Podcasts about brand stories

  • 947PODCASTS
  • 2,496EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Mar 14, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about brand stories

Show all podcasts related to brand stories

Latest podcast episodes about brand stories

ITSPmagazine | Technology. Cybersecurity. Society
The Business of Trust: What Steel Patriot Partners Is Watching at RSAC 2026 | A Brand Spotlight with Michael Parisi

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 14, 2026 22:35


As RSAC 2026 approaches, Michael Parisi of Steel Patriot Partners sits down with Marco Ciappelli and Sean Martin to talk about what it means to show up to the world's largest cybersecurity conference with a business-first mindset. For Parisi — a 20-plus year veteran of professional services, federal compliance, and cybersecurity — RSA is less about the show floor and more about the quiet corners where real conversations happen.   Steel Patriot Partners operates on a simple but powerful premise: business owners first, engineers second, compliance professionals third. That philosophy shapes everything from how they engage clients to how they show up at industry events. At RSAC, Parisi's calendar is already full — and intentionally so. The value isn't in the booths. It's in the bilateral trust that forms between peers who cut through the noise to share what's actually working.   And the noise, this year, is particularly loud. AI dominates the conversation in ways that create as much anxiety as excitement — especially for federal cybersecurity professionals whose institutional knowledge feels suddenly uncertain. Parisi addresses this head-on: the question isn't just whether AI will replace jobs, it's whether leaders are having honest conversations with their teams about what's changing and why. The fog of marketing has thickened into what he calls a "fog of truth" — a marketplace where it's increasingly hard to know who actually delivers versus who just pitches well.   This conversation is a preview of what Steel Patriot Partners will be listening for, talking about, and connecting around at RSAC 2026 — from retaining trusted people amid AI disruption, to whether tried-and-true solutions still hold their own against the wave of AI-native platforms. Parisi and the SPP team will also be sitting down with Marco and Sean live on the floor for a deeper follow-up conversation.   Loved this conversation? Share it with someone heading to RSAC 2026 and make sure to connect with Michael Parisi and the Steel Patriot Partners team in San Francisco.   GUEST Michael Parisi Chief Growth Officer, Steel Patriot Partners https://www.linkedin.com/in/michael-parisi-4009b2261/ https://www.steelpatriotpartners.com   RESOURCES Steel Patriot Partners: https://www.steelpatriotpartners.com RSAC Conference 2026: https://www.rsaconference.com   ✨ A special thank you to our sponsors and supporters: https://itspm.ag/telecom-ts630   _____________________________   Are you interested in telling your story?

ITSPmagazine | Technology. Cybersecurity. Society
Software Supply Chains, AI Risk, and the Transparency Gap | A Brand Spotlight with Daniel Bardenstein of Manifest | RSAC 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 14, 2026 21:55


As RSAC 2026 approaches, Daniel Bardenstein, CEO and Co-Founder of Manifest, joins hosts Sean Martin and Marco Ciappelli to unpack the growing disconnect between how security leaders perceive their AI and software supply chain posture and what practitioners on the ground actually experience. Drawing from Manifest's new research report — Beyond the Black Box — Bardenstein connects the dots between shadow AI, SBOM adoption gaps, and a dangerous pattern: history is repeating itself as organizations rush to adopt AI with the same disregard for security that characterized the early cloud era.   In a wide-ranging pre-event conversation ahead of RSAC 2026, Daniel Bardenstein, CEO and Co-Founder of Manifest, explores what it means to truly secure the software and AI supply chain — not just check the compliance box. Manifest's new research report, Beyond the Black Box, surveyed more than 300 security and AI leaders globally to understand the reality of AI adoption and software supply chain risk. One of the most striking findings was not a statistic, but a structural problem: a significant perception gap exists between how confident executive security leadership feels about their AI security posture and how unprepared frontline practitioners actually are. Where there is misalignment, Bardenstein notes, there is risk.   The conversation draws a vivid parallel to the cloud adoption wave of a decade ago, when organizations rushed to SaaS and cloud infrastructure without thinking through security implications — and gave birth to entire new industries to clean up the mess. Today, the same dynamic is playing out with AI. Nearly two-thirds of the survey respondents reported encountering shadow AI within their organizations, as employees freely use tools like ChatGPT, DeepSeek, or locally downloaded models without centralized governance. When that AI eventually gets embedded into software that organizations build, deploy, and sell, the blind spots compound.   SBOMs — software bills of materials — represent a promising step toward supply chain transparency, and Bardenstein credits the US government's regulatory nudging for driving adoption. Manifest's research shows that roughly 60% of organizations are now generating SBOMs, a meaningful milestone. But generation is not governance. Too many organizations treat an SBOM as a compliance artifact — a JSON file on a hard drive — rather than an operational tool that could dramatically accelerate vulnerability response, regulatory compliance, and incident management. The prescription has been filled; it's just not being taken.   To reframe the urgency, Bardenstein introduces the concept of the "transparency tax" — the hidden cost organizations pay in time, money, and risk when they build or buy opaque technology. Just as consumers demand ingredient labels on food, Carfax reports on used cars, and active ingredient disclosures on prescriptions, the technology sector needs to normalize the same transparency for software and AI. For organizations willing to do the math, the case for investing in supply chain visibility becomes not just a security argument, but a business one.   Heading into RSAC 2026, Manifest will not have a booth but will be active across the conference floor, meeting with customers, partners, and prospects. Bardenstein will appear on an invite-only panel alongside leadership from Corridor Dev, 1Password, and Google to discuss secure software and secure AI. The team is also planning to announce new platform capabilities designed to close the governance gaps their research surfaced — helping organizations move fast without creating the kind of blind spots that make AI adoption a liability rather than an advantage.   Tune in for this sharp, candid pre-event conversation — and look for the full on-location Brand Spotlight recorded live at RSAC 2026 in San Francisco.  

ITSPmagazine | Technology. Cybersecurity. Society
Adapting to the Speed of Risk: Why GRC Programs Must Move with the Business | A Brand Highlight Conversation with Steve Schlarman, Senior Director of Archer

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 12, 2026 6:30


Archer is redefining what it means to manage governance, risk, and compliance in an environment defined by constant change. Steve Schlarman, Senior Director at Archer, has spent nearly two decades helping organizations understand why their traditional GRC approaches are falling short and what it takes to close the gap. The forces challenging organizations today are well known: velocity of change, volume of change, and the uncertainty that compounds both. What makes the problem acute is timing. Annual audit cycles and quarterly risk assessments produce reports that reflect a reality that has already shifted by the time decision makers see them. The result is drift between what GRC functions can see and what leadership actually needs to know, and every gap in that visibility carries potential exposure. Schlarman explains that this reactive posture is exactly what Archer is working to change. Rather than treating risk and compliance as periodic checkboxes, the goal is to build a program that runs continuously, projecting forward as the business expands into new jurisdictions, launches new products, or encounters emerging risks. What are the compliance obligations? How does exposure shift? Archer Evolv is designed to answer those questions in real time, keeping GRC moving alongside the business rather than scrambling to catch up. Central to Archer's strategy is AI applied with intention. Rather than deploying generic agents, Archer is building what Schlarman calls AI operators: focused, guardrailed tools designed specifically to solve GRC problems. That distinction matters because the complexity of risk and compliance work demands precision, not just automation. This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlight GUEST Steve Schlarman, Senior Director, Archer | https://www.linkedin.com/in/steveschlarman/ RESOURCES Learn more about Archer and the Archer Evolv platform: https://www.archerirm.com Are you interested in telling your story? ▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full ▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight ▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlight KEYWORDS Steve Schlarman, Archer, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, GRC, governance risk and compliance, adaptive GRC, integrated risk management, Archer Evolv, AI in GRC, risk management, compliance automation, enterprise risk, risk and compliance strategy Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Embrace the Process ft. Peter Santana

