Podcasts about brand stories

  • 944PODCASTS
  • 2,480EPISODES
  • 32mAVG DURATION
  • 5WEEKLY NEW EPISODES
  • Feb 22, 2026LATEST

POPULARITY

20192020202120222023202420252026

Categories



Best podcasts about brand stories

Show all podcasts related to brand stories

Latest podcast episodes about brand stories

ITSPmagazine | Technology. Cybersecurity. Society
The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 22, 2026 7:35


What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
The Autonomous SOC Is No Longer a Dream | A Brand Highlight Conversation with Subo Guha, Senior Vice President of Product Management of Stellar Cyber

Redefining CyberSecurity

Play Episode Listen Later Feb 22, 2026 7:35


What does it take to turn the dream of an autonomous SOC into something organizations can actually deploy? Subo Guha, Senior Vice President of Product Management at Stellar Cyber, joins Sean Martin to share how the company's AI-driven security operations platform is making that vision a reality. Stellar Cyber serves SOC teams across more than 50 countries, with a primary focus on MSPs and MSSPs supporting the underserved mid-market, though marquee enterprise customers like Canon are also part of the portfolio.How can agentic AI change the way SOC teams handle alert overload? Guha describes what he calls a "digital army" of AI agents that work around the clock to automate alert triage and catch phishing attacks. The system filters 70 to 80 percent of incoming alerts, allowing analysts to focus on the 20 percent that matter most. With attackers using AI to launch faster and more frequent campaigns, Stellar Cyber takes a human-augmented approach, meaning the AI learns from analyst interactions and continuously guides the SOC team toward faster, more accurate remediation.Why does this matter for MSPs operating on thin margins? Guha explains that the autonomous SOC capability layered on top of Stellar Cyber's XDR platform allows MSSPs to serve more customers, reduce mean time to repair, and grow their tenant base without proportionally increasing staff. When MSSPs grow revenue, Stellar Cyber grows alongside them, creating a mutually beneficial model that ultimately means more organizations get protected.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSubo Guha, Senior Vice President of Product Management, Stellar Cyber @LinkedInRESOURCESLearn more about Stellar Cyber: https://stellarcyber.aiAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSSubo Guha, Stellar Cyber, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, autonomous SOC, agentic AI, security operations, XDR, NDR, MSSP, MSP, alert triage, AI-driven security, Open XDR, Gartner Magic Quadrant, phishing detection, SOC automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Personal Brand Story I Share your Story
Bettina Montazem I Obdachlos über Nacht: Wie ich mitten in Köln aus der Krise Schönheit erschaffen habe

Personal Brand Story I Share your Story

Play Episode Listen Later Feb 20, 2026 47:07


Bettina Montazem betreibt mit ihren beiden Töchtern das Urania Theater in Köln. In unserem Gespräch erzählt sie, wie sie nach vielen Jahren Pause zu ihrer Theaterleidenschaft zurückfand und in ihren Krisen Chancen entwickelt hat.Ihre Produktionen sind von Hand gemacht, emotional und detailverliebt. Diese Liebe hat mit Shakespeare begonnen und sie nie losgelassen. Als alleinerziehende Mutter verdiente sie ihren Lebensunterhalt in der Verwaltung und setzte jahrelang keinen Fuß in ein Theater. Das Fehlen des Theaters macht sie krank. Im Alter von 40 Jahren erinnert sie sich an ihre Träume.Schritt für Schritt baut sie sich ihre Theaterwelt auf und führt heute gemeinsam mit ihren beiden Töchtern das Urania Theater, wo sie mit großer Leidenschaft Kombinationen aus Zirkus und Oper präsentieren. Diese Kombination liebt sie sehr und erzählt, woher diese Liebe kommt. Zusätzlich macht sie zeitgenössisches Theater mit sozialen und politischen Themen, die deutschlandweit von Kulturämtern eingekauft werden.Als mitten in der Theatersaison 2025 ihre langjährige Spielstätte in Köln Ehrenfeld über Nacht geschlossen werden muss, werden die drei Frauen und ihr Theater über Nacht obdachlos. Statt den Kopf in den Sand zu stecken, sucht sie nach Lösungen. In dieser Krise stehen viele Menschen an ihrer Seite und zwei Wochen später eröffnen sie das Urania Theater im Spiegelpalast in Köln Mühlheim. Inmitten von Beton ist dieser Ort etwas ganz besonderes und ihre Liebeserklärung an die Stadt Köln.Das Schöne in der Krise sehenBettina erzählt, dass die Erfahrung, als Kind ihre Heimat Iran verlassen zu müssen, ihr geholfen hat, diese Krise zu meistern. Diese Resilienz und den Ansporn, in jeder Krise etwas Schönes zu sehen, hat sie an ihre Töchter weitergegeben.Sie schildert ihre Erinnerungen an das Aufwachsen im Iran, die Flucht und wie die Zerrissenheit, die die Familie damals erlebte, sie geprägt hat.Sie beschreibt, wie die Geschichten für ihre verschiedenen Shows entstehen und lebendig werden. Wenn sie über ihre Arbeit spricht, sagt sie: „Meine Idee ist, dem Elend, der Verzweiflung und dem Dreck Schönheit entgegen zu setzen."Außerdem sprechen wir über ihre aktuellen Herausforderungen, Glücksmomente und über das Lachen. Auch politische Themen kommen nicht zu kurz.Bettinas Lebensphilosophie: „Mit jeder Faser lebendig zu sein, die Freiheit zu haben, alles zu denken, alles zu fühlen und sich selber die Freiheit zu geben, alles tun zu können."Willst du mehr über Bettina erfahren? Dann schau dir ihre Webseite und folge ihr auf Instagram und Urania Theater Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auch auf Lebensgeschichten-Verlag oder vereinbare direkt einen Termin mit mir.Verpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunesHat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram.Hier geht's zu den ShownotesSupport the show

ITSPmagazine | Technology. Cybersecurity. Society
The Operations Layer for Live Events | A Brand Highlight Conversation with Ben Ikwuagwu, CEO & Co-Founder of Soundcheck Live

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 7:47


Ben Ikwuagwu is a vocalist, performer, and entrepreneur who has spent over 15 years navigating the live events world. That firsthand experience, combined with a degree in operations and years working in corporate America, gives him a unique vantage point on what makes the industry run and where it breaks down. Now, as CEO & Co-Founder of Soundcheck Live, he is channeling both worlds into a single platform designed to simplify how live event professionals manage their work.What does an all-in-one operations platform for live events actually do? Soundcheck Live focuses on four core pillars: booking, scheduling, payments, and coordination. Ikwuagwu explains that every event, regardless of size, comes down to these four elements. The platform provides a centralized dashboard where teams can manage gig details, client communication, and payment information without juggling spreadsheets, text threads, and scattered documents.How is Soundcheck Live building differently? From day one, the team has built the product around its users. Pilots with bands, production companies, and venues shaped the tool from the ground up. With advances in AI, the feedback loop has accelerated dramatically. Focus group insights that once took weeks to implement now translate into working features in hours, giving users the feeling that the platform is being custom-built for their specific workflows.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTBen Ikwuagwu, CEO & Co-Founder of Soundcheck LiveOn LinkedIn: https://www.linkedin.com/in/benjaminikwuagwu/RESOURCESSoundcheck Live (Website): https://soundchecklive.io/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSBen Ikwuagwu, Soundcheck Live, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, live events, gig management, event operations, live music, booking platform, freelancer tools, event technology, live entertainment, artist management, talent agencies Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
White Knight Labs: Still 2015 — How Old Vulnerabilities and Vibe Coding Are Breaking the Future | A Brand Story Podcast John Stigerwalt Founder at White Knight Labs | Red Team Operations Leader

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 36:54


There's a particular kind of clarity you get when you talk to someone who spends their days breaking into things for a living. Not with malice — with purpose. John Steigerwald, known to most in the industry simply as "Stigs," co-founded White Knight Labs in 2016 with a mission that sounds almost disarmingly simple: build the best penetration testing team anyone has ever seen, and actually deliver results. Nearly a decade later, the company has grown to 40 people, gone international, and is busier than ever. The question worth asking is: why?The uncomfortable answer, according to Stigs, is that the fundamental problems haven't changed. At all."Honestly, it's still 2015," he said during our most recent conversation on ITSPmagazine's Brand Story series. Not as a metaphor. As a diagnosis. The same misconfigurations, the same weak identity policies, the same unlocked back doors that red teamers were exploiting a decade ago are still wide open today. The apps built in a COVID-era frenzy — pushed out fast, tested never — are now running critical business infrastructure. And the organizations using them are only finding out when something breaks.What's changed is the surface area. Cloud, AI, Microsoft 365, vibe-coded production apps — each new layer of technology gets adopted at speed, and each one arrives carrying the same original sin: no one turned on the basics. Stigs used Microsoft 365 as a pointed example. Millions of businesses are running on it with DMARC turned off, default configurations untouched, Copilot layered on top, and not a single CIS Benchmark policy applied. "Every client is vulnerable," he said. "Not just 10% of clients. Every client."That's a striking statement. It's also, if you've been paying attention to breach headlines, not a surprising one.The AI angle adds a new and almost darkly comedic wrinkle. Vibe coding — the practice of using AI tools like Cursor or Claude to generate production-ready code at speed — has given entry-level developers intermediate-level output. Which sounds great, until you realize that the AI models many of them leaned on were trained on outdated, sometimes vulnerable data. Stigs described visiting multiple clients with nearly identical security weaknesses, all tracing back to the same ChatGPT-generated setup instructions. "You and your neighbor did the same thing," he told one client. That's not just a funny anecdote. It's a warning about what happens when an entire industry bootstraps its infrastructure from the same flawed source.And yet, Stigs isn't anti-AI. He uses it every day. He just sees it with the clarity of someone who also finds the holes it leaves behind. His prediction for the near future: a massive wave of secure code review requests, as companies start reckoning with the vibe-coded backlog they've been quietly accumulating. AppSec is about to have a very good year.Looking forward, White Knight Labs is watching the growing intersection of private sector expertise and government infrastructure testing with particular interest. Critical infrastructure in America, long overdue for rigorous physical and embedded testing, is starting to receive that attention. Stigs and his team are already in the room.What makes White Knight Labs different isn't just technical skill — it's the ability to communicate what they find in language that actually lands. In an industry full of reports that gather dust, that matters. The best penetration test in the world is useless if no one acts on it.The door is open. It's been open for years. The question is who you call to finally lock it.To learn more about White Knight Labs, visit their website or reach out directly. Listen to the full conversation on ITSPmagazine.GUESTJohn StigerwaltFounder at White Knight Labs | Red Team Operations Leaderhttps://www.linkedin.com/in/john-stigerwalt-90a9b4110/RESOURCESWhite Knight Labs:  https://whiteknightlabs.com_____________________________________________________________Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
The New Identity Risk AI Agents Bring to the Enterprise | A Brand Highlight Conversation with Ido Shlomo, Co-Founder & CTO of Token Security

