POPULARITY
In this episode, James chats with Richard Stiennon—cybersecurity analyst, author, and former aerospace engineer—whose 20+ year journey spans from designing car seats to hacking corporate systems for giants like Dell. Hear how a 1992 magazine article led him to launch his own ISP and rise to prominence at Gartner. Richard shares his personal stories from the frontlines of cybersecurity, his crusade against risk management jargon, and bold predictions on AI's impact on security. Plus, private jet mishaps and the unconventional wisdom behind IT Harvest.
Keypoint Intelligence's Peter Mayhew and Carl Schell sit down with Richard Stiennon, Founder of IT-Harvest and author of Curmudgeon, to discuss being an analyst in the print and smart technology industry. Using many ideas from the book to frame the conversation, they speak at length about analysts vs. journalists vs. influencers as well as what ingredients are needed to be successful in the space in the future.
All links and images for this episode can be found on CISO Series. Check out this post for the discussion that is the basis of our conversation on this week's episode co-hosted by me, David Spark (@dspark), the producer of CISO Series, and Geoff Belknap (@geoffbelknap), CISO, LinkedIn. Joining me is our guest Richard Stiennon, chief research analyst, IT-Harvest. In this episode: In this episode: Why do so many vendors claim to offer zero-trust solutions? Is that framework even applicable to some product categories? Do your eyes roll when you hear "zero trust solution"? What do most people think it is, and what's the reality? Thanks to our podcast sponsor, SquareX SquareX helps organizations detect, mitigate and threat-hunt web attacks happening against their users in real-time, including but not limited to malicious sites, files, scripts, and networks. Find out more at sqrx.com.
TechSpective Podcast Episode 129 You may not have noticed, but the tech and cybersecurity job market has sort of sucked the past few years. Maybe it’s just me. My friend Richard Stiennon, research analyst with IT-Harvest and author of Security […] The post Future of Tech and Cybersecurity Looks Bright Thanks to AI appeared first on TechSpective.
Amid the ever-evolving landscape of cyber threats, organisations are constantly challenged to ensure security. Conventional security methods are failing to keep up with the escalating volume and sophistication of attacks. By implementing Managed Detection and Response (MDR) with automation, Security Operations Centers (SOCs) can optimise workflows, augment analyst capabilities, and significantly enhance the organisation's overall cybersecurity defences. Palo Alto Networks offers comprehensive MDR services, leveraging its threat intelligence and cutting-edge technology expertise. Unit 42, its esteemed threat intelligence team, is crucial in providing valuable insights into emerging threats and trends, empowering organisations to stay ahead of malicious actors. In this episode of the EM360 Podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Ophir Karako, Software Engineer (Unit 42) at Palo Alto Networks, to discuss: Palo Alto's MDR Services Operational Automation Data EnrichmentThreat Response Job security for SOC Analysts Interested in learning more about XSOAR and Palo Alto Networks? You can find some additional resources below:Enloe Medical Center Strengthens Its Security Posture and Improves Efficiency With Unit 42 MDRUnit 42 Managed Detection and Response Service DatasheetA Practical Guide to Deploying SecOps AutomationChapters00:00 - Introduction and Background00:57 - MDR Services at Palo Alto Networks03:20 - Automation in Operations04:16 - Automating Data Enrichment05:13 - Intellectual Property Playbooks and Scripts05:41 - Customized Reports for Customers06:10 - Automated Threat Response07:08 - Insights and Lessons Learned from Automation07:37 - Benefits of Automation for SOC Analysts08:06 - Collaboration with Product Experts09:04 - Treating Automation as a CI/CD Process10:01 - The Future of Automation in Cybersecurity12:51 - Automation and Job Security for SOC Analysts14:20 - Cortex XSOAR: Security Orchestration, Automation, and Response Platform15:46 - Unit 42 MDR Service16:16 - Conclusion
The SolarWinds breach exposed vulnerabilities within DevSecOps practices, sending shockwaves through the tech world. The U.S. Securities and Exchange Commission (SEC) indictment against SolarWinds further emphasised the gravity of the situation, alleging the company misled investors by failing to disclose these vulnerabilities and the subsequent breach adequately. This lack of transparency raises crucial questions about accountability and risk management in the mobile app development landscape, pushing organisations to re-evaluate their DevSecOps practices and prioritise robust security measures throughout the entire development lifecycle.In this episode of the EM360 Podcast, Head of Podcast Production Paulina Rios Maya speaks to Richard Stiennon, Chief Research Analyst at IT-Harvest, and Tom Tovar, CEO and Co-Creator of Appdome, to discuss: The SolarWinds indictment The U.S. SEC 4-day ruleThe impact on DevSecOps practicesBYOD and VPN security The evolving role of cybersecurityBuilding cyber resilience
Guests:Eric Parizo, Managing Principle Analyst at Omdia [@OmdiaHQ]On Linkedin | https://www.linkedin.com/in/ericparizo/On Twitter | https://twitter.com/EricParizoRichard Stiennon, Chief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in an enlightening dialogue with industry analysts and cybersecurity veterans, Eric Parizo and Richard Stiennon. The trio explored various aspects of the vendor space in cybersecurity, discussing topics like vendor consolidation, market contraction, and the state of M&A inundating an already-overwhelmed IT environment with complex products.Parizo, a managing principal analyst, counters the narrative of large vendors, stating that most companies desire best-of-breed solutions that offer better integration and measurable outcomes. However, he sees challenges in getting standalone solutions to work together efficiently. To tackle this, Parizo envisages a shift from product integration to data integration, enabling enterprises to handle security data in centralized repositories like Amazon Security Lake.Stiennon, a chief research analyst, points out that security will always be a subpart of the next big thing. Despite the increase in intelligent security systems and development in DevSecOps, Stiennon expresses doubt about a total transformation in security due to the potential disruption to business productivity. Instead of seeking transformation in security, he urges CISOs to first identify and reduce the number of redundant products they pay for, as vendors often progressively add