co-Founder of Eve, and Mark Humphrey

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 5, 2025 41:47


Governance, risk, and compliance (GRC) has long been burdened by heavy manual processes, slow assessments, and limited visibility. In this Brand Story episode, Sean Martin and Marco Ciappelli are joined by Anders Søborg, Co-Founder of Eve, and Mark Humphrey, who brings two decades of fraud and cybersecurity experience to the team. Together, they unpack how Eve is challenging traditional GRC tools by offering something entirely different: automation with evidence-based intelligence at its core.Anders shares how his experience as Chief Risk Officer and partner at major firms like Ernst & Young and PwC shaped Eve's mission. He describes a world where compliance doesn't have to mean complexity. Eve's AI engine evaluates more than a thousand controls in under 15 minutes—surpassing manual reviews that could take weeks—and goes a step further by offering recommendations, not just red flags.This isn't about replacing people. It's about helping overwhelmed compliance, risk, and audit teams regain control. Mark emphasizes how Eve operates like a true partner, delivering support with no ego and full transparency. Their approach combines deep regulatory knowledge, contextual AI agents trained on real-world frameworks, and a clear respect for data sovereignty and privacy—an essential requirement for global pharma, financial, and consulting clients already relying on the platform.More than a dashboard, Eve acts as an intelligent engine embedded into existing workflows via API, making it a natural complement—not a competitor—to existing GRC platforms. The platform is customizable, evidence-driven, and built with firsthand knowledge of what compliance professionals actually need: clear guidance, real-time answers, and fewer repetitive tasks.The episode leaves listeners with a compelling question: what if your compliance program could coach your team, reduce audit costs, and provide instant visibility—without sacrificing accuracy or control?Learn more about E-V-E GRC: https://itspm.ag/eve-grc-99Note: This story contains promotional content. Learn more.Guests:Anders Søborg, Co-founder, Director at E-V-E GRC | On LinkedIn: https://www.linkedin.com/in/anders-s%C3%B8borg-3826702/Mark Humphrey, Senior Sales and Channel Director EMEA at E-V-E GRC | On LinkedIn: https://www.linkedin.com/in/m-humphrey-mba-0020192b1/ResourcesRedefine Compliance. Unleash Your Potential with E-V-E GRC. Command Compliance: https://itspm.ag/e-v-e-i1mlLearn more and catch more stories from E-V-E GRC: https://www.itspmagazine.com/directory/evegrcLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

How Stories Happen
Tom Webster: podcasting's top researcher on how to tell the story of numbers

How Stories Happen

Play Episode Listen Later Aug 5, 2025 34:43


We're presented with a lot of false choices in our work: Quantity or quality? Revenue or social impact? Sweet or savory? But few false choices are more worth challenging than this: Are you more emotional storyteller or data-driven communicator?Our guest today is the perfect person to challenge this assumption. It's Tom Webster! Tom is a legend in the podcast space. He's a partner at Sounds Profitable, an organization which researches and seeks to grow the audio business. For nearly three decades, Tom's insights and advice have helped steer this entire industry forward, and he's led hundreds of audience research projects for organizations spanning six continents and shows ranging from Howard Stern to All Things Considered.Tom's book is called The Audience Is Listening: A Little Guide to Building a Big Podcast, and just before this episode, Tom and Sounds Profitable won an award for Best Data Storytelling from the Content Marketing Institute.It's only fitting that he shares with us in this episode how to tell the stories of numbers, as well as the 3 traits to a podcast or any project capable of finding passionate fans.ABOUT ME, JAY ACUNZO:Subscribe to my free newsletter at jayacunzo.com/newsletterWork with me one-on-one: jayacunzo.com/servicesBook me to speak to your group: jayacunzo.com/keynotesConnect with me on social: LinkedIn, InstagramI help experts differentiate and resonate. Together, I work with you to develop a distinct and memorable premise driving your platform, turn that big idea into signature IP you own, and help you embody it as a speaker and storyteller. Compete on the impact of your thinking, not the volume of your marketing. This makes it easier to win more and better clients.You've done lots of things. Now it's time to [be] a thing. Stop chasing attention and become more highly sought.***TO RATE AND REVIEW THE SHOW:Leave a review on Apple Podcasts Leave a rating on Spotify  JOIN MY PUBLIC SPEAKING ACCELERATOR:Enrollment is now open for my 8-week virtual program, with personalized 1:1 support and group coaching calls, along with video lessons, video reviews of your speech, and more. Reserve your spot. Space is limited. Visit jayacunzo.com/signaturetalk — the next cohort starts September 8.

