Investing In The Crowd Means Investing In Society And Humanity | A CrowdSec Story With Philippe Humeau And Phillip Wylie

A Their Story conversation with Sean Martin, Marco Ciappelli, Philippe Humeau, CEO at CrowdSec, and Phillip Wylie, The Hacker Maker

In this second chapter of our conversation with CrowdSec CEO, Philippe Humeau, we invite The Hacker Maker, Phillip Wylie, to bring his penetration testing experience and insights. Together we explore the value of investing in the cybersecurity community information sharing platform as a way to do way more than protect your organization. By doing so, we can help secure other businesses and whole communities in the neighbors around you, such as a local hospital that could experience an attack that you've already seen on your network.

The value of investing in the security knowledge sharing economy directly impacts IT operations, security operations, businesses, society, and, therefore, humanity.

Join us for a philosophical yet fun, thought-provoking conversation that will likely prompt you to not only share this podcast with your friends, colleagues, and peers but also start sharing your cybersecurity insights with your digital neighbors through the power of the CrowdSec platform.

Catch 22 | Consumers Hate Sharing Their Data, But There's No Other Option | An Imperva Story About The Findings In The Imperva Global Consumer Survey With Terry Ray

A Their Story conversation with Imperva fellow, Terry Ray.

Consumers worry about sharing data online, yet most feel they have “no choice” but to share their data if they want to use online services. It's a catch 22 — and it is not a bus.

Trust is waning. A majority of consumers, globally, say that trust in the many digital service providers’ ability to keep their personal data secure has decreased over the past five years.

Still, despite serious concerns, most consumers share their darkest secrets online via cloud messaging services even though they recognize there would be repercussions for them if the information they shared was leaked.

No question, it's a catch 22. But what do we do? That's the catch. Again.

Have a listen to learn more about the connections and responsibilities between consumers and the businesses they rely upon to live their digital lives.

The Making Of A Better Cybersecurity Bootcamp | The Level Effect Origin Story With Co-Founders Greg Ake And Rob Noeth

A Their Story conversation with Greg Ake, CEO, and Rob Noeth, CTO, at Level Effect.

This isn't just a story about a company and what they do. This is a story about using your previous experiences and pursuing your passion to help others, which is exactly what Greg Ake and Rob Noeth have done.

Greg and Rob have a goal of helping to reduce security risk for everyone, not just themselves or their employers, but for other organizations and our country. Level Effect is accomplishing this by teaching truly realistic training and making it applicable to an actual role in cybersecurity.

With a practical vs. knowledge-based approach to removing unnecessary noise in their curriculum, it's obvious Level Effect is different.

Join us and listen to this inspiring conversation about the origins of Level Effect — even the name — and how they've built a better cybersecurity bootcamp.

Trusted Interoperability Is The Key To Better Health Care Delivery | TEFCA And TNAP Are The Keys To Trusted Interoperability | A HITRUST Customer Story With Lee Barrett And Michael Parisi

A Their Story conversation with Lee Barrett, Executive Director at Electronic Healthcare Network Accreditation Commission, and Michael Parisi (VP of adoption at HITRUST)

Patients, and their providers, deserve to have immediate, accurate access to their personal health information so they can get the best healthcare possible. How and where does the concept of interoperability come into play for a number of societal issues and patient care delivery challenges we are trying to solve for? Let's look at TEFCA to find out.

in today's story, we are joined by two organizations—HITRUST and EHNAC—dedicated to making the healthcare ecosystem thrive by reducing friction in risk management and in supply chain interoperability. This spirit couldn't be applied at a better time with the recent release of TEFCA—the Trusted Exchange Framework and Common Agreement.

Real-Time Data Security Is Too Slow: Avoid Creating A Solution Bigger Than The Problem Itself | An Imperva Story with Terry Ray

A Their Story conversation with Imperva fellow, Terry Ray.

Data Security is often seen as the “scary” or “intimidating” domain of security. And, yet, it’s needed more than ever before.

