Evolving Third-Party Risk Management for Today’s Complex Ecosystems | An Archer Story With Jon Ehret And Chris Patteson

A Their Story conversation with Sean Martin, Marco Ciappelli, and leaders from Archer and RiskRecon

The third-party ecosystems of today’s organizations have become more complex, more digital, and more extensive than ever before. The need for an accurate picture of your vendor’s security posture is greater than ever, with public and private sector organizations reporting a surge in cyber-attacks, and at the same time, continuing to experience and react to substantial disruption to their third-party ecosystems.

Want to learn more? Have a listen and watch the on-demand webinar.

The Good, The Bad, And The Ugly | The Bad Bot Report 2021 | An Imperva Story with Edward Roberts

A Their Story conversation with Sean Martin, Marco Ciappelli, and Imperva

The 8th edition of the Bad Bot Report, produced using research and analysis from Imperva Research Labs, shows that more than 40% of all web traffic requests originated from a bot last year. The reduction in human traffic coupled with the increase in bot traffic, according to the report, suggests the growing scale and widespread impact of bots in daily life.

This is a 2-part podcast series with Imperva. In this series, we get to speak with Edward Roberts, Director of Strategy, Application Security at Imperva, to look at the findings in the report from two angles. Be sure to catch both episodes to get both perspectives.

Their Identities Are Hidden, But Their Frustrations Are Not | InfoSec Confessions: Log's Honest Truth | A Devo Story

A Their Story conversation with Sean Martin, Marco Ciappelli, and the team from Devo. This is a 5-part podcast series inspired by the Log’s Honest Truth video campaign recently published by Devo.

Logs do not lie. But, what is the true story that a company’s business data can tell to the security professionals that use these logs everyday to do their job? Perhaps more importantly, can these cybersecurity professionals candidly and openly talk about the way they feel about their job and how they would like the data to work better for them?

Sometimes we just need a safe space to share how we really feel.

Listen to each podcast episode, watch the accompanying Log’s Honest Truth confession video, and be sure to subscribe to our newsletter and podcasts to catch all of the episodes as they become available.

Building A Center Of Excellence For Business Processes And Workflow Automation | A Nintex Story With Josh Waldo And Maggie Malone Swearingen

A Their Story conversation with Sean Martin, Marco Ciappelli, and leaders from Nintex and Protiviti

When defined and executed well, a Center of Excellence can be more than a model or process to follow; it can set the bar for the organization by which each part can play a role in making things better. It's not automatic—it requires dedication—and customization.

Have a listen to learn about what our guests hear every day from organizations of all sizes looking to make things better for the business by transforming their business processes with a clear view for what it means to be excellent in how things are built, managed, and executed.

Enjoy, and automate!

Inside The Mind Of A Hacker Report | Unique Histories, Shared Destiny | A Bugcrowd Story

A Their Story conversation with Sean Martin, Marco Ciappelli, and Bugcrowd executives, business leaders, and security researchers

While similarities exist, the latest research indicates the next era of cybersecurity has more in common with the Renaissance, sharing its characteristics of humanism, exploration, and warfare.

This is a 4-part podcast and webcast series we have discussions with Bugcrowd executives, business leaders, and security researchers. The series will explore the traits, attributes, and mindset of the security researchers that enable the successful crowdsourced security assessment market, specifically focusing on these 4 areas: BUSINESS VALUE | GEOGRAPHICS | DEMOGRAPHICS | PSYCHOGRAPHICS

Bookmark this page to catch all of the episodes as they become available.

Listen and learn as you build out your security program by leveraging the global and diverse crowd.

When Failure Is Not An Option, Organizations Turn To The Mainframe — Incorporating Mainframes Into Your Zero Trust Architecture | A Key Resources Story With Cynthia Overby

A Their Story conversation with Sean Martin, Marco Ciappelli, and Key Resources president and co-founder, Cynthia Overby

As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks.

The last time we checked, they were not sitting underground, disconnected from the rest of the IT infrastructure, and in the general vicinity of Area 51. Nope. They are connected and making most of our lives work throughout society. Let's show them the respect — and the security — they deserve.

Enjoy the conversation, if you please.