features that might already be available in their product pool.Parizo and Stiennon both offered unique insights into the future of cybersecurity platforms. Parizo acknowledged the merits of the platform approach but challenged the assertion made by large vendors about the superiority and cost-effectiveness of cybersecurity platforms over standalone solutions. He suggested most companies prefer best-of-breed solutions due to enhanced integration and measurable performance outcomes. Conversely, Stiennon expressed skepticism about cybersecurity platforms becoming predominant in the market, asserting that new threats and ongoing innovation make it impossible for one vendor to fully secure an enterprise. Both analysts indicate that, although cybersecurity platforms offer some benefits, the continually evolving security landscape ensures that no single platform approach will dominate the market.Ultimately, Parizo and Stiennon believe that, while consolidation and platform approaches have some benefits, the key to organizational security lies in continuous innovation, knowing the full capabilities of products, and utilizing comprehensive data management to communicate more effectively and make better decisions. Despite the inherent challenges, both experts also remain optimistic about the evolving role of data and AI in driving efficient cyber security practices.Top questions addressed:What is the current status of cybersecurity platforms in the market and how accepted are they by the enterprise?How is data management influencing the security landscape and what role does AI play in its evolution?How successful and realistic are the efforts towards consolidating security capabilities within organizations?What is the current trajectory of mergers, acquisitions, and consolidation in the market?Companies referenced in this conversation:Palo Alto, Cisco, Fortinet, Azure, Symantec, Google, Chrome, Norton LifeLock, AVG, Amazon, Elastic, Splunk, Snowflake, AWS, Cribl___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
Guests:Eric Parizo, Managing Principle Analyst at Omdia [@OmdiaHQ]On Linkedin | https://www.linkedin.com/in/ericparizo/On Twitter | https://twitter.com/EricParizoRichard Stiennon, Chief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode's SponsorsImperva | https://itspm.ag/imperva277117988Devo | https://itspm.ag/itspdvweb___________________________Episode NotesIn this episode of the Redefining CyberSecurity Podcast, host Sean Martin engages in an enlightening dialogue with industry analysts and cybersecurity veterans, Eric Parizo and Richard Stiennon. The trio explored various aspects of the vendor space in cybersecurity, discussing topics like vendor consolidation, market contraction, and the state of M&A inundating an already-overwhelmed IT environment with complex products.Parizo, a managing principal analyst, counters the narrative of large vendors, stating that most companies desire best-of-breed solutions that offer better integration and measurable outcomes. However, he sees challenges in getting standalone solutions to work together efficiently. To tackle this, Parizo envisages a shift from product integration to data integration, enabling enterprises to handle security data in centralized repositories like Amazon Security Lake.Stiennon, a chief research analyst, points out that security will always be a subpart of the next big thing. Despite the increase in intelligent security systems and development in DevSecOps, Stiennon expresses doubt about a total transformation in security due to the potential disruption to business productivity. Instead of seeking transformation in security, he urges CISOs to first identify and reduce the number of redundant products they pay for, as vendors often progressively add features that might already be available in their product pool.Parizo and Stiennon both offered unique insights into the future of cybersecurity platforms. Parizo acknowledged the merits of the platform approach but challenged the assertion made by large vendors about the superiority and cost-effectiveness of cybersecurity platforms over standalone solutions. He suggested most companies prefer best-of-breed solutions due to enhanced integration and measurable performance outcomes. Conversely, Stiennon expressed skepticism about cybersecurity platforms becoming predominant in the market, asserting that new threats and ongoing innovation make it impossible for one vendor to fully secure an enterprise. Both analysts indicate that, although cybersecurity platforms offer some benefits, the continually evolving security landscape ensures that no single platform approach will dominate the market.Ultimately, Parizo and Stiennon believe that, while consolidation and platform approaches have some benefits, the key to organizational security lies in continuous innovation, knowing the full capabilities of products, and utilizing comprehensive data management to communicate more effectively and make better decisions. Despite the inherent challenges, both experts also remain optimistic about the evolving role of data and AI in driving efficient cyber security practices.Top questions addressed:What is the current status of cybersecurity platforms in the market and how accepted are they by the enterprise?How is data management influencing the security landscape and what role does AI play in its evolution?How successful and realistic are the efforts towards consolidating security capabilities within organizations?What is the current trajectory of mergers, acquisitions, and consolidation in the market?Companies referenced in this conversation:Palo Alto, Cisco, Fortinet, Azure, Symantec, Google, Chrome, Norton LifeLock, AVG, Amazon, Elastic, Splunk, Snowflake, AWS, Cribl___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
How will AI impact the next generation of people working with computer science?This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help him navigate this question, Robby has invited two people with quite different backgrounds: Richard Stiennon, author of Security Yearbook 2023 and Founder and Chief Research Analyst at IT-Harvest, and High School Junior, Athena Contos. Athena was recently visiting colleges, together with her father Brian Contos, a long-time veteran of the mnemonic security podcast. They both noticed a lot of excitement and concern regarding AI amongst those about to embark on their higher education, and questions about how AI will impact their choices of schools, majors, careers, and ultimately their future.In this episode, Athena and Richard share their perspectives on AI's potential in education, the ethics of using AI in this context, and how we can go from combating the use of AI in the classroom to making it a useful tool for learning.
