The protection of computer systems from theft or damage
POPULARITY
Categories
Send us a textIn this episode, we dive deep into the world of digital transformation and cloud-native architecture with Madoc Batters, Head of Cloud, Network and IT Security at Warner Hotels. Madoc shares his remarkable journey from washing 100 cars at age 11 to buy his first ZX81 computer to leading enterprise-scale cloud migrations. We explore the challenges of organizational culture change, the bold decision to migrate their most complex system first, and the importance of shifting left with security and FinOps practices. Madoc also shares insights on modern networking solutions like Alkira, the role of AI in transformation, and how his ultra-marathon mindset (including a 105-mile run) applies to pushing through digital transformation challenges. Whether you're starting your cloud journey or looking to accelerate your transformation efforts, this episode is packed with practical wisdom and inspiring leadership insights.Where to Find MadocLinkedIn: https://www.linkedin.com/in/madoc-batters-aws-machinelearning/Sessionize: https://sessionize.com/madoc-batters/Show LinksWarner Hotels: https://www.warnerhotels.co.uk/Alkira: https://www.alkira.com/AWS Bedrock: https://aws.amazon.com/bedrock/HashiCorp: https://www.hashicorp.com/AWS Summit: https://aws.amazon.com/events/summits/FinOpsX: https://www.finops.org/community/finopsx/ZX81 Computer: https://en.wikipedia.org/wiki/ZX81Follow, Like, and Subscribe!Podcast: https://www.thecloudgambit.com/YouTube: https://www.youtube.com/@TheCloudGambitLinkedIn: https://www.linkedin.com/company/thecloudgambitTwitter: https://twitter.com/TheCloudGambitTikTok: https://www.tiktok.com/@thecloudgambit
We're joined by Jacob Hill, founder of the GRC Academy, a leading provider of training and consulting services in governance, risk, and compliance. In this episode, Jacob dives into the new DOD regulations for CMMC, and why it's essential for contractors to get a head start in implementing these regulations. Jacob shares insights into what the new CMMC regulations entail and the implications for businesses. He discusses how the CMMC framework is designed to ensure that companies comply with cybersecurity best practices and what steps they need to take to become certified. Additionally, Jacob introduces his new course on the GRC Academy, which focuses on helping companies understand these regulations and navigate the certification process. He explains how the course can benefit companies and help them avoid costly mistakes while preparing for CMMC compliance. This podcast is a must-listen for anyone involved in government contracting or cybersecurity, looking to understand the implications of CMMC regulations. Jacob's expertise in this area and the insights he provides will prove invaluable to anyone looking to get a head start in implementing these regulations. Tune in to hear Jacob Hill's take on CMMC regulations and what companies can do to prepare for compliance. Take the course: https://grcacademy.io/courses/cmmc-overview-training-small-medium-businesses-smb/ Understand CMMC: https://grcacademy.io/cmmc/controls/ Contacts Jacob: https://www.linkedin.com/in/jacobrhill/ #CMMC #cybersecurity #governmentcontracting #compliance #GRC #podcast #training #certification #DOD #informationsecurity #smallbusiness #riskmanagement #regulations #ITsecurity #datasecurity #manufacturingunscripted #manufacturing #manufacturingcontracts
Öfters liest oder hört man, dass Bug Bounty Modelle die bessere Möglichkeit sind, Schwachstellen zu finden. Doch ist das wirklich so? Sandro Müller und Andreas Wisler diskutieren über die Unterschiede, Vor- und Nachteile von Bug Bounty und Penetration Tests.
