Share ITSPmagazine Podcasts
Share to email
Share to Facebook
Share to X
By ITSPmagazine, Sean Martin, Marco Ciappelli
5
3131 ratings
The podcast currently has 2,425 episodes available.
Host | Matthew S Williams
On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams
______________________
This Episode’s Sponsors
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
______________________
Episode Notes
What if the reason we're not hearing from aliens is that everyone out there is listening, but no one is broadcasting messages? This is the essence of the "SETI Paradox" and the ongoing debate between proponents of SETI and METI - Messaging Extraterrestrial Intelligence
______________________
Resources
Beyond Fermi's Paradox: What is the "SETI Paradox" Hypothesis?: https://www.universetoday.com/149513/beyond-fermis-paradox-xvii-what-is-the-seti-paradox-hypothesis/
______________________
For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast
Guest: Dawn Greenfield Ireland, Author and Storyteller
Website | https://degreenfield.com
On LinkedIn | https://www.linkedin.com/in/degreenfield/
On Facebook | https://facebook.com/dawn.ireland.18
_____________________________
Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast
On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
_____________________________
This Episode’s Sponsors
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
_____________________________
Episode Introduction
Hello, everyone! Marco Ciappelli here, and welcome to another episode of ITSPmagazine. Today, I had the pleasure of speaking with the incredibly talented author and storyteller, Dawn Greenfield Ireland. Dawn has an impressive catalog of written works, spanning from science fiction and dystopian novels to cozy mysteries and award-winning screenplays. Let’s dive into her fascinating journey and gather insightful tips for aspiring writers.
The Genesis of a Writer
Our conversation kicked off with Dawn sharing the origins of her writing career. Dawn’s literary journey began in an unusual way—through technical writing. In the 1970s, while working as an executive secretary in an oil and gas company’s documentation department, a surprising opportunity arose. Dawn was asked to review some documents, which led her to discover a new talent she hadn’t previously known she possessed.
This realization was a game-changer, and she transitioned into technical writing. Later, Dawn moved on to work at Compact Computer, where she gained invaluable insights into the publishing industry as a whole.
Transitioning from Technical Writing to Fiction
One intriguing aspect of Dawn’s career is her transition from technical writing to fiction. I asked her about this shift and whether she had always harbored a desire to write fiction. Dawn revealed that her first foray into fiction happened during a long commute to work, where daydreams turned into notes jotted down on a yellow legal pad. These notes eventually materialized into her first science fiction novel, Second Chance (later renamed Prophecy of Thal).
However, the journey was anything but smooth. Dawn’s first draft took years to complete and underwent numerous revisions before it was finally published—33 years later.
The Importance of Editing and Critique Groups
Dawn’s story underscores the significance of continuous learning and refinement in the writing process. She shared how joining a critique group was instrumental in improving her writing skills. The group provided constructive feedback that helped her transform raw ideas into well-crafted stories.
For aspiring writers, Dawn emphasizes the importance of finding a critique group or, at the very least, a good editor or proofreader to help polish one’s work.
Adapting Books into Screenplays
As an author who has also delved into screenwriting, Dawn explained the distinctions between writing novels and screenplays. While novels allow for expansive descriptions and detailed storytelling, screenplays demand brevity and focus. Adapting a 400-page novel into a 95-page screenplay requires careful condensation, often leaving out important elements.
Despite the challenges, Dawn enjoys both forms of writing, finding fulfillment in the unique constraints and creative opportunities each offers.
The Role of Reading in Writing
We also discussed the pivotal role of reading in one’s development as a writer. Dawn reads two to six books per week, attributing much of her writing prowess to this habit. Reading widely exposes writers to various styles, techniques, and vocabulary, all of which contribute to honing their craft.
She encourages budding writers to read extensively and use modern technology, like eBooks, to easily look up unfamiliar words and concepts.
Practical Advice for Aspiring Writers
To wrap up our conversation, I asked Dawn to offer some practical advice for new writers. Here are her key suggestions:
• Start with an Outline: Jot down your ideas and gradually expand them into a structured outline.
• Join or Form a Critique Group: Feedback from peers can be invaluable in improving your work.
