The protection of computer systems from theft or damage
POPULARITY
Categories
Erweitere dein Verständnis für Diversity und digitale Sicherheit mit "Cybersecurity ist Chefsache".In der aktuellen Episode begrüßt Nico Freitag Julia Hermann, CISO bei infodas. In einem offenen Gespräch sprechen sie über Female Empowerment in der Cyberbranche, über persönliche Erfahrungen, Herausforderungen und konkrete Schritte, wie Frauen gezielt gefördert werden können.Julia erzählt, wie sie ihre Karriere in der IT-Security startete – oft als einzige Frau im Raum – und warum es ihr heute ein Herzensanliegen ist, andere Frauen zu ermutigen, ihren eigenen Weg in der Cyber Security zu gehen.Themen dieser Folge:Female Empowerment bedeutet: Räume schaffen, in denen Frauen sich fachlich wie persönlich entfalten könnenWarum Netzwerke wie She@ISACA echte Veränderung bewirken – weit über Symbolpolitik hinausWieso Frauen gerade in Krisensituationen starke, strukturierte Führung einbringenWie Unternehmen den Unterschied zwischen Sichtbarkeit und Scheinaktivismus verstehen müssenWarum Mentoring, Offenheit und Vielfalt auf allen Ebenen der Schlüssel zu resilienten Security-Teams sindJulia spricht auch über ihre Rolle bei der ISACA, die Relevanz internationaler Zusammenarbeit und die Verantwortung, junge Talente nicht erst an der Uni, sondern schon viel früher zu gewinnen.Eine Folge voller Impulse, Klartext und echter Motivation – nicht nur für Frauen, sondern für alle, die Vielfalt als Stärke begreifen.____________________________________________
Raiden beobachtet eine Woche lang mit dem Fernglas ein Unternehmen, welches Millionen in IT-Security investiert hat - und findet mit Pizzaboxen eine Schwachstelle, die keine Firewall der Welt schützen kann.
In der Welt der IT-Sicherheit bleibt man nicht lang von Hash-Funktionen verschont. Im ersten Moment wird es gerne mit Verschlüsselungsfunktionen verwechselt. Das ist zwar nicht ganz falsch. Allerdings ist eine Hash-Funktion eine spezialisierte Kryptografische Anwendung mit eigenen Aufgaben. Sandro und Andreas sprechen in dieser Folge über dieses komplexe Thema so, dass es jeder versteht.
In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working closely with the sales, marketing, product, engineering, and customer success teams to drive security outcome-focused initiatives.She has spent the past 20+ years of her career in various IT and IT Security roles and has over a decade of experience in the managed services space. Outside of her role at eSentire, Tia is also an adjunct professor of Cybersecurity at Yeshiva University and is currently pursuing her PhD in Cybersecurity Leadership.--Cybersecurity isn't just about platforms and processes—it's about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with one of the key players behind the eSentire customer experience. This series is all about pulling back the curtain and putting the spotlight on the people who power eSentire's world-class cybersecurity services.Join us for a relaxed and revealing discussion covering day-to-day challenges, personal motivation, industry observations, and the unique value each guest brings to the eSentire mission. Get to know the voices behind the protection—and why our people are at the core of everything we do.--Have a question for us? Reach out: hello@esentire.com---About Cyber TalksFrom ransomware attacks to supply chain compromises, eSentire's Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they're addressing these challenges.About eSentireeSentire, Inc., the Authority in Managed Detection and Response (MDR), protects the critical data and applications of 2000+ organizations in 80+ countries, across 35 industries from known and unknown cyber threats by providing Exposure Management, Managed Detection and Response and Incident Response services designed to build an organization's cyber resilience & prevent business disruption. Founded in 2001, eSentire protects the world's most targeted organizations with 65% of its global base recognized as critical infrastructure, vital to economic health and stability. By combining open XDR platform technology, 24/7 threat hunting, and proven security operations leadership, eSentire's award-winning MDR services and team of experts help organizations anticipate, withstand and recover from cyberattacks. For more information, visit www.esentire.com and follow @eSentire.