ITSPmagazine | Technology. Cybersecurity. Society
When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Chris Pierson

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Aug 4, 2025 18:01


Digital risk is no longer confined to the enterprise perimeter. Executives and board members—along with their families—are increasingly targeted outside of work, in personal settings, and online. Dr. Chris Pierson, Founder and CEO of BlackCloak, joins Sean Martin and Marco Ciappelli to discuss the current state of digital executive protection and why a piecemeal approach is insufficient.Chris outlines how threats to privacy, cybersecurity, and physical safety intersect across personal and professional domains. A breached home network, a deepfake circulating online, or a targeted social engineering campaign could all become entry points back into a company's infrastructure—or lead to reputational or financial fallout. That's why BlackCloak takes a holistic view, combining identity protection, device hardening, social listening, concierge response, and physical risk monitoring into a single service.One of the key resources discussed is the vendor-agnostic Digital Executive Protection Framework. Free to download and use, it offers CISOs and CSOs a 14-point checklist covering areas like financial data protection, social media monitoring, physical threats, and personal cyber hygiene. According to Chris, it's designed to be practical, actionable, and easy to integrate into quarterly reviews and budget planning cycles.While many security vendors promise protection through tools alone, BlackCloak emphasizes relationships—human connection is built into the service. The platform includes real-time threat response and one-on-one interaction, going far beyond 1-800 numbers or chatbots.Whether you're managing executive risk for a Fortune 500 company or navigating new board-level cyber obligations, this conversation outlines the real gaps in current corporate protections—and a solution that meets executives where they are.Learn more about BlackCloak: https://itspm.ag/itspbcwebNote: This story contains promotional content.Learn more.Guest:Chris Pierson, Founder & CEO, BlackCloak | https://www.linkedin.com/in/drchristopherpierson/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-storyKeywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operations

eCommerce Evolution
From Farm to Top 1% Shopify Store: How Fresh Chili Company Built a Multi-Million Brand Through Authentic Storytelling

eCommerce Evolution

Play Episode Listen Later Jul 31, 2025 41:33 Transcription Available


When most brands struggle to break through the noise online, Chris Lang and Fresh Chili Company cracked the code by doing something radically different: they started with story, not sales. In this episode, discover how a small New Mexico chili company became a top 1% Shopify store with explosive 85% year-over-year growth, a 4.96% conversion rate, and 3.74% ROAS—all while building an engaged community that devours their content faster than NBA games get views.Chris reveals the exact strategies behind their meteoric rise, from leveraging organic social as a testing ground for paid ads to creating "addictive" content that turns customers into brand evangelists. This isn't another generic growth story—it's a masterclass in building authentic connections that drive real business results.—Sponsored by OMG Commerce - go to (https://www.omgcommerce.com/contact) and request your FREE strategy session today!—Chapters: (00:00) Introduction to Fresh Chile Company(02:30) History of The Chili Capital of the World(07:03) Keys to Success: Storytelling & Community(11:20) Balancing Organic and Paid Strategies(16:57) Creative Content & Testing Philosophy(21:47) Building a Brand Story(24:22) Search Visibility(27:46) SEO Strategies & Content Plans(34:20) How Fresh Chile Builds Community—Connect With Brett: LinkedIn: https://www.linkedin.com/in/thebrettcurry/ YouTube: https://www.youtube.com/@omgcommerce Website: https://www.omgcommerce.com/ Relevant Links:Chris' LinkedIn: https://www.linkedin.com/in/chrislangsocial/Fresh Chile Website: https://freshchileco.com/_Past guests on eCommerce Evolution include Ezra Firestone, Steve Chou, Drew Sanocki, Jacques Spitzer, Jeremy Horowitz, Ryan Moran, Sean Frank, Andrew Youderian, Ryan McKenzie, Joseph Wilkins, Cody Wittick, Miki Agrawal, Justin Brooke, Nish Samantray, Kurt Elster, John Parkes, Chris Mercer, Rabah Rahil, Bear Handlon, JC Hite, Frederick Vallaeys, Preston Rutherford, Anthony Mink, Bill D'Allessandro, Jeff Oxford, Bryan Porter and more