• Stay Organized: Use tools and strategies to keep your writing process efficient and avoid working with outdated drafts.
Final Thoughts
Dawn Greenfield Ireland’s journey from technical writer to multi-genre author and screenwriter is a testament to the importance of perseverance, continuous learning, and embracing new challenges. Whether you’re just starting out or looking to transition into a new genre, implementing her advice can undoubtedly help you become a better writer.
Thank you for joining us on this episode of ITSPmagazine. Don’t forget to check out Dawn’s extensive library of work and consider reaching out to her for further insights. Until next time, keep writing, and keep telling those stories that make us all human.
_____________________________
Resources
Writers Preparation Handbook Online Course: https://www.degreenfield.com/online-classes
_____________________________
For more podcast stories from Audio Signals:
https://www.itspmagazine.com/audio-signals
Watch the video version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQvnJ8eHUlVX8AuyhehtexA
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
HITRUST will launch its AI Security Certification in December 2024, addressing the unique security risks of artificial intelligence systems. As AI reshapes the cybersecurity landscape, existing control frameworks, including HITRUST CSF, do not fully address new and evolving threats. The certification offers prescriptive controls to help secure AI deployments effectively.
Targeted at AI platform and product providers, this certification is an optional extension to HITRUST CSF validated assessments. It addresses AI-specific threats alongside traditional cybersecurity risks, focusing on security practices for AI/ML deployments, including generative AI.
The certification integrates with third-party risk management (TPRM) platforms, enabling more efficient workflows for managing AI solution security. This helps organizations manage AI risk, adopt AI solutions with confidence, and reduce complexity, time, and costs.
Designed to enhance third-party AI risk management, the certification allows organizations to identify shared security responsibilities between AI providers and users. It ensures greater trust and security across AI deployments, helping businesses stay ahead of emerging AI threats.
The draft certification specification is open for public comment until October 17, 2024.
To learn more and to provide feedback visit: https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/about
Learn more about HITRUST: https://itspm.ag/itsphitweb
Note: This story contains promotional content. Learn more.
Guest: Jeremy Huval, Chief Innovation Officer, HITRUST [@HITRUST]
On LinkedIn | https://www.linkedin.com/in/jeremyhuval/
Resources
Learn more and catch more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust
Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs
Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/
Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up
Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story
Guest: Lisa Forte, Partner at Red Goat Security, Cybersecurity Crisis Trainer
On LinkedIn | https://www.linkedin.com/in/lisa-forte/
Host: Matthew Rosenquist
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist
______________________
Episode Sponsors
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
______________________
Episode Introduction
I speak with Lisa Forte, a legend when it comes to helping organizations prepare for handling cybersecurity crisis events, who shares her rich insights and recommendations.
______________________
Resources
______________________
For more podcast stories from Cybersecurity Insights with Matthew Rosenquist, visit: https://www.itspmagazine.com/cybersecurity-insights-with-matthew-rosenquist
Watch this episode on YouTube: https://www.youtube.com/watch?v=fBcflVIjNnM
ITSPmagazine's YouTube Channel: 📺 https://www.youtube.com/@itspmagazine
Be sure to share and subscribe!
Guest: Kate O'Neill, Dean, College of Business, American University of Iraq-Baghdad
On LinkedIn | https://www.linkedin.com/in/k-kathleen-oneill-phd-strategicleadership/
Hosts:
Alejandro Juárez Crawford
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford
Miriam Plavin-Masterman
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman
______________________
Episode Introduction
Kate, the Dean of the College of Business at American University in Iraq, Baghdad, draws from her extensive international experience to discuss:
- The importance of being self-aware of cultural assumptions.
- Strategies for bridging cultural differences, including explicitly stating intentions.
- The concept of semantic non-equivalence in cross-cultural contexts.
- How intentional communication can overcome cultural barriers.
- The paradox of finding unity in diversity and division in similarity. and lot more!
The episode concludes with reflections on the importance of listening, sharing personal experiences, and finding common ground even in the face of significant differences.