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 19, 2026 6:56


What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Creating Relevance ft. Carrie Willetts

Brand Story

Play Episode Listen Later Feb 19, 2026 57:12


Leadership isn't about having it all figured out — it's about staying relevant, embracing the mess, and protecting culture as you grow. In this episode, Carrie Willetts shares hard-earned lessons on leading at scale, integrating with empathy, and why confidence and community matter more than ever in healthcare.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: https://www.gravitygroup.com/podcast/creating-relevance/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketing(00:00) Introduction to Carrie Willetts(02:00) The Evolution of Leadership and Culture(05:05) The Importance of Local Presence in Healthcare(09:44) Embracing the Messiness of Leadership(16:09) Advice for Young Leaders(21:11) Communication and Clarity in Leadership(26:15) The Complexity of Integration in Healthcare(31:30) Carrie's Leadership Purpose and Growth(36:45) How to Find Clarity(39:06) Defining Success in Leadership (42:22) A Season of Community(48:45) Working on Communication(51:48) Advice to Your Younger Self

Leaders in Customer Loyalty, Powered by Loyalty360
#509: Leaders in Customer Loyalty: Brand Stories | Listening Before Leading: Friendly's New Approach to Customer Loyalty

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 19, 2026 20:51 Transcription Available


Send a textFew restaurant brands carry the emotional weight of Friendly's. Founded in 1935 during the Great Depression, the brand was built on a simple but enduring belief: even in hard times, people deserve comfort, joy, and togetherness. Nearly 90 years later, that purpose still anchors Friendly's strategy.  But executing Friendly's brand strategy is rapidly evolving.  Under the leadership of Erik Jensen, Vice President of Marketing, Friendly's is in the midst of a renovation-led revival that touches everything from restaurant design and franchising to customer loyalty. At the center of that work is a renewed focus on listening, particularly when customers signal that something isn't working. 

Redefining CyberSecurity
The New Identity Risk AI Agents Bring to the Enterprise | A Brand Highlight Conversation with Ido Shlomo, Co-Founder & CTO of Token Security

Redefining CyberSecurity

Play Episode Listen Later Feb 19, 2026 6:56


What happens when AI agents inherit access to enterprise systems but nobody governs their identities? Ido Shlomo, Co-Founder and CTO of Token Security, joins the conversation to unpack a rapidly growing challenge that many organizations face but few have addressed. As businesses accelerate AI adoption, agents are being deployed to fetch data from CRMs, process emails, and execute actions across platforms. The problem is that these agents often operate with persistent access, no clear ownership, and little visibility into what they can reach.How should security teams approach AI agent identity governance? Shlomo explains that the first step is discovery. Most companies do not know what their AI agent inventory looks like, and without that baseline, effective governance is impossible. The good news, he notes, is that agents do not suffer from politics. They do exactly what they are told and operate within the boundaries they are given. That predictability makes the challenge more manageable if the right tooling is in place.What makes an effective access policy for AI agents? Rather than relying on prompt filtering or output controls that add latency and friction, Shlomo advocates for intent-based permission models that scope each agent to access only what it needs, when it needs it. He frames the prioritization process as a matrix of access and autonomy, where the agents with the highest levels of both deserve immediate attention. For business leaders, the visibility that comes from this approach also reveals waste and inefficiency, highlighting departments and services that are not delivering on their intended value. To learn more about how to identify, govern, and secure AI agent identities, connect with the Token Security team and follow Ido Shlomo for practical guidance.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIdo Shlomo, Co-Founder & CTO of Token SecurityOn LinkedIn: https://il.linkedin.com/in/ido--shlomoRESOURCESToken Security (Website): https://www.token.security/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIdo Shlomo, Token Security, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, AI agent identity, non-human identity, identity governance, AI agent security, identity risk, least privilege, AI agent access, machine identity, NHI security, AI agent inventory, intent-based access Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Payday With Rayray
3 - How to Tell Your Brand Story (Framework)

Payday With Rayray

Play Episode Listen Later Feb 16, 2026 30:42


Hiding your struggles is keeping you broke and disconnected from your audience. I realized this when I made my first million at 23—people didn't see the discipline or the betrayals; they just saw a "blonde Instagram chick" and spat venom because they lacked context. We're diving deep into the psychology of Narrative Transportation, that state where your audience stops judging you and starts living the story with you. I'm breaking down how I alchemized eating canned tuna and failing 20 sales calls into a brand that people actually trust. If you're ready to transcend "basic bitch branding" and become a memorable leader, you need to master the art of the hero's journey. Here's a glance at what you'll hear from me in this episode:   • The "Venom" of Success: Why sharing results without the "trials and tribulations" creates resentment instead of connection. • Ancient Technology: Why the human brain retains stories better than facts, data, or statistics. • Social Bonding & Safety: How storytelling creates biological safety and social intimacy with your potential clients. • The "Trance" State: Understanding neural coupling and how to light up your listener's imagination. • The Redemption Arc: How sharing your transformation allows your audience to reframe their own pain and challenges. • The "Best Story" Wins: Why being emotionally compelling is more important than being the "most" logical or skilled. Timestamps: 00:00 – Introduction 01:13 – How my first million-dollar press feature actually backfired. 03:48 – Taking control of the narrative 05:56 – Why a lack of story creates an inherent disconnection in your humanity. 07:52 – Narrative Transportation: The phenomenon of being immersed in a story 09:44 – How hearing someone else's hardship reframes our own meaning-making. 13:16 – Example breakdown: The difference between a transactional pitch and a soulful story. 18:52 – Why celebrities like Taylor Swift are compelling through universal themes 20:47 – Why sharing failures makes you more trustworthy and competent. 25:55 – Introduction to the Hero's Journey framework for your brand. Links: Origin Story Template: https://www.canva.com/design/DAG-bXPns94/URY-Dv9S35Vh4n--8P303Q/view?utm_content=DAG-bXPns94&utm_campaign=designshare&utm_medium=link&utm_source=publishsharelink&mode=preview Instagram: https://www.instagram.com/rachelbell/ Work of Art Website: https://workofartpodcast.com/

How Stories Happen
The metaphor and the magic: My take on AI in 2026

How Stories Happen

Play Episode Listen Later Feb 16, 2026 23:31


It's been a good long while since I've had a good long rant. *Cracks knuckles.* Let us begin.Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→Subscribe to my newsletter→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

ITSPmagazine | Technology. Cybersecurity. Society
KEVology: How Exploit Scores and Timelines Shape Real Security Decisions | A Brand Highlight Conversation with Tod Beardsley, Vice President of Security Research of runZero

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 13, 2026 8:23


The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Semantic Chaining: A New Image-Based Jailbreak Targeting Multimodal AI | A Brand Highlight Conversation with Alessandro Pignati, AI Security Researcher of NeuralTrust

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 13, 2026 7:14


What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
Semantic Chaining: A New Image-Based Jailbreak Targeting Multimodal AI | A Brand Highlight Conversation with Alessandro Pignati, AI Security Researcher of NeuralTrust

Redefining CyberSecurity

Play Episode Listen Later Feb 13, 2026 7:14


What happens when AI safety filters fail to catch harmful content hidden inside images? Alessandro Pignati, AI Security Researcher at NeuralTrust, joins Sean Martin to reveal a newly discovered vulnerability that affects some of the most widely used image-generation models on the market today. The technique, called semantic chaining, is an image-based jailbreak attack discovered by the NeuralTrust research team, and it raises important questions about how enterprises secure their multimodal AI deployments.How does semantic chaining work? Pignati explains that the attack uses a single prompt composed of several parts. It begins with a benign scenario, such as a historical or educational context. A second instruction asks the model to make an innocent modification, like changing the color of a background. The final, critical step introduces a malicious directive, instructing the model to embed harmful content directly into the generated image. Because image-generation models apply fewer safety filters than their text-based counterparts, the harmful instructions are rendered inside the image without triggering the usual safeguards.The NeuralTrust research team tested semantic chaining against prominent models including Gemini Nano Pro, Grok 4, and Seedream 4.5 by ByteDance, finding the attack effective across all of them. For enterprises, the implications extend well beyond consumer use cases. Pignati notes that if an AI agent or chatbot has access to a knowledge base containing sensitive information or personal data, a carefully structured semantic chaining prompt can force the model to generate that data directly into an image, bypassing text-based safety mechanisms entirely.Organizations looking to learn more about semantic chaining and the broader landscape of AI agent security can visit the NeuralTrust blog, where the research team publishes detailed breakdowns of their findings. NeuralTrust also offers a newsletter with regular updates on agent security research and newly discovered vulnerabilities.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlessandro Pignati, AI Security Researcher, NeuralTrustOn LinkedIn: https://www.linkedin.com/in/alessandro-pignati/RESOURCESLearn more about NeuralTrust: https://neuraltrust.ai/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSAlessandro Pignati, NeuralTrust, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, semantic chaining, image jailbreak, AI security, agentic AI, multimodal AI, LLM safety, AI red teaming, prompt injection, AI agent security, image-based attacks, enterprise AI security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Redefining CyberSecurity
KEVology: How Exploit Scores and Timelines Shape Real Security Decisions | A Brand Highlight Conversation with Tod Beardsley, Vice President of Security Research of runZero

Redefining CyberSecurity

Play Episode Listen Later Feb 13, 2026 8:23


The CISA Known Exploited Vulnerabilities (KEV) catalog is one of the most referenced resources in vulnerability management, but how well do security teams actually understand what it tells them? In this Brand Highlight, Tod Beardsley, Vice President of Security Research at runZero and former CISA section chief who helped manage the KEV on a daily basis, breaks down what the catalog is designed to do and, just as importantly, what it is not.What is the KEV catalog and who is it really for? The KEV is mandated by Binding Operational Directive 22-01 (BOD 22-01), which tasks CISA with identifying vulnerabilities that are known to be exploited and have an available fix. Its primary audience is federal civilian executive branch agencies, but because the catalog is public, organizations everywhere use it as a prioritization signal. Beardsley notes that inclusion on the KEV requires a CVE ID, evidence of active exploitation, a patch or mitigation, and relevance to federal interests, meaning zero-day vulnerabilities and end-of-life systems without CVEs never appear.How should organizations think about KEV entries that are not equally dangerous? Beardsley explains that only about a third of KEV-listed vulnerabilities represent straight-shot remote code execution with no user interaction and no authentication required. The rest span a wide spectrum of severity. EPSS data reveals an inverse bell curve: many KEV entries have extremely low probabilities of exploitation in the next 30 days, while others cluster at the high end with commodity exploits widely available. This means treating every KEV entry as equally critical leads to wasted effort and alert fatigue.That gap between the catalog and real-world decision-making is exactly what KEVology addresses. The research, produced by Beardsley at runZero, enriches KEV data with CVSS metrics, EPSS scores, exploit tooling indicators, and ATT&CK mappings to help security teams filter and prioritize vulnerabilities based on what actually matters to their environment. Rather than prescribing a single priority list, KEVology treats the KEV as data to be analyzed, not doctrine to be followed blindly.To make this analysis accessible and interactive, runZero built KEV Collider, a free, daily-updated web application at runzero.com/kev-collider. The tool lets defenders sort, filter, and layer multiple risk signals across the entire KEV catalog. Because every filter combination is encoded in URL parameters, teams can bookmark and share custom views with colleagues instantly. Beardsley describes KEV Collider as an evergreen companion to the research, updating automatically as new vulnerabilities are added to the catalog each week.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTTod Beardsley, Vice President of Security Research at runZeroOn LinkedIn: https://www.linkedin.com/in/todb/RESOURCESLearn more about runZero: https://www.runzero.comKEVology research report: https://www.runzero.com/resources/kevology/KEV Collider: https://www.runzero.com/kev-collider/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSTod Beardsley, runZero, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, KEVology, KEV Collider, CISA KEV, vulnerability management, exploit scoring, EPSS, CVSS, vulnerability prioritization, exposure management, BOD 22-01, known exploited vulnerabilities, cybersecurity risk, patch management Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Personal Brand Story I Share your Story
Neu: Kapitel 1 – Echte Geschichten. Echtes Leben. Echte Begegnung.