June's Patch [FIX] Tuesday unpacks a lighter-than-usual Windows patch cycle — but don't get too comfortable. Join Automox cybersecurity experts as they break down high-risk vulnerabilities across macOS and Windows, including:A chained SSH vulnerability (CVE-2025-26465 & CVE-2025-26466) that allows memory exhaustion and bypasses host key verificationA WebDAV remote code execution flaw (CVE-2025-33053) actively exploited in the wildMultiple macOS threats, from sandbox escapes to keychain access and privilege escalationThe team also shares patching strategies, mitigation tips, and password hygiene advice you'll want to follow.
Durch die Lockdowns während der Corona-Pandemie, mussten viele Unternehmen überstürzt ein Tool für Video-Calls zur Verfügung stellen. In vielen Fällen war dies Microsoft Teams. Damit wurde Service Microsoft 365 in einer Form gepushed, mit der niemand gerechnet hatte. Tatsächlich konnten die Projekte dadurch nicht sauber geplant werden. Einige Firmen haben dies nachgeholt und die Konfiguration anschliessend abgesichert. Das passierte aber nicht überall (konsequent). In unserem Alltag als Auditoren sehen wir viele Microsoft Cloud-Umgebungen, die nicht gut abgesichert sind. Zusammen mit Michel Hennet, dem Head of Audit bei goSecurity, spricht Sandro Müller in dieser Folge über 5 typische Fehler in M365.
In dieser Folge sprechen wir mit David Schwalen, COO von ITERACON, über moderne IT-Operations als zentrale Funktion. Im Fokus: • Security als Innovationstreiber • Partnerschaft statt Lieferverhältnis • Empowerment statt Hierarchie David bringt über 20 Jahre IT-Erfahrung mit. Er spricht über Incident Response, kulturellen Fit im Team – und warum IT-Security proaktiv angegangen werden muss. Takeaways: - Security by Design statt Reaktion - Kundenbeziehung = Vertrauen + Flexibilität - Kultur schlägt Struktur – auch in der IT Mehr zu ITERACON findet ihr auf https://www.iteracon.de/ Connect on LinkedIn: - David Schwalen – linkedin.com/in/david-schwalen - Ulrich Irnich – linkedin.com/in/ulrich-irnich - Markus Kuckertz – linkedin.com/in/markuskuckertz Alle Podcast Folgen findet ihr unter: digitalpacemaker.de Wir freuen uns auf Feedback. Let's talk!
Send us a textIn this episode, we dive deep into the world of digital transformation and cloud-native architecture with Madoc Batters, Head of Cloud, Network and IT Security at Warner Hotels. Madoc shares his remarkable journey from washing 100 cars at age 11 to buy his first ZX81 computer to leading enterprise-scale cloud migrations. We explore the challenges of organizational culture change, the bold decision to migrate their most complex system first, and the importance of shifting left with security and FinOps practices. Madoc also shares insights on modern networking solutions like Alkira, the role of AI in transformation, and how his ultra-marathon mindset (including a 105-mile run) applies to pushing through digital transformation challenges. Whether you're starting your cloud journey or looking to accelerate your transformation efforts, this episode is packed with practical wisdom and inspiring leadership insights.Where to Find MadocLinkedIn: https://www.linkedin.com/in/madoc-batters-aws-machinelearning/Sessionize: https://sessionize.com/madoc-batters/Show LinksWarner Hotels: https://www.warnerhotels.co.uk/Alkira: https://www.alkira.com/AWS Bedrock: https://aws.amazon.com/bedrock/HashiCorp: https://www.hashicorp.com/AWS Summit: https://aws.amazon.com/events/summits/FinOpsX: https://www.finops.org/community/finopsx/ZX81 Computer: https://en.wikipedia.org/wiki/ZX81Follow, Like, and Subscribe!Podcast: https://www.thecloudgambit.com/YouTube: https://www.youtube.com/@TheCloudGambitLinkedIn: https://www.linkedin.com/company/thecloudgambitTwitter: https://twitter.com/TheCloudGambitTikTok: https://www.tiktok.com/@thecloudgambit