______________________
Resources
______________________
Episode Sponsors
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
______________________
For more podcast stories from What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman, visit: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford and https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman
In this Brand Story episode, hosts Sean Martin and Marco Ciappelli welcome Lebin Cheng from Imperva to discuss the ever-important topic of API security. As the head of the API security team at Imperva, Lebin Cheng offers a nuanced view into the challenges and solutions involved in protecting sensitive data facilitated by APIs. A central theme of the discussion revolves around API security's complexity due to APIs' role in digital transformation, cloud migration, and data integration. APIs act as a gateway for data interaction and integration, offering flexibility but also introducing significant security risks.
Cheng underscores that as APIs provide open access to critical data, they become prime targets for sophisticated cyber threats. These threats exploit vulnerabilities in API deployments, making robust security measures indispensable. Cheng highlights the importance of securing APIs not as a one-time effort but as an ongoing process. He discusses how Imperva employs real-time monitoring and behavioral analysis to enhance API security. By establishing a baseline of what constitutes normal behavior, Imperva can quickly detect and respond to anomalies. This approach goes beyond traditional, static security measures, which often fall short against dynamic threats that evolve alongside technology.
Additionally, the conversation touches on the notion of 'security by design.' Cheng advocates for integrating security considerations from the earliest stages of API development. This results in more resilient applications capable of withstanding sophisticated attacks. The discussion also notes the growing trend of DevSecOps, which emphasizes the collaboration between development, security, and operations teams to embed security throughout the software development lifecycle. Real-world applications of these principles are evident in various sectors, including open banking.
Cheng explains how open banking initiatives, which allow smaller financial institutions to access larger banks' data via APIs, highlight the necessity of strong API security. A breached API could expose sensitive financial data, leading to significant financial and reputational damage. The hosts and Cheng also explore how Imperva's innovation in API security involves leveraging artificial intelligence and machine learning. These technologies help in identifying and mitigating potential risks by analyzing vast amounts of data to detect unusual patterns that might indicate a security threat.
In closing, Cheng emphasizes the importance of continuous innovation and vigilance in the field of API security. He invites organizations to adopt a proactive stance, continuously updating their security measures to protect their data assets effectively. This episode serves as a compelling reminder of the critical role API security plays in today's interconnected digital world.
Learn more about Imperva: https://itspm.ag/imperva277117988
Note: This story contains promotional content. Learn more.
Guest: Lebin Cheng, VP, API Security, Imperva [@Imperva]
On LinkedIn | https://www.linkedin.com/in/lebin/
Resources
Learn more and catch more stories from Imperva: https://www.itspmagazine.com/directory/imperva
Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story
Guests:
Shrey Modi, Software Engineer Intern, Teladoc Health
On LinkedIn | https://www.linkedin.com/in/shreymodi7/
Rahul Vishwakarma, Blue Ridge Labs, Robin Hood
On LinkedIn | https://www.linkedin.com/in/rahulvishwakarma/
________________________________
Host: Saman Fatima
On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima
________________________________
This Episode’s Sponsors
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network
________________________________
Episode Description
Are you from India? Wishing to come to the USA for your studies? Is your dream university - California State University? If yes, grab a pen, paper, and water, and you are all good to know everything. From researching the dream university to getting selected and beating the elephant in the room (i.e. the VISA process) to settling up - you need to know EVERYTHING because, at the end of the day, it is a foreign land with a lot of newness, loneliness, and self-dependency.
________________________________
Resources
Checkout the Cal State's AI Research Club: https://www.csulb.edu/college-of-engineering/article/ai-research-club-launches
Join the BBWIC Foundation Community: https://www.bbwic.com/
________________________________
For more podcast stories from Off The Record With Saman: https://www.itspmagazine.com/off-the-record-with-saman-student-abroad-podcast
Watch the video version on-demand on YouTube: https://www.youtube.com/watch?v=0954PDs3hFI&list=PLnYu0psdcllS96iavkI5nQsErJ3795ow6
Guest: Ashley Jess, Senior Intelligence Analyst, Intel 471 [@Intel471Inc]
At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633
____________________________
Hosts:
Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]
On ITSPmagazine | https://www.itspmagazine.com/sean-martin
Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast
On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli
____________________________
Episode Notes
As part of their Chats on the Road for the On Location series during SecTor in Toronto, Sean Martin and Marco Ciappelli had an engaging conversation with Ashley Jess, a Senior Threat Intelligence Analyst from Intel471.