Brand Story
Creativity in Business ft. John McNeil

Brand Story

Play Episode Listen Later Jul 31, 2025 62:20


In episode 93 of Brand Story, we sit down with John McNeil, Founder & CEO of John McNeil Studio, for a candid conversation about what it really means to build a brand. From his early days in traditional agencies to pioneering the studio model, John shares how his team helps brands move beyond deliverables to a system where everything from strategy to media to brand experience works together.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: https://www.gravitygroup.com/podcast/creativity-in-business/https://www.linkedin.com/in/johnmcneil/https://www.johnmcneilstudio.com/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on: Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) John's Early Agency Years(04:43) Breaking into Creativity(09:04) Founding John McNeil Studio(11:50) Everything is Media(16:00) Rethinking the Brand Process(18:25) The Promise and Pitfalls of AI(24:25) Authenticity as a Differentiator(29:23) Strategy + Creativity as One(48:45) The Power of Brand Labs(51:55) Looking Ahead: The Studio Model

The Home Builder Digital Marketing Podcast
Episode #279: Building a Brand Story Around Community - Monaca Onstad

The Home Builder Digital Marketing Podcast

Play Episode Listen Later Jul 30, 2025 30:15


This week on The Home Builder Digital Marketing Podcast, Monaca Onstad of OnPlace joins Greg and Kevin to discuss how home builders can build a brand story around the communities they build in and connect more authentically with home buyers. https://www.buildermarketingpodcast.com/episodes/279-building-a-brand-story-around-community-monaca-onstad

Selling on Amazon with Andy Isom
#494 - Why Your Brand Story Isn't Selling and How to Fix It

Selling on Amazon with Andy Isom

Play Episode Listen Later Jul 29, 2025 7:04


Your Amazon Brand Story module might be costing you sales. In this episode of Built by Business, Andy breaks down why most sellers use the Brand Story feature wrong and how to fix it to build trust, drive conversions, and increase your listing performance.   Learn the three reasons your Brand Story isn't working, and follow Andy's simple 3-block fix to turn it into a high-converting sales asset. From proof-driven visuals to smart layout decisions, this episode will show you how to unlock the real potential of Brand Story and A+ Content.   Claim your Free Amazon Brand Audit at www.weavos.io

ITSPmagazine | Technology. Cybersecurity. Society
ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John Lilliston