Brand Story

Play Episode Listen Later Mar 12, 2026 42:49


Careers don't always follow the path we expect. In this episode, Peter Santana reflects on leaving a stable executive role to pursue work driven by purpose, service, and growth. His story is a reminder that meaningful leadership often begins when we stop chasing the finished product and start embracing the process.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/embrace-the-processContinue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) Introduction to Peter Santana's Journey(01:44) The Leap of Faith: From CFO to Mission Aviation(07:00) The Impact of Relationships and Gratitude(08:50) Navigating Challenges and Perspective(14:39) Balancing Ambition and Mindfulness(18:12) Embracing Lifelong Learning and Growth(21:28) Overcoming Self-Doubt in Careers(27:45) Empathy in Leadership(34:55) Looking Ahead (39:20) Investing and Embracing the Process

How Stories Happen
How to write better pitches to book speaking gigs [Jay's go-to format]

How Stories Happen

Play Episode Listen Later Mar 11, 2026 18:50


The way we write pitches is broken compared to what actually works, all because of one nuanced but critical reality:We're good at describing our talks. We're bad at describing why they'd BOOK US TO SPEAK. But isn't that the point? In this short episode, you'll learn how to re-think your pitches and write better session descriptions to pitch event planners. It'll also be useful for pitching podcast hosts, editors, and any gatekeeper who might platform you.To get more ideas like this, subscribe to my newsletter→PS: As mentioned in the episode, please expect a name change and cover art change for the show soon. Can't wait for things to come!***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***IF YOU ENJOY THE SHOW:Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

The Story Forge
Run Wise. Run Healthy. - Bjorn Anderson

The Story Forge

Play Episode Listen Later Mar 10, 2026 73:39


In this episode, we sit down with Bjorn Anderson, founder of RunWise, a new platform built to help runners train smarter and stay healthy. A lifelong student of endurance sport, Bjorn has become increasingly focused on one question: why do so many runners get hurt while trying to get better?Drawing from coaching insight, training data, and the lived experience of thousands of runners, Bjorn explains how small daily decisions—mileage, recovery, intensity, and life stress—combine to shape injury risk. His answer is RunWise: a system designed to evaluate a runner's training day by day, offering a simple red, yellow, green risk assessment that helps athletes avoid the mistakes that derail seasons.We talk about marathon training, the unique challenges facing masters runners, and the philosophy behind sustainable performance. If you care about running longer, healthier, and wiser, this conversation will change the way you think about training. ★ Support this podcast on Patreon ★

ITSPmagazine | Technology. Cybersecurity. Society
Tackling Third-Party Risk and AI Security in Healthcare | A Brand Spotlight Conversation with Jason Kor, Principal of HITRUST | HIMSS 2026 Event Coverage

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Mar 9, 2026 11:48


Third-party risk is no longer a background concern for healthcare organizations -- it is a frontline challenge. Jason Kor, Principal at HITRUST, works on the company's third-party risk management team, helping enterprises understand the security risk embedded in their supply chains. The numbers tell a stark story: according to Security Scorecard, 99% of the world's 2,000 largest companies are actively connected to a vendor that has experienced a breach in the past 18 months. And Verizon's Data Breach Investigations Report shows that the share of breaches tied to a third party has doubled year over year. HITRUST exists precisely to help organizations move from awareness to action. HITRUST will be at HIMSS 2026 in Las Vegas, March 9-12, at Booth 11307. Stop playing whack-a-mole with vendor risk -- step into the VR challenge and win prizes. For organizations already holding a HITRUST certification, the team has something else waiting: a trophy recognizing the commitment to independent, external audits and rigorous security standards. For those exploring certification for the first time, the booth is a chance to understand how HITRUST compares to alternatives like SOC 2 questionnaires -- and why scalability and risk reduction make it the stronger choice for supply chain assurance. Kor puts it plainly: the audits are time-consuming and expensive because they are effective. And at the end of the process, someone reads that report and makes real business decisions based on what it contains. Two major themes converge at this year's event: supply chain risk and AI. HITRUST has already launched an AI security assessment offering, and new CSF releases are on the horizon, including a report center feature enabling online review of assessments for anti-fraud and continuous monitoring purposes. On Tuesday, March 10, 2026, from 11:10 AM to 11:30 AM, Kor will deliver a 20-minute session titled "Understanding AI Security Risk -- The New Blind Spot in TPRM and Supply Chain Resilience." The session addresses a rapidly evolving challenge: as organizations build their own generative AI tooling -- or work with third parties that have integrated AI into their products -- questions around data sovereignty, input handling, and model provenance become critical, especially in healthcare where electronic health information is at stake. Also on the HIMSS 2026 agenda from HITRUST: Ryan Patrick, Executive Vice President of TPRM Customer Solutions, joins John P. Houston of UPMC and Chuck Christian of Franciscan Health for a Brunch Briefing titled "Building Secure, Compliant, and Resilient Healthcare Systems Together" on Tuesday, March 10, 2026, from 10:30 AM to 11:45 AM at Level 1, Casanova 505. The session offers practical strategies, frameworks, and real-world lessons for organizations looking to reduce risk, enhance protection, and advance trust in an evolving threat and regulatory landscape. This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlight GUEST Jason Kor, Principal, HITRUSThttps://www.linkedin.com/in/securityconsultantcissp/ RESOURCES HITRUST: https://hitrustalliance.net Jason Kor Session -- Understanding AI Security Risk -- The New Blind Spot in TPRM and Supply Chain Resilience (Tuesday, March 10, 2026, 11:10 AM - 11:30 AM): https://app.himssconference.com/event/himss-2026/planning/UGxhbm5pbmdfNDMyMTMxOA== Building Secure, Compliant, and Resilient Healthcare Systems Together -- Brunch Briefing (Tuesday, March 10, 2026, 10:30 AM - 11:45 AM): https://app.himssconference.com/event/himss-2026/planning/UGxhbm5pbmdfNDMzNzQwMQ== HIMSS 2026 Global Health Conference and Exhibition: https://www.itspmagazine.com/cybersecurity-technology-society-events/himss-global-health-conference-amp-exhibition-2026 Are you interested in telling your story? ▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full ▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight ▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlight KEYWORDS Jason Kor, HITRUST, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, third-party risk management, TPRM, supply chain risk, healthcare cybersecurity, HIMSS 2026, AI security, generative AI risk, HITRUST CSF, cybersecurity certification, data sovereignty, electronic health information, vendor risk management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

A SEAT at THE TABLE: Leadership, Innovation & Vision for a New Era
How to Turn Storytelling into a Brand Strategy

A SEAT at THE TABLE: Leadership, Innovation & Vision for a New Era

Play Episode Listen Later Mar 8, 2026 29:24


Marketing these days feels overwhelming.  Most companies lurch between scattered marketing efforts with no clear path to take them from where they are to where they want to be.Yet in today's hyper competitive market, marketing is no longer a ‘nice to have'.  It's a ‘need to have'.  To make marketing work, companies need simple marketing systems that help them stay consistent and stay on brand.Today we are joined by the amazing Natalie Alves, founder of Nat Marie Design, a a boutique branding and marketing studio in San Antonio, Texas that help founders and growing businesses develop doable marketing programs that reduce overwhelm.In this episode of A Seat at The Table, Nat will be discussing How to shift from being seen as a vendor to being seen as a strategic partner.The biggest gaps  small businesses are missing when building trust online.How small teams can stay consistent without marketing efforts taking over their lives.Please join me now in learning how to get our marketing back on track - hopefully the fast track!Connect with Natalie Alves:https://www.linkedin.com/in/natmariedesignwww.natmariedesign.comThe Fresh Patch Podcast - Where Good Pets Get It. Welcome to the Fresh Patch Podcast where we talk about everything, from dog...Listen on: Apple Podcasts Visit A Seat at The Table's website at https://seat.fm

Personal Brand Story I Share your Story
Meine Geschichte und ich - Geprägt. Verstanden. Neu geschrieben.