„Ihr Password wurde bei einem datenleck entdeckt Klicken sie hier um es zu endern.“ So könnte man sich einen Phishing-Versuch vorstellen, doch tatsächlich gehen Cyberkriminelle heutzutage weitaus professioneller vor. In der aktuellen Folge sprechen Dr. Mathias Grzesiek und Mirjam Hannah Steinfeld über Cyber-Crime und beantworten die Frage, wieso Angehörige beratender Berufe besonders beliebte Angriffsziele sind. Sie erläutern aktuelle Entwicklungen der Informationssicherheit, wie zum Beispiel den Einsatz von KI beim sogenannten CEO-Fraud. Herr Dr. Grzesiek und Frau Steinfeld erklären, welche strafrechtlichen und sonstigen Folgen bei ungenügenden Sicherheitsstandards drohen und besprechen abschließend Strategien, mit denen Risiken minimiert werden können. Hier geht's zur Folge Nr. 57 „Cybersicherheit im Gesundheitswesen“: https://criminal-compliance.podigee.io/57-cr Hier geht's zur Folge Nr. 182 „Gesetzgebungsupdate: Digital-Gesetz“: https://criminal-compliance.podigee.io/182-cr Hier geht's zur Folge Nr. 190 „Der strafrechtliche Schutz von Geschäftsgeheimnissen“: https://criminal-compliance.podigee.io/190-cr Hier geht's zur Folge Nr. 225 „IT-Sicherheit für Berater“: https://criminal-compliance.podigee.io/225-cr Dr. Mathias Grzesiek ist Rechtsanwalt und Partner bei Rosinus | Partner Rechtsanwälte PartG mbB in Frankfurt am Main und berät Unternehmen und Individualpersonen zu allen Fragen des IT-Strafrechts sowie des Wirtschafts- und Steuerstrafrechts. Dr. Mathias Grzesiek ist erreichbar unter m.grzesiek@rosinus-partner.com oder telefonisch unter 069 87403060. Mirjam Hannah Steinfeld, MBA, CFE ist Rechtsanwältin und Fachanwältin für Strafrecht. Sie ist als Salary Partnerin bei Rosinus | Partner tätig und berät Unternehmen und Privatpersonen in allen Fragen des Wirtschaftsstrafrechts. Mirjam Hannah Steinfeld ist per E-Mail unter m.steinfeld@rosinus-partner.com oder telefonisch unter 069 87403060 zu erreichen. https://www.rosinus-on-air.com https://rosinus-partner.com
In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey into the IT space, Jeremy unpacks practical strategies for improving compliance, prioritizing threats, and empowering IT teams to play offense — not just defense. Whether you're an IT pro or just endpoint-curious, this episode will give you fresh perspective on managing smarter, not harder.
Spring is in the air, and it's time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups, and addressing tech debt, Landon walks you through practical steps that will boost efficiency, enhance security, and set you up for a smoother year ahead. Tune in and learn how a little proactive maintenance today can save you countless hours of reactive troubleshooting tomorrow!Clean Your Desk and WorkspaceDust Off Your Hardware and Check for WearUntangle and Manage CablesReview Patch PoliciesPurge Old Accounts and Review Software ContractsDeclutter Local Systems and StorageAudit and Test Your BackupsReview Digital and Hardware Tech DebtUpdate Your Documentation and Refresh Policies
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Verborgen achter versleutelde lagen, onzichtbaar voor de gewone internetgebruiker, vind je het Dark Web. Dé plek voor wie anoniem wil blijven — denk aan klokkenluiders en activisten, maar ook aan hackers en drugshandelaren. Maar: ben je wel écht 100% anoniem op het Dark Web?Dat bespreekt techjournalist Daniël Verlaan in deze laatste aflevering van het seizoen met Dave en Harm. Hij doet verslag van wat hij zoal tegenkomt op de schaduwkant van het internet en merkt op dat mainstream platformen als Telegram en Snapchat steeds populairder worden voor het uitvoeren van illegale praktijken. Betekent dat het einde van het Dark Web?In de nieuwsronde:Nu.nl - ‘MIVD zag vorig jaar eerste Russische sabotageaanval in Nederland'RTL Nieuws - ‘MIVD: Russische hackers wilden stembusgang Europese verkiezingen saboteren'De cybertips van deze week:Tools van Objective CPodcast The Vergecast - ‘How to keep your data safe when you travel'Game mee met je kinderenHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Sandro Müller hat einen Gast aus den eigenen Reihen. Zusammen mit Marius Hamborgstrøm rollt er die 5 häufigsten Fehler auf, welche die goSecurity-Auditoren bei ihren Audits finden.