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 17:51


ThreatLocker to Unveil Game-Changing Zero Trust Innovations at Black Hat 2025 | Visit Them at Booth #1933 | A ThreatLocker Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with John LillistonJoin ITSP Magazine's Marco Ciappelli and Sean Martin as they preview ThreatLocker's exciting Black Hat 2025 presence with Detect Product Director John Lilliston. Discover upcoming major announcements, hands-on hacking demos, and how ThreatLocker's default deny approach is revolutionizing enterprise cybersecurity through comprehensive zero trust implementation.As Black Hat USA 2025 approaches, cybersecurity professionals are gearing up for one of the industry's most anticipated events. ITSP Magazine's Marco Ciappelli and Sean Martin recently sat down with John Lilliston, ThreatLocker's Detect Product Director, to preview what promises to be an exciting showcase of zero trust innovation at booth 1933.ThreatLocker has become synonymous with the "default deny" security approach, a philosophy that fundamentally changes how organizations protect their digital assets. Unlike traditional security models that allow by default and block known threats, ThreatLocker's approach denies everything by default and allows only approved applications, network communications, and storage operations. This comprehensive strategy operates across application, network, and storage levels, creating what Lilliston describes as a "hardened system that stops adversaries in their tracks."The company's rapid growth reflects the industry's embrace of zero trust principles, moving beyond buzzword status to practical, enterprise-ready solutions. Lilliston, who joined ThreatLocker in February after evaluating their products from the enterprise side, emphasizes how the platform's learning mode and ring fencing capabilities set it apart from competitors in the application control space.At Black Hat 2025, ThreatLocker will demonstrate their defense-in-depth strategy through their Detect product line. While their primary zero trust controls rarely fail, Detect provides crucial monitoring for applications that must run in enterprise environments but may have elevated risk profiles. The system can automatically orchestrate responses to threats, such as locking down browsers exhibiting irregular behavior that might indicate data exfiltration attempts.Visitors to booth 1933 can expect hands-on demonstrations and on-demand hacking scenarios that showcase real-world applications of ThreatLocker's technology. The company is preparing major announcements that CEO Danny Houlihan will reveal during the event, promising game-changing developments for both the organization and its client base.ThreatLocker's Black Hat agenda includes a welcome reception on Tuesday, August 5th, from 7-10 PM at the Mandalay Bay Complex, and Houlihan's presentation on "Simplifying Cybersecurity" on Thursday, August 7th, from 10:15-11:05 AM at Mandalay Bay J.The convergence of practical zero trust implementation, cutting-edge threat detection, and automated response capabilities positions ThreatLocker as a key player in the evolving cybersecurity landscape, making their Black Hat presence essential viewing for security professionals seeking comprehensive protection strategies.Keywords: Black Hat 2025, zero trust security, cybersecurity conference, ThreatLocker, default deny strategy, endpoint protection, application control, threat detection, enterprise security, network security, cybersecurity solutions, security automation, malware prevention, cyber threats, information security, security platform, Black Hat USA, cybersecurity innovation, managed detection response, security operationsLearn more about ThreatLocker: https://itspm.ag/threatlocker-r974Note: This story contains promotional content.Learn more.Guests:John LillistonCybersecurity Director | Threat Detection & Response | SOC Leadership | DFIR | EDR/XDR Strategy | GCFA, GISP | https://www.linkedin.com/in/john-lilliston-4725217b/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlockerThreatLocker® Welcome Reception | Don't gamble with your security! Join us at Black Hat for a lively Welcome Reception hosted by ThreatLocker®. Meet our Cyber Hero® Team and dive into discussions on the latest advancements in ThreatLocker®Endpoint Security. It's a great opportunity to connect and learn together! ‍‍Time: 7PM - 10PM | Location: Mandalay Bay Complex RSVP below and we'll send you a confirmation email with all the details.[ Welcome Reception RSVP ]Learn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Supply Chain Transparency Isn't Just Technical—It's a Business Imperative | A LevelBlue Brand Story with Theresa Lanowitz

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 29, 2025 36:18


As digital infrastructure becomes increasingly interwoven with third-party code, APIs, and AI-generated components, organizations are realizing they can't ignore the origins—or the risks—of their software. Theresa Lanowitz, Chief Evangelist at LevelBlue, joins Sean Martin and Marco Ciappelli to unpack why software supply chain visibility has become a top concern not just for CISOs, but for CEOs as well.Drawing from LevelBlue's Data and AI Accelerator Report, part of their annual Futures Report series, Theresa highlights a striking correlation: 80% of organizations with low software supply chain visibility experienced a breach in the past year, while only 6% with high visibility did. That data underscores the critical role visibility plays in reducing business risk and maintaining operational resilience.More than a technical concern, software supply chain risk is now a boardroom topic. According to the report, CEOs have the highest awareness of this risk—even more than CIOs and CISOs—because of the direct impact on brand reputation, stock value, and partner trust. As Theresa puts it, software has become the “last mile” of digital business, and that makes it everyone's problem.The conversation explores why now is the time to act. Government regulations are increasing, adversarial attacks are intensifying, and organizations are finally beginning to connect software vulnerabilities with business outcomes. Theresa outlines four critical actions: leverage CEO awareness, understand and prioritize vulnerabilities, invest in modern security technologies, and demand transparency from third-party providers.Importantly, cybersecurity culture is emerging as a key differentiator. Companies that embed security KPIs across all business units—and align security with business priorities—are not only more secure, they're also more agile. As software creation moves faster and more modular, the organizations that prioritize visibility and responsibility throughout the supply chain will be best positioned to adapt, grow, and protect their operations.Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber]On LinkedIn | https://www.linkedin.com/in/theresalanowitz/ResourcesTo learn more, download the complete findings of the LevelBlue Threat Trends Report here: https://itspm.ag/levelbyqdpTo download the 2025 LevelBlue Data Accelerator: Software Supply Chain and Cybersecurity report, visit: https://itspm.ag/lbdaf6iLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Bots, APIs, and Runtime Risk: What Exposures Are Driving AI Security Innovation in 2025 | An Akamai Pre-Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Rupesh Chokshi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 25, 2025 21:47


