POPULARITY
The Business of Meetings – Episode 267: From Token to Transformative: Making Boards Work with Marc Stockli We are thrilled to welcome Marc Stockli, an accomplished entrepreneur from Switzerland, as our guest today. With over 20 years of business experience, Marc has chaired the Global Board of the Entrepreneurs Organization and has also become an author. Join us as Marc shares his journey and gives us a sneak peek into his upcoming book, Make Boards Work. Bio: Marc Stockli: Marc O. Stockli has benefited from a unique perspective for many years in developing and writing this book. Marc has also been a public speaker to thousands of entrepreneurs in more than 30 countries. Marc has been exposed to board work from early on in his career. First, as a young investment banker, and later a strategy consultant for world-renowned professional services firms. Later on, as an entrepreneur and investor. In sum, he has prepared for, attended, and reflected on about 200 board meetings overall. This profound experience has been gained globally, allowing Marc to provide unique insights and disclose hidden opportunities. Marc O. Stockli is a co-founder and former CEO of Totemo, whose cybersecurity products are used by 1,500 corporations and more than 3.5 million licensed users. Totemo was sold to Palo Alto-based Kiteworks in December 2021. Marc is an active investor, board member, and coach for entrepreneurial companies and teams in technology and financial services. He acts in such capacity for Amwell (IPO on NYSE in September 2020), Beekeeper, Merantix, Lucy Security (sold to ThriveDX in February 2022), Vara, CleanHub, or Format Vermögen & Anlagen, to name but a few. Previously, Marc worked in corporate finance in Hong Kong, Tokyo, and New York, as well as strategy consulting with BCG. He holds a law degree from the University of St. Gallen HSG and an MBA from the Wharton School at the University of Pennsylvania. Marc recently served as the Global Chairman of the Entrepreneurs' Organization (“EO”, more than 19,000 members in more than 70 countries). Connect with Eric Rozenberg On LinkedIn Facebook Instagram Website Subscribe to The Business of Meetings newsletter Listen to The Business of Meetings podcast Connect with Marc Stockli On LinkedIn
A Their Story interview with Sean Martin and Marco Ciappelli Guest: Colin Bastable The organization telling us their story today is Lucy Security Are you empowering your employees to embrace and utilize their cybersecurity superpowers? Organizations are defined by their culture—and the culture is determined by the collection of individuals that make up the organization. Organizations that take information security seriously and work with their employees to understand and embrace their role in protecting themselves and the business are the organizations that stand a better chance of thwarting off an attack. According to today’s guest, Colin Bastable, 97% of all of the threats originate with some form of social engineering. So, organizations must work on having an understanding of the human angle as it relates to these threats—both the employees as humans and the cybercriminals as humans. Organizations must understand the human motivation—both to attack and to protect themselves. People are people on all sides of the equation—it’s just how it is; it’s just how they are. Once you have this understanding, coupled with how the protection technologies work, you can begin to identify the gaps between what the technology can offer and what the humans can do for themselves. It’s this gap that needs to be closed. Are you interested in understanding how to identify and close this gap? Have a listen to this chat with Colin—he’s seen this in action all around the world in many different industries. Learn more about Lucy Security on ITSPmagazine here: https://www.itspmagazine.com/company-directory/lucy-security For more stories from RSA Conference 2020, be sure to visit https://www.itspmagazine.com/rsa-conference-usa-2020-rsac-san-francisco-coverage
Plus MortgagePhish, Keystone Managament Group's innovative phishing attack prevention and training software, tries to work with the ALTA.
As I scanned the list of my unread emails, one stood out, coming from alerts@citibank.com. The message indicated there was a problem with a credit card transaction, a link was provided to learn more about this problem. I clicked on the link and was taken to an official-looking Citibank web page with a form to login to my account. Fortunately, I did catch myself before completing the login, realizing that this was a classic phishing attack to trick me into providing my login credentials on a fake web page. According to a 2019 Report by PhishLabs, approximately 65% of all phishing attacks were part of a credential theft scheme. The article claims Nation-state actors use phishing attacks to gain strategic access to target environments, such as the armed forces, all areas of the federal government, the power grid, corporate research and virtually all areas of intellectual property. Join me and Colin Bastablé as we discuss the various types of cyber attacks and how Lucy Security helps organizations defend against these attacks.
A Their Story interview with John Dasher Only 3% of security attacks leverage technical weakness, while the remaining 97% are driven by exploiting people. Lucy Security enables organizations to take on the role of an attacker and uncover existing gaps in both technical infrastructure and staff knowledge and eliminate them through a comprehensive e-learning program. Employee responses to daily hazards like phishing are both monitored, as well as taught so that employees more accurately recognize threats and respond appropriately. On the front end, we’ll discuss how the bad guys plan and set up infrastructure to carry out their attacks. On the back end, we see that around 20% of employees will, unfortunately, click on an email-borne phishing attack. Through proper awareness training, this can often reduce this to less than 5%. Interestingly, while training, employees can help “crowdsource” needed data to help steer the updating of other pieces of the organizational security stack. To help employees be more security-minded, Colin discusses how transparency with employee behavior and their progress is vital. Regulation and compliance are top of mind in this conversation — GDPR and California’s new 2018 California Privacy Act for example — and how one must think regarding protecting the kind of data a security LMS might acquire. Learn more about Lucy Security on ITSPmagazine here: https://www.itspmagazine.com/company-directory/lucy-security
News broke this morning about a breach taking place at Marriott that exposed the data of 500 million (yes, half a billion) guests. Sean Martin took some time to dig into this situation, speaking with two security professionals with thoughts on the matter: Colin Bastable from Lucy Security and Matt Mosley from Tevora. Here's what they covered: - Do we know how it happened? - Why did it (does it) take so long to detect the breach? - Why is this industry a regular target for cybercrime? - What's the impact in the consumer, the hospitality industry, and the credit card companies? - What steps consumers can take to protect themselves?