Personal Brand Story I Share your Story

Play Episode Listen Later Mar 6, 2026 9:50


Meine Geschichte und ichIn dieser besonderen Podcast Folge wende ich mich meiner eigenen Geschichte zu. Ich spreche darüber, warum ich mein Buch „Meine Geschichte und ich. Geprägt. Verstanden. Neu geschrieben.“ geschrieben habe und wie mich die Auseinandersetzung mit meiner Familiengeschichte verändert hat.Ich erzähle dir: Warum sich bestimmte Muster in meinem Leben wiederholt habenWie die Geschichte meiner Eltern und Großeltern unbewusst meinen Weg geprägt hatWelche Krisen mich gezwungen haben, hinzuschauenWie ich gelernt habe, meine Geschichte anzunehmen und neu zu schreibenWelche Botschaft ich mit diesem Buch an dich weitergeben möchteDiese Folge ist eine Einladung, die eigene Vergangenheit zu erkunden – nicht um dort stecken zu bleiben, sondern um frei zu werden für das, was kommen darf.Für wen ist die Folge interessant?Menschen, die sich fragen, warum bestimmte Muster immer wiederkehrenAlle, die ihre Familiengeschichte besser verstehen möchtenHörerinnen und Hörer, die sich gerade in Umbruchsphasen befindenMenschen, die Impulse für Selbstfindung und Selbstverantwortung suchenVeröffentlichungstermin des Buches16. Mai 2026 – Welttag der Biografien und mein Geburtstag.Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auf meine Webseite  und Lebensgeschichten-Verlag oder vereinbare direkt einen Termin mit mir.  Hier kannst du mein Buch "Meine Geschichte und ich" vorbestellen: Online-ShopVerpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunes. Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram. Support the show

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Designing Loyalty for the Way People Travel: Choice Privileges' Evolving Value Strategy

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Mar 5, 2026 29:22 Transcription Available


Send a textWhat if hotel loyalty wasn't built just for road warriors, but for the way the average person actually travels? That's the question driving the evolution of Choice Privileges. As travel behaviors shift and consumers demand more flexibility and recognition, Choice Hotels International is reshaping its loyalty strategy to deliver rewards that feel achievable, relevant, and worth coming back for. For more than 85 years, Choice Hotels has shaped how travelers experience hospitality. With more than 7,500 properties across 50 countries and 22 brands, it's a company with significant influence.  In this edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Nandika Suri, Vice President of Loyalty at Choice Hotels, about how the Choice Privileges program is evolving to balance aspiration with accessibility, simplify engagement, and strengthen loyalty in an increasingly dynamic travel landscape. 

Event Industry News Podcast
How Feast & Fable Turns Meals into Immersive Brand Stories

Event Industry News Podcast

Play Episode Listen Later Mar 5, 2026 35:53 Transcription Available


James Dixon talks with Jenny McNeil, founder of Feast & Fable, about creating immersive, narrative-driven dining experiences that use food as the central storytelling device for brands and events. They cover Jenny's career path, examples of multi-room and sensory activations, and how sound, scent, performance and context make meals memorable for press, influencers and consumers. Visit https://www.feast-fable.co.uk/ to find out more To keep up to date with all the news, subscribe for free here. If you would like to take part in a podcast, then please complete our submission form.

Branded Bull Podcast
Brand Story vs. Business Systems: Which Should You Focus On First? Ep 89.

Branded Bull Podcast

Play Episode Listen Later Mar 3, 2026 9:11


In this episode, we break down why smaller green industry businesses should prioritize marketing, operations, customer service, and systems before diving deep into brand storytelling. Learn what actually moves the needle at each stage of growth—and how to avoid solving big-business problems too early. Important Links: https://www.brandedbull.com/  https://www.instagram.com/brandedbull/ https://www.facebook.com/brandedbullinc https://www.lawntrepreneuracademy.com/ 

How Stories Happen
Content ARCs: how to own your ideas in the market

How Stories Happen

Play Episode Listen Later Mar 2, 2026 30:00


There is a very big difference between having a good idea and actually owning it publicly. In this episode, a means to re-think your approach to crafting and publishing your content, no matter the channel or medium. The goal is to both clarify your thinking to yourself and build an audience of passionate fans along the way. Subscribe to my newsletter→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

Personal Brand Story I Share your Story
Ute Simon I Mein Leben im Laufrhythmus: Wenn Laufen zur Brücke wird zwischen Kenia, Coaching und meinem Herzen

Personal Brand Story I Share your Story

Play Episode Listen Later Feb 27, 2026 56:10


In meinem Interview mit Ute Simon sprechen wir unter anderem über ihre Lauf-Leidenschaft, ihr Finish beim Ironman und ihre Hakuna Matata Stiftung.Ute erzählt von ihrer Arbeit als Mental Coach und ihrem beruflichen Weg, der mit einer klassischen Bankenkarriere begann. Sie schildert, dass sie nach ihrem Mutterschutz als erste Anlagenberaterin mit einer Halbtagsstelle wieder in ihren Beruf eingestiegen ist. Eigentlich war alles gut, doch sie spürt, dass da noch mehr ist. Im Alter von 38 Jahren kündigt sie und absolviert eine Coaching-Ausbildung. Ihre ersten Seminare und Coachings gibt sie im Bankenbereich, doch nach und nach kommen Sportler und andere Klienten hinzu.Sie selbst ist leidenschaftliche Läuferin und hat zahlreiche Marathons und Ultraläufe absolviert. Gemeinsam mit ihrem Mann verbindet sie Laufen mit Charity. Sie sammeln Spenden, doch die Weitergabe der Gelder stellt sie immer wieder vor Herausforderungen. Bei einer Laufreise in Kenia beschließen sie, eine eigene Stiftung zu gründen – die Hakuna Matata Foundation.Ute beschreibt, wie die Gründung verlaufen ist und was die Hakuna Matata Foundation vor Ort bewegt. Sie vermittelt Schulpatenschaften für Kinder, deren Familien den Betrag nicht aufbringen können. Doch sie leisten sehr viel mehr: Ihr Mann ist Augenarzt, führt Augenprophylaxe und Operationen durch. Ute geht in die Schulen und zeigt den Kindern und Jugendlichen, wie sie mental stärker werden.Wir sprechen darüber, welche Rolle der Laufsport in ihrem Leben spielt und wie es kam, dass sie mit 60 Jahren beim Ironman in Hawaii gestartet ist, obwohl das nie ihr Ziel war. Sie beschreibt, welche Herausforderungen sie hatte und wie es war, die Ziellinie zu überqueren. Dazu gibt sie uns Einblicke, welche mentalen Übungen ihr während des Wettkampfs geholfen haben und warum sie nach dem Schwimmen und Radfahren gedacht hat: „Und jetzt nur noch einen Marathon.“Was sie sonst noch vorhat, darüber reden wir natürlich auch.Willst du mehr über Ute und ihre Arbeit erfahren? Dann schau auf ihre Webseite und die der Hakuna Matata Foundation. Vernetze dich mit ihr auf LinkedIn und folge ihr auf Instagram Hakuna Matata Foundation. Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auch auf Lebensgeschichten-Verlag oder vereinbare direkt einen Termin mit mir.Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram.Support the show