Personal Brand Story I Share your Story

Play Episode Listen Later Feb 13, 2026 7:33


Warum wir Räume für Begegnung und Neuanfänge brauchenWas passiert nach dem ersten Schritt?In dieser Folge stelle ich dir mein neues Veranstaltungsformat „Kapitel 1 – Echte Geschichten. Echtes Leben. Echter Austausch.“ vor – und erzähle, warum ich glaube, dass echte Begegnungen und persönliche Geschichten heute wichtiger sind denn je.Kapitel 1 ist mehr als eine Lesung. Es ist ein Raum für Austausch, Inspiration und Mut. Ein Raum, in dem Autorinnen und Autoren ihre Lebensgeschichten teilen – ehrlich, reflektiert und auf Augenhöhe.Ich spreche darüber:warum mich echte Lebensgeschichten so bewegenweshalb wir Räume für Begegnung brauchenwie das Format aufgebaut istund was dich bei der Auftaktveranstaltung erwartetAuftakt am 26. Februar: Mit Yvonne Simon und ihrem Buch „Ich mach's jetzt einfach -  Über den Mut, den ersten Schritt zu wagen“. Vor 10 Jahren ist sie den Portugiesischen Jakobsweg nach Finistère gepilgert – ein Schritt, der ihr Leben verändert hat. An diesem Abend sprechen wir über Mut, Zweifel, Begleitung und die Frage: „Ich mach's jetzt einfach – und was passiert nun?“55 Minuten Inspiration Moderiertes Gespräch & Lesepassagen Mini-Übung für dein eigenes nächstes Kapitel Online oder live vor OrtWenn du Lust hast auf echte Geschichten, ehrlichen Austausch und neue Impulse für dein eigenes Leben, dann sei dabei.Alle Informationen & Anmeldung: Kapitel 1Ticket sichernMöchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auf meine Webseite  und Lebensgeschichten-Verlag oder vereinbare direkt einen Termin mit mir.Verpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunes Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram.Hier geht's zu den ShownotesSupport the show

ITSPmagazine | Technology. Cybersecurity. Society
Building Community Around the AI SOC Revolution | A Brand Spotlight Conversation with Monzy Merza, Co-Founder and CEO of Crogl | AI SOC Summit 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 12, 2026 17:56


What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Inside Jollibee's Digital-First Loyalty Strategy Driving Rapid Expansion

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 12, 2026 15:49 Transcription Available


Send a textIn the latest edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Rachel Masocol, Director of Digital Marketing and Ecommerce for Jollibee Group, North America, about how the company's rapid growth and loyalty program redesign are driven by increasing digital engagement. Jollibee has always been about more than just chicken—despite being voted America's number one fast-food fried chicken two years in a row by USA Today. What began as a small ice cream parlor in the Philippines, founded by Tony Tan Caktiong, has grown into one of the fastest-growing quick-service restaurant brands in the world. 

Redefining CyberSecurity
Building Community Around the AI SOC Revolution | A Brand Spotlight Conversation with Monzy Merza, Co-Founder and CEO of Crogl | AI SOC Summit 2026

Redefining CyberSecurity

Play Episode Listen Later Feb 12, 2026 17:56


What happens when the security community stops debating whether AI belongs in the SOC and starts figuring out how to make it work? Monzy Merza, Co-Founder and CEO of Crogl, is helping answer that question, both through the autonomous AI SOC agent his company builds and through the inaugural AI SOC Summit, a community event designed to bring practitioners together for honest, no-nonsense conversation about what is real and what is hype in AI-driven security operations.Crogl builds what Merza describes as a "superhero suit" for SOC analysts. The platform investigates every alert in depth, working across multiple data lakes without requiring data normalization, and escalates only the issues that require human judgment. But the conversation here goes beyond any single product. Merza explains that the motivation for creating the AI SOC Summit came directly from community feedback. Security teams across enterprises are trying to determine what to buy, what to build, and how to govern AI in their environments, and they need a transparent, practical space to share those experiences.How are threat actors changing the game with agentic AI? Merza points to two critical shifts. First, adversaries are now conducting campaigns using agentic systems, which means defenders need to operate at the same speed. Second, the barrier to entry for sophisticated attacks has dropped significantly because agentic systems handle much of the technical detail, from crafting convincing phishing emails to automating post-exploitation activity. The implication is clear: security teams that do not adopt AI-driven capabilities risk falling behind attackers who already have.The AI SOC Summit, hosted March 3rd at the Hyatt Regency in Tysons, Virginia, is structured to serve the practitioners who are doing the daily work of security operations. The morning features keynotes from CISOs sharing what is working and what is not, along with perspectives on AI governance and privacy. The afternoon splits into two tracks: talk sessions from startups and established companies, and a five-and-a-half-hour hackathon where attendees get free access to frontier AI models and tools to experiment hands-on with real security data.Who should attend the AI SOC Summit? Merza identifies four key personas. SOC analysts at every tier who are buried in alert triage. Security engineers deploying AI-driven and traditional tools who want to see how other enterprises are rationalizing their investments. Incident responders and threat hunters who need to understand how to track agentic activity rather than just human activity. And builders, the security teams prototyping and testing AI capabilities in-house, who want to learn from what others have tried, what has failed, and what constraints can be overcome.What sets this event apart from the typical conference experience? The AI SOC Summit is intentionally vendor-agnostic. Sponsors range from reseller partners serving government organizations to household names like Splunk and Cribl, but the focus stays on community learning rather than product pitches. Many organizations still restrict employee access to frontier models and agentic systems, and the summit provides a space where attendees can kick the tires on these technologies without worrying about tooling costs or corporate restrictions. The goal is for every participant to leave with something practical they can take back and apply to their work immediately.This is a Brand Spotlight. A Brand Spotlight is a ~15 minute conversation designed to explore the guest, their company, and what makes their approach unique. Learn more: https://www.studioc60.com/creation#spotlightGUESTMonzy Merza, Co-Founder and CEO, Crogl [@monzymerza on X]https://www.linkedin.com/in/monzymerzaRESOURCESCrogl: https://www.crogl.comAI SOC Summit: https://www.aisocsummit.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSMonzy Merza, Crogl, Sean Martin, brand story, brand marketing, marketing podcast, brand spotlight, AI SOC Summit, AI SOC agent, security operations center, agentic AI, autonomous security, threat detection, SOC analyst, incident response, threat hunting, security engineering, AI governance, cybersecurity community, hackathon, frontier AI models, agentic speed, security automation Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Chris Buck and His Signature Yamaha Revstar RS02CB at NAMM 2026 | A Brand Highlight Conversation with Chris Buck, Yamaha Signature Artist

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 11, 2026 1:56


What does it take to design a signature guitar from the ground up? Chris Buck sits down with Sean Martin at NAMM 2026 to talk about the journey of creating the Yamaha Revstar RS02CB, his first production signature model. Buck describes the experience as surreal, noting that the weight of joining Yamaha's legacy of signature artists continues to hit him in waves. The lengthy design process, he says, was about making sure every detail lived up to what the guitar could be.How did Chris Buck and Yamaha land on the right pickups for the RS02CB? Buck explains that the pickups were the centerpiece of the collaboration, with the team working through countless iterations of magnet types, wire specifications, and voicing options. The result is a set of custom P90-style pickups that deliver the dynamic, responsive tone he has built his sound around. The wraparound tailpiece, a feature less common on modern instruments, adds sustain and directness to the signal path, contributing to the guitar's massive volume and resonance.What makes the RS02CB stand apart from other Revstar models? Buck highlights a three-way pickup selector switch instead of the five-way found on the current generation of Revstars, along with custom inlays and his own signature squiggle on the back of the headstock. He caps the conversation by playing a lick that shows exactly what the guitar can do, leaving no doubt about the instrument's character and capability.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTChris Buck, Yamaha Signature Artist | On Instagram: @chrisbuckguitar | Website: https://www.chrisbuckguitar.shop/RESOURCESYamaha: https://usa.yamaha.com/Yamaha RS02CB Chris Buck Signature Revstar: https://usa.yamaha.com/products/musical_instruments/guitars_basses/el_guitars/rs02cb/index.htmlPart of ITSPmagazine's On Location Coverage at NAMM 2026.

How Stories Happen
My favorite story structure to captivate and teach

How Stories Happen

Play Episode Listen Later Feb 9, 2026 25:39


When you give a presentation of any kind, you don't actually have a captive audience. YOU need to captivate. This is a story structure that can both captivate your audience AND deliver the message or lesson they most need (and you need to distribute to do your job).As mentioned, there are just a few spaces left in the next cohort of my public speaking accelerator. Grab yours here:Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

Personal Brand Story I Share your Story
Boris Riek I Was bleibt, wenn Erfolg, Geld und Sicherheit plötzlich weg sind?