There are several reports indicating that the gravy train is about to come to a screeching halt in the cybersecurity industry. Fortune 1000 companies are freezing or cutting back on purchasing budgets for tools and services, which will hit the majority of private and start-up companies that have focused on that segment for 10 years. It's not all bad news. 80 percent of the potential market is all blue water, but it comprises small to medium businesses (SMB) that are not cyber-savvy, and are ready to buy... as long as you can explain what you do in their terms, and demonstrate it works. We talked with Richard Stiennon, founder and chief analyst for IT-Harvest, and Grant Wernick, CEO of Fletch that is enjoying remarkable success and growth by serving the smaller customers. While you are listening, drop us a line and we will send you information about how you can sponsor our special edition to be distributed at it-sa365 in Germany this year. --- Send in a voice message: https://podcasters.spotify.com/pod/show/crucialtech/message Support this podcast: https://podcasters.spotify.com/pod/show/crucialtech/support
215: Attention all sales leaders who want to build a cohesive team! Have you been misled by these popular myths about building a cohesive sales team through communication and collaboration? Myth #1: A team that agrees on everything is the most cohesive. Myth #2: Communication alone is enough to build a cohesive team. Myth #3: Collaboration should be done solely within the sales team. But don't worry, Nick Degnan is here to set the record straight and reveal the truth about building a truly cohesive sales team.In this episode, you will be able to:Unearth the significant impact of a thriving company culture on sales triumph.Delve into the art of assembling a unified sales team with clear communication and teamwork.Understand the significance of adopting a long-term outlook in crafting a winning sales career.Realize why ethics and respectful treatment of customers are essential in the sales world.Conquer the obstacles of accelerated company expansion and develop organizational resilience.My special guest is Nick Degnan, a seasoned sales leader with a wealth of experience in building and managing successful sales teams. Throughout his 17-year career, Nick has worked with tech giants like EMC, Pure Storage, and Tanium, honing his sales strategy and team management expertise. As the current SVP of Global Sales at Axonius, Nick is deeply committed to fostering a collaborative and communicative environment to support a high-performing sales team. His insights on building cohesiveness and driving results have made him a go-to resource for sales managersThe resources mentioned in this episode are:Visit salesbluebird.com/research to learn more about the IT Harvest cybersecurity platform.Check out Axonius for world-class technology that solves real-world problems.Join the team at Axonius, surrounded by good people who work hard and value excellence.Connect with Nick Degnan on LinkedIn to stay up-to-date on his latest insights and experiences.Subscribe to the Sales Bluebird podcast for more tips and strategies on growing sales in the cybersecurity industry.Nick Degnan on LinkedInAxonius websiteSupport the show
On this episode of Sales Bluebird, Alisdair, co-founder of Darwinium, shares the challenges of protecting vulnerable customers and how their company is solving those problems. From digital identity technology to automated remediation, Darwinium's unique platform provides complete visibility across user journeys. They discuss the importance of good customer recognition, solving tangible business problems, and the convergence of cybercrime and cybersecurity in financial services and e-commerce. They also touch on the significance of fresh perspectives, hiring people you trust, and getting your go-to-market strategy right before bringing in a VP of Sales. [00:04:16] Why Downturns Are the Best Time for Startups[00:06:15] Cybersecurity expert moves to Australia after successful acquisition.[00:09:33] Darwinium: Protecting Customers with Collective Intelligence and Edge Computing[00:16:51] Converging Cybercrime and Cybersecurity: The Intersection[00:19:47] Uncovering Customer's Hierarchy of Risk Detection Needs[00:26:27] Building a Startup with a Higher Purpose[00:28:06] Darwinium Solves Business Problems with Cybersecurity Solution[00:31:25] Darwinium: Born Global & Hiring Strategically Worldwide[00:35:04] Sales success through fresh perspectives and validation[00:38:08] Buying Pressure Points: Ecommerce & Financial ServicesDarwiniumAlisdair on LinkedInThis episode is brought to you by IT-Harvest, the most comprehensive research tool for the cybersecurity industry.Support the show
Varun Badhwar is the CEO of Endor Labs, his third startup. He previously founded CipherCloud and RedLock, which were acquired by Lookout and Palo Alto Networks respectively.After the SolarWinds attack, Varun recognized the vulnerability of open-source software and set out to find a solution. He founded Endor Labs to help developers understand the risks of using open-source software, enabling them to make informed decisions. In this episode, you will learn the following:1. Why Varun sets expectations of his new hire sales team to become certified on both the demo and also the pitch within 2 weeks 2. Varun's brilliant reframing of the SBOM (software bill of materials) concept3. The importance of building a brand and creating content to engage audiencesResources:Varun BadhwarEndor Labs Sponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/research.Other episodes you'll enjoy:Top 8 reasons why great sales people leave5 steps to ramp new sellers when you have no enablement and no timeUnlocking Data Protection with Paul Lewis, CEO of CalamuAction:If you enjoyed this episode, please could you give a review by going to Salesbluebird.com/R. It would mean a lot to me personally, and it would help grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