We're joined by Jacob Hill, founder of the GRC Academy, a leading provider of training and consulting services in governance, risk, and compliance. In this episode, Jacob dives into the new DOD regulations for CMMC, and why it's essential for contractors to get a head start in implementing these regulations. Jacob shares insights into what the new CMMC regulations entail and the implications for businesses. He discusses how the CMMC framework is designed to ensure that companies comply with cybersecurity best practices and what steps they need to take to become certified. Additionally, Jacob introduces his new course on the GRC Academy, which focuses on helping companies understand these regulations and navigate the certification process. He explains how the course can benefit companies and help them avoid costly mistakes while preparing for CMMC compliance. This podcast is a must-listen for anyone involved in government contracting or cybersecurity, looking to understand the implications of CMMC regulations. Jacob's expertise in this area and the insights he provides will prove invaluable to anyone looking to get a head start in implementing these regulations. Tune in to hear Jacob Hill's take on CMMC regulations and what companies can do to prepare for compliance. Take the course: https://grcacademy.io/courses/cmmc-overview-training-small-medium-businesses-smb/ Understand CMMC: https://grcacademy.io/cmmc/controls/ Contacts Jacob: https://www.linkedin.com/in/jacobrhill/ #CMMC #cybersecurity #governmentcontracting #compliance #GRC #podcast #training #certification #DOD #informationsecurity #smallbusiness #riskmanagement #regulations #ITsecurity #datasecurity #manufacturingunscripted #manufacturing #manufacturingcontracts
Think your password is enough? Think again. In this episode of Teach IT, we break down what multi-factor authentication (MFA) really is — and why it's one of the smartest ways to secure your accounts. You'll learn how MFA works, the difference between SMS codes, authenticator apps, biometrics, and physical security keys, and why phishing-resistant MFA matters more than ever. Whether you're an IT pro looking to share smart security tips with employees, friends, or family — or just trying to stay safe online yourself — this quick guide to MFA will help you make smarter security choices.
In this episode of Automate IT, Jeremy Maldonado dives into the world of data-driven endpoint management—breaking down what it means to go “beyond the spreadsheets.” He explores how visibility, intelligent reporting, asset intelligence, and risk scoring can transform how IT teams manage and secure their environments. Drawing from his own journey into the IT space, Jeremy unpacks practical strategies for improving compliance, prioritizing threats, and empowering IT teams to play offense — not just defense. Whether you're an IT pro or just endpoint-curious, this episode will give you fresh perspective on managing smarter, not harder.
Spring is in the air, and it's time to give your IT environment the deep clean it deserves! In this episode of Hands-On IT, host Landon Miles shares nine essential spring cleaning tips to help IT pros declutter, optimize, and future-proof their systems. From cleaning workspaces and dusting off hardware to reviewing patch policies, auditing backups, and addressing tech debt, Landon walks you through practical steps that will boost efficiency, enhance security, and set you up for a smoother year ahead. Tune in and learn how a little proactive maintenance today can save you countless hours of reactive troubleshooting tomorrow!Clean Your Desk and WorkspaceDust Off Your Hardware and Check for WearUntangle and Manage CablesReview Patch PoliciesPurge Old Accounts and Review Software ContractsDeclutter Local Systems and StorageAudit and Test Your BackupsReview Digital and Hardware Tech DebtUpdate Your Documentation and Refresh Policies
Verborgen achter versleutelde lagen, onzichtbaar voor de gewone internetgebruiker, vind je het Dark Web. Dé plek voor wie anoniem wil blijven — denk aan klokkenluiders en activisten, maar ook aan hackers en drugshandelaren. Maar: ben je wel écht 100% anoniem op het Dark Web?Dat bespreekt techjournalist Daniël Verlaan in deze laatste aflevering van het seizoen met Dave en Harm. Hij doet verslag van wat hij zoal tegenkomt op de schaduwkant van het internet en merkt op dat mainstream platformen als Telegram en Snapchat steeds populairder worden voor het uitvoeren van illegale praktijken. Betekent dat het einde van het Dark Web?In de nieuwsronde:Nu.nl - ‘MIVD zag vorig jaar eerste Russische sabotageaanval in Nederland'RTL Nieuws - ‘MIVD: Russische hackers wilden stembusgang Europese verkiezingen saboteren'De cybertips van deze week:Tools van Objective CPodcast The Vergecast - ‘How to keep your data safe when you travel'Game mee met je kinderenHet Digitale Front wordt mede mogelijk gemaakt door KPMG.Zie het privacybeleid op https://art19.com/privacy en de privacyverklaring van Californië op https://art19.com/privacy#do-not-sell-my-info.