Personal Brand Story I Share your Story

Play Episode Listen Later Feb 7, 2026 82:30


In meinem Interview mit Boris Riek sprechen wir über tiefe wirtschaftliche und persönliche Brüche, seinen Neustart nach der größten Krise seines Lebens und die besondere Rolle New Yorks in seiner Geschichte.Boris wächst am Stadtrand von Osnabrück auf. Früh erlebt er Mobbing und zieht sich in die Welt der Bücher zurück. Gleichzeitig prägt ihn das unternehmerische Umfeld seiner Familie. Er beginnt, sich intensiv mit außergewöhnlichen Persönlichkeiten zu beschäftigen und mit der Frage, was Menschen wirklich antreibt.Die USA, insbesondere New York, spielen dabei eine zentrale Rolle. Während eines Austauschjahres in den USA landet Boris zwar auf einer Farm in Oklahoma, doch dort wird der Grundstein für seine unternehmerische Laufbahn gelegt. Zurück in Deutschland baut er mehrere Unternehmen auf, beschäftigt sich intensiv mit Persönlichkeitsentwicklung und gründet schließlich ein Institut und eine Akademie im hochpreisigen Segment.Als seine Frau, die ein Familienunternehmen führt, schwer erkrankt, übernimmt Boris die Geschäftsführung. Wirtschaftlich steht er auf dem Höhepunkt seiner Karriere – bis kurz vor seinem 50. Lebensjahr seine Frau stirbt. Er deckt massive Schäden durch Fremdverschulden auf und verliert sein Vermögen. Er schlägt einen ungewöhnlichen Weg ein, diese Missstände aufzudecken. 2024 reist Boris spontan nach New York. Drei Tage lang läuft er durch die Stadt, stellt sich grundlegende Fragen nach Identität, Haltung und Zukunft – und findet neue Klarheit und Inspiration.Wir sprechen offen über seine Krise, über Verantwortung, über die Alarmcodes der Navy Seals, den Unterschied zwischen Verhalten und Charakter und darüber, wie gefährlich es ist, Menschen in Schubladen zu stecken. Außerdem beschreibt er, wie er es geschafft hat, diese Krise zu bewältigen. Willst du mehr über Boris erfahren? Dann schau dir seine Webseite  und folge ihm auf Instagram. Hier ist der Link zu seinem Buch. Möchtest du mehr über meine Arbeit und über mich erfahren? Dann schau auf meine Webseite und Lebensgeschichten-Verlag oder vereinbare direkt einen Termin mit mir.Verpasse keine meiner Podcast Folgen und abonniere meinen Podcast auf Spotify oder iTunes Hat dir die Folge gefallen? Dann würde ich mich sehr freuen, wenn du meinen Podcast bewertest Vernetze dich mit mir auf LinkedIn und folge mir auf Instagram. Hier geht's zu den ShownotesSupport the show

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | How Simon Is Redefining Loyalty in Shopping Centers

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Feb 5, 2026 42:00 Transcription Available


Send us a textCustomer loyalty has become a cornerstone of modern brand strategy, but for shopping center owners, it has never been a simple equation. Without control of the point of sale and with thousands of independent retailers operating under one roof, building a cohesive loyalty program  presents challenges most consumer brands never face. That tension is what ultimately shaped Simon+™: a loyalty program built to reflect how people shop today, across stores, channels, and experiences. In a recent conversation, Enna Allen, Senior Vice President of Marketing at Simon shared how Simon is re-thinking loyalty for a nontraditional category and why flexibility, collaboration, and value are essential to making the program work. 

ITSPmagazine | Technology. Cybersecurity. Society
The Rise of the Bionic Hacker and AI-Driven Vulnerability Discovery | A Brand Highlight Conversation with Laurie Mercer, Senior Director of Solutions Engineering of HackerOne

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 4, 2026 5:45


What happens when artificial intelligence enters the arena of ethical hacking? Laurie Mercer, Senior Director of Solutions Engineering at HackerOne, joins Sean Martin for a look inside the ninth annual Hacker-Powered Security Report, where the headline is clear: the bionic hacker has arrived. HackerOne connects the global security research community with enterprises, open source projects, and major organizations, all working toward a shared mission of building a safer internet by finding, fixing, and rewarding the discovery of vulnerabilities.How is AI reshaping the bug bounty landscape? Mercer describes a dramatic shift unfolding on the HackerOne platform. For the first time, autonomous AI agents are operating alongside human researchers, growing from a single agent to more than ten competing on the leaderboard. At the same time, customers are driving change from the other side, with a 270% increase in organizations placing AI models within the scope of their bug bounty programs. The platform has paid out a record $81 million in bounty rewards over the past 12 months, with an average payout of roughly $1,000 per vulnerability, underscoring the sheer volume of valid findings flowing through the system.What makes these findings so significant? Of the reports submitted, 23,700 are rated critical or high severity, representing vulnerabilities capable of causing serious data breaches. HackerOne estimates these remediations have helped organizations avoid up to $3 billion in potential breach costs. The collectives participating on the platform range from venture-capital-backed startups building AI-powered offensive tools to informal groups of researchers pooling resources for greater efficiency. Mercer highlights three vulnerability categories that have surged over the past year: prompt injection, sensitive information exposure through large language models, and insecure plugin design. For any organization deploying AI-powered tools, these represent the most urgent areas to assess and secure.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTLaurie Mercer, Senior Director of Solutions Engineering at HackerOneOn LinkedIn: https://www.linkedin.com/in/lauriemercer/RESOURCESLearn more about HackerOne: https://www.hackerone.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSLaurie Mercer, HackerOne, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, bug bounty, ethical hacking, bionic hacker, AI agents, autonomous hacking, vulnerability discovery, hacker-powered security, offensive security, prompt injection, insecure plugin design, LLM security, AI vulnerability, cybersecurity, breach avoidance, bug bounty platform, responsible disclosure Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
From Cyber Energia to Centrii: Rebranding to Lead the Future of OT Security in Critical Energy Infrastructure | A Brand Story Conversation with Rafael Narezzi, Co-Founder and CEO of Centrii

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Feb 2, 2026 19:40


The renewable energy sector faces a fundamental disconnect. Cybersecurity teams generate endless alerts and vulnerability reports, while operational managers focus on asset performance and site availability. Neither group speaks the other's language, leaving executives struggling to make informed decisions about where to invest limited resources. Rafael Narezzi, Co-Founder and CEO of Centrii, has built his company specifically to bridge this gap, translating technical cyber risks into the financial business outcomes that drive executive decision-making.Centrii, emerging from its predecessor Cyber Energia, represents a new approach to OT security in the energy sector. The name itself carries meaning: the sentinel of industrial intelligence, signified by the double I at the end. Rather than simply identifying vulnerabilities and presenting red alerts, the platform contextualizes risks in terms that matter to the business. How does a potential compromise affect your power purchase agreements? What happens to your revenue when energy prices fluctuate and your site goes offline? These are the questions that Centrii answers.The company prices its services per megawatt hour, demonstrating its commitment to speaking the language of energy rather than traditional IT security. This approach reflects a deeper understanding that renewable energy assets present vastly different risk profiles. A biomass facility with 24/7 personnel on site faces different challenges than an unmanned offshore wind installation. Solar farms, hydrogen facilities, and battery storage systems each require tailored risk assessments that account for their unique operational characteristics and regulatory requirements.Recent attacks on distributed energy resources, including the compromise of Poland's renewable grid, underscore the urgency of this work. With regulations like NERC CIP 15 in the United States, NIS 2.0 in Europe, and the UK Cyber Security Bill now holding asset owners personally accountable for cybersecurity failures, organizations can no longer afford to treat OT security as an afterthought. Narezzi observes that compliance has become the driving force pushing companies to take responsibility for their critical infrastructure assets.What sets Centrii apart is its ability to help executives identify which risks actually matter. When every cybersecurity tool reports critical alerts, organizations face paralysis. Which red is the red that demands immediate attention? Centrii provides clarity by mapping technical findings to financial impact, reputational damage, and operational consequences specific to each asset type and technology.The company's presentation at DistribuTECH 2026 focuses on battery energy storage systems, an area of explosive growth driven by data center demand and the expanding role of AI. Narezzi draws a parallel to Ocean's 11, where coordinated manipulation of power systems creates cascading failures. As batteries become essential for grid balancing, the risks of compromised dispatch commands affecting multiple installations simultaneously represent a scenario that demands serious attention from asset owners and regulators alike.Operating across 16 countries with diverse energy technologies, Centrii provides a unified platform for organizations managing hundreds of sites across different regions and regulatory environments. The goal is straightforward: give every stakeholder, from technical teams to the C-suite, a common language for understanding and acting on cyber risk in the energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO, Centriihttps://www.linkedin.com/in/narezzi/RESOURCESCentriihttps://centrii.comCyber Energiahttps://cyberenergia.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Centrii, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT security, renewable energy cybersecurity, battery energy storage systems, BESS, critical infrastructure protection, energy sector cybersecurity, NERC CIP, NIS 2.0, power purchase agreements, distributed energy resources, industrial intelligence, cyber risk quantification Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Gibson Guitars at NAMM 2026: 131 Years of Craftsmanship, Innovation & Functional Art | A Brand Highlight Conversation with Jeff Stempka, Global Brand & Marketing at Gibson | NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 30, 2026 10:22


131 years. Still handcrafted in Nashville. Still changing music.At NAMM 2026, Sean Martin and Marco Ciappelli sat down with Jeff Stempka, Global Brand & Marketing at Gibson & Gibson Custom, to talk about what makes this brand untouchable—the craftsmanship, the artist connection, and why people will stretch their budget just to hold one.From the Les Paul Studio Double Trouble to the ES-335 Fifties and Sixties refresh, Gibson is honoring its legacy while pushing forward.Jeff said it best: "These are tools that enable incredible musicians to take the instruments and do something we never intended."

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Hilton Builds Loyalty Through Flexibility, Recognition, and Human-Centered Travel

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Jan 29, 2026 33:56 Transcription Available


Send us a textFor more than a century, Hilton has been shaping how people experience hospitality. Today, the company spans 26 brands, 9,000 properties, and 141 countries and territories, yet its loyalty strategy remains grounded in a simple idea: make travelers feel seen, valued, and supported at every stage of their journey. In this edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Brad Anderson, Vice President of the Hilton Honors program, about how the brand continues to evolve loyalty in an increasingly complex and expectation-driven travel landscape. 