www.iotusecase.com#MASCHINENBAU #SECURITY #PENETRATIONTEST #IOT-PLATTFORMIn der 165. Episode des IoT Use Case Podcasts spricht Gastgeberin Ing. Madeleine Mickeleit mit Michael Buchenberg, Head of IT Security bei XITASO, über die Absicherung vernetzter Produkte im industriellen Umfeld. Am Beispiel eines Projekts mit DMG MORI und der Plattform CELOS X zeigt die Folge, wie Penetration Tests in der Praxis ablaufen, welche Angriffsvektoren im IoT-Kontext eine Rolle spielen und wie Konzepte wie DevSecOps und der Cyber Resilience Act die Entwicklung sicherer Lösungen beeinflussen.Folge 165 auf einen Blick (und Klick):(10:55) Herausforderungen, Potenziale und Status quo – So sieht der Use Case in der Praxis aus(16:08) Lösungen, Angebote und Services – Ein Blick auf die eingesetzten Technologien (22:02) Übertragbarkeit, Skalierung und nächste Schritte – So könnt ihr diesen Use Case nutzen Podcast ZusammenfassungWie sicher sind eigentlich meine digitalen Produkte im Feld? Diese Frage stellen sich viele Hersteller – spätestens, wenn es um vernetzte Maschinen, IoT-Plattformen oder Kundenportale geht. Genau darum geht es in dieser Podcastfolge mit Michael Buchenberg, Head of IT Security bei XITASO.Am Beispiel eines Projekts mit DMG MORI und der Plattform CELOS X wird praxisnah aufgezeigt, wie Penetration Tests helfen, reale Schwachstellen frühzeitig zu identifizieren – etwa in Maschinen, Cloud-Anbindungen oder Standard-Schnittstellen wie OPC UA oder MQTT. Getestet wird unter realistischen Bedingungen: direkt an der Maschine im Shopfloor.Zentrale Herausforderungen:Historisch gewachsener Code (z. B. alte SPS-Programme), der nicht für Vernetzung entwickelt wurdeMangelnde Transparenz über Risiken im Gesamtsystem – von der Maschine bis zur CloudFehlendes Schwachstellenmanagement in der ProduktentwicklungSorgen von Endkunden beim Umgang mit sensiblen ProduktionsdatenLösungsansatz: Neben klassischem Penetration Testing spricht Michael über den Ansatz DevSecOps – also das frühzeitige Mitdenken von Sicherheit in der Software- und Produktentwicklung. Entscheidend ist dabei: Wer potenzielle Schwachstellen schon in der Architektur erkennt, spart Aufwand und Kosten in späteren Phasen.Regulatorische Relevanz:Mit dem Cyber Resilience Act und der NIS-2-Richtlinie wird Sicherheit zur Pflicht. Hersteller müssen künftig aktiv nach Schwachstellen suchen, Updates bereitstellen und Sicherheit über den gesamten Produktlebenszyklus sicherstellen.Die Folge liefert klare Best Practices und einen Realitätscheck für alle, die IoT-Lösungen entwickeln oder betreiben – insbesondere im Maschinen- und Anlagenbau, aber auch darüber hinaus.-----Relevante Folgenlinks:Madeleine (https://www.linkedin.com/in/madeleine-mickeleit/)Michael (https://www.linkedin.com/in/michael-buchenberg/)CELOS X Plattform (https://de.dmgmori.com/produkte/digitalisierung/celos-x)Post-Quanten-Kryptographie (https://xitaso.com/projekte/amiquasy-migration-zu-post-quanten-kryptographie/)Penetration Tests von Fräsmaschinen (https://xitaso.com/projekte/dmg-mori-penetration-test/?utm_source=iot.website&utm_medium=podcast&utm_campaign=iot.use.case)Jetzt IoT Use Case auf LinkedIn folgen
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Willkommen beim Podcast von Technologie-Scout Boris Bärmichl!Bereit für eine faszinierende Entdeckungsreise in die Welt der Technologie?
Hallo da draußen an den Empfangsgeräten und herzlich willkommen zu einer neuen Podcast Folge. Mit dabei in dieser Podcast Folge ist Jens Wonneberger, der als CISO beim Hersteller für Filter- und Ansaugsysteme MANN+HUMMEL tätig ist. Julius, Marcel und Jens sprechen in Podcast Folge #102 über die zwölf verschiedenen CISO Archetypen und wann welche CISO Rolle wo zum Einsatz kommt.