In this episode of Cyber Ops Unmasked, InfoSystem's Keith Hales sits down with Mackenzie Brown from Blackpoint Cyber to discuss cyber security posture management and how business can best prepare themselves for the storm. How can you get your organization running the way it should? Where do you currently stand with cyber resilience? What do you need to do to get where you need to be? Learn more about the tools and strategies InfoSystems uses to provide realistic, holistic, and historically informed roadmaps for business leaders to know what to do and what steps to take to protect their businesses. Listen to the most recent episode of Cyber Ops Unmasked now. VISIT THE INFOSYSTEMS WEBSITE: https://infosystemsinc.com/ CHECK OUT INFOSYSTEMS CYBER: https://infosystemscyber.com INFOSYSTEMS ON LINKEDIN: https://www.linkedin.com/company/infosystems-inc-/ INFOSYSTEMS ON FACEBOOK: https://www.facebook.com/InfoSystems
➡️ Like The Podcast? Leave A Rating: https://ratethispodcast.com/successstory In this "Lessons" episode, Theresa Payton, former White House CIO, shares how predictable human behavior creates vulnerabilities in cybersecurity and why conventional defenses often fall short. Learn why routine security measures are exploited by sophisticated social engineering and how designing innovative, personalized protocols can disrupt attackers and strengthen digital defenses. ➡️ Show Linkshttps://successstorypodcast.com YouTube: https://youtu.be/bH8DwhGUg0cApple: https://podcasts.apple.com/us/podcast/theresa-payton-cybersecurity-expert-author-former-white/id1484783544Spotify: https://open.spotify.com/episode/5DLZKqN89CTRVXW2Hi3Pq5➡️ Watch the Podcast on YouTubehttps://www.youtube.com/c/scottdclary
Send us a textIn this high-energy conversation, Joey Pinz chats with Joshua Liberman, a cybersecurity expert, adventurer, and polyglot with a fascinating life story. From hitchhiking across Africa and Asia to mastering martial arts and leading in cybersecurity, Joshua shares how resilience, adaptability, and quick decision-making have shaped his success.
Today, I'm sharing something deeply personal and serious—my stalker story. For over a year, Timothy C. (we can share his full name soon if need be) has been physically stalking me, and his digital harassment goes back even further. Law enforcement is now involved, but I wanted to update you all in case anything happens to me—so there's no question about who did it. This episode isn't just about my experience; it's also about the reality of stalking, the dangers of obsession, and the importance of taking threats seriously. Stay aware, stay safe, and let's talk about it all, shall we?—https://noblegoldinvestments.com
Peter Pflaster and Ben Glass team up in this episode of Product Talk to tackle the ins and outs of third-party application patching with Automox. They break down what third-party software means, where IT teams often struggle with patching, and why a centralized approach can make all the difference. With a relaxed yet informative style, the two cover everything from cross-platform patching for Windows, Mac, and Linux to the process behind counting supported titles and taking customer requests. They also touch on unique solutions like Automox Worklets™ for managing custom software and share how Automox simplifies patching for IT teams of all sizes.