ITSPmagazine | Technology. Cybersecurity. Society
Burton And Circle Strings Guitars at NAMM 2026: Snowboards Meet Custom Guitars And It Is Awesome! | A Brand Highlight Conversation From NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 27, 2026 5:33


Snowboards and Guitars: Circle Strings x Burton at NAMM 2026Some collaborations make you stop and ask how nobody thought of this before.At NAMM Media Day 2026, Sean Martin caught up with Adam Buchwald and William Hylton from Circle Strings, a Vermont-based guitar company, to talk about their partnership with Burton. The concept is deceptively simple: matching snowboards and custom guitars built from the same materials.But the execution is anything but simple.Buchwald owns a wood company in Vermont. He had an entire tree of figured mahogany set aside, waiting for the right project. When Burton agreed to collaborate, he knew exactly what to do with it. The wood became the centerpiece—the visual and sonic foundation of everything that followed.Then William Hylton got to work.Hylton, Circle Strings' designer and CNC specialist, is a backcountry snowboarder. He chose Burton's Alakazam powder board shape as his starting point, drawn to its distinctive tail curve. That curve, he realized, was already guitar-esque. So he wove it through the entire instrument—the fingerboard extension, the pickguard, the bridge tips. The snowboard's DNA lives in every contour.But here's where it gets interesting.The core of a Burton snowboard is wood. Lightweight, durable, designed for performance. Hylton took that same core material and built a guitar body from it. The result feels right in your hands—balanced, resonant, purposeful. It's not a gimmick. It's a genuine instrument built from materials engineered to perform.The acoustic model features a sound hole that mirrors the snowboard's design. Inlays are crafted from Burton's core material, tying everything together visually and conceptually. Both guitars showcase snowflake inlays inspired by Snowflake Bentley, the Vermont photographer who first captured snowflakes in their true crystalline form over a century ago.It's a detail that says everything about how Circle Strings approaches their work. History. Craft. Place.Vermont runs through this collaboration. Buchwald and Hylton are snowboarders. They source their wood locally. They build instruments that reflect where they come from. Burton, also rooted in Vermont's snow culture, was a natural partner.The Burton team, according to Hylton, is thrilled. Many of them are musicians. Some are fans of the artists Circle Strings builds for. The connection was already there—this project just made it tangible.What strikes me about this collaboration is the underlying philosophy. Snowboards and guitars aren't that different when you strip them down. Both are built from wood. Both demand precision. Both exist to help someone express themselves—whether carving powder or carving a melody.Circle Strings and Burton understand this. They didn't force a partnership. They found the common thread and followed it.The result is a set of instruments that belong in a museum and on a stage. Objects that tell a story about craft, place, and the people who refuse to separate their passions.Snowboards and guitars. Same wood. Same craft. Different ride.Sean Martin reports from NAMM 2026 for ITSPmagazine.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTSAdam Buchwald and William HyltonRESOURCESLearn more about Circle Strings Guitars: https://circlestrings.comLearn more about Burton Snowboards: https://www.burton.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, Burton, Circle Strings, custom guitars, snowboard guitar, handmade guitars, Vermont, guitar collaboration, Burton snowboards, NAMM, luthier, unique guitars Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
PRS Guitars at NAMM 2026: John Mayer Wild Blue Silver Sky & Ed Sheeran Baritone Revealed | A Brand Highlight Conversation with Alex Chadwhick from PRS Guitars | NAAM 2026

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 26, 2026 4:45


Vintage Dreams, Modern Hands: A Conversation with PRS Guitars at NAMM 2026They were literally closing down the show floor when I grabbed Alex Chadwick from PRS Guitars for a conversation I wasn't willing to miss.We'd been talking off-mic about something that kept nagging at me—this tension between technology and creativity that runs through everything in the music world right now. So I hit record, security guards circling, and asked him straight: Is technology helping musicians become better artists, or do you still need to learn the hard way?His answer was refreshingly honest. Technology isn't inherently good or bad. It's a tool. When it helps people be more expressive, more creative—that's the win. When it gets in the way of that expression? That's when we have a problem.It's the kind of nuance that gets lost in the usual gear coverage.PRS brought some beautiful new instruments to NAMM this year. The John Mayer Wild Blue Silver Sky stopped people in their tracks—a sharp turquoise finish with the first matching headstock ever produced from their Maryland factory on a Silver Sky. Limited to a thousand pieces worldwide. For Mayer fans and Silver Sky devotees alike, this one feels special.Then there's the Ed Sheeran Semi-Hollow Piezo Baritone. A 27.7-inch scale instrument tuned a fifth below standard, with discrete outputs for both magnetic and piezo elements. But here's what got me: each guitar ships with a signed print of Sheeran's original artwork that appears on the body. He's a visual artist too. The instrument becomes a canvas for multiple creative expressions at once.But the conversation that really stuck with me was about vintage guitars and why we romanticize them so much.Those 1950s and 60s instruments—the ones on posters, in documentaries, making the music that shaped entire generations—they've become holy relics. And the ones that actually sound magical? They cost as much as a house now. So how does anyone access that?Chadwick explained something about PRS's philosophy that I found genuinely compelling. They don't go back to the fifties. They go back to 1985. That gives them freedom—they can draw inspiration from those holy grail instruments without being trapped by their quirks, their inconsistent tolerances, their aged components. They can take what made those guitars legendary and build it into something repeatable, accessible, and comfortable.The goal, he said, is to create instruments that get out of the way. Guitars that let the person be more expressive instead of fighting against limitations.That phrase has been echoing in my head since I left Anaheim. Instruments that get out of the way.Because that's really what this is about, isn't it? All the gear, all the technology, all the innovation—it only matters if it helps someone find their voice. Make their own music. Tell their own story.PRS seems to understand that. In a world obsessed with vintage nostalgia and spec-sheet comparisons, they're building for expression.And that's worth a conversation, even when security is showing you the door.Marco Ciappelli reports from NAMM 2026 for ITSPmagazine, exploring the intersection of technology, creativity, and the humans who make music possible.__________________________This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTAlexander ChadwickPRS GuitarsRESOURCESLearn more about PRS GUITARS: https://prsguitars.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSNAMM 2026, PRS Guitars, John Mayer Silver Sky, Ed Sheeran guitar, PRS Wild Blue, baritone guitar, guitar gear, new guitars 2026, PRS limited edition, guitar innovation, NAMM Show, musician interviews Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Engineering Brand Love ft. Rick Milenthal

Brand Story

Play Episode Listen Later Jan 22, 2026 42:07


What happens when marketing becomes more automated, data-driven, and efficient — but less human? In episode 102 of Brand Story, we sit down with Rick Milenthal, Chairman, Founder, and CEO of The Shipyard, to explore why emotion still matters more than technology, how fear can hold brands back, and why understanding people is the key to building brands that last.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/engineering-brand-loveContinue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketingChapters:(00:00) – Meet Rick Milenthal and The Shipyard(03:10) – Curiosity, fear, and adapting to change(09:01) – Building The Shipyard(11:59) – Engineering brand love and emotional storytelling(23:10) – Culture, leadership, and mental health in agencies(27:21) – Client work spotlight: EVs & Visit California(34:47) – The future of The Shipyard(37:00) – Fear vs adventure in leadership(40:54) – Rick's advice to his younger self

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | Papa Murphy's “Take and Bake” Pizza Reinvents Customer Engagement & Loyalty

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Jan 22, 2026 33:45 Transcription Available


Send us a textPapa Murphy's has sliced out a unique position in the crowded pizza category with a simple yet transformative idea: pizzas made fresh in-store, taken home, and baked by the customer. With more than 1,000 locations across the U.S., including franchise-owned stores, the brand continues to differentiate through both product and experience. Loyalty360 recently spoke with Jason Focht, Vice President of Digital Marketing, about the uniqueness of the take-and-bake model and the launch of the redesigned MySlice Rewards loyalty program. Both lend themselves well to motivating customer engagement and creating loyalty.

ITSPmagazine | Technology. Cybersecurity. Society
2026 Security Predictions: Agentic SOC, China Threats, and Quantum Readiness | A Brand Highlight Conversation with Vincent Stoffer, Field Chief Technology Officer of Corelight

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 21, 2026 7:50


Vincent Stoffer, Field Chief Technology Officer at Corelight, shares his predictions for 2026 and what security teams should prepare for in the coming year. With nearly a decade at Corelight and a background in network and security engineering, Stoffer brings a unique perspective on where the industry is heading.The conversation explores the emergence of the agentic SOC, where AI agents work alongside human analysts to accelerate detection, response, and incident resolution. Stoffer explains that while the protocols and tools have been in development, 2026 is the year organizations will finally see these capabilities deliver real results. The key differentiator, he notes, is data quality. Tools that provide rich, detailed, and comprehensive network evidence will thrive in this AI-enabled environment.Stoffer also addresses the persistent threat from nation-state actors, particularly China's Typhoon campaigns targeting critical infrastructure. From energy and telecoms to international partners, these threats continue to expand with AI-powered acceleration. Understanding your environment and detecting anomalous behavior remains essential for organizations facing these sophisticated adversaries.The discussion concludes with a look at post-quantum readiness. While quantum computing threats may be 10 to 20 years away, Stoffer emphasizes the importance of understanding cryptographic assets now. Corelight has published a white paper detailing how NDR provides the network visibility needed to locate cryptographic assets and plan migration to quantum-ready cipher suites.This is a Brand Highlight. A Brand Highlight is an introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTVincent Stoffer, Field Chief Technology Officer at CorelightOn LinkedIn: https://www.linkedin.com/in/vincent-stoffer-07057827/RESOURCESLearn more about Corelight: https://corelight.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSVincent Stoffer, Corelight, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, agentic SOC, network detection and response, NDR, critical infrastructure security, nation-state threats, China Typhoon campaigns, Salt Typhoon, Volt Typhoon, post-quantum cryptography, quantum readiness, AI in cybersecurity, security operations, incident response, network visibility, Zeek Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Please Me!
What's Your Brand Story with Eve Hall

Please Me!