Historically, it’s a domain of security that is typically found in highly regulated industries. However, data is the currency of the modern economy and the fuel behind nearly every organization. Business large and small collect, create, store, manipulate, and share data that is sensitive in nature and valuable to cybercriminals.

2022 must be the year where data security becomes attainable for all. The solution to the problem can't be bigger than the problem itself. And, the problem can't be defined as dealing with it in real-time. It's important we use data to protect the data, getting ahead of the threat.

The Journey To A Right-Sized Risk Management And Compliance Framework | A HITRUST Customer Story With John Overbaugh, Michael Tiemeyer, And Michael Parisi

A Their Story conversation with John Overbaugh (ASG), Michael Tiemeyer (Teladoc Health), and Michael Parisi (VP of adoption at HITRUST)

Taking responsibility for what we build and how we secure it matters. Especially in the ways we talked about during today’s Their Story episode? It matters to the business partners. It matters to the customers. And, as pointed out by Mike Parisi during this conversation, it matters to society.

There are many reasons why organizations large and small choose HITRUST to help them through their security, risk, and compliance journey.

Why do you choose HITRUST?

Protecting Your Cloud-Native Environment — The State Of Single-, Multi-, And Hybrid-Cloud Security | An Imperva Story with Kunal Anand and Mitch Ashley

A Their Story conversation with Imperva executive, Kunal Anand and research analyst, Mitch Ashley

With the cloud computing revolution, everything seems to be — and, in many cases, certainly is — more accessible to business and their innovations. But, as we often say, the fundaments of cybersecurity best practices remain, and we cannot allow the race for more to lower our security postures.

Join us for this conversation as our guests — technologist and innovator Kunal Anand and technology and industry analyst Mitch Ashley — take us on a journey down the river and through the multi- and hybrid clouds as we look at the past and present and future of cloud services and information security.

Words Matter: Understanding The Vocabulary Used Between Business Leaders And CISOs | A Blue Lava Story With Demetrios Lazarikos (Laz)

A Their Story conversation with Sean Martin, Marco Ciappelli, and Demetrios Lazarikos (Laz) from Blue Lava

This is certainly not a new or revolutionary statement: "Words Matter." What is new nowadays is the pace at which our business, relationships, and society change. Technology is fueling many of these changes, and we are all learning new ways as we go. As we're trying to figure out what we are doing and where we're going to go next, the words we use to describe the world around us matter even more than ever. There's a moral to this story, and Laz's words matter immensely for those seeking to run an information security program that not only protects the business but also helps it achieve its objectives.

Business Process Management Lifecycle Podcast Series—Orchestrating The Business Of The Future Today | A Their Story Conversation With Nintex

A Their Story conversation with Sean Martin and Nintex experts, partners, and guests

This is a 5-part podcast series with Nintex thought leaders and solutions partners. The series will walk through the lifecycle of employing business process management (BPM) and business process automation (BPA) within the organization.

The 5 episodes include: DEFINITION | CONSTRUCTION | EXECUTION | AUTOMATION | ORCHESTRATION

Listen and start building for the future now.

The Blue Lava Origin Story | A Blue Lava Story With Co-Founders Demetrios Lazarikos (Laz), Julia Tran, Jonna Melinauskas, And Andy Hoernecke

A Their Story conversation with Sean Martin and the 4 founders from Blue Lava

This is one of those origin stories that we love to share on ITSPmagazine. While each company's story is unique, inspiring, and beautiful in its own way, this one is told by the four friends that happen to be those that had a dream and turned it into reality. It is an extraordinary moment for the four of the co-founders to tell us how Blue Lava came to be and for us to share it with all of you.

Taming The Chaotic World Of API Security — Finding Your Path To Protection | An Imperva Story with Kunal Anand

A Their Story conversation with Sean Martin, Marco Ciappelli, and Imperva executives

As digital consumers, we need APIs to beckon mobile apps and access the digital services we love. But, for companies, it's a new dimension of risk that many aren't prepared for. In part, because it's not always clear: who's responsible for securing the APIs?