In this episode, Maxime Lamothe-Brassard, Co-founder and CEO of LimaCharlie, embarks on a bold mission to revolutionize the cybersecurity industry by creating an "AWS-like" model for cybersecurity tools and infrastructure, juxtaposing the old-school approach that has dominated the industry.In this episode, you will learn the following:1. LimaCharlie's unique approach and who it is for2. How a business model of using what you need now pays off3. Maxime's driver for hiring a CROResources:Maxime Lamothe-BrassardLimaCharlieSponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:How to help your prospect understand that you have the solution to their problemWhat I would do differently at the beginning of my sales careerHow to use strategic narrative to engage with prospects with Andy RaskinAction:If you enjoyed this episode please could you give a review by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Moving from being an employee to founding your first company is a big step for anyone to take. In this episode, Jori VanAntwerp, CEO & Co-Founder at SynSaber, talks about how he did that and more.In this episode, you will learn the following:1. The big impact SynSaber is making in the operations technology space2. The people who guided Jori along the way3. Why his first sales hire was a VPResources:Jori VanAntwerpSynsaberSponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:Bob Kruse, CEO and co-founder of Revelstoke Security, on how a sales leader becomes CEO of a cybersecurity companyDan Parelskin, VP WW Sales @ Axis Security on getting the first customers and intentionally creating a sales cultureMike Baker, CRO at Noname, talks about leading a sales team through hyper-growthAction:If you enjoyed this episode please could you give a review by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Michael Gwynn's career took him from the army, to Johnson and Johnson, to working in cybersecurity. After years of working in cybersecurity, Michael was introduced to the world of startups and IDmelon.After seeing the potential in the company and the product, Michael took a leap of faith and joined the team as their VP of Sales. With their cutting-edge technology and Michael's industry experience, IDmelon is now leading the industry in passwordless authentication and overnight deployment. In this episode, you will learn the following:1. An approach to right-sizing a sales team2. IDmelon's potential and their partner lift from Microsoft3. Why you give prospects dessert first (or do the magic trick before explaining how you did it. Resources:Michael Gwynn LinkedInMichael@idmelon.comIDMelonSponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/research.Other episodes you'll enjoy:How to get first meetings using VC programs, CISO networks, resellers & sales networksServe dessert first ... it will make you more successful in B2B salesShould you add more sellers to your sales team?Action:If you enjoyed this episode please could you give a review by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Starting a cybersecurity startup may seem daunting and complex, but with the right team and resources, it can be done. In this episode of the Sales Bluebird podcast, I chat with Liat Hayun, the co-founder and CEO of Eureka Security, about her journey of leaving a secure corporate job to create a successful cloud security startup. In this episode, you will learn the following:The decision to come out of stealth and hire their marketing leader first. Differentiation by protecting data itself as opposed to all the things around it.The learning culture at Eureka. For them, it's all about trying things, experimenting, and thinking about different ways to approach people.Resources:Eureka SecurityLiat HayunAsaf WeissSponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:How to use your sales deck effectivelyBrian Gumbel, CRO At Armis Shares His Tips on Scaling Cyber Security Sales Teams3 tips to help your team build 1st meeting connectionsAction:You know how every podcast host asks you to rate and review their podcast but doesn't tell you how and where to actually do that?! Well, I've made it easy for you! If you enjoy the podcast, please could you give a review with this easy-to-use tool by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Eric Olden, CEO and co-founder of Strata Identity, joined us to share his journey from building a security software company in a garage, to taking a leap of faith to join Oracle, and then finally founding Strata Identity. Tune in to hear his story and the tips, tricks, and experiences he has learned along the way.In this episode, you will learn the following:1. Why Strata didn't do any outbound in early days; instead honed in on a long-term, thoughtful content strategy approach2. Why you need to hire people willing to do the work3. Why grit is important for founders & early employeesSponsor:This episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchResources:Strata IdentityEric OldenOther episodes you'll enjoy:Why your team may be "losing" prospects and ONE drastic way to stop itOne tip to avoid sounding stupid in conversations with your prospectsOutbound is brokenAction:You know how every podcast host asks you to rate and review their podcast but doesn't tell you how and where to actually do that?! Well, I've made it easy for you! If you enjoy the podcast, please could you give a review with this easy-to-use tool by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Cybersecurity startups do best when their prospects are innovators. People and companies who are able to buy from and work with startups and less mature technology. But how do you know if your prospects are innovators? This episode covers one way to qualify prospects by just asking a few simple questions. Here's what I cover:1. Example questions to ask your prospect to determine if they are innovators and able to work with you without wasting time and effort2. Tips on when and how to ask those questions3. Strategies for being upfront with buyers to show you are someone they can trustSponsorThis episode was brought to you by IT-Harvest.With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in.IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:6 reasons security leaders buy from startupsDenise Hayman, CRO at Sonrai Security talks journey in cyber security and her biggest learnings Jay Wallace, VP of Worldwide Sales at Rumble, on building a sales teamAction:You know how every podcast host asks you to rate and review their podcast but doesn't tell you how and where to actually do that?! Well, I've made it easy for you! If you enjoy the podcast, please could you give a review with this easy-to-use tool by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