Play Episode Listen Later Jan 21, 2026 27:37


In this special episode of the What's Your Brand Story Podcast, host Dhylles Victoria sits down for a deeply personal and powerful conversation with Eve, creator of Please Me. Together, they explore the story behind the brand and how lived experience, trauma healing, and sexual liberation helped shape a global movement. This episode dives into the realities of sexual health, pleasure, and healing, and why breaking the silence around these topics isn't just important it's essential. In this episode, we discuss: Eve's journey from childhood sexual trauma to sexual empowerment Why sexual health care is essential—not optional The orgasm gap and the truth about orgasm equality Why 95% of women require clitoral stimulation to orgasm Sexual health conditions rarely talked about, including: Erectile dysfunction (ED) Incontinence Pelvic floor dysfunction Premature ejaculation Healing sexual shame after trauma Men's sexual health and why it matters too Pleasure, sex toys, vibrators, and redefining what “sex” really means How silence around sex causes harm—and how open dialogue creates healing Connect with the Host Dhylles Victoria What's Your Brand Story PodcastListen on Spotify:https://open.spotify.com/show/4u7va5FBlQmBq9bk3SB6Rx Connect with Eve & Please Me  Website:https://pleaseme.online  Social Media & Contact:https://pleaseme.online/contacts  Substack Newsletter:https://pleaseme.substack.com  Patreon (Ad-Free Episodes & Bonus Content):https://patreon.com/PleaseMePodcast  Be a Guest on Please Me:Apply via PodMatchhttps://www.podmatch.com/hostdetailpreview/beaguestonpleasemepodcast Learn more about your ad choices. Visit megaphone.fm/adchoices

ITSPmagazine | Technology. Cybersecurity. Society
Securing the Decentralized Energy Grid | A Brand Story Conversation with Rafael Narezzi of Cyber Energia

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 20, 2026 28:39


The renewable energy sector faces a critical cybersecurity gap. As wind farms, solar installations, and battery energy storage systems proliferate across the globe, they create a decentralized network of digitally controlled assets that remain largely unprotected. Rafael Narezzi, Co-Founder and CEO of Cyber Energia, brings more than two decades of technology leadership experience to address this growing vulnerability in critical infrastructure.Cyber Energia takes a fundamentally different approach to OT security. While most cybersecurity companies stop at identifying risks through CVE scores and vulnerability assessments, Cyber Energia starts from the risk and translates it into financial terms that executives can act upon. The platform connects technical findings to compliance frameworks including NIS 2.0, IEC 62443, and NERC CIP, providing asset owners with a clear maturity landscape and actionable intelligence.Rafael Narezzi explains that asset owners in the renewable sector operate differently than traditional IT environments. Financial companies often acquire energy assets as investments without maintaining technical staff on-site. When compliance regulations now hold these owners personally liable for cybersecurity failures, they need tools that speak their language: dollars, risk, and return on investment. Cyber Energia prices its services per megawatt, demonstrating its commitment to speaking the language of energy.The decentralization of energy generation presents unique challenges. Rafael Narezzi points to recent cyber attacks on Poland's distributed grid as evidence that threat actors understand how to manipulate multiple remote locations simultaneously to destabilize power networks. Battery energy storage systems present particular risks, as compromised dispatch commands could create grid imbalances similar to the fictional scenario depicted in Ocean's 11. Yet many sites lack even basic cyber hygiene protections.Cyber Energia helps customers understand the financial impact of potential attacks. A 98-megawatt wind turbine site, for example, could lose 1.9 million dollars from just one week of downtime. This quantification enables executives to make informed decisions about relatively modest security investments that significantly reduce their risk exposure. The platform provides a single-view dashboard for organizations managing hundreds of sites across different regions, technologies, and regulatory environments.Rafael Narezzi observes that a CEO before a cyber attack is fundamentally different from a CEO after one. Organizations often underestimate digital risks compared to physical ones, despite living in an increasingly connected world. Regulations like NIS 2.0 now impose personal liability on directors and can revoke operating licenses, removing any excuse for neglecting cybersecurity. The awareness is changing, but Cyber Energia continues working to close the gap between compliance requirements and actual security posture across the renewable energy sector.This is a Brand Story. A Brand Story is a ~35-40 minute in-depth conversation designed to tell the complete story of the guest, their company, and their vision. Learn more: https://www.studioc60.com/creation#fullGUESTRafael Narezzi, Co-Founder and CEO of Cyber Energiahttps://www.linkedin.com/in/narezzi/RESOURCESCyber Energiahttps://cyberenergia.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSRafael Narezzi, Cyber Energia, Sean Martin, brand story, brand marketing, marketing podcast, brand story, OT cybersecurity, renewable energy security, critical infrastructure protection, NIS 2.0 compliance, IEC 62443, wind farm cybersecurity, solar energy security, battery energy storage systems, BESS security, decentralized energy grid, cyber risk quantification, energy sector compliance, NERC CIP, operational technology security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Persuasion by the Pint
417: The Psychology of the Pour: How To Craft Brand Stories and Captivating Package Design

Persuasion by the Pint

Play Episode Listen Later Jan 18, 2026 70:30


On this episode, Bryant Vander Weerd joins us. He is the Founder of Full Pour Media, an award-winning creative agency that specializes in the food and beverage industry. Full Pour Media works with clients both in US and abroad to plan, produce, and execute marketing and promotional strategies Bryant has won three Emmy awards for […] The post 417: The Psychology of the Pour: How To Craft Brand Stories and Captivating Package Design first appeared on Persuasion by the Pint.

The Savvy Scribe
EP343: From Bedside to Business: Crafting Your Nurse Writer Brand Story with Dr. Farah Laurent

The Savvy Scribe

Play Episode Listen Later Jan 17, 2026 50:34


Send us a textDr. Farah shares the real story behind her pivot from ER nurse to nurse career coach and business owner. You'll learn how your personal story can fuel your brand identity, the importance of visibility in business, and how to stand out in a saturated market—even as a nurse writer. This episode is packed with tangible advice for nurses ready to build something of their own.About Dr. Farah LaurentNurse entrepreneur and founder of Nurses Making Business Moves Conference! Nurse career coach who's coached over 200 nurses to land their dream role making 6 figures! Author, podcaster, and keynote speaker!Key TakeawaysThe early resistance Farah faced—and how it fueled her purpose and missionWhy personal brand is your reputation and how to actively manage itHow to turn your story into a brand that builds trust and attracts clientsThe value of niching down to speak directly to your ideal audienceVisibility strategies: showing up on video, creating educational content, and networkingWhy testimonials and referrals are powerful tools for growing your credibilityThe difference between a business idea and a real business opportunityThe must-have elements before launching your brand and businessPractical tips for nurse writers: building authority, creating content, and connecting authenticallyWhy consistency matters more than perfectionWelcome to the Savvy Scribe Podcast, I'm so glad you're here! Before we start the show, if you're interested, we have a free Facebook group called "Savvy Nurse Writer Community"I appreciate you following me and listening today. I would LOVE for you to subscribe: ITUNESAnd if you love it, can I ask for a

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Stories | CAVA Blends Bold Mediterranean Flavors with Experience, Innovation, and Outstanding Service

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Jan 15, 2026 27:35 Transcription Available


Send us a textAs one of the fastest-growing fast-casual brands, Mediterranean eatery, CAVA, was founded in 2010 as a full-service restaurant. The company's goal is to make delicious food that customers feel good about buying and eating. Today, the company has grown substantially, with more than 400 restaurants in 28 states across the country. In this edition of Leaders in Customer Loyalty: Brand Stories, Loyalty360 spoke with Andy Rebhun, Chief Experience Officer for CAVA, about the secret to this brand's dramatic growth strategy.  

ITSPmagazine | Technology. Cybersecurity. Society
From Department of No to Department of Know: The CISO Evolution | A Brand Highlight Conversation with Ivan Milenkovic, Vice President, Cyber Risk Technology of Qualys

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 13, 2026 6:37


In this Brand Highlight, Ivan Milenkovic, Vice President, Cyber Risk Technology at Qualys, joins host Sean Martin to discuss how security leaders can break free from the whack-a-mole cycle of vulnerability management.With more than 48,000 vulnerabilities disclosed in 2025 alone and the average enterprise juggling 76 different security consoles, Milenkovic argues that the old methods of counting patches and chasing alerts are no longer sustainable. Instead, Qualys helps organizations prioritize threats based on business context through what the company calls TruRisk.Milenkovic describes a fundamental shift he sees taking place in boardroom conversations: moving from risk appetite to risk tolerance. Boards and executives now want to know what specific losses mean to the business rather than simply asking whether the organization is secure.For CISOs, this means evolving from the department of "No" to the department of "Know," where security leaders understand where problems exist, how to fix them, and what architecture supports business objectives. The key is demonstrating return on investment through resilience metrics rather than vulnerability counts.Qualys addresses this challenge through its Enterprise TruRisk Management platform, which facilitates what Milenkovic calls the Risk Operations Center. Unlike a traditional SOC that focuses on incidents that have already occurred, the ROC takes a proactive stance, helping organizations prevent threats and optimize security spending before damage occurs.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIvan Milenkovic, Vice President, Cyber Risk Technology, QualysOn LinkedIn | https://www.linkedin.com/in/ivanmilenkovic/RESOURCESLearn more about Qualys | https://www.qualys.comAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIvan Milenkovic, Qualys, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, Enterprise TruRisk Management, Risk Operations Center, ROC, vulnerability management, CISO, cyber risk, risk tolerance, security leadership, proactive security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

10PlusBrand
What is a Brand Story? Why storytelling of a hero's journey is key to building a storybrand_Joanne Z. Tan_Episode 81, Season 2

10PlusBrand

Play Episode Listen Later Jan 11, 2026 2:48


What is a brand story? - A brand story is a narrative about a brand, business or personal, based on facts, records, user experience, employee stories, testimonials, and founder's memories, all of which illustrate brand DNA, values, and brand experiences.

How Stories Happen
Improving the signature speech of a marketing entrepreneur

How Stories Happen

Play Episode Listen Later Jan 9, 2026 36:19


Go inside inside my public speaking accelerator, Design My Signature Talk, with this clip from our final group call.Watch the full video of this episode→Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→In this episode, hear Brian Piper deliver his brand new signature story as a reliable opener of his brand new signature talk that we developed in the cohort. He used this material to get 3 brand new client leads from his first attempt.Brian is a marketing consultant and an author who works with people in higher ed. He helps them embrace AI and become more analytical and data led. But for years, he struggled with developing a SIGNATURE speech, instead building new talks every talk. He also struggled to draw from a major source of ideas and identity and stories in his life, refusing to put that material on stage -- a problem we navigated in the cohort to finally crack the code on a stronger opening story for him.***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

ITSPmagazine | Technology. Cybersecurity. Society
Identity, Access, and the Rise of Synthetic Identities | A Brand Highlight Conversation with Denny LeCompte, CEO and Co-Founder of Portnox

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 8, 2026 5:46


In this Brand Highlight, we talk with Denny LeCompte, CEO and Co-Founder of Portnox, about how identity and access control are changing as AI-driven agents and synthetic identities become active participants inside enterprise environments.Passwords still sit at the root of many security failures, which is why the conversation starts with the fundamentals: controlling who can access data, from where, and under what device and policy conditions. Certificate-based authentication emerges as a practical way to reduce password dependency while keeping enforcement tied to managed devices and policy compliance.The discussion then shifts to what is changing for security leaders. CISOs may feel more confident managing traditional cyber threats, but uncertainty rises quickly when AI-generated and non-human identities enter the picture. Agentic AI turns automation into an entity that touches networks and applications, making access control a first-order requirement rather than an afterthought.A clear theme emerges throughout the conversation: synthetic identities are not hypothetical. They appear anywhere autonomous agents require permissions to act, from software development to workflow automation. Applying the same discipline used for human identities, including least privilege, scope limitation, and policy enforcement, becomes essential to maintaining control as AI adoption accelerates.Note: This story contains promotional content. Learn more.GuestDenny LeCompte, CEO and Co-Founder of Portnoxhttps://www.linkedin.com/in/dennylecompte/ResourcesLearn more about Portnox: https://www.portnox.com/Are you interested in telling your story?Full Length Brand Story: https://www.studioc60.com/content-creation#fullBrand Spotlight Story: https://www.studioc60.com/content-creation#spotlightBrand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, denny lecompte, portnox, identity, access, zero trust, passwordless, certificates, agentic ai, synthetic identities, brand story, brand marketing, marketing podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Real-Time Protection Against AI-Driven Account Takeover Fraud | A Brand Highlight Conversation with Israel Mazin, Co-Founder and CEO of Memcyco