Ahead of Black Hat USA 2025, Sean Martin and Marco Ciappelli sit down once again with Rupesh Chokshi, Senior Vice President and General Manager of the Application Security Group at Akamai, for a forward-looking conversation on the state of AI security. From new threat trends to enterprise missteps, Rupesh lays out three focal points for this year's security conversation: protecting generative AI at runtime, addressing the surge in AI scraper bots, and defending the APIs that serve as the foundation for AI systems.Rupesh shares that Akamai is now detecting over 150 billion AI scraping attempts—a staggering signal of the scale and sophistication of machine-to-machine activity. These scraper bots are not only siphoning off data but also undermining digital business models by bypassing monetization channels, especially in publishing, media, and content-driven sectors.While AI introduces productivity gains and operational efficiency, it also introduces new and uncharted risks. Agentic AI, where autonomous systems operate on behalf of users or other systems, is pushing cybersecurity teams to rethink their strategies. Traditional firewalls aren't enough—because these threats don't behave like yesterday's attacks. Prompt injection, toxic output, and AI-generated hallucinations are some of the issues now surfacing in enterprise environments, with over 70% of organizations already experiencing AI-related incidents.This brings the focus to the runtime. Akamai's newly launched Firewall for AI is purpose-built to detect and mitigate risks in generative AI and LLM applications—without disrupting performance. Designed to flag issues like toxic output, remote code execution, or compliance violations, it operates with real-time visibility across inputs and outputs. It's not just about defense—it's about building trust as AI moves deeper into decision-making and workflow automation.CISOs, says Rupesh, need to shift from high-level discussions to deep, tactical understanding of where and how their organizations are deploying AI. This means not only securing AI but also working hand-in-hand with the business to establish governance, drive discovery, and embed security into the fabric of innovation.Learn more about Akamai: https://itspm.ag/akamailbwcNote: This story contains promotional content. Learn more.Guests:Rupesh Chokshi, SVP & General Manager, Application Security, Akamai | https://www.linkedin.com/in/rupeshchokshi/Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesLearn more and catch more stories from Akamai: https://www.itspmagazine.com/directory/akamaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
Dropzone AI Brings Agentic Automation to Black Hat USA 2025 | A DROP ZONE AI Pre Event Coverage of Black Hat USA 2025 Las Vegas | Brand Story with Edward Wu Founder/CEO at Dropzone AI

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 23, 2025 20:07


As Black Hat USA 2025 approaches, the cybersecurity world is buzzing with innovation—and Dropzone AI is right at the center of it. With roots in Seattle and a mission to bring true intelligence into the security operations center (SOC), the Dropzone AI team is gearing up for a packed week in Las Vegas, from BSides to the AI Summit, and finally at Startup City (booth #6427).Founded by Edward Wu, former Head of AI/ML at ExtraHop Networks, Dropzone AI was built on a key realization: the last thing SOCs need is another flood of alerts. Instead, they need help processing and acting on them. That's where Dropzone comes in—offering an AI-powered security analyst that doesn't just detect threats, but investigates, correlates, and takes action.During a recent pre-event chat with ITSPmagazine's Sean Martin and Marco Ciappelli, Edward explained the core philosophy behind the platform. Unlike hype-driven claims of “fully autonomous SOCs,” Dropzone takes a practical, tiered approach to automation. Their agentic AI system performs full investigations, determines the nature of alerts (true vs. false positives), and recommends or executes containment actions depending on risk tolerance and policy.The tech has found particular traction with lean security teams, or those expanding toward 24/7 coverage without adding headcount. Rather than replacing humans, the platform augments them—freeing analysts from the drudgery of low-priority alert triage and giving them space to focus on strategic work. As Edward put it, “Nobody wants to be a tier-one analyst forever.” Dropzone helps make sure they don't have to be.The platform integrates across existing security stacks and data sources, drawing from threat intel, logs, and endpoint signals to build a full picture of every alert. Security teams retain full control, with human-in-the-loop decision-making remaining the standard in most use cases. However, for low-risk assets and off-hours scenarios, some customers are already authorizing autonomous action.With conversations at Black Hat expected to revolve around the reality of AI in production—not just the vision—Dropzone is entering the perfect arena. From demonstrating real-world impact to sharing insights on agentic design and trust boundaries, their presence will resonate with everyone from analysts to CISOs.Whether you're building out your SOC, questioning your MDR provider, or simply overwhelmed with alert fatigue, this may be your signal. Dropzone AI isn't selling buzzwords. They're delivering results. Visit them at Startup City, booth #6427, and see for yourself what the future of alert triage and SOC efficiency looks like—one investigation at a time. Note: This story contains promotional content. Learn more.Guests:Edward Wu, Founder/CEO at Dropzone AI On LinkedIn: https://www.linkedin.com/in/edwardxwu/DROPZONE AI: https://itspm.ag/dropzoneai-641Hosts:Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.comMarco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com______________________ResourcesVisit the DROPZONE Website to learn more: https://itspm.ag/dropzoneai-641Learn more and catch more stories from Dropzone on ITSPmagazine: https://www.itspmagazine.com/directory/dropzoneaiLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story