The discussion centered on the intricacies of artificial intelligence (AI), its uses, and its abuses in the realm of cybersecurity. Ashley's upcoming presentation titled "Hello from the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation, and Scam Campaigns" sets the stage for an in-depth exploration into the dark side of AI. Ashley gives a glimpse into how AI is being utilized for nefarious purposes, highlighting the connection between generative AI and disinformation campaigns. She explains how AI has been used to create politically motivated fake graffiti, deepfake videos with celebrities, and even entirely fabricated news websites.
She emphasizes that the lowest barrier to entry for generating such content is lower than ever, making it easy for bad actors to create and spread false information swiftly. She mentions a particularly interesting case during the Olympics, where an entire propaganda movie starring a deepfake Tom Cruise was produced for political purposes. This example underscores the potential of AI to convincingly spread disinformation on a massive scale. She also points out how scam campaigns are increasingly leveraging AI, making them more believable and harder to detect.
One crucial topic Ashley touches on is the matter of responsibility in combating these threats. She discusses the need for more robust government regulations and the role of various technology vendors in detecting and preventing the misuse of AI. She highlights the importance of technologies like Web3 and blockchain for content provenance.
According to Ashley, integrating such measures into platforms used by everyday people can help mitigate the risks posed by AI-generated disinformation. Marco Ciappelli adds to this by reflecting on how easy it is to create misleading content and target vulnerable populations. He points out that ordinary citizens, who are not as vigilant or technologically savvy, are at greater risk. On this note, Sean Martin questions who should be responsible for protecting individuals and organizations from AI-based threats.
The discussion also touches on the ethical aspects of AI and its dual-use nature—where technological advancements can be both beneficial and harmful. Ashley emphasizes the need for a balanced approach that considers both the legitimate applications of AI technology and its potential for abuse. Ashley Jess is enthusiastic about her upcoming talk at SecTor where she promises to delve further into these critical issues.
The session aims to provide a realistic, frontline view of how AI is being used maliciously and to encourage more proactive measures to combat these emerging threats. For those attending SecTor, her insights promise to be both enlightening and essential.
Be sure to follow our Coverage Journey and subscribe to our podcasts!
____________________________
This Episode’s Sponsors
HITRUST: https://itspm.ag/itsphitweb
____________________________
Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canada
On YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190S
Be sure to share and subscribe!
____________________________
Resources
Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns (Session): https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161
Learn more about SecTor Cybersecurity Conference Toronto 2024: https://www.blackhat.com/sector/2024/index.html
____________________________
Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverage
Are you interested in sponsoring our event coverage with an ad placement in the podcast?
Learn More 👉 https://itspm.ag/podadplc
Want to tell your Brand Story as part of our event coverage?
Learn More 👉 https://itspm.ag/evtcovbrf
To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcast
To see and hear more Redefining Society stories on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-society-podcast
Guest: Steve Wilson, Chief Product Officer, Exabeam [@exabeam] & Project Lead, OWASP Top 10 for Larage Language Model Applications [@owasp]
On LinkedIn | https://www.linkedin.com/in/wilsonsd/
On Twitter | https://x.com/virtualsteve
____________________________
Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]
On ITSPmagazine | https://www.itspmagazine.com/sean-martin
View This Show's Sponsors
___________________________
Episode Notes
In this episode of Redefining CyberSecurity, host Sean Martin sat down with Steve Wilson, chief product officer at Exabeam, to discuss the critical topic of secure AI development. The conversation revolved around the nuances of developing and deploying large language models (LLMs) in the field of cybersecurity.
Steve Wilson's expertise lies at the intersection of AI and cybersecurity, a point he emphasized while sharing his journey from founding the Top 10 group for large language models to authoring his new book, "The Developer's Playbook for Large Language Model Security." In this insightful discussion, Wilson and Martin explore the roles of developers and product managers in ensuring the safety and security of AI systems.
One of the key themes in the conversation is the categorization of AI applications into chatbots, co-pilots, and autonomous agents. Wilson explains that while chatbots are open-ended, interacting with users on various topics, co-pilots focus on enhancing productivity within specific domains by interacting with user data. Autonomous agents are more independent, executing tasks with minimal human intervention.