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Story | From Sticker Cards to Smart Rewards: Hot Head Burritos Evolves Loyalty

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 26, 2026 21:16 Transcription Available


Send a textNearly two decades after first firing up the grill, Hot Head Burritos, with its fiery mascot Leroy leading the charge, has grown from a Dayton favorite into a fast-casual brand with serious regional momentum. Known for bold flavors and an increasingly sophisticated digital loyalty strategy, the chain now spans 86 locations across nine states and continues finding new ways to connect with guests, from the counter to the app and everywhere in between. Peter Wiley has had a front-row seat to that evolution. Now serving as Vice President of Marketing and IT, he's been involved since day one. “My brother called me and said, ‘Hey, I'm starting a brand. Can you work on a website and a logo and some graphics?'” he said.  Over time, that creative support expanded into leadership over marketing, loyalty, and IT, roles that increasingly intersect as the brand grows. 

ITSPmagazine | Technology. Cybersecurity. Society
The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 22, 2026 7:35


What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber

Redefining CyberSecurity

Play Episode Listen Later Feb 22, 2026 7:35


What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
The New Identity Risk AI Agents Bring to the Enterprise | A Brand Highlight Conversation with Ido Shlomo, Co-Founder & CTO of Token Security

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 6:56


What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
The Operations Layer for Live Events | A Brand Highlight Conversation with Ben Ikwuagwu, CEO & Co-Founder of Soundcheck Live

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 7:47


Ben Ikwuagwu is a vocalist, performer, and entrepreneur who has spent over 15 years navigating the live events world. That firsthand experience, combined with a degree in operations and years working in corporate America, gives him a unique vantage point on what makes the industry run and where it breaks down. Now, as CEO & Co-Founder of Soundcheck Live, he is channeling both worlds into a single platform designed to simplify how live event professionals manage their work.What does an all-in-one operations platform for live events actually do? Soundcheck Live focuses on four core pillars: booking, scheduling, payments, and coordination. Ikwuagwu explains that every event, regardless of size, comes down to these four elements. The platform provides a centralized dashboard where teams can manage gig details, client communication, and payment information without juggling spreadsheets, text threads, and scattered documents.How is Soundcheck Live building differently? From day one, the team has built the product around its users. Pilots with bands, production companies, and venues shaped the tool from the ground up. With advances in AI, the feedback loop has accelerated dramatically. Focus group insights that once took weeks to implement now translate into working features in hours, giving users the feeling that the platform is being custom-built for their specific workflows.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTBen Ikwuagwu, CEO & Co-Founder of Soundcheck LiveOn LinkedIn: https://www.linkedin.com/in/benjaminikwuagwu/RESOURCESSoundcheck Live (Website): https://soundchecklive.io/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSBen Ikwuagwu, Soundcheck Live, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, live events, gig management, event operations, live music, booking platform, freelancer tools, event technology, live entertainment, artist management, talent agencies Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
White Knight Labs: Still 2015 — How Old Vulnerabilities and Vibe Coding Are Breaking the Future | A Brand Story Podcast John Stigerwalt Founder at White Knight Labs | Red Team Operations Leader

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 36:54


There's a particular kind of clarity you get when you talk to someone who spends their days breaking into things for a living. Not with malice — with purpose. John Steigerwald, known to most in the industry simply as "Stigs," co-founded White Knight Labs in 2016 with a mission that sounds almost disarmingly simple: build the best penetration testing team anyone has ever seen, and actually deliver results. Nearly a decade later, the company has grown to 40 people, gone international, and is busier than ever. The question worth asking is: why?The uncomfortable answer, according to Stigs, is that the fundamental problems haven't changed. At all."Honestly, it's still 2015," he said during our most recent conversation on ITSPmagazine's Brand Story series. Not as a metaphor. As a diagnosis. The same misconfigurations, the same weak identity policies, the same unlocked back doors that red teamers were exploiting a decade ago are still wide open today. The apps built in a COVID-era frenzy — pushed out fast, tested never — are now running critical business infrastructure. And the organizations using them are only finding out when something breaks.What's changed is the surface area. Cloud, AI, Microsoft 365, vibe-coded production apps — each new layer of technology gets adopted at speed, and each one arrives carrying the same original sin: no one turned on the basics. Stigs used Microsoft 365 as a pointed example. Millions of businesses are running on it with DMARC turned off, default configurations untouched, Copilot layered on top, and not a single CIS Benchmark policy applied. "Every client is vulnerable," he said. "Not just 10% of clients. Every client."That's a striking statement. It's also, if you've been paying attention to breach headlines, not a surprising one.The AI angle adds a new and almost darkly comedic wrinkle. Vibe coding — the practice of using AI tools like Cursor or Claude to generate production-ready code at speed — has given entry-level developers intermediate-level output. Which sounds great, until you realize that the AI models many of them leaned on were trained on outdated, sometimes vulnerable data. Stigs described visiting multiple clients with nearly identical security weaknesses, all tracing back to the same ChatGPT-generated setup instructions. "You and your neighbor did the same thing," he told one client. That's not just a funny anecdote. It's a warning about what happens when an entire industry bootstraps its infrastructure from the same flawed source.And yet, Stigs isn't anti-AI. He uses it every day. He just sees it with the clarity of someone who also finds the holes it leaves behind. His prediction for the near future: a massive wave of secure code review requests, as companies start reckoning with the vibe-coded backlog they've been quietly accumulating. AppSec is about to have a very good year.Looking forward, White Knight Labs is watching the growing intersection of private sector expertise and government infrastructure testing with particular interest. Critical infrastructure in America, long overdue for rigorous physical and embedded testing, is starting to receive that attention. Stigs and his team are already in the room.What makes White Knight Labs different isn't just technical skill — it's the ability to communicate what they find in language that actually lands. In an industry full of reports that gather dust, that matters. The best penetration test in the world is useless if no one acts on it.The door is open. It's been open for years. The question is who you call to finally lock it.To learn more about White Knight Labs, visit their website or reach out directly. Listen to the full conversation on ITSPmagazine.GUESTJohn StigerwaltFounder at White Knight Labs | Red Team Operations Leaderhttps://www.linkedin.com/in/john-stigerwalt-90a9b4110/RESOURCESWhite Knight Labs:  https://whiteknightlabs.com_____________________________________________________________Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Creating Relevance ft. Carrie Willetts

Brand Story

Play Episode Listen Later Feb 19, 2026 57:12


Leadership isn't about having it all figured out — it's about staying relevant, embracing the mess, and protecting culture as you grow. In this episode, Carrie Willetts shares hard-earned lessons on leading at scale, integrating with empathy, and why confidence and community matter more than ever in healthcare.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: https://www.gravitygroup.com/podcast/creating-relevance/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) Introduction to Carrie Willetts(02:00) The Evolution of Leadership and Culture(05:05) The Importance of Local Presence in Healthcare(09:44) Embracing the Messiness of Leadership(16:09) Advice for Young Leaders(21:11) Communication and Clarity in Leadership(26:15) The Complexity of Integration in Healthcare(31:30) Carrie's Leadership Purpose and Growth(36:45) How to Find Clarity(39:06) Defining Success in Leadership (42:22) A Season of Community(48:45) Working on Communication(51:48) Advice to Your Younger Self