How And Where You Draw The Lines Of Protection Matters | A BlackCloak Story

A Their Story conversation with Sean Martin, Marco Ciappelli, BlackCloak executives, industry thought leaders, and security/risk practitioners

Balancing protection, responsibility, and liability for the safety of the employees and the safeguarding of company assets.

It may seem obvious and straightforward that there are clear lines between work time and personal time — work devices and personal devices — work networks and personal networks … and so on. It was never that simple before the work-from-home phenomenon and it’s only gotten even more complicated since.

In this three-part conversation, we’ll be looking at what it means to protect the employee as a means to protect the business. We will look at what may not be obvious for most organizations: how and where companies draw their lines of protection between their business and their employees matter. Get the responsibility lines drawn correctly and the business revenue and growth can be protected. Draw the protection line(s) incorrectly and you could be introducing liability can be added to the overall corporate risk profile.

This is a 3-part podcast series that will cover three different perspectives across these 3 episodes:
EXECUTIVES | EMPLOYEES | OPERATIONS

Bookmark this page to catch all of the episodes as they become available.

The State of Privacy In 2021 | Multi-National Companies Have Unique Privacy Requirements | An Imperva Story with Kunal Anand

A Their Story conversation with Sean Martin, Marco Ciappelli, and Imperva executives

We live in a global economy with a global Internet—but is there just one Internet?

This is a 2-part podcast series with Imperva executives. The series will explore the role of the Internet(s) in defining and enforcing data privacy policies around the world.

Subscribe to the newsletter and Subscribe to the podcast to get notified of future episodes.

2020 SOC Performance Report: A Tale of Two SOCs | A Devo Story

A Their Story conversation with Sean Martin, Marco Ciappelli, and Devo executives, business leaders, and security practitioners

What separates a highly effective SOC from a poor-performing SOC?

In this three-part conversation, we will discuss exactly that: the technology, the humans, and the synergistic relationship between the two. Together, with Devo, we explore the tale of Two SOCs: what defines success and what drives performance—plus, what doesn’t.

This is a 3-part podcast series with Devo executives, business leaders, and practitioners along with some of their strategic customers and partners. The series will explore the tale of 2 SOCs: what defines success and what drives performance—with the community-based research the Ponemon Institute performed that will effectively define these 3 episodes: TECHNOLOGY | HUMANS | BUSINESS

Bookmark this page to catch all of the episodes as they become available.

Listen and start tuning your SOC to achieve the performance the business deserves.

The ReversingLabs Story — Chapter 3 | With Erik Thoen

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Erik Thoen

The last time we got together with ReversingLabs was during RSA Conference San Francisco 2020. Back then, we spoke with Mario Vuksan And Tyson Whitten to learn about how the black box of machine learning and artificial intelligence is giving InfoSec professionals a few headaches. A lot has remained the same on this front. Still, a lot has changed since then for many organizations’ SOC teams: work from home environments, disruptive digital and business transformation, rapid cloud deployments, and the ever-dreaded “do more with less budget” operational tactic — to mention just a few.

So, with all that we are now dealing with, how do we find the best path to better information security?

Have a listen.

Securing The Future Of Business | A Series of Conversations With RSA Security

A Their Story conversation with Sean Martin, Marco Ciappelli, and RSA Security executives, customers, and partners.

This is a 3-part podcast and webcast series with RSA Security executives and business leaders along with some of their strategic customers and partners. The series will explore the accelerated digital transformation disruption as organizations evaluate their risk as it maps to their current and future business operations.

The 3 episodes include: SECURITY | WORKFORCE | BUSINESS

Bookmark this page to catch all of the episodes as they become available.

Listen and start building for the future now.

The Cequence Security Story — Chapter 3 | With Matt Keil

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Matt Keil

With the use of APIs come a large number of entry points for bad actors to target. How many APIs are used within an organization, you ask? Many don't know - but Cequence Security can provide a view into this complex environment, giving organizations a full visual footprint of the APIs in use and then provide a risk score and further inspection to identify vulnerabilities and other gaps that could lead to a compromise.

Describing the API environment as "connective tissue," Matt shares a number of examples of how API-based risk exposure, vulnerability exploitation, and escalation of privilege can become a thing of the past when using the discovery and continuous monitoring capabilities in the newly-released Ceqeuence Security API Sentinel product.

Have a listen.