Cybercriminaliteit overstijgt de landsgrenzen - dat blijkt deze week opnieuw bij de ontmanteling van de kindermisbruiksite Kidflix. Een samenwerkingsverband van maar liefst 30 landen, dat leidde tot 79 arrestaties wereldwijd.Hoe pak je als politie zulke enorme cyberoperaties aan? Dave en Harm stellen die vraag aan Ruben van Well, die leiding gaf aan het Nederlandse cyberteam tijdens ‘Operatie Cookiemonster'. Hij vertelt over de ‘klapdag', de onwetendheid van sommige daders en wat nu precies de Nederlandse specialiteit is in deze cybermissies.Dave haakt in met het ongelofelijke verhaal van ‘Operation Destabilise' en laat daarmee zien hoe cybercriminaliteit tegenwoordig in alle aspecten van onze samenleving verweven is. Jeroen de Wit van KPMG schuift aan om te bespreken hoe wij als Nederland onze cyberskills het beste kunnen overbrengen aan onze bondgenoten.In de nieuwsronde:The Guardian - ‘How the Atlantic's Jeffrey Goldberg got added to the White House Signal group chat'NOS - ‘Klanten verruilen Amerikaanse techbedrijven voor Europese alternatieven'De cybertips van deze week:Podcast: Veroordeeld - aflevering 2The Record - ‘Inside Operation Destabilise'Boek: ‘Warfare Reimagined: Embracing AI In The Military' - Igor van GemertBoek: ‘Ghost In The Wires' - Kevin MitnickDocumentaire: ‘Intercepted'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Na ‘Signal-gate' rijst de vraag: kunnen we in Nederland nog wel blind vertrouwen op Amerikaanse inlichtingen?Dave en Harm duiken in de gevolgen van een mogelijke vertrouwensbreuk met de VS. Wat betekent dat voor onze veiligheid – en voor de digitale samenwerking tussen bondgenoten? Te gast is Willemijn Aerdts, expert op het gebied van inlichtingen- en veiligheidsdiensten én Eerste Kamerlid voor D66.Daarnaast schuift reserve-officier Pascal Hogenboom aan. Hij legt uit hoe KPMG in actie komt als Nederland wordt getroffen door een ramp die onze samenleving kan ontwrichten.De cybertips van deze week:De Volkskrant - ‘AIVD speelde sleutelrol in geheime operatie met CIA in Oekraïne'Serie ‘Adolescence'PimEyesHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
In this episode of Cyber Ops Unmasked, InfoSystem's Keith Hales sits down with Mackenzie Brown from Blackpoint Cyber to discuss cyber security posture management and how business can best prepare themselves for the storm. How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be? Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-/ INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary
In aanloop naar de NAVO-top in Den Haag scherpt de overheid de straffen voor digitale spionage aan. Dat roept de vraag op: wie zijn er eigenlijk uit op het achterhalen van onze staatsgeheimen of het binnendringen van vitale infrastructuur zoals het stroomnet, internet of stoplichten? En waarom? Dat leggen Dave en Harm, vergezeld door Jordi van den Breekel (ethisch hacker bij KPMG) je in deze aflevering uit door in de huid van een hacker te kruipen. De cybertips van deze week: Hack The BoxWired - ‘SolarWinds: The Untold Story of the Boldest Supply-Chain Hack Ever'Boek: ‘Careless People: A story of where I used to work' - Sarah Wynn-Williams Het Digitale Front wordt mede mogelijk gemaakt door KPMG. Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Send us a textIn this high-energy conversation, Joey Pinz chats with Joshua Liberman, a cybersecurity expert, adventurer, and polyglot with a fascinating life story. From hitchhiking across Africa and Asia to mastering martial arts and leading in cybersecurity, Joshua shares how resilience, adaptability, and quick decision-making have shaped his success.