ITSPmagazine | Technology. Cybersecurity. Society
The Proof Is in the Posture: What Real Security Maturity Looks Like | A HITRUST Brand Story with Bimal Sheth and Vincent Bennekers

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jul 22, 2025 46:01


The HITRUST 2025 Trust Report sheds light on a critical question organizations continue to ask: can you really rely on a certification to mean what it says? According to Vincent Bennekers, Vice President of Quality, and Bimal Sheth, Executive Vice President of Standards Development and Assurance Operations at HITRUST, the answer comes down to one word: reliability.The conversation highlights how HITRUST goes beyond a simple checklist by layering in both threat intelligence and maturity modeling. Their framework isn't just built on abstract risk—it incorporates real-world attack techniques, aligning controls to the MITRE ATT&CK framework. This means that the certification reflects actual adversarial tactics rather than hypothetical risk scenarios.Bennekers shares that 99.41% of HITRUST-certified organizations did not report a breach in the last year, and that consistency over two annual reports points to meaningful outcomes—not just marketing claims. Sheth explains how each certification is reviewed in full by HITRUST, not just sampled, and every control is assessed for maturity—not pass/fail. It's a model that helps companies continuously improve, while also giving relying parties better information.For executive teams and boards, the report surfaces where organizations commonly struggle, including access control, vulnerability management, and third-party risk. It also highlights a growing use of external inheritance—leveraging cloud service providers' security posture—as a strategic move for organizations with tighter budgets.Looking ahead, the conversation points to continuous assurance and the evolving role of AI—both as a source of new risks and a tool to enhance security operations. HITRUST is already exploring certification models that reduce drift and increase visibility year-round.For organizations wanting to build more than just a paper shield, this episode unpacks how certification—done right—can be a strategic, measurable advantage.Note: This story contains promotional content. Learn more.Guests:Bimal Sheth, Executive Vice President of Standards Development and Assurance Operations at HITRUST | On LinkedIn: https://www.linkedin.com/in/bimal-sheth-248219130/Vincent Bennekers, Vice President of Quality at HITRUST | On LinkedIn: https://www.linkedin.com/in/vincent-bennekers-a0b3201/Host:Sean Martin, Co-Founder at ITSPmagazine and Host of Redefining CyberSecurity Podcast | https://www.seanmartin.com/______________________Keywords: sean martin, bimal sheth, vincent bennekers, hitrust, trust report, cybersecurity, compliance, certification, quality assurance, risk management, brand story, brand marketing, marketing podcast, brand story podcast______________________ResourcesHITRUST 2025 Trust Report: https://itspm.ag/hitrusz49cWebinar: Beyond the Checkbox: Rethinking SOC 2, Cybersecurity, and Third-Party Risk in 2025 — An ITSPmagazine Webinar with HITRUST (https://www.crowdcast.io/c/beyond-the-checkbox-rethinking-soc-2-cybersecurity-and-third-party-risk-in-2025-an-itspmagazine-webinar-with-hitrust)Visit the HITRUST Website to learn more: https://itspm.ag/itsphitwebLearn more and catch more stories from HITRUST on ITSPmagazine: https://www.itspmagazine.com/directory/hitrustLearn more about ITSPmagazine Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story