The Semperis Story — Chapter 3 | With Darren Mar-Elia

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Darren Mar-Elia

Businesses rely heavily on Active Directory to manage policies and access for pretty much everything that runs their business. Essentially, they built a vault years ago to hold all of their treasures and secrets, and business operations look to that vault every moment of every day to grab things from it so they can make countless business decisions.

But, because that vault was created and used behind scenes by most throughout the organization, does it get the attention it deserves in terms of risk assessments, threat monitoring, and attack defense?

This is the burning question that we dig in to with Darren in this chapter.

Have a listen.

Adapting To Unpredictability Without Compromising Quality | A Conversation With HITRUST

Their Story conversations with Sean Martin and HITRUST executives, customers, and partners

This is a 2-part podcast and webcast series with HITRUST executives along with some of their strategic customers and partners. The series explores the value of a formal risk management program coupled with a well-formed culture of security and business continuity that focuses on the impact a crisis can have on the customer.

Bookmark this page to catch all of the episodes as they become available.

The BlackCloak Story — Chapter 2 | With Christopher Pierson

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Christopher Pierson

Succeeding in the information security market takes a lot more than building a better mousetrap. The market must be ready for the solution—finding value and willing to pay for the it—and the team must be capable of surviving a financial runway that supports a return for their investors. Looks like BlackCloak is on the right track for all of the above.

In this podcast, Dr. Pierson walks us through some of the high level threat trends and specific threat activity he and his team are seeing and monitoring as they protect executives and high net worth individuals when and where their business cyber protections stop— in their home and in their everyday life. From home printers being hijacked to cyber extortion, everything is fair game for cyber criminals.

No need to take our word for it. Press play and listen to Dr. Pierson telling us about this new chapter in the BlackCloak story.

Their Story | Inkscreen | A Conversation With Josh Bohls

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Josh Bohls

A picture is worth a thousand words. Why is that? Because humans like to visualize things.

While written words and checkboxes help us manage our tasks, often, it’s a picture—or a diagram—or a scanned document—that can make all the difference in the world.

The potential business workflows, scenarios, and use cases are endless. Examining them will uncover the question, are we taking advantage of new mobile-ready capabilities? Or, are our existing business processes keeping employees chained to the office? And, especially in the new age of pretty much everyone working from home, it begs an even bigger question: how are the in-office workflows working out?

These questions, and many more, are discussed during this chat with Josh Bohls, founder and CEO of Inkscreen. If you have business processes and are looking to make the most of text and images to keep your business workflows running smoothly—AND SECURELY—you’ll want to listen to the Inkscreen story.

Ready? Then have at it!

Their Story | SecureStack | A Conversation With Guy Givoni and Paul McCarty

A Their Story conversation with Sean Martin and Marco Ciappelli

Guests: Guy Givoni and Paul McCarty

We were fortunate to meet Guy Givoni and Paul McCarty during their RSA Conference Launch Pad event in Singapore. They’ve been busy riding the wave of success following that event and we caught up with them in San Francisco during RSA Conference 2020 to get an update from them.

Are you ready to learn more? Good! Have a listen to their story.

Their Story | DomainTools | A Conversation With Corin Imai

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Corin Imai

Having met Corin Imai in many roles and many locations over the years, we were thrilled to finally sit down with her and hear her story - which includes the work she is doing at DomainTools. There’s a lot to what Corin and the team of data scientists are up to. Have a listen as she shares some of their work with us during this chat.

It is a good story. Enjoy.

Their Story | OPSWAT | A Conversation With Benny Czarny

A Their Story conversation with Sean Martin and Marco Ciappelli

Guest: Benny Czarny

Before we get to the start of this story, our journey here begins with a view of the current moment in time: OPSWAT’s focus on protecting our critical infrastructure.

You might be surprised (or, maybe not) that several organizations that the OPSWAT team has connected with don’t have a decent answer to this question, with many lacking any policy to define what is appropriate vs. what shouldn’t be allowed. Something as simple as the introduction of a malicious Excel spreadsheet that bypasses the antivirus sandbox capabilities can create a situation where a power plant can be taken offline.

So, What does the future hold for securing our critical infrastructure? Listen to Benny Czarny, CEO, and founder of OPSWAT, as he enlightens us during this chat.