Perhaps it's the engineers/developers. Maybe it's the InfoSec team. In some instances, there's a dedicated AppSec team that oversees this activity. Sometimes it's a combo of this group. But, unfortunately, because of the lack of clarity, sometimes it's nobody.

To help bring clarity to the chaos, we had Kunal Anand, CTO at Imperva, join us to help understand what organizations are up against and then help them find ways to operationalize API security.

CyberSecurity Leaders Use Cybersecurity Maturity Model (CMM) To Achieve Cybersecurity Maturity With Their InfoSec Program | A Blue Lava Story With Demetrios Lazarikos (Laz) And Andy Hoernecke

A Their Story conversation with Sean Martin and Demetrios Lazarikos (Laz) + Andy Hoernecke from Blue Lava

Listen in to learn more from Laz and Andy as they share their experiences and expertise. Join us to examine what it means for InfoSec teams to achieve maturity and how a comprehensive program framework can help the group begin their journey by setting a baseline and establishing maturity measurements.

Crowdsourcing Cybersecurity Intelligence To Secure Society | A CrowdSec Story With Philippe Humeau

A Their Story conversation with Sean Martin, Marco Ciappelli, and Philippe Humeau, CEO at CrowdSec

CrowdSec is joining the good guys on this battlefield and understands that by acting together and sharing important, relevant pieces of information, we can successfully counteract organized cybercrime. CrowdSec's CTI-driven IPS objective is to automate cybersecurity threat intelligence sharing and consumption on a large scale.

Learn more about what it means to join the crowd and how all the information can benefit businesses and organizations all over the globe. This is the value of authentic and accurate information sharing.

Language Holds The Key To Communicating Security And Business Strategy | A Blue Lava Story With Jen Sanford and Rock Lambros

A Their Story conversation with Sean Martin, "Rock" Lambros of RockCyber, and Jen Sanford from Blue Lava

CISOs tend to talk to other technical personnel and don’t get involved in business conversations on a regular basis. To succeed in their role, however, CISOs need to get out from behind their keyboards and start discussions with executives so they can begin to translate what they do in security into what the business wants to hear. But finding those connection points between technology and the business is difficult.

With this story, Martin, Lambros and Sanford focus on strategy and planning because that’s what helps CISOs evolve into the role they want now and into the future. But it doesn’t happen magically. Only through understanding, research, and action, can CISOs reach that point.

It’s time to make your own magic happen. Have a listen.

Executives Are Under Siege As Hackers Target The Video Game Industry | A BlackCloak Story With Chris Pierson And Joel Fulton

A Their Story conversation with Sean Martin, Marco Ciappelli, and BlackCloak CEO and founder, Chris Pierson with CyberSecurity and CISO veteran, Joel Fulton

It is not the first, nor the last, time we suggest studying our history to learn about our present and imagine the future. To get a view for how society reacts to scams and cons, we can look to the past for education, perhaps some inspiration, and maybe even some guidance. Yes, even when looking at cybersecurity and the video game industry.

In this new chapter of the BlackCloak story, we get to dive into a new report the team put together, looking at the world of gaming as the source of risk, threats, and compromise. And, to our liking, we got to use the report's findings to take a look back in time (way back, in fact), such that we can connect the dots between humanity, psychology, and security (cyber and not).

Listen in. Go back in time with us. And prepare for the future. Remember, while the report is about gaming — this isn't a game.

Cloud Modernization Strategies | What Does Your Data Transformation Journey Look Like | An Imperva Story with Ron Bennatan

A Their Story conversation with Sean Martin, Marco Ciappelli, and Imperva executives

We live in a world where the only constant is change. We’ve managed to survive by anticipating and following the changes to our business models, data models, and threat models. Have we done a decent job bringing our business to the cloud thus far? What about where we head to next?