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
Het wordt steeds duidelijker dat Rusland de hybride oorlog op het Westen heeft geopend. Niet alleen via satelliet-sabotage (waar Nederland deze week samen met 7 andere landen een officiële VN-klacht tegen indiende), maar ook op zee.Schimmige spionage schepen en schade aan diepzeekabels, wat betekent dat voor ons? Samen met commandeur buiten dienst Michiel Hijmans kijken Dave en Harm deze week wat er allemaal op onze eigen Noordzee gebeurt. Als oud-leider van het NAVO-vlootverband weet Michiel als geen ander hoe belangrijk maritieme stabiliteit is om onze samenleving draaiende te houden.In de nieuwsronde bespreken Dave en Harm:De Telegraaf - ‘Hoeveel last heeft Nederland van Russische satelliet-sabotage?'De Volkskrant - ‘Tweede Kamer wil een ‘rijkscloud' om los te komen van Amerikaanse big tech'Rapport Europol - ‘EU Serious and Organised Crime Threat Assessment'De cybertips van deze week:Podcast Pointer - ‘Spionnen op de Noordzee'De Volkskrant - ‘Sabotage onder water: de Russische schaduwoorlog legt kwetsbaarheid van het Westen bloot'Het Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Nederland dreigt zijn sterke positie in AI te verliezen, waarschuwt Google. Terwijl andere landen volop investeren en hun AI-ondernemingen laten uitgroeien tot wereldspelers, blijft Nederland twijfelen.In deze aflevering onderzoeken Dave en Harm samen met AI-ondernemer Maarten Sukel hoe kunstmatige intelligentie al onverwacht verweven is met ons dagelijks leven. Van slimme assistenten tot onzichtbare algoritmes—AI is dichterbij dan je denkt. En waarom lijkt Nederland achter te blijven in deze technologische revolutie?Ook schuift Frank van Praat (KPMG) aan: hij deed onderzoek naar hoe we écht over AI denken.In de nieuwsronde bespreken Dave en Harm:VRT - ‘Hoe Rusland ook in ons land mensen online ronselt voor sabotage en spionage'De nieuwe Chinese AI-agent ManusDe cybertips van deze week:De Nationale AI cursusDocumentaire VRT - ‘Einde van oorlog in Oekraïne zal geen einde maken aan hybride oorlog'The Verge - ‘How to stop the AI you're using from training with your data'Het boek van Maarten: De AI-revolutieHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
Peter Pflaster and Ben Glass team up in this episode of Product Talk to tackle the ins and outs of third-party application patching with Automox. They break down what third-party software means, where IT teams often struggle with patching, and why a centralized approach can make all the difference. With a relaxed yet informative style, the two cover everything from cross-platform patching for Windows, Mac, and Linux to the process behind counting supported titles and taking customer requests. They also touch on unique solutions like Automox Worklets™ for managing custom software and share how Automox simplifies patching for IT teams of all sizes.
Zero Trust World 2025: Strengthening Cybersecurity Through Zero TrustZero Trust World 2025 has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by ThreatLocker, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.A Deep Dive into Windows Security and Zero Trust
Host(s): Abram Nanney, Shane Chism, and Sabir Abdul-Haqq (www.yourebs.biz)Topic: On this episode, we sit down and interview Trent Lyght, Fractional Sales Executive at Cleverce LLC, about the services some of the companies he represents provide like Cyber Insurance and IT Security.Concierge Cyber video link: https://www.youtube.com/watch?v=5_dLzkEOTsY Open Source Intelligence video link: https://www.youtube.com/watch?v=1_LQl0XaPz8Email your tech questions and opinions to: everydaytech@mpbonline.org Hosted on Acast. See acast.com/privacy for more information.