Leaders in Customer Loyalty, Powered by Loyalty360
#509: Leaders in Customer Loyalty: Brand Stories | Listening Before Leading: Friendly's New Approach to Customer Loyalty

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 19, 2026 20:51 Transcription Available


Send a textFew restaurant brands carry the emotional weight of Friendly's. Founded in 1935 during the Great Depression, the brand was built on a simple but enduring belief: even in hard times, people deserve comfort, joy, and togetherness. Nearly 90 years later, that purpose still anchors Friendly's strategy.  But executing Friendly's brand strategy is rapidly evolving.  Under the leadership of Erik Jensen, Vice President of Marketing, Friendly's is in the midst of a renovation-led revival that touches everything from restaurant design and franchising to customer loyalty. At the center of that work is a renewed focus on listening, particularly when customers signal that something isn't working. 

Redefining CyberSecurity
The New Identity Risk AI Agents Bring to the Enterprise | A Brand Highlight Conversation with Ido Shlomo, Co-Founder & CTO of Token Security

Redefining CyberSecurity

Play Episode Listen Later Feb 19, 2026 6:56


What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Payday With Rayray
3 - How to Tell Your Brand Story (Framework)

Payday With Rayray

Play Episode Listen Later Feb 16, 2026 30:42


Hiding your struggles is keeping you broke and disconnected from your audience. I realized this when I made my first million at 23—people didn't see the discipline or the betrayals; they just saw a "blonde Instagram chick" and spat venom because they lacked context. We're diving deep into the psychology of Narrative Transportation, that state where your audience stops judging you and starts living the story with you. I'm breaking down how I alchemized eating canned tuna and failing 20 sales calls into a brand that people actually trust. If you're ready to transcend "basic bitch branding" and become a memorable leader, you need to master the art of the hero's journey. Here's a glance at what you'll hear from me in this episode:   • The "Venom" of Success: Why sharing results without the "trials and tribulations" creates resentment instead of connection. • Ancient Technology: Why the human brain retains stories better than facts, data, or statistics. • Social Bonding & Safety: How storytelling creates biological safety and social intimacy with your potential clients. • The "Trance" State: Understanding neural coupling and how to light up your listener's imagination. • The Redemption Arc: How sharing your transformation allows your audience to reframe their own pain and challenges. • The "Best Story" Wins: Why being emotionally compelling is more important than being the "most" logical or skilled. Timestamps: 00:00 – Introduction 01:13 – How my first million-dollar press feature actually backfired. 03:48 – Taking control of the narrative 05:56 – Why a lack of story creates an inherent disconnection in your humanity. 07:52 – Narrative Transportation: The phenomenon of being immersed in a story 09:44 – How hearing someone else's hardship reframes our own meaning-making. 13:16 – Example breakdown: The difference between a transactional pitch and a soulful story. 18:52 – Why celebrities like Taylor Swift are compelling through universal themes 20:47 – Why sharing failures makes you more trustworthy and competent. 25:55 – Introduction to the Hero's Journey framework for your brand. Links: Origin Story Template: https://www.canva.com/design/DAG-bXPns94/URY-Dv9S35Vh4n--8P303Q/view?utm_content=DAG-bXPns94&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelink&mode=preview Instagram: https://www.instagram.com/rachelbell/ Work of Art Website: https://workofartpodcast.com/

How Stories Happen
The metaphor and the magic: My take on AI in 2026

How Stories Happen

Play Episode Listen Later Feb 16, 2026 23:31


It's been a good long while since I've had a good long rant. *Cracks knuckles.* Let us begin.Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→Subscribe to my newsletter→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

ITSPmagazine | Technology. Cybersecurity. Society
KEVology: How Exploit Scores and Timelines Shape Real Security Decisions | A Brand Highlight Conversation with Tod Beardsley, Vice President of Security Research of runZero

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 13, 2026 8:23


The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Semantic Chaining: A New Image-Based Jailbreak Targeting Multimodal AI | A Brand Highlight Conversation with Alessandro Pignati, AI Security Researcher of NeuralTrust

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 13, 2026 7:14


What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
Semantic Chaining: A New Image-Based Jailbreak Targeting Multimodal AI | A Brand Highlight Conversation with Alessandro Pignati, AI Security Researcher of NeuralTrust

Redefining CyberSecurity

Play Episode Listen Later Feb 13, 2026 7:14


What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
KEVology: How Exploit Scores and Timelines Shape Real Security Decisions | A Brand Highlight Conversation with Tod Beardsley, Vice President of Security Research of runZero

Redefining CyberSecurity

Play Episode Listen Later Feb 13, 2026 8:23


The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Building Community Around the AI SOC Revolution | A Brand Spotlight Conversation with Monzy Merza, Co-Founder and CEO of Crogl | AI SOC Summit 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 12, 2026 17:56


What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Inside Jollibee's Digital-First Loyalty Strategy Driving Rapid Expansion

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 12, 2026 15:49 Transcription Available


Send a textIn the latest edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Rachel Masocol, Director of Digital Marketing and Ecommerce for Jollibee Group, North America, about how the company's rapid growth and loyalty program redesign are driven by increasing digital engagement. Jollibee has always been about more than just chicken—despite being voted America's number one fast-food fried chicken two years in a row by USA Today. What began as a small ice cream parlor in the Philippines, founded by Tony Tan Caktiong, has grown into one of the fastest-growing quick-service restaurant brands in the world. 

Redefining CyberSecurity
Building Community Around the AI SOC Revolution | A Brand Spotlight Conversation with Monzy Merza, Co-Founder and CEO of Crogl | AI SOC Summit 2026

Redefining CyberSecurity

Play Episode Listen Later Feb 12, 2026 17:56


What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Chris Buck and His Signature Yamaha Revstar RS02CB at NAMM 2026 | A Brand Highlight Conversation with Chris Buck, Yamaha Signature Artist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 11, 2026 1:56


What does it take to design a signature guitar from the ground up? Chris Buck sits down with Sean Martin at NAMM 2026 to talk about the journey of creating the Yamaha Revstar RS02CB, his first production signature model. Buck describes the experience as surreal, noting that the weight of joining Yamaha's legacy of signature artists continues to hit him in waves. The lengthy design process, he says, was about making sure every detail lived up to what the guitar could be.How did Chris Buck and Yamaha land on the right pickups for the RS02CB? Buck explains that the pickups were the centerpiece of the collaboration, with the team working through countless iterations of magnet types, wire specifications, and voicing options. The result is a set of custom P90-style pickups that deliver the dynamic, responsive tone he has built his sound around. The wraparound tailpiece, a feature less common on modern instruments, adds sustain and directness to the signal path, contributing to the guitar's massive volume and resonance.What makes the RS02CB stand apart from other Revstar models? Buck highlights a three-way pickup selector switch instead of the five-way found on the current generation of Revstars, along with custom inlays and his own signature squiggle on the back of the headstock. He caps the conversation by playing a lick that shows exactly what the guitar can do, leaving no doubt about the instrument's character and capability.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTChris Buck, Yamaha Signature Artist | On Instagram: @chrisbuckguitar | Website: https://www.chrisbuckguitar.shop/RESOURCESYamaha: https://usa.yamaha.com/Yamaha RS02CB Chris Buck Signature Revstar: https://usa.yamaha.com/products/musical_instruments/guitars_basses/el_guitars/rs02cb/index.htmlPart of ITSPmagazine's On Location Coverage at NAMM 2026.