Wilson brings attention to the concept of overreliance on AI models and the associated risks. Highlighting that large language models can hallucinate or produce unreliable outputs, he stresses the importance of designing systems that account for these limitations. Product managers play a crucial role here, ensuring that AI applications are built to mitigate risks and communicate their reliability to users effectively.
The discussion also touches on the importance of security guardrails and continuous monitoring. Wilson introduces the idea of using tools akin to web app firewalls (WAF) or runtime application self-protection (RASP) to keep AI models within safe operational parameters. He mentions frameworks like Nvidia's open-source project, Nemo Guardrails, which aid developers in implementing these defenses.
Moreover, the conversation highlights the significance of testing and evaluation in AI development. Wilson parallels the education and evaluation of LLMs to training and testing a human-like system, underscoring that traditional unit tests may not suffice. Instead, flexible test cases and advanced evaluation tools are necessary. Another critical aspect Wilson discusses is the need for red teaming in AI security. By rigorously testing AI systems and exploring their vulnerabilities, organizations can better prepare for real-world threats. This proactive approach is essential for maintaining robust AI applications.
Finally, Wilson shares insights from his book, including the Responsible AI Software Engineering (RAISE) framework. This comprehensive guide offers developers and product managers practical steps to integrate secure AI practices into their workflows. With an emphasis on continuous improvement and risk management, the RAISE framework serves as a valuable resource for anyone involved in AI development.
About the Book
Large language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.
Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list—a feat accomplished by more than 400 industry experts—this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.
___________________________
Sponsors
Imperva: https://itspm.ag/imperva277117988
LevelBlue: https://itspm.ag/attcybersecurity-3jdk3
___________________________
Watch this and other videos on ITSPmagazine's YouTube Channel
Redefining CyberSecurity Podcast with Sean Martin, CISSP playlist:
📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq
ITSPmagazine YouTube Channel:
📺 https://www.youtube.com/@itspmagazine
Be sure to share and subscribe!
___________________________
Resources
Book: "The Developer's Playbook for Large Language Model Security: Building Secure AI Applications": https://amzn.to/3ztWuc2
OWASP Top 10 for LLM: https://genai.owasp.org/
___________________________
To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-cybersecurity-podcast
Are you interested in sponsoring this show with an ad placement in the podcast?
Learn More 👉 https://itspm.ag/podadplc
In 7 Minutes on ITSPmagazine, Sean Martin chats with Chris Pierson, CEO and Co-founder of BlackCloak, about their latest milestone in digital executive protection. BlackCloak, a pioneer in protecting executives, senior leaders, high-net-worth individuals, and family offices, has secured $17 million in a Series B funding round led by Baird Capital, with contributions from Blue Heron, TDF, and Tech Operators.
Chris explains that the new funds will focus on scaling the company's operations, building proprietary cybersecurity and privacy technologies, and enhancing their concierge-level services. The goal is to provide specialized protection and remediation for corporate executives, board members, and high-profile individuals, including those in their families' personal lives.
The conversation touches on the increasing need for digital executive protection against breaches, privacy risks, and identity theft. Chris highlights how recent attacks on home environments have accelerated the demand for robust digital security solutions. Investors are drawn to BlackCloak's unique approach and market potential.
Looking ahead, Chris envisions a day in the life of a protected digital executive as one where privacy enhancements and proactive, intelligence-driven alerts become standard. BlackCloak aims to make managing personal cybersecurity seamless, offering reactive support and expert advice along the way. With this fresh investment, the company is poised to capture significant growth in this critical space.
Learn more about BlackCloak:https://itspm.ag/itspbcweb
Note: This story contains promotional content. Learn more.
Guest: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]
On Linkedin | https://www.linkedin.com/in/drchristopherpierson/
On Twitter | https://twitter.com/drchrispierson
Resources
Learn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloak
BlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices: https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/
Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs
Newsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/
Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-up
Are you interested in telling your story?
https://www.itspmagazine.com/telling-your-story
The podcast currently has 2,425 episodes available.
7,596 Listeners