This week on Sales Bluebird, we sat down with Ted Miracco, CEO of Approov Mobile Security. Hear what he has to say about the future of mobile security and why his company is so well-positioned to make an impact.In this episode, you will learn the following:1. Why Approov is so well positioned2. Ted's main focus as the new CEO for the next few quarters3. The challenge Approov faces with reaching application developers and getting noticed in a very noisy marketResources:https://approov.io/https://www.linkedin.com/in/tedmiracco/SponsorThis episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:72: Top 8 reasons why great sales people leave71: Why you should hire lines not dots (and what the heck that means!)192: How to transform a boring case study into a compelling storyAction:You know how every podcast host asks you to rate and review their podcast but doesn't tell you how and where to actually do that?! Well, I've made it easy for you! If you enjoy the podcast, please could you give a review with this easy-to-use tool by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Telling great stories is a powerful tool to convert more first meetings into second meetings, and more second meetings into demos, and demos into POCs. We are often given case studies and told to “use them with customers”. But how do you do that? How do you turn a case study into a great story?In this episode, I'll walk you through an example of how to take a 4-page case study and turn it into a powerful story you can tell live to a prospect.In this episode, you will learn the following:1. How to tell a compelling customer story in 90 seconds or less2. How to use the hero's journey story structure to create a powerful narrative3. How to transform a case study into a compelling storySponsorThis episode was brought to you by IT-Harvest. With over 3,200 vendors in cybersecurity, it is hard to keep track of all the latest developments as well as researching and analyzing categories and subcategories…that's where the IT-Harvest cybersecurity platform comes in. IT-Harvest is the first and only research platform dedicated to cybersecurity. And it's run by Richard Stiennon who has done it all in cybersecurity. Find out more by going to salesbluebird.com/researchOther episodes you'll enjoy:Chris Beall, CEO at ConnectAndSell, on how to make a great cold call (and he improves mine!)Mike Rogers, CRO at Noetic Cyber, breaks down why Ionic Security was not a financial successSimple framework for value-oriented discoveryAction:You know how every podcast host asks you to rate and review their podcast but doesn't tell you how and where to actually do that?! Well, I've made it easy for you! If you enjoy the podcast, please could you give a review with this easy-to-use tool by going to Salesbluebird.com/R. It would mean a lot to me personally and it helps grow the podcast.Connect with me: YouTube: https://www.youtube.com/@salesbluebirdTwitter: https://www.twitter.com/unstoppable_doLinkedIn: https://www.linkedin.com/in/andrewmonaghanSupport the show
Today's guest is Richard Stiennon, Chief Research Analyst at IT-Harvest. In a nod to Clausewitz and Gaddis, this episode is called On Cyber Warfare. In this episode, Richard discusses founding IT-Harvest and his current role there, the transition to data-driven research, the biggest industry shifts and trends, the threat and the current state of cyber warfare, his feelings towards cyber defense, and as always, his toughest lesson learned.
Matthew Lewis, Product Marketing Director at HID Global, and Richard Stiennon, Chief Research Analyst at IT-Harvest, discuss why authentication is still such an issue. They address the significance of passwords in our daily lives, zero trust strategies, security, and SSO. They dig deep into the drive for usability and user experience.
Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?Richard started IT-Harvest to literally harvest data, and that's resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he's discovered from the tool.The cybersecurity space, he's found, has focused and refocused and reframed and refocused again. Now, it's apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they're developed with no thought to security, says Richard. Now we're reaping what was sown. Let's get into Things on the IoT Security Podcast!Follow Richard Stiennon on all his platforms: https://www.linkedin.com/in/stiennonhttps://stiennon.substack.comhttps://twitter.com/stiennonhttps://www.it-harvest.comFollow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/. Let's get into Things on the IoT Security Podcast!Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontosAnd you can follow John Vecchi at https://www.linkedin.com/in/johnvecchiThe IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast
Nikki: With your latest book, the Security Yearbook for 2022 ,this is the third iteration of the series right? It started in 2020 and has only grown since then. Can you talk a little bit about why you started this annual compilation of research? Nikki: For any other security practitioners or anyone in the field who's interested in writing a book or putting together a comprehensive manuscript or research, do you have any tips or advice for them to get started?Chris: Can you tell us about your endeavors with IT-Harvest and your IT industry research, what is it and how did you get started?Chris: I know you serve in various advisory roles. How does your industry research help inform your advisory perspective?Chris: Based on your current IT industry research what are some of the most alarming or interesting trends around vendors, investors and M&A you see currently? Nikki: What is one of the most surprising statistics that you've uncovered year after year? I know one that continues to surprise me is just how prevalent and SUCCESSFUL phishing attacks are. What about you? Nikki: What are your top recommendations, based on your research, for security practitioners and business owners to be aware of and focus on when it comes to risk mitigation?Chris: Looking at the current IT industry and trends, what is one prediction you have for some of the most significant changes we can expect in say 3-5 years?