How Stories Happen
My favorite story structure to captivate and teach

How Stories Happen

Play Episode Listen Later Feb 9, 2026 25:39


When you give a presentation of any kind, you don't actually have a captive audience. YOU need to captivate. This is a story structure that can both captivate your audience AND deliver the message or lesson they most need (and you need to distribute to do your job).As mentioned, there are just a few spaces left in the next cohort of my public speaking accelerator. Grab yours here:Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | How Simon Is Redefining Loyalty in Shopping Centers

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 5, 2026 42:00 Transcription Available


Send us a textCustomer loyalty has become a cornerstone of modern brand strategy, but for shopping center owners, it has never been a simple equation. Without control of the point of sale and with thousands of independent retailers operating under one roof, building a cohesive loyalty program  presents challenges most consumer brands never face. That tension is what ultimately shaped Simon+™: a loyalty program built to reflect how people shop today, across stores, channels, and experiences. In a recent conversation, Enna Allen, Senior Vice President of Marketing at Simon shared how Simon is re-thinking loyalty for a nontraditional category and why flexibility, collaboration, and value are essential to making the program work. 

ITSPmagazine | Technology. Cybersecurity. Society
The Rise of the Bionic Hacker and AI-Driven Vulnerability Discovery | A Brand Highlight Conversation with Laurie Mercer, Senior Director of Solutions Engineering of HackerOne

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 4, 2026 5:45


What happens when artificial intelligence enters the arena of ethical hacking? Laurie Mercer, Senior Director of Solutions Engineering at HackerOne, joins Sean Martin for a look inside the ninth annual Hacker-Powered Security Report, where the headline is clear: the bionic hacker has arrived. HackerOne connects the global security research community with enterprises, open source projects, and major organizations, all working toward a shared mission of building a safer internet by finding, fixing, and rewarding the discovery of vulnerabilities.How is AI reshaping the bug bounty landscape? Mercer describes a dramatic shift unfolding on the HackerOne platform. For the first time, autonomous AI agents are operating alongside human researchers, growing from a single agent to more than ten competing on the leaderboard. At the same time, customers are driving change from the other side, with a 270% increase in organizations placing AI models within the scope of their bug bounty programs. The platform has paid out a record $81 million in bounty rewards over the past 12 months, with an average payout of roughly $1,000 per vulnerability, underscoring the sheer volume of valid findings flowing through the system.What makes these findings so significant? Of the reports submitted, 23,700 are rated critical or high severity, representing vulnerabilities capable of causing serious data breaches. HackerOne estimates these remediations have helped organizations avoid up to $3 billion in potential breach costs. The collectives participating on the platform range from venture-capital-backed startups building AI-powered offensive tools to informal groups of researchers pooling resources for greater efficiency. Mercer highlights three vulnerability categories that have surged over the past year: prompt injection, sensitive information exposure through large language models, and insecure plugin design. For any organization deploying AI-powered tools, these represent the most urgent areas to assess and secure.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTLaurie Mercer, Senior Director of Solutions Engineering at HackerOneOn LinkedIn: https://www.linkedin.com/in/lauriemercer/RESOURCESLearn more about HackerOne: https://www.hackerone.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSLaurie Mercer, HackerOne, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, bug bounty, ethical hacking, bionic hacker, AI agents, autonomous hacking, vulnerability discovery, hacker-powered security, offensive security, prompt injection, insecure plugin design, LLM security, AI vulnerability, cybersecurity, breach avoidance, bug bounty platform, responsible disclosure Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
From Cyber Energia to Centrii: Rebranding to Lead the Future of OT Security in Critical Energy Infrastructure | A Brand Story Conversation with Rafael Narezzi, Co-Founder and CEO of Centrii

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 2, 2026 19:40


The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Gibson Guitars at NAMM 2026: 131 Years of Craftsmanship, Innovation & Functional Art | A Brand Highlight Conversation with Jeff Stempka, Global Brand & Marketing at Gibson | NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 30, 2026 10:22


131 years. Still handcrafted in Nashville. Still changing music.At NAMM 2026, Sean Martin and Marco Ciappelli sat down with Jeff Stempka, Global Brand & Marketing at Gibson & Gibson Custom, to talk about what makes this brand untouchable—the craftsmanship, the artist connection, and why people will stretch their budget just to hold one.From the Les Paul Studio Double Trouble to the ES-335 Fifties and Sixties refresh, Gibson is honoring its legacy while pushing forward.Jeff said it best: "These are tools that enable incredible musicians to take the instruments and do something we never intended."

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Hilton Builds Loyalty Through Flexibility, Recognition, and Human-Centered Travel

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Jan 29, 2026 33:56 Transcription Available


Send us a textFor more than a century, Hilton has been shaping how people experience hospitality. Today, the company spans 26 brands, 9,000 properties, and 141 countries and territories, yet its loyalty strategy remains grounded in a simple idea: make travelers feel seen, valued, and supported at every stage of their journey. In this edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Brad Anderson, Vice President of the Hilton Honors program, about how the brand continues to evolve loyalty in an increasingly complex and expectation-driven travel landscape. 

ITSPmagazine | Technology. Cybersecurity. Society
Burton And Circle Strings Guitars at NAMM 2026: Snowboards Meet Custom Guitars And It Is Awesome! | A Brand Highlight Conversation From NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 27, 2026 5:33


Snowboards and Guitars: Circle Strings x Burton at NAMM 2026Some collaborations make you stop and ask how nobody thought of this before.At NAMM Media Day 2026, Sean Martin caught up with Adam Buchwald and William Hylton from Circle Strings, a Vermont-based guitar company, to talk about their partnership with Burton. The concept is deceptively simple: matching snowboards and custom guitars built from the same materials.But the execution is anything but simple.Buchwald owns a wood company in Vermont. He had an entire tree of figured mahogany set aside, waiting for the right project. When Burton agreed to collaborate, he knew exactly what to do with it. The wood became the centerpiece—the visual and sonic foundation of everything that followed.Then William Hylton got to work.Hylton, Circle Strings' designer and CNC specialist, is a backcountry snowboarder. He chose Burton's Alakazam powder board shape as his starting point, drawn to its distinctive tail curve. That curve, he realized, was already guitar-esque. So he wove it through the entire instrument—the fingerboard extension, the pickguard, the bridge tips. The snowboard's DNA lives in every contour.But here's where it gets interesting.The core of a Burton snowboard is wood. Lightweight, durable, designed for performance. Hylton took that same core material and built a guitar body from it. The result feels right in your hands—balanced, resonant, purposeful. It's not a gimmick. It's a genuine instrument built from materials engineered to perform.The acoustic model features a sound hole that mirrors the snowboard's design. Inlays are crafted from Burton's core material, tying everything together visually and conceptually. Both guitars showcase snowflake inlays inspired by Snowflake Bentley, the Vermont photographer who first captured snowflakes in their true crystalline form over a century ago.It's a detail that says everything about how Circle Strings approaches their work. History. Craft. Place.Vermont runs through this collaboration. Buchwald and Hylton are snowboarders. They source their wood locally. They build instruments that reflect where they come from. Burton, also rooted in Vermont's snow culture, was a natural partner.The Burton team, according to Hylton, is thrilled. Many of them are musicians. Some are fans of the artists Circle Strings builds for. The connection was already there—this project just made it tangible.What strikes me about this collaboration is the underlying philosophy. Snowboards and guitars aren't that different when you strip them down. Both are built from wood. Both demand precision. Both exist to help someone express themselves—whether carving powder or carving a melody.Circle Strings and Burton understand this. They didn't force a partnership. They found the common thread and followed it.The result is a set of instruments that belong in a museum and on a stage. Objects that tell a story about craft, place, and the people who refuse to separate their passions.Snowboards and guitars. Same wood. Same craft. Different ride.Sean Martin reports from NAMM 2026 for ITSPmagazine.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSAdam Buchwald and William HyltonRESOURCESLearn more about Circle Strings Guitars: https://circlestrings.comLearn more about Burton Snowboards: https://www.burton.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, Burton, Circle Strings, custom guitars, snowboard guitar, handmade guitars, Vermont, guitar collaboration, Burton snowboards, NAMM, luthier, unique guitars Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
PRS Guitars at NAMM 2026: John Mayer Wild Blue Silver Sky & Ed Sheeran Baritone Revealed | A Brand Highlight Conversation with Alex Chadwhick from PRS Guitars | NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 26, 2026 4:45


