Their Stories

Their Story Chats At RSA Conference San Francisco 2019 | Shauna Park, Director at DataLocker

A Their Story interview with John Dasher​​​​​​​

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Shauna Park, DataLocker’s Director of Channel Sales, to discuss their solution set, and walk through how industries such as healthcare, financial services and even Hollywood are taking advantage of encrypted storage. We’ll even get a sneak peek into how use cases involving the cloud will come to be supported.

Their Story Chats At RSA Conference San Francisco 2019 | Mike Vanoverbeke, SecureData

A Their Story interview with John Dasher​​​​​​​

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Mike Vanoverbeke, SecureData’s Director of Product Management, to talk about portable secure storage and how it fits in with today’s modern business.

Their Story Chats At RSA Conference San Francisco 2019 | Cathy Allen, CEO of Santa Fe Group

A Their Story interview with John Dasher​​​​​​​

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Cathy Allen of the Santa Fe Group to discuss how third-party risk has evolved with and around the growth in malicious hacking, the changing makeup and thinking across boards of directors, the importance of diversity (including the relationship between AI and diversity), and how well-thought-out tools assist with risk assessments.

Their Story Chats At RSA Conference San Francisco 2019 | Mickey Bresman, CEO at Semperis

A Their Story interview with John Dasher​​​​​​​

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Mickey Bresman, CEO at Semperis, to discuss the difficulty that normal Active Directory upgrades, restores and backups, let alone full-blown disaster recovery, can cause – and how Semperis has a solution that promises to change all of that.

Their Story Chats At RSA Conference San Francisco 2019 | Larry Link And Shreyans Mehta, Cequence Security

A Their Story interview with John Dasher​​​​​​​

In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Larry Link & Shreyans Mehta from Cequence, a silicon valley startup who is applying real-time network analysis, machine learning, threat intelligence, and behavioral analytics to accurately detect and mitigate bot attacks without affecting legitimate user traffic. Listen in to hear more!

Their Story Chats At RSA Conference San Francisco 2019 | Eoin Keary And Rahim Jina, Edgescan

A Their Story interview with Sean Martin

During RSA Conference 2019 in San Francisco, Sean Martin stops by the Edgescan booth to chat with the company’s co-founders, Eoin Keary and Rahim Jina. The conversation was driven mainly by their latest vulnerability stats report which was just released.

Their Story Chats At RSA Conference San Francisco 2019 | George Wrenn, CEO Of CyberSaint

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher sat down at RSA Conference with George Wrenn, CEO and Founder of CyberSaint. Imagine if you were told that your organization must demonstrably adopt a cybersecurity framework and show compliance in order to secure new business or, perhaps more frustratingly, retain a contract you’ve already won. Listen in to hear more!

Their Story Chats At RSA Conference San Francisco 2019 | Samantha Madrid of Juniper Networks

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher sat down at RSA Conference with Samantha Madrid of Juniper Networks to chat about leveraging the infrastructure you already have to protect you from unknown threats. Sound far-fetched? Hear how Juniper is applying insight gleaned through behavior intelligence to areas such as wireless network usage.

Their Story Chats At RSA Conference San Francisco 2019 | Colin Bastable, CEO Of Lucy Security

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher sat down at RSA Conference with Colin Bastable, CEO of Lucy Security to talk about how the bad guys plan and set up infrastructure to carry out their attacks, and how transparency with employee behavior and their progress with respect to awareness training is vital.

Their Story | A Dialogue With Geeta Schmidt and Pieter Heyn From Humio

A Their Story interview with Sean Martin

The organization telling us their story today is Humio. Humio are headquartered in Denmark and are focused on providing real-time access to data via live system observability through fast, scalable and efficient log data management.

Our guests from Humio are Geeta Schmidt, CEO of Humio, and Pieter Heyn, Director of Sales & Alliances for the UK & Ireland at Humio. Each share their individual stories for how they entered the InfoSec arena before walking us through some of the trends they are seeing in the market, how they are building a solution to support those trends, and how their culture, solution development process, and customer interaction model are designed to establish trust and ensure that a simple, common mission is achieved.

Their Story: A Dialogue With Larry Link, CEO, Cequence Security

ITSPmagazine recently caught up with the CEO at Cequence Security, Larry Link. With co-founders coming from some of the largest cybersecurity companies in the world, the team at Cequence is laser-focused on stopping the growing number of malicious bot attacks.

Their Story Chats At Black Hat Conference 2018 | Willy Leichter From Virsec

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher sat down at Black Hat 2018 with Willy Leichter, Vice President of Marketing at Virsec to talk about Virsec’s unique approach to security and how it protects enterprises from advanced memory-based attacks, fileless attacks, and other subtle, insidious attacks at near 100% accuracy.

Their Story Chats At Black Hat Conference 2018 | Jonathan Sander From STEALTHbits

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Jonathan Sander of STEALTHbits about unstructured data, protecting credentials, ransomware, machine learning (and Sylvester Stallone) — plus how STEALTHbits can help protect an organization’s sensitive data from insider threats and automate security and compliance tasks.

Their Story: A Dialogue with Dena Haritos Tsamitis From Carnegie Mellon University

A Their Story interview with Selena Templeton

ITSPmagazine's Selena Templeton sat down with Dena Haritos Tsamitis of Carnegie Mellon University to capture CMU’s story (which was among the first institutions in the world to create a degree program for cybersecurity). They also chat about the Information Networking Institute (INI) and Women@INI (WINI), Cylab (CMU's security and privacy research institute), MySecureCyberspace, diversity and inclusion, and imposter syndrome.

Their Story Chats At Black Hat Conference 2018 | Dana Tamir From Silverfort

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Dana Tamir of Silverfort at Black Hat 2018 about multi-factor authentication, how it’s changed with the shift to the cloud, hybrid environments and disappearing perimeters, and how Silverfort enables strong MFA across the entire network without modifications to endpoints and servers.

Their Story Chats At Black Hat Conference 2018 | Nick Bilogorskiy From Juniper Networks

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Nick Bilogorskiy from Juniper Networks at Black Hat 2018 about malware, ransomware, new cryptocurrency attacks (“crypto jacking”) and how Juniper can help protect you by keeping your network clean and clear.

Their Story Chats At Black Hat Conference 2018 | Keenan Skelly From Circadence

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine's John Dasher had a chance to sit down with Keenan Skelly, VP Global Partnerships & Security Evangelist at Circadence, at this year's Black Hat to capture Circadence’s story and chat about gamification and security, AI, cyber ranges, and women in cyber.

Their Story Chats at Black Hat Conference 2018 | Brian Reed from NowSecure

A Their Story interview with John Dasher​​​​​​​

ITSPmagazine’s John Dasher chats with Brian Reed of NowSecure about their latest research that shows that using a top 50 mobile app from your favorite App Store probably has one or more critical vulnerabilities with a Common Vulnerability Scoring System (CVSS) score of 8 or higher. And we’re talking production apps from Fortune 500 companies here folks.

Divide and Conquer: One Process - Multiple Workflows

It feels normal and right to think that a business process should be modeled and designed from start to finish in a single place. Make it one workflow, and everyone knows what to do, you can monitor the workflow, and if you need to make changes, you know exactly where to look. Simple, right?