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Jan 8, 2026 5:34


As AI makes it easier for attackers to launch account takeover campaigns at scale, organizations face mounting pressure to protect their customers and their brand. Israel Mazin, Co-Founder and CEO of Memcyco, joins the conversation to discuss how real-time detection and protection capabilities are changing the game.Memcyco is built on four products within a unified platform, each designed to detect and block both traditional and AI-driven attacks in real time. Unlike reactive threat intelligence solutions, Memcyco identifies victims as they interact with fake sites, provides detailed attacker data, and even deploys credential deception to neutralize stolen information before it can be used.With an agentless deployment that takes just minutes to implement, Memcyco delivers more than 10x ROI for customers across financial services, retail, airlines, logistics, and hospitality. The company has achieved nearly 300% year-over-year growth, serving organizations across North America, Latin America, Europe, and beyond.This is a Brand Highlight. A Brand Highlight is a ~5 minute introductory conversation designed to put a spotlight on the guest and their company. Learn more: https://www.studioc60.com/creation#highlightGUESTIsrael Mazin, Co-Founder and CEO of MemcycoOn LinkedIn: https://www.linkedin.com/in/israel-mazin-62215b/RESOURCESMemcyco: https://www.memcyco.com/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKEYWORDSIsrael Mazin, Memcyco, Sean Martin, brand story, brand marketing, marketing podcast, brand highlight, account takeover, ATO fraud, digital impersonation, phishing protection, real-time fraud detection, credential deception, website spoofing, AI-driven attacks, fraud prevention platform, agentless security Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Brand Story
Season 5 Favorite Moments

Brand Story

Play Episode Listen Later Jan 8, 2026 18:31


In this highlight episode, we revisit some of our favorite moments from Season Five of Brand Story. The conversation reflects on what it takes to build brands people believe in, how marketers should think beyond surface-level metrics in a zero-click landscape, and what it means to lead creative work with intention.This is Brand Story, a podcast celebrating the stories of real people who are making an impact on brands, business, and the world around them. Episodes feature guests from a variety of backgrounds who bring their own unique perspectives to the conversation.Brand Story is created and produced by Gravity Group, a full-service brand and marketing agency, and is hosted by Gravity Group President, Steve Gilman.Links and Information From the Episode Here: gravitygroup.com/podcast/season-five-favorite-moments/Continue the conversation on social:For more of Brand Story, check out our LinkedIn (https://www.linkedin.com/company/gravitygroupmarketing), where we'll post previews and highlights of shows, behind-the-scenes sneak peeks, plus other marketing news you can use.We're also on:Instagram — https://www.instagram.com/gravitygroupFacebook — https://www.facebook.com/gravitygroupmarketingChapters:(00:00) Introduction(1:05) Happiness Advantage — Mark Lester (Ep 90)(4:02) Zero-Click Marketing — Rand Fishkin (Ep 91)(6:28) Collaborative Leadership — Aya Baeshean (Ep 87)(9:55) Brand Transformation — Simon Hill (Ep 97)(12:51) Building Brand Loyalty — Phyllis Rothschild (Ep 95)(15:35) Keeping Creativity Alive — Brian Thibodeau (Ep 98)

Leaders in Customer Loyalty, Powered by Loyalty360
Leaders in Customer Loyalty: Brand Story | A Century of the Crave: White Castle's Recipe for Retaining Loyal Fans for 105 Years

Leaders in Customer Loyalty, Powered by Loyalty360

Play Episode Listen Later Jan 8, 2026 26:36 Transcription Available


Send us a textWhite Castle's loyal fan base has kept America's “first fast-food hamburger chain” in business for nearly 105 years. What makes this brand still appeal to consumers and continue to expand, especially when other chains struggle to keep the doors open?   Loyalty 360 spoke with Jamie Richardson, Vice President of Marketing and Public Relations at White Castle, on the brand's longevity and its loyalty program, known as Craver Nation Rewards. 

ITSPmagazine | Technology. Cybersecurity. Society
When AI Guesses and Security Pays: Choosing the Right Model for the Right Security Decision | A Brand Story Highlight Conversation with Michael Roytman, CTO of Empirical Security

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 30, 2025 7:58


In this Brand Highlight, we talk with Michael Roytman, CTO of Empirical Security, about a problem many security teams quietly struggle with: using general purpose AI tools for decisions that demand precision, forecasting, and accountability.Michael explains why large language models are often misapplied in security programs. LLMs excel at summarization, classification, and pattern extraction, but they are not designed to predict future outcomes like exploitation likelihood or operational risk. Treating them as universal problem solvers creates confidence gaps, not clarity.At Empirical, the focus is on preventative security through purpose built modeling. That means probabilistic forecasting, enterprise specific risk models, and continuous retraining using real telemetry from security operations. Instead of relying on a single model or generic scoring system, Empirical applies ensembles of models tuned to specific tasks, from vulnerability exploitation probability to identifying malicious code patterns.Michael also highlights why retraining matters as much as training. Threat conditions, environments, and attacker behavior change constantly. Models that are not continuously updated lose relevance quickly. Building that feedback loop across hundreds of customers is as much an engineering and operations challenge as it is a data science one.The conversation reinforces a simple but often ignored idea: better security outcomes come from using the right tools for the right questions, not from chasing whatever AI technique happens to be popular. This episode offers a grounded perspective for leaders trying to separate signal from noise in AI driven security decision making.Note: This story contains promotional content. Learn more.GUESTMichael Roytman, CTO of Empirical Security | On LinkedIn: https://www.linkedin.com/in/michael-roytman/RESOURCESLearn more about Empirical Security: https://www.empiricalsecurity.com/LinkedIn Post: https://www.linkedin.com/posts/bellis_a-lot-of-people-are-talking-about-generative-activity-7394418706388402178-uZjB/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Brand Spotlight Story: https://www.studioc60.com/content-creation#spotlight▶︎ Brand Highlight Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, michael roytman, ed beis, empirical security, cybersecurity, ai, machinelearning, vulnerability, risk, forecasting, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

How Stories Happen
My process for booking keynotes (the engine most overlook)

How Stories Happen

Play Episode Listen Later Dec 19, 2025 25:00


If you want to book more and better speaking opportunities, this is the episode for you. I take a closer look at the process most speakers miss, not because they haven't had any success selling their offerings, but precisely because they have. Speaking works in the opposite way to almost everything else. It's an inverted commercial model. We need to embrace this fact and invest our time, energy, and budget accordingly, if we want to book more and better stages, charge or raise our speaker fees, and develop a sustainable pipeline of keynotes and speaking engagements.There's a paradox at the center of what it takes to do this well. Get ready to reverse your process!Join the next cohort of Design My Signature Talk (starts Feb. 23, 2026)→Get the full transcript and visual model from this episode→Get my best resources for keynote speakers→***ABOUT ME, JAY ACUNZOI work with entrepreneurs, execs, and teams on the journey from competent to resonant. To do that, I help transform your thinking into clear, captivating ideas, speeches, and IP. Stop chasing attention. Become the one others seek.I'm a former marketing leader at Google and HubSpot and globally touring speaker and author. I've spent 20 years building the exact thought leadership I now help clients create—as a practitioner-peer, not a coach with templates.Work with me 1:1, book me to speak, or explore free resources at jayacunzo.comDon't market more. Matter more.Think resonance over reach.Don't be the best. Be their favorite.***ENJOY THE SHOW? PLEASE SAY THANKS!Leave a review on Apple Podcasts Leave a rating on Spotify Thanks for listening!

Ecomm Breakthrough
Throwback: Unlocking Customer Engagement - The Secret Weapon of QR Codes in E-Commerce