This is a 2-part podcast series with Imperva executives. The series will explore the past, present, and future paths organizations have and will need to take to the cloud with a data security model and solution designed to handle constant growth and change.

Now… please join us as we join you on this journey you’ve already begun.

The Business Value Of A Security First Approach As A Means To Achieve And Maintain Compliance | A HITRUST Customer And Partner Story With Rudi Perkins (Welvie) And Blaise Wabo (A-LIGN)

A Their Story conversation with Rudi Perkins (Welvie) And Blaise Wabo (A-LIGN), customer and partner of HITRUST, respectively

Suppose you're like Rudi, who, six years ago, tried to bring his organization to an effective level of compliance and increase his security posture by managing multiple spreadsheets. In that case, you're probably finding yourself going nuts — just like Rudi did, and many others do, when faced with a similar complex and overwhelming situation.

Thankfully, this is when Rudi's and Blaise's stories — individually and collectively — can make a world of difference for you.

They've figured many things out: they found the right processes, tools, and partners to make this experience better overall. They've created an experience they want, driven by a common framework that maps all of those things together, giving you the means to do the controls assessment, identify and mitigate the gaps, and then apply that work to many standards, frameworks, and regulations in the US and abroad.

In short, what HITRUST and its Assessor community are doing here is to enable the business — individually and collectively as part of a larger supply chain — to operate securely within the boundaries of the regulatory and industry requirements for which they must abide.

“Our customers expect that of us. Our partners expect that of us. We should expect that of each other and of ourselves too.” —Sean Martin

The Humans In The Mainframe | Common Misunderstandings In Mainframe Security Management | A Key Resources Story With Ray Overby

A Their Story conversation with Sean Martin, Marco Ciappelli, and Key Resources CTO and co-founder, Ray Overby

The lack of InfoSec talent is something the cybersecurity industry complains about all the time. How does this challenge differ when we look at mainframe security? Once again, perception and reality are not a match.

We've come full circle with mainframes. They still do what they were designed to do — really well, in fact. Still, we need to understand the role of the human in the equation as we try to do two things at once: 1) run the critical business processes on the mainframe, and 2) remember that security doesn't happen magically; it requires human intervention.

It's time to put the humans back in the mainframe. History, as usual, can help us clarify the present and plan for a better future.

Have a listen to learn more.

Take Back The Keys To Your Kingdom | A Semperis Story About Purple Knight's Mission To Secure Active Directory | With Darren Mar-Elia And Ran Harel

A Their Story conversation with Sean Martin, Marco Ciappelli, and leaders from Semperis

Here is the truth: Active Directory remains a soft target for attackers attempting to steal credentials and deploy ransomware. However, there is another truth: it doesn't have to stay that way. There is a new Knight in the castle — it is purple, and it is here to change the game.

During this podcast, we learn more about Semperis' mission with its new free tool, Purple Knight, including what it can do, how it works, and what the end results can be once an organization takes concrete steps to protect the keys to its kingdom.

Join us on this new adventure and meet this new character in the Semperis saga.

Once upon a time...

6 Years Of Vulnerability Analysis: Stacking Up The Bugs To Understand Their Impact On Business | The 6th Annual 2021 Vulnerability Statistics Report | An Edgescan Story With Eoin Keary

A Their Story conversation with Sean Martin, Marco Ciappelli, and Eoin Keary from Edgescan

It is that jolly time of the year: The Edgescan vulnerability stats report has arrived! After six annual editions, it has become an industry pillar representing the global state of cybersecurity vulnerability management.

It is not for nothing that this large dataset is also part of other annual security analysis reports, such as the OWASP Top 10 and Verizon Data Breach Investigations Report (DBIR).

So, what's in it? A bunch of numbers, and they all mean something. They will help you and your organization improve the effectiveness of your vulnerability management program and, in turn, your risk profile. But do not take our word for it. We spoke directly with the founder of the report and the company behind it, Edgescan's CEO, Eoin Keary.