It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Richard Stiennon!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS
It's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Richard Stiennon!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS
The Nature of Cybersecurity is undergoing rapid evolution. Cyber attacks are becoming more violent - and sophisticated. Big developments in tech over the last few years have led to some of the most shocking ransomware incidents. In this episode of the EM360 podcast, Chief Research Analyst at https://it-harvest.com/ (IT-Harvest), https://www.linkedin.com/in/stiennon/ (Richard Stiennon) speaks to https://www.linkedin.com/in/mmmpp/?originalSubdomain=uk (Mariana Periera), Director of Email Security Products at https://www.darktrace.com/en/ (Darktrace), to explore: How businesses can come back stronger following a threat The email supply chain and how attackers are using legitimate credentials to attack Core capabilities and the importance of augmenting with AI The true changing nature of cybersecurity
Cyber risk intelligence is critical for businesses that operate in the digital world. It is the collection, evaluation, and analysis of cyber threat information by those with access to all-source information. Like other areas of important business intelligence, cyber threat intelligence is qualitative information put into action to help develop security strategies and aid in identifying threats and opportunities. In this episode of the EM360 podcast, Richard Stiennon, Chief Research Analyst at IT-Harvest, speaks to Caitlin Gruenberg Director, Risk Solutions Engineer at CyberGRX as the pair explore: Third-party cyber risk management vs self-assessments Cyber risk intelligence in the wake of huge, high-profile breaches The meaning of a true risk exchange
CIAM enables organisations to securely capture and manage customer identity and profile data, as well as control customer access to certain applications and services. Usually providing a variety of features including customer registration, self-service account management, and 2FA/MFA, the best CIAM solutions ensure a secure and seamless customer experience. But how can enterprises hit a balance between security and customer friction? In the first of two EM360 analyst podcasts with Beyond Identity, Chief Research Analyst at IT-Harvest, Richard Stiennon speaks to Jing Gu, Senior Product Marketing Manager, about the role CIAMs play when it comes to managing end-user activities.
Do you think you know all of the cybersecurity vendors on the market? Think again. Need help getting a clear view for how they all fit into the bigger InfoSec picture in your org? Have a listen.In today's episode, long-time industry analyst, Richard Stiennon, takes us on a journey down memory lane into the world of cybersecurity and the ever-growing landscape of innovation, technology, features, products, solutions, and more.About the bookSecurity Yearbook 2020 was launched at RSA Conference 2020 on February 24 and has been identified as One of the Best Cybersecurity Books of 2021 by Ben Rothke!The 2021 directory has been completely updated. 300 small vendors and two abject failures stopped supporting their websites in 2020. 600 new vendors were added, although only 13 high profile startups are listed. The Directory now contains 2,615 vendors of security products.Two new stories of the pioneers of the cybersecurity industry have been added. Renaud Deraison, creator of Nessus, and Amit Yoran founder of Riptech and CEO of Tenable contribute their stories.A new section has been added to track the performance of 21 publicly traded security vendors like Crowdstrike, Zscaler, Fortinet, and Palo Alto Networks.Thanks to AGC Partners, Security Yearbook 2021 contains a complete listing of M&A activity for 2020.There were over $10 billion in new investments in high-flying security vendors. A complete list and analysis of these deals is included.The biggest difference in the directory this year is that the percent change in headcount is listed for each vendor. This is probably the most important metric for quickly assessing a vendor's health. Successful vendors grow.Having known each other for years, Richard and Sean reminisce and they talk about the past, present, and future of the entire cybersecurity field.____________________________GuestRichard StiennonChief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________This Episode's SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________ResourcesSecurity Yearbook | A Complete History And Directory Of The Entire Cybersecurity Industry- 2021 edition: https://it-harvest.com/shop/security-yearbook-2021/- 2022 edition: https://it-harvest.com/shop/security-yearbook-2022/Connect with Richard at IT-Harvest: https://it-harvest.com/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?
Do you think you know all of the cybersecurity vendors on the market? Think again. Need help getting a clear view for how they all fit into the bigger InfoSec picture in your org? Have a listen.In today's episode, long-time industry analyst, Richard Stiennon, takes us on a journey down memory lane into the world of cybersecurity and the ever-growing landscape of innovation, technology, features, products, solutions, and more.About the bookSecurity Yearbook 2020 was launched at RSA Conference 2020 on February 24 and has been identified as One of the Best Cybersecurity Books of 2021 by Ben Rothke!The 2021 directory has been completely updated. 300 small vendors and two abject failures stopped supporting their websites in 2020. 600 new vendors were added, although only 13 high profile startups are listed. The Directory now contains 2,615 vendors of security products.Two new stories of the pioneers of the cybersecurity industry have been added. Renaud Deraison, creator of Nessus, and Amit Yoran founder of Riptech and CEO of Tenable contribute their stories.A new section has been added to track the performance of 21 publicly traded security vendors like Crowdstrike, Zscaler, Fortinet, and Palo Alto Networks.Thanks to AGC Partners, Security Yearbook 2021 contains a complete listing of M&A activity for 2020.There were over $10 billion in new investments in high-flying security vendors. A complete list and analysis of these deals is included.The biggest difference in the directory this year is that the percent change in headcount is listed for each vendor. This is probably the most important metric for quickly assessing a vendor's health. Successful vendors grow.Having known each other for years, Richard and Sean reminisce and they talk about the past, present, and future of the entire cybersecurity field.____________________________GuestRichard StiennonChief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________This Episode's SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________ResourcesSecurity Yearbook | A Complete History And Directory Of The Entire Cybersecurity Industry- 2021 edition: https://it-harvest.com/shop/security-yearbook-2021/- 2022 edition: https://it-harvest.com/shop/security-yearbook-2022/Connect with Richard at IT-Harvest: https://it-harvest.com/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?