Zero Trust World 2025: Strengthening Cybersecurity Through Zero TrustZero Trust World 2025 has come to a close, leaving behind a series of thought-provoking discussions on what it truly means to build a culture of security. Hosted by ThreatLocker, the event brought together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.A Deep Dive into Windows Security and Zero Trust
Zero Trust World 2025 is officially underway, and the conversation centers around what it means to build a culture of security. Hosted by ThreatLocker, this event brings together security professionals, IT leaders, and decision-makers to explore the complexities of Zero Trust—not just as a concept but as an operational mindset.Defining Zero Trust in PracticeSean Martin and Marco Ciappelli set the stage with a key takeaway: Zero Trust is not a one-size-fits-all solution. Each organization must define its own approach based on its unique environment, leadership structure, and operational needs. It is not about a single tool or quick fix but about establishing a continuous process of verification and risk management.A Focus on Security OperationsSecurity operations and incident response are among the core themes of this year's discussions. Speakers and panelists examine how organizations can implement Zero Trust principles effectively while maintaining business agility. Artificial intelligence, its intersection with cybersecurity, and its potential to both strengthen and challenge security frameworks are also on the agenda.Learning Through EngagementOne of the standout aspects of Zero Trust World is its emphasis on education. From hands-on training and certification opportunities to interactive challenges—such as hacking a device to win it—attendees gain practical experience in real-world security scenarios. The event fosters a culture of learning, with participation from help desk professionals, CIOs, CTOs, and cybersecurity practitioners alike.The Power of CommunityBeyond the technical discussions, the event underscores the importance of community. Conferences like these are not just about discovering new technologies or solutions; they are about forging connections, sharing knowledge, and strengthening the collective approach to security.Zero Trust World 2025 is just getting started, and there's much more to come. Stay tuned as Sean and Marco continue to bring insights from the conference floor, capturing the voices that are shaping the future of cybersecurity.Hosts:Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
IT and security teams are under constant pressure to streamline operations while maintaining strong security and compliance. In this Brand Story episode, Chase Doelling, Principal Strategist at JumpCloud, shares insights from the company's latest SME IT Trends Report. The discussion highlights key trends, challenges, and opportunities that IT teams face, particularly in small and medium-sized businesses (SMBs).The Role of IT in Business OperationsDoelling emphasizes the increasing responsibility placed on IT teams. Historically seen as cost centers, IT and security functions are now recognized as critical to business success. More organizations are merging IT and security efforts, ensuring that security considerations are built into every decision rather than being addressed reactively.A major takeaway from the report is the shift toward decentralization in IT decision-making. Departments are increasingly adopting tools independently, leading to an explosion of software-as-a-service (SaaS) applications. While this autonomy can boost efficiency, it also creates risks. Shadow IT—where employees use unauthorized tools—has become a top concern, with 88% of organizations identifying it as a risk.AI, Security, and IT InvestmentThe report also reveals a growing divide in AI adoption. Organizations are either moving aggressively into AI initiatives or staying completely on the sidelines. Those embracing AI often integrate it into security and IT operations, balancing innovation with risk management.Budget trends indicate that IT spending is rising, with security tools accounting for a significant portion. The need for robust cybersecurity measures has pushed organizations to prioritize visibility, access management, and compliance. A notable shift is occurring in remote and hybrid work models. While remote work surged in previous years, only 9% of organizations now report being fully remote. This return to office environments introduces new IT challenges, particularly in managing networks and devices across hybrid workplaces.How JumpCloud Supports IT TeamsJumpCloud's platform simplifies IT and security operations by unifying identity and access management, device management, and security policies. One key challenge IT teams face is visibility—knowing who has access to what systems and ensuring compliance with security policies. JumpCloud's approach allows organizations to manage users and devices from a single platform, reducing complexity and improving security posture.An example of JumpCloud's impact is its ability to detect and manage SaaS usage. If an employee tries to use an unauthorized tool, JumpCloud can guide them toward an approved alternative, preventing security risks without stifling productivity. This balance between security and efficiency is essential, particularly for SMBs that lack dedicated security teams.Looking Ahead: IT and Security ConvergenceDoelling teases upcoming research that will explore the relationship between IT and security teams. With these functions blending more than ever, organizations need insights into how to align strategies, resources, and budgets effectively.For IT and security professionals navigating a landscape of increased threats, shifting work environments, and AI-driven innovation, the insights from JumpCloud's research provide a valuable benchmark. To gain a deeper understanding of these trends and their implications, listen to the full episode and explore the latest SME IT Trends Report.Note: This story contains promotional content. Learn more. Guest: Chase Doelling, Principal Strategist, JumpCloud [@JumpCloud], On LinkedIn | https://www.linkedin.com/in/chasedoelling/ResourcesLearn more about JumpCloud and their offering: https://itspm.ag/jumpcloud-pg7zTo download the SME IT Trends Report: https://itspm.ag/jumpcljqywCatch more stories from JumpCloud at https://www.itspmagazine.com/directory/jumpcloudAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story
Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More