Zero Trust World 2025 is officially underway, and the conversation centers around what it means to build a culture of security. Hosted by ThreatLocker, this event brings together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.Defining Zero Trust in PracticeSean Martin and Marco Ciappelli set the stage with a key takeaway: Zero Trust is not a one-size-fits-all solution. Each organization must define its own approach based on its unique environment, leadership structure, and operational needs. It is not about a single tool or quick fix but about establishing a continuous process of verification and risk management.A Focus on Security OperationsSecurity operations and incident response are among the core themes of this year's discussions. Speakers and panelists examine how organizations can implement Zero Trust principles effectively while maintaining business agility. Artificial intelligence, its intersection with cybersecurity, and its potential to both strengthen and challenge security frameworks are also on the agenda.Learning Through EngagementOne of the standout aspects of Zero Trust World is its emphasis on education. From hands-on training and certification opportunities to interactive challenges—such as hacking a device to win it—attendees gain practical experience in real-world security scenarios. The event fosters a culture of learning, with participation from help desk professionals, CIOs, CTOs, and cybersecurity practitioners alike.The Power of CommunityBeyond the technical discussions, the event underscores the importance of community. Conferences like these are not just about discovering new technologies or solutions; they are about forging connections, sharing knowledge, and strengthening the collective approach to security.Zero Trust World 2025 is just getting started, and there's much more to come. Stay tuned as Sean and Marco continue to bring insights from the conference floor, capturing the voices that are shaping the future of cybersecurity.Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
IT and security teams are under constant pressure to streamline operations while maintaining strong security and compliance. In this Brand Story episode, Chase Doelling, Principal Strategist at JumpCloud, shares insights from the company's latest SME IT Trends Report. The discussion highlights key trends, challenges, and opportunities that IT teams face, particularly in small and medium-sized businesses (SMBs).The Role of IT in Business OperationsDoelling emphasizes the increasing responsibility placed on IT teams. Historically seen as cost centers, IT and security functions are now recognized as critical to business success. More organizations are merging IT and security efforts, ensuring that security considerations are built into every decision rather than being addressed reactively.A major takeaway from the report is the shift toward decentralization in IT decision-making. Departments are increasingly adopting tools independently, leading to an explosion of software-as-a-service (SaaS) applications. While this autonomy can boost efficiency, it also creates risks. Shadow IT—where employees use unauthorized tools—has become a top concern, with 88% of organizations identifying it as a risk.AI, Security, and IT InvestmentThe report also reveals a growing divide in AI adoption. Organizations are either moving aggressively into AI initiatives or staying completely on the sidelines. Those embracing AI often integrate it into security and IT operations, balancing innovation with risk management.Budget trends indicate that IT spending is rising, with security tools accounting for a significant portion. The need for robust cybersecurity measures has pushed organizations to prioritize visibility, access management, and compliance. A notable shift is occurring in remote and hybrid work models. While remote work surged in previous years, only 9% of organizations now report being fully remote. This return to office environments introduces new IT challenges, particularly in managing networks and devices across hybrid workplaces.How JumpCloud Supports IT TeamsJumpCloud's platform simplifies IT and security operations by unifying identity and access management, device management, and security policies. One key challenge IT teams face is visibility—knowing who has access to what systems and ensuring compliance with security policies. JumpCloud's approach allows organizations to manage users and devices from a single platform, reducing complexity and improving security posture.An example of JumpCloud's impact is its ability to detect and manage SaaS usage. If an employee tries to use an unauthorized tool, JumpCloud can guide them toward an approved alternative, preventing security risks without stifling productivity. This balance between security and efficiency is essential, particularly for SMBs that lack dedicated security teams.Looking Ahead: IT and Security ConvergenceDoelling teases upcoming research that will explore the relationship between IT and security teams. With these functions blending more than ever, organizations need insights into how to align strategies, resources, and budgets effectively.For IT and security professionals navigating a landscape of increased threats, shifting work environments, and AI-driven innovation, the insights from JumpCloud's research provide a valuable benchmark. To gain a deeper understanding of these trends and their implications, listen to the full episode and explore the latest SME IT Trends Report.Note: This story contains promotional content. Learn more. Guest: Chase Doelling, Principal Strategist, JumpCloud [@JumpCloud], On LinkedIn | https://www.linkedin.com/in/chasedoelling/ResourcesLearn more about JumpCloud and their offering: https://itspm.ag/jumpcloud-pg7zTo download the SME IT Trends Report: https://itspm.ag/jumpcljqywCatch more stories from JumpCloud at https://www.itspmagazine.com/directory/jumpcloudAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
In this episode of Automox's CISO IT podcast, host Jason Kikta welcomes back Rich Casselberry, VP of IT security at AT&I, to discuss key insights from the CISO Blueprint. The conversation emphasizes the importance of a positive approach to security, the role of automation in IT practices, and the necessity of delegation to enhance efficiency. Rich shares real-world examples illustrating how a solution-oriented mindset can lead to better security outcomes and how automation can free up valuable time for IT professionals.