Richard Stiennon is the chief research analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,600+ vendors in the IT security industry. He has held leadership positions at PricewaterhouseCoopers, Webroot and Fortinet. Previously, he was a research VP at Gartner for their IT Security Research Practice and held CMO and CSO roles.
“It's just a straight sequence, which is mind-numbing to me… This is like a Computer Science 101 bad homework assignment, the kind of stuff that you would do when you're first learning how web servers work. I wouldn't even call it a rookie mistake because, as a professional, you would never write something like this." -- Kenneth White, codirector of the Open Crypto Audit Project On this episode of InSecurity, Matt Stephenson sits down with Richard Stiennon for a chat about a LOT of things. He has a new book coming, dropped TWO books in 2020 and we find time to take a look at recent security events unfolding around social media site Parler and the cyber attack on the US Government. Could these events have been prevented with a better approach? The Parler breach was ludicrously simple. The Solarwinds event was infinitely more complicated, but would a CI/CD approach have made a difference? Find out what an industry expert thinks… About Curmudgeon: How to Succeed as an Industry Analyst Curmudgeon is the first (and only) book on how to become and excel as an industry analyst. It is written by a 20 year veteran of the business, the author of UP and to the RIGHT: Strategy and tactics of Analyst Influence. In addition to Stiennon's first hand experience at Gartner, then as an independent analyst covering the cybersecurity industry, there are contributions from analysts such as Tom Austin, Bob Hafner, Jon Oltsik, and others. If you have ever considered becoming an analyst this is the book you should read. If you interact with analysts you should read Curmudgeon to inform your understanding of the analyst life. About Security Yearbook 2021 Security Yearbook 2021 is the second edition of an annual publication that records the history of the IT Security industry and provides a complete catalog of all the vendors. Thousands of copies will be in the hands of media, analysts, and most importantly, security technology buyers. The industry directory is updated to reflect the changes to the vendorscape in 2020 including M&A, launches, and new funding. Over 3,000 vendors are listed by country and category. Each entry includes the number of employees and growth from the previous year. Security Yearbook 2021 is the only place this data is published. Security Yearbook is an indispensable desk reference for IT security practitioners, marketers, CISOs, and investors. About Richard Stiennon Richard Stiennon (@stiennon) is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. Richard is the author of Secure Cloud Transformation: The CIO'S Journey, Surviving Cyberwar and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes and The Analyst Syndicate. In previous lives, he was Chief Strategy Officer for Blancco Technology Group, Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. Richard has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London About Matt Stephenson Insecurity Podcast host Matt Stephenson (@packmatt73) leads the Broadcast Media team at BlackBerry, which puts me in front of crowds, cameras, and microphones all over the world. I am the regular host of the InSecurity podcast and video series at events around the globe. I have spent the last 10 years in the world of Data Protection and Cybersecurity. Since 2016, I have been with Cylance (now BlackBerry) extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to network security, can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty they weren't there for us, but you never know... Every week on the InSecurity Podcast, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. InSecurity is about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... Can’t get enough of Insecurity? You can find us at Spotify, Apple Podcasts and ThreatVector as well as GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Richard Stiennon, Chief Research Analyst with IT-Harvest and industry executive, joins the podcast. Richard gives insight on some of the bigger and most known data attacks in reference to what we are learning for future avoidance. What are some of the security lessons that we’ve learned from these attacks? On both the supplier side as well as the consumer side. Are current verification methods sufficient to assure security from attacks? Scott dives into Richard’s recent publishings including the Forbes article “There is No Cloud Security Segment” and his book the Security Yearbook 2020 John asks Richard about automating security in the Cloud. What if there was a completely engineered security environment that handled security in an automated way? We discuss “What is true cloud security” and how can companies move this security to the cloud. Richard gives insight into what needs to happen next to see larger security models fully deployed in the cloud. Richard shares thoughts on the overlap of so many security vendors. Are they doing the same thing or is there something different?