Vintage Dreams, Modern Hands: A Conversation with PRS Guitars at NAMM 2026They were literally closing down the show floor when I grabbed Alex Chadwick from PRS Guitars for a conversation I wasn't willing to miss.We'd been talking off-mic about something that kept nagging at me—this tension between technology and creativity that runs through everything in the music world right now. So I hit record, security guards circling, and asked him straight: Is technology helping musicians become better artists, or do you still need to learn the hard way?His answer was refreshingly honest. Technology isn't inherently good or bad. It's a tool. When it helps people be more expressive, more creative—that's the win. When it gets in the way of that expression? That's when we have a problem.It's the kind of nuance that gets lost in the usual gear coverage.PRS brought some beautiful new instruments to NAMM this year. The John Mayer Wild Blue Silver Sky stopped people in their tracks—a sharp turquoise finish with the first matching headstock ever produced from their Maryland factory on a Silver Sky. Limited to a thousand pieces worldwide. For Mayer fans and Silver Sky devotees alike, this one feels special.Then there's the Ed Sheeran Semi-Hollow Piezo Baritone. A 27.7-inch scale instrument tuned a fifth below standard, with discrete outputs for both magnetic and piezo elements. But here's what got me: each guitar ships with a signed print of Sheeran's original artwork that appears on the body. He's a visual artist too. The instrument becomes a canvas for multiple creative expressions at once.But the conversation that really stuck with me was about vintage guitars and why we romanticize them so much.Those 1950s and 60s instruments—the ones on posters, in documentaries, making the music that shaped entire generations—they've become holy relics. And the ones that actually sound magical? They cost as much as a house now. So how does anyone access that?Chadwick explained something about PRS's philosophy that I found genuinely compelling. They don't go back to the fifties. They go back to 1985. That gives them freedom—they can draw inspiration from those holy grail instruments without being trapped by their quirks, their inconsistent tolerances, their aged components. They can take what made those guitars legendary and build it into something repeatable, accessible, and comfortable.The goal, he said, is to create instruments that get out of the way. Guitars that let the person be more expressive instead of fighting against limitations.That phrase has been echoing in my head since I left Anaheim. Instruments that get out of the way.Because that's really what this is about, isn't it? All the gear, all the technology, all the innovation—it only matters if it helps someone find their voice. Make their own music. Tell their own story.PRS seems to understand that. In a world obsessed with vintage nostalgia and spec-sheet comparisons, they're building for expression.And that's worth a conversation, even when security is showing you the door.Marco Ciappelli reports from NAMM 2026 for ITSPmagazine, exploring the intersection of technology, creativity, and the humans who make music possible.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlexander ChadwickPRS GuitarsRESOURCESLearn more about PRS GUITARS: https://prsguitars.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, PRS Guitars, John Mayer Silver Sky, Ed Sheeran guitar, PRS Wild Blue, baritone guitar, guitar gear, new guitars 2026, PRS limited edition, guitar innovation, NAMM Show, musician interviews Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Engineering Brand Love ft. Rick Milenthal

Brand Story

Play Episode Listen Later Jan 22, 2026 42:07


What happens when marketing becomes more automated, data-driven, and efficient — but less human? In episode 102 of Brand Story, we sit down with Rick Milenthal, Chairman, Founder, and CEO of The Shipyard, to explore why emotion still matters more than technology, how fear can hold brands back, and why understanding people is the key to building brands that last.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/engineering-brand-loveContinue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketingChapters:(00:00) – Meet Rick Milenthal and The Shipyard(03:10) – Curiosity, fear, and adapting to change(09:01) – Building The Shipyard(11:59) – Engineering brand love and emotional storytelling(23:10) – Culture, leadership, and mental health in agencies(27:21) – Client work spotlight: EVs & Visit California(34:47) – The future of The Shipyard(37:00) – Fear vs adventure in leadership(40:54) – Rick's advice to his younger self

ITSPmagazine | Technology. Cybersecurity. Society
2026 Security Predictions: Agentic SOC, China Threats, and Quantum Readiness | A Brand Highlight Conversation with Vincent Stoffer, Field Chief Technology Officer of Corelight

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 21, 2026 7:50


Vincent Stoffer, Field Chief Technology Officer at Corelight, shares his predictions for 2026 and what security teams should prepare for in the coming year. With nearly a decade at Corelight and a background in network and security engineering, Stoffer brings a unique perspective on where the industry is heading.The conversation explores the emergence of the agentic SOC, where AI agents work alongside human analysts to accelerate detection, response, and incident resolution. Stoffer explains that while the protocols and tools have been in development, 2026 is the year organizations will finally see these capabilities deliver real results. The key differentiator, he notes, is data quality. Tools that provide rich, detailed, and comprehensive network evidence will thrive in this AI-enabled environment.Stoffer also addresses the persistent threat from nation-state actors, particularly China's Typhoon campaigns targeting critical infrastructure. From energy and telecoms to international partners, these threats continue to expand with AI-powered acceleration. Understanding your environment and detecting anomalous behavior remains essential for organizations facing these sophisticated adversaries.The discussion concludes with a look at post-quantum readiness. While quantum computing threats may be 10 to 20 years away, Stoffer emphasizes the importance of understanding cryptographic assets now. Corelight has published a white paper detailing how NDR provides the network visibility needed to locate cryptographic assets and plan migration to quantum-ready cipher suites.This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTVincent Stoffer, Field Chief Technology Officer at CorelightOn LinkedIn: https://www.linkedin.com/in/vincent-stoffer-07057827/RESOURCESLearn more about Corelight: https://corelight.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSVincent Stoffer, Corelight, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, agentic SOC, network detection and response, NDR, critical infrastructure security, nation-state threats, China Typhoon campaigns, Salt Typhoon, Volt Typhoon, post-quantum cryptography, quantum readiness, AI in cybersecurity, security operations, incident response, network visibility, Zeek Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Please Me!
What's Your Brand Story with Eve Hall

Please Me!