Ecomm Breakthrough

Play Episode Listen Later Dec 18, 2025 16:39


In this episode, Josh interviews Kris Gramlich, an experienced Amazon FBA seller and entrepreneur. Kris shares practical strategies for building customer loyalty, including using product insert cards with QR codes that lead buyers to claim free gifts in exchange for their contact information and order ID. He emphasizes providing value rather than manipulating reviews and discusses sourcing free sample gifts locally to quickly engage customers. Kris also offers actionable tips on optimizing product images, building an audience, and leveraging influencer marketing, all aimed at fostering long-term relationships and driving repeat business on Amazon.Chapters:Introduction to Kris Gramlich (00:00:00)Josh introduces Kris, his background in entrepreneurship, and his Amazon FBA journey.Product Insert Cards & QR Codes (00:01:03)Discussion on using product insert cards with QR codes to engage customers and offer free gifts.Landing Pages & Customer Verification (00:02:00)Explaining the process: QR code leads to a landing page, collects customer info and order ID to verify purchases.Avoiding Review Manipulation (00:04:06)Emphasizing not asking for reviews to avoid Amazon penalties and focusing on providing value instead.Free Gift Strategy & Messaging (00:05:15)Details on the types of free gifts offered, messaging on insert cards, and conversion rates.Sourcing & Sample Packs (00:05:48)Switching to U.S. suppliers for faster fulfillment and offering sample packs as free gifts.Landing Page Experience & Brand Story (00:07:30)Using videos and storytelling on landing pages to build brand connection and encourage opt-ins.Gift Relevance & Opt-In Process (00:08:01)Ensuring free gifts are relevant to the purchased product and using order ID to prevent abuse.Email Follow-Up & Community Building (00:09:16)Using MailChimp for follow-up emails, sharing brand story, and building a community around new product launches.Consumable Products & Customer Satisfaction (00:10:26)Focusing on consumable pet products, offering alternatives if customers are unsatisfied, and prioritizing customer happiness.Actionable Takeaways & Listing Optimization (00:11:46)Josh summarizes three actionable takeaways: optimize listing images, build an audience, and use free samples for subscriptions.Product Launch Strategies & Influencer Marketing (00:13:55)Discussing launch strategies: audience outreach, PPC, influencer marketing, and new affiliate software tools.Where to Find Kris & Closing (00:15:51)Kris shares how listeners can connect with him and offers a free gift; episode closes.Links and Mentions:Tools and WebsitesZapierMailchimpSellozo.comTranscript:Josh 00:00:00  Today I am excited to introduce you to Kris Gramlich. Kris is a professional FBA seller, a podcast host and an account executive at Sellozo. Kris has always been entrepreneurial and enjoyed the thrill of selling items, from selling items at garage sales as a kid to mowing yards and then selling clothes on eBay. Kris learned how to sell physical products on Amazon in 2013, starting out by selling things around the house. He learned the basics of retail arbitrage and started sourcing his own products. Kris launched his first product in 2014 after watching YouTube videos and listening to podcasts. Currently, Kris has four brands and enjoys helping other sellers on Amazon. Kris hosts a podcast with Dustin, another seller, where they talk about industry leaders and other sellers. So welcome to the podcast today, Kris.Kris 00:00:52  That's quite the intro there. Josh. That's pretty good. I'm gonna have to take a couple notes there and kind of implement those on our own podcast. That was really good.Josh 00:01:00  Hey. Well, you have, you have a good bio yourself.Josh 00:01:03  I think that's that's why it sounds so good to you. So I want to dive in a little bit more with, how you're building that audience with insert cards. You know, we do the same thing with our brand. I don't know that I necessarily see that as, like, overly gray. I mean, you look at like a box of, you know, grab some Clorox wipes. Right. What's on the product label for Clorox wipes? it's the P&G website. Right. So like and they have like a, you know, they're not saying like, hey, come register your warranty per se, but like they have links to their social media, right? They have their icons, they have their website on there. So like I don't think people need to be as scared about that. Right. But what are you seeing working really well when it comes to product inserts?Kris 00:01:49  Well if anything good out of Covid came, it's that people were more adapted to QR codes. So people like start to they know what that is now.Kris 00:02:00  And so QR code like that just not people realize, oh I can scan that. So a QR code insert that is has some type of messaging messaging like so thank you. you know, get your free gift. there's, there's things that, that I'm doing now where, somebody scans it, they go to a landing page. in that landing page, they give name, email address, order ID number, and that just kind of verifies that the order matches with Amazon order. So we're not just getting spammed for free gift. Yeah. And they scan it and we just give a free gift out. And, all they got to do is provide us with their name and their email address. we're think about adding their mailing address there, just to kind of have that for like a backup plan to do postcards. I get a random side note here, but I bought something Amazon like literally 60 days later, I got a gift. Like a postcard in the mail. Really? How'd this? How'd this guy know to send me this postcard for another item? So, like, reverse engineering? That's kind of fun for me.Kris 00:03:07  So I'm trying to figure that out, but, Yeah, the insert scan, QR code landing page. Basic information. No first name, last name, email address, and then the order ID. we're using a tool called, It's going away from me. Zapier or Zapier, however you want to pronounce. Okay, that that, links up order IDs so that, when they type in your ID, it matches correctly with the order ID inside your account. and then from there, we send them a free sample and the free sample. You know, it's just something to, like, get them to engage with us, maybe try another product that we're thinking about launching down the road. it also just allows them to, like, feel warm and fuzzy. So maybe that when that review request does come and that that review request is done by Amazon, we're not sending any more like, hey, give us a five star review. We're just leaving it more like providing value. And whenever they get something from Amazon that says, how would you rate your experience with so-and-so brand? Maybe they think, hey, that was a good brand.Kris 00:04:06  I'll leave a five star review, so we're leaving that alone.Josh 00:04:09  So you're not even touching reviews. You're not.Kris 00:04:11  Even to touch.Josh 00:04:12  It. Yep.Kris 00:04:13  Yeah. Just leaving like just value.Josh 00:04:15  Yeah. I agree 100% with the, you know, not even touching reviews. We we've made the same decision because we have opt in flows and all of that. And everybody's like why don't you ask for a review? And it's like, I'm not even touching it with a ten foot pole.Kris 00:04:28  Because not anymore.Josh 00:04:29  That's that's the one thing that like is if Amazo...

ITSPmagazine | Technology. Cybersecurity. Society
AI Adoption Without Readiness: When AI Ambition Collides With Data Reality | A TrustedTech Brand Story Conversation with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 17, 2025 34:16


As organizations race to adopt AI, many discover an uncomfortable truth: ambition often outpaces readiness. In this episode of the ITSPmagazine Brand Story Podcast, host Sean Martin speaks with Julian Hamood, Founder and Chief Visionary Officer at TrustedTech, about what it really takes to operationalize AI without amplifying risk, chaos, or misinformation.Julian shares that most organizations are eager to activate tools like AI agents and copilots, yet few have addressed the underlying condition of their environments. Unstructured data sprawl, fragmented cloud architectures, and legacy systems create blind spots that AI does not fix. Instead, AI accelerates whatever already exists, good or bad.A central theme of the conversation is readiness. Julian explains that AI success depends on disciplined data classification, permission hygiene, and governance before automation begins. Without that groundwork, organizations risk exposing sensitive financial, HR, or executive data to unintended audiences simply because an AI system can surface it.The discussion also explores the operational reality beneath the surface. Most environments are a patchwork of Azure, AWS, on-prem infrastructure, SaaS platforms, and custom applications, often shaped by multiple IT leaders over time. When AI is layered onto this complexity without architectural clarity, inaccurate outputs and flawed business decisions quickly follow.Sean and Julian also examine how AI initiatives often emerge from unexpected places. Legal teams, business units, and individual contributors now build their own AI workflows using low-code and no-code tools, frequently outside formal IT oversight. At the same time, founders and CFOs push for rapid AI adoption while resisting the investment required to clean and secure the foundation.The episode highlights why AI programs are never one-and-done projects. Ongoing maintenance, data validation, and security oversight are essential as inputs change and systems evolve. Julian emphasizes that organizations must treat AI as a permanent capability on the roadmap, not a short-term experiment.Ultimately, the conversation frames AI not as a shortcut, but as a force multiplier. When paired with disciplined architecture and trusted guidance, AI enables scale, speed, and confidence. Without that discipline, it simply magnifies existing problems.Note: This story contains promotional content. Learn more.GUESTJulian Hamood, Founder and Chief Visionary Officer at TrustedTech | On LinkedIn: https://www.linkedin.com/in/julian-hamood/Are you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlightKeywords: sean martin, julian hamood, trusted tech, ai readiness, data governance, ai security, enterprise ai, brand story, brand marketing, marketing podcast, brand story podcast, brand spotlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

ITSPmagazine | Technology. Cybersecurity. Society
Mastering The Art of Risk Management Without Losing Your Mind | A CyXcel Brand Story Conversation with Megha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk

ITSPmagazine | Technology. Cybersecurity. Society

Play Episode Listen Later Dec 16, 2025 44:13


Risk has always been part of doing business. What has changed is its scale, speed, and interconnected nature. In this episode, Sean Martin and Marco Ciappelli are joined by Megha Kumar, Chief Product Officer and Head of Geopolitical Risk at CyXcel, to explore how organizations can think more clearly about digital risk without becoming paralyzed by complexity.Kumar shares how digital resilience is no longer a technical problem alone. Regulations, infrastructure dependencies, geopolitical tensions, supply chain exposure, and emerging technologies such as AI now converge into a single operational reality. Organizations that treat these as isolated issues often miss the real picture, where one decision quietly amplifies risk across multiple domains.A central theme of the conversation is proportion. Kumar emphasizes that risk management is not about eliminating uncertainty, but aligning effort with value. Not every threat matters equally to every organization. Understanding who you are, where you operate, and where you are going determines which signals deserve attention and which are simply noise.The discussion also reframes geopolitics as a daily business concern rather than a distant policy issue. Companies operate inside global power dynamics whether they acknowledge it or not. Technology choices, supplier relationships, and market expansion decisions increasingly carry political and regulatory consequences that surface quickly and without warning.Rather than advocating for massive new departments or rigid frameworks, Kumar outlines a practical approach. Organizations can decide whether to avoid, mitigate, transfer, or tolerate risk, then revisit those decisions as conditions change. This mindset supports growth and innovation while avoiding the false comfort of static checklists.The episode closes on culture. Effective risk management depends on listening across roles, disciplines, and seniority. Internal dissent, diverse viewpoints, and external validation are presented as assets, not obstacles. In a world where uncertainty is constant, resilience comes from clarity, not control.Learn more about CyXcel: https://itspm.ag/cyxcel-922331Note: This story contains promotional content. Learn more.GUESTMegha Kumar, Partner, Chief Product Officer & Head of Geopolitical Risk at CyXcel | On LinkedIn: https://www.linkedin.com/in/drmeghakumarcyxcel/RESOURCESLearn more and catch more stories from CyXcel: https://www.itspmagazine.com/directory/cyxcelAre you interested in telling your story?▶︎ Full Length Brand Story: https://www.studioc60.com/content-creation#full▶︎ Spotlight Brand Story: https://www.studioc60.com/content-creation#spotlight▶︎ Highlight Brand Story: https://www.studioc60.com/content-creation#highlight Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

From the Yellow Chair
Behind the Scenes: Great American Brand Story 2025 Winners, Skagit Plumbing

From the Yellow Chair

Play Episode Listen Later Dec 9, 2025 32:04 Transcription Available


Send us a textA new logo didn't change everything—owning a clear promise did. We sit down with Mark and Teresa Summers of Skagit Plumbing to unpack how winning the Great American Brand Story set off a deeper transformation: a cousin-made logo gave way to a brand with a mission their team and town could feel. From the first “lottery ticket” application to the moment they just knew they'd won, their journey shows how identity becomes the foundation for growth, culture, and community impact.We dig into the rebrand itself: a flag-shaped S that signals a flagship promise—Staked In Community—plus the language, guidelines, website, and digital assets that turned symbols into daily behaviors. The changes were immediate. Technicians volunteered for parades, a new GM role took shape with confidence, and the mascot Mr. 360 drew crowds for photos. Around town, the new vans earned texts, shout-outs, and vintage-hat nostalgia from a local radio voice. More than aesthetics, the rebrand gave everyone a story to carry, inside the shop and out on the street.If you lead a home service business, this conversation offers practical takeaways: treat brand as infrastructure, not decoration. Use a clear promise to guide hiring, training, community events, and customer experience. Let your values drive visibility—local SEO improves when your story is specific and true. The Summers also speak to the emotional side of change, honoring the old mark while choosing a future that supports scaling, better processes, and a stronger team identity. Ready to turn a logo into a legacy? Listen, share with a fellow owner, and if you feel that nudge, apply to the next Great American Brand Story. Subscribe, leave a review, and tell us the one promise your brand stands on.If you enjoyed this chat From the Yellow Chair, consider joining our newsletter, "Let's Sip Some Lemonade," where you can receive exclusive interviews, our bank of helpful downloadables, and updates on upcoming content. Please consider following and drop a review below if you enjoyed this episode. Be sure to check out our social media pages on Facebook and Instagram. From the Yellow Chair is powered by Lemon Seed, a marketing strategy and branding company for the trades. Lemon Seed specializes in rebrands, creating unique, comprehensive, organized marketing plans, social media, and graphic design. Learn more at www.LemonSeedMarketing.com Interested in being a guest on our show? Fill out this form! We'll see you next time, Lemon Heads!