Hmm, wonder what topic Matt, Rich, and guest host Mike Semel, of Semel Consulting, will talk about this week. Surprise! It’s the Coronavirus outbreak, and the challenges of coping with remote work generally and security specifically these days, a subject they get into in detail with interview guest Richard Stiennon, of security consultancy IT-Harvest. They also discuss the pros and cons of rotating passwords, getting your business right for a sale, and Kaseya Compliance Manager’s new no-wait cyber insurance integration. Hat tip on that last story to Ned Ryerson! Remember folks, if you have cyber insurance, you could always use a little more. Am I right or am I right? Subscribe to ChannelPro Weekly! Topics and Related Links Mentioned: In the Age of COVID-19, Paul Nebb is an “IT First Responder” Tekie Geek Taking a Proactive Approach to COVID-19 for Customers Kaseya Adds No-Wait Cyber Insurance to Compliance Manager Letting Password Expirations Expire M&A the Right Way, Part 1: Your Pre-Sale Checklist Richard Stiennon's Security Yearbook 2020 Rich's ICYMI plug and quickie preview of the week ahead
Hmm, wonder what topic Matt, Rich, and guest host Mike Semel, of Semel Consulting, will talk about this week. Surprise! It’s the Coronavirus outbreak, and the challenges of coping with remote work generally and security specifically these days, a subject they get into in detail with interview guest Richard Stiennon, of security consultancy IT-Harvest. They also discuss the pros and cons of rotating passwords, getting your business right for a sale, and Kaseya Compliance Manager’s new no-wait cyber insurance integration. Hat tip on that last story to Ned Ryerson! Remember folks, if you have cyber insurance, you could always use a little more. Am I right or am I right? Subscribe to ChannelPro Weekly! Look for us in your favorite podcast app. If you don't see us (yet) then you can subscribe via RSS in almost any podcast app using this link: http://www.channelpronetwork.com/rss/cpw Show Information: Episode #: 138Title: Needle Nose NedDuration: 1:41:04File size: 46.8MBRegulars: Rich Freeman - Executive Editor, Matt Whitlock - Technology EditorGuest Host: Mike Semel, CEO of Semel Consulting Video of ChannelPro Weekly #138 - Needle Nose Ned Topics and Related Links Mentioned: In the Age of COVID-19, Paul Nebb is an “IT First Responder” Tekie Geek Taking a Proactive Approach to COVID-19 for Customers Kaseya Adds No-Wait Cyber Insurance to Compliance Manager Letting Password Expirations Expire M&A the Right Way, Part 1: Your Pre-Sale Checklist Richard Stiennon's Security Yearbook 2020 Rich's ICYMI plug and quickie preview of the week ahead
Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, recaps the short timeline of quality assurance in manufacturing and argues for the same approach it to cybersecurity as a core function of the business. Do investors and CISOs aligning their digital strategies accordingly and where exactly does ownership lie if, and when, the unexpected happens?
Richard Stiennon, serial author, industry expert, and Chief Research Analyst at IT-Harvest, recaps the short timeline of quality assurance in manufacturing and argues for the same approach it to cybersecurity as a core function of the business. Do investors and CISOs aligning their digital strategies accordingly and where exactly does ownership lie if, and when, the unexpected happens?
Richard Stiennon: The IT Security Industry: A Complete History We here at InSecurity have a question… Why Hasn’t Anyone Catalogued the Entirety of the IT Security Industry? Why hasn’t the Cybersecurity industry gotten better at protecting all the things? There are SO many companies offering variations on existing solutions or brand new solutions… but the threats remain and the bad actors continue to be successful. Outside of The Internet… where can we go to get information on and analysis of the companies who are creating solutions that work? Can we learn where they came from? Have they been successful previously? If only we knew someone who could compile a compendium of all that is going on in the IT Security world… In this week’s episode of InSecurity, Matt Stephenson somehow managed to wrangle 60 minutes with industry legend Richard Stiennon. The take a walk through Richard’s work as author of multiple books on the threat of cyberwar, the role analysts play in the industry and his eye toward the future. His latest project is creating a Farmer’s Almanac of the entirety of Cybersecurity. It is such a fabulous idea, we’re kind of flummoxed as to how no one has done it yet. It is also such a breathtaking undertaking… we kind of understand why no one has done it yet. Come grab a seat with one of the greatest historians in all of the IT world and find out what is coming next! About Richard Stiennon Richard Stiennon (@stiennon) is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 2,200 vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Secure Cloud Transformation: The CIO'S Journey, Surviving Cyberwar and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes and The Analyst Syndicate. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King’s College, London About Matt Stephenson Insecurity Podcast host Matt Stephenson(@packmatt73) leads the Security Technology team at Cylance, which puts him in front of crowds, cameras, and microphones all over the world. He is the regular host of the InSecurity podcastand host of CylanceTV Twenty years of work with the world’s largest security, storage, and recovery companies has introduced Stephenson to some of the most fascinating people in the industry. He wants to get those stories told so that others can learn from what has come Every week on the InSecurity Podcast, Matt interviews leading authorities in the security industry to gain an expert perspective on topics including risk management, security control friction, compliance issues, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line. Can’t get enough of Insecurity? You can find us at ThreatVector InSecurity Podcasts, iTunes/Apple Podcasts and GooglePlayas well as Spotify, Stitcher, SoundCloud, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Lawrence Tech’s Sabrina Collins joined M2 TechCast to talk about LTU’s summer computer camps. Richard Stiennon from IT Harvest updates cyber security threats. Tember Shea interviews Rachna Govani, Founder & CEO, Foodstand. David Brophy discusses the Michigan Growth Capital Symposium May 15-16.
Surviving Cyberwar author Richard Stiennon, Forbes commentator & founder of IT-Harvest, discusses cybersecurity & American vulnerability to cyber attack.
Richard Stiennon, security expert and industry analyst, is known for shaking up the industry and providing actionable guidance to vendors and end users. He relaunched the security blog ThreatChaos.com and is the founder of IT-Harvest.
Richard Stiennon, security expert and industry analyst, is known for shaking up the industry and providing actionable guidance to vendors and end users. He relaunched the security blog ThreatChaos.com and is the founder of IT-Harvest.