Play Episode Listen Later Jan 21, 2026 27:37


In this special episode of the What's Your Brand Story Podcast, host Dhylles Victoria sits down for a deeply personal and powerful conversation with Eve, creator of Please Me. Together, they explore the story behind the brand and how lived experience, trauma healing, and sexual liberation helped shape a global movement. This episode dives into the realities of sexual health, pleasure, and healing, and why breaking the silence around these topics isn't just important it's essential. In this episode, we discuss: Eve's journey from childhood sexual trauma to sexual empowerment Why sexual health care is essential—not optional The orgasm gap and the truth about orgasm equality Why 95% of women require clitoral stimulation to orgasm Sexual health conditions rarely talked about, including: Erectile dysfunction (ED) Incontinence Pelvic floor dysfunction Premature ejaculation Healing sexual shame after trauma Men's sexual health and why it matters too Pleasure, sex toys, vibrators, and redefining what “sex” really means How silence around sex causes harm—and how open dialogue creates healing Connect with the Host Dhylles Victoria What's Your Brand Story PodcastListen on Spotify:https://open.spotify.com/show/4u7va5FBlQmBq9bk3SB6Rx Connect with Eve & Please Me  Website:https://pleaseme.online  Social Media & Contact:https://pleaseme.online/contacts  Substack Newsletter:https://pleaseme.substack.com  Patreon (Ad-Free Episodes & Bonus Content):https://patreon.com/PleaseMePodcast  Be a Guest on Please Me:Apply via PodMatchhttps://www.podmatch.com/hostdetailpreview/beaguestonpleasemepodcast Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
Securing the Decentralized Energy Grid | A Brand Story Conversation with Rafael Narezzi of Cyber Energia

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 20, 2026 28:39


The renewable energy sector faces a critical cybersecurity gap. As wind farms, solar installations, and battery energy storage systems proliferate across the globe, they create a decentralized network of digitally controlled assets that remain largely unprotected. Rafael Narezzi, Co-Founder and CEO of Cyber Energia, brings more than two decades of technology leadership experience to address this growing vulnerability in critical infrastructure.Cyber Energia takes a fundamentally different approach to OT security. While most cybersecurity companies stop at identifying risks through CVE scores and vulnerability assessments, Cyber Energia starts from the risk and translates it into financial terms that executives can act upon. The platform connects technical findings to compliance frameworks including NIS 2.0, IEC 62443, and NERC CIP, providing asset owners with a clear maturity landscape and actionable intelligence.Rafael Narezzi explains that asset owners in the renewable sector operate differently than traditional IT environments. Financial companies often acquire energy assets as investments without maintaining technical staff on-site. When compliance regulations now hold these owners personally liable for cybersecurity failures, they need tools that speak their language: dollars, risk, and return on investment. Cyber Energia prices its services per megawatt, demonstrating its commitment to speaking the language of energy.The decentralization of energy generation presents unique challenges. Rafael Narezzi points to recent cyber attacks on Poland's distributed grid as evidence that threat actors understand how to manipulate multiple remote locations simultaneously to destabilize power networks. Battery energy storage systems present particular risks, as compromised dispatch commands could create grid imbalances similar to the fictional scenario depicted in Ocean's 11. Yet many sites lack even basic cyber hygiene protections.Cyber Energia helps customers understand the financial impact of potential attacks. A 98-megawatt wind turbine site, for example, could lose 1.9 million dollars from just one week of downtime. This quantification enables executives to make informed decisions about relatively modest security investments that significantly reduce their risk exposure. The platform provides a single-view dashboard for organizations managing hundreds of sites across different regions, technologies, and regulatory environments.Rafael Narezzi observes that a CEO before a cyber attack is fundamentally different from a CEO after one. Organizations often underestimate digital risks compared to physical ones, despite living in an increasingly connected world. Regulations like NIS 2.0 now impose personal liability on directors and can revoke operating licenses, removing any excuse for neglecting cybersecurity. The awareness is changing, but Cyber Energia continues working to close the gap between compliance requirements and actual security posture across the renewable energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO of Cyber Energiahttps://www.linkedin.com/in/narezzi/RESOURCESCyber Energiahttps://cyberenergia.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Cyber Energia, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT cybersecurity, renewable energy security, critical infrastructure protection, NIS 2.0 compliance, IEC 62443, wind farm cybersecurity, solar energy security, battery energy storage systems, BESS security, decentralized energy grid, cyber risk quantification, energy sector compliance, NERC CIP, operational technology security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Persuasion by the Pint
417: The Psychology of the Pour: How To Craft Brand Stories and Captivating Package Design

Persuasion by the Pint

Play Episode Listen Later Jan 18, 2026 70:30


On this episode, Bryant Vander Weerd joins us. He is the Founder of Full Pour Media, an award-winning creative agency that specializes in the food and beverage industry. Full Pour Media works with clients both in US and abroad to plan, produce, and execute marketing and promotional strategies Bryant has won three Emmy awards for […] The post 417: The Psychology of the Pour: How To Craft Brand Stories and Captivating Package Design first appeared on Persuasion by the Pint.

The Savvy Scribe
EP343: From Bedside to Business: Crafting Your Nurse Writer Brand Story with Dr. Farah Laurent

The Savvy Scribe

Play Episode Listen Later Jan 17, 2026 50:34


Send us a textDr. Farah shares the real story behind her pivot from ER nurse to nurse career coach and business owner. You'll learn how your personal story can fuel your brand identity, the importance of visibility in business, and how to stand out in a saturated market—even as a nurse writer. This episode is packed with tangible advice for nurses ready to build something of their own.About Dr. Farah LaurentNurse entrepreneur and founder of Nurses Making Business Moves Conference! Nurse career coach who's coached over 200 nurses to land their dream role making 6 figures! Author, podcaster, and keynote speaker!Key TakeawaysThe early resistance Farah faced—and how it fueled her purpose and missionWhy personal brand is your reputation and how to actively manage itHow to turn your story into a brand that builds trust and attracts clientsThe value of niching down to speak directly to your ideal audienceVisibility strategies: showing up on video, creating educational content, and networkingWhy testimonials and referrals are powerful tools for growing your credibilityThe difference between a business idea and a real business opportunityThe must-have elements before launching your brand and businessPractical tips for nurse writers: building authority, creating content, and connecting authenticallyWhy consistency matters more than perfectionWelcome to the Savvy Scribe Podcast, I'm so glad you're here! Before we start the show, if you're interested, we have a free Facebook group called "Savvy Nurse Writer Community"I appreciate you following me and listening today. I would LOVE for you to subscribe: ITUNESAnd if you love it, can I ask for a

ITSPmagazine | Technology. Cybersecurity. Society
From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 13, 2026 6:37


In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Real-Time Protection Against AI-Driven Account Takeover Fraud | A Brand Highlight Conversation with Israel Mazin, Co-Founder and CEO of Memcyco

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 8, 2026 5:34


As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. Israel Mazin, Co-Founder and CEO of Memcyco, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.Memcyco is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, Memcyco identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.With an agentless deployment that takes just minutes to implement, Memcyco delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIsrael Mazin, Co-Founder and CEO of MemcycoOn LinkedIn: https://www.linkedin.com/in/israel-mazin-62215b/RESOURCESMemcyco: https://www.memcyco.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIsrael Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 8, 2026 5:46


In this Brand Highlight, we talk with Denny LeCompte, CEO and Co-Founder of Portnox, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.Note: This story contains promotional content. Learn more.GuestDenny LeCompte, CEO and Co-Founder of Portnoxhttps://www.linkedin.com/in/dennylecompte/ResourcesLearn more about Portnox: https://www.portnox.com/Are you interested in telling your story?Full Length Brand Story: https://www.studioc60.com/content-creation#fullBrand Spotlight Story: https://www.studioc60.com/content-creation#spotlightBrand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.