Dynamic Access Control in Modern Cloud Environments | A Brand Story Conversation From Black Hat USA 2024 | A Britive Story with Artyom Poghosyan | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Nick Chasm, Red Herrings, and Letters That Started It All: Michael Pickard on Writing Mysteries and Storytelling | Audio Signals Podcast With Marco CiappelliSean Martin
The Theory of Saving the World: Intervention Requests and Critical Infrastructure | An Australian Cyber Conference 2024 in Melbourne Conversation with Ravi Nayyar | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Rebalancing Cyber Security: Prioritizing Response and Recovery in Governance | An Australian Cyber Conference 2024 in Melbourne Conversation with Asaf Dori and Ashwin Pal | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Breaking Down the Complexities of Client-Side Threats and How to Stop Them | A c/side Brand Story Conversation with Simon WijckmansSean Martin
Data Security Posture Management — DSPM. What, why, when, and how: All The Insights You Need To Know | An Imperva Brand Story Conversation with Terry RaySean Martin
From Code to Confidence: The Role of Human Factors in Secure Software Development | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Kelsey Fulton | Redefining CyberSecurity with Sean MartinSean Martin
Establishing a New Standard for Cybersecurity Professionals Worldwide: Addressing Trust, Standards, and Risk for the CISO Role | CISO Circuit Series with Heather Hinton | Michael Piacente and Sean Martin | Redefining CyberSecurity PodcastSean Martin
From Signaling to Safety: Protecting Critical Infrastructure and the Modern Railway from Digital Threats | A Conversation with Fahad Mughal | Redefining CyberSecurity with Sean MartinSean Martin
Cyber Threat Research, Hands-On Labs, and a Challenge You Can’t Afford to Miss | A Zero Trust World Conversation with Kieran Human | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
The Ultimate 2025 Tech & Cybersecurity Event Guide: Where to Be | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Shadow IT: Securing Your Organization in a World of Unapproved Apps | A Zero Trust World Conversation with Ryan Bowman | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Book "My Limitless Life" I Interview with Authors Karen Meades and Barry Finlay | Audio Signals Podcast With Marco CiappelliSean Martin
The 2025 OWASP Top 10 for LLMs: What’s Changed and Why It Matters | A Conversation with Sandy Dunn and Rock Lambros | Redefining CyberSecurity with Sean MartinSean Martin
The Rhythm of Storytelling: From Screenwriting to Novels with Stephen Jay Schwartz | Audio Signals Podcast With Marco CiappelliSean Martin
Hackers, Policy, and the Future of Cybersecurity: Inside The Hackers’ Almanack from DEF CON and the Franklin Project | A Conversation with Jake Braun | Redefining CyberSecurity with Sean MartinSean Martin
Shifting Realities: Crime, Sci-Fi, and the Art of Storytelling with Frank Scalise | Audio Signals Podcast With Marco CiappelliSean Martin
The Cyber Resilience Act: How the EU is Reshaping Digital Product Security | A Conversation with Sarah Fluchs | Redefining CyberSecurity with Sean MartinSean Martin
From Newsroom to Lens: Robin Hamilton’s Journey Through Documentary Filmmaking and Social Activism | Audio Signals Podcast With Marco CiappelliSean Martin
Detection vs. Noise: What MITRE ATT&CK Evaluations Reveal About Your Security Tools | A Conversation with Allie Mellen | Redefining CyberSecurity with Sean MartinSean Martin
Building and Securing Intelligent Workflows: Why Your AI Strategy Needs Agentic AI Threat Modeling and a Zero Trust Mindset | A Conversation with Ken Huang | Redefining CyberSecurity with Sean MartinSean Martin
Thy Mother Is A Lioness: Historical Fiction and the Stories That Shape Us — A Conversation with Sam Foster | Audio Signals Podcast With Marco CiappelliSean Martin
Vibe Coding: Creativity Meets Risk in the Age of AI-Driven Development | A Conversation with Izar Tarandach | Redefining CyberSecurity with Sean MartinSean Martin
Inside the DARPA AI Cyber Challenge: Securing Tomorrow’s Critical Infrastructure Through AI and Healthy Competition | An RSAC Conference 2025 Conversation with Andrew Carney | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
Agentic AI to the Rescue? From Billable Hours to Bots: The New Legal Workflow | A Conversation with Frida Torkelsen and Maged Helmy | Redefining CyberSecurity with Sean MartinSean Martin
Drawing from Empathy: Storytelling, Mythology, and Cartooning with Mythtickle Creator Justin Thompson | Audio Signals Podcast With Marco CiappelliSean Martin
From Feed to Foresight: Cyber Threat Intelligence as a Leadership Signal | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3Sean Martin
When AI Looks First: How Agentic Systems Are Reshaping Cybersecurity Operations | A Musing On the Future of Cybersecurity and Humanity with Sean Martin and TAPE3 | Read by TAPE3Sean Martin
OT Emergency Preparedness: When Disaster Recovery Meets Real-World Safety | A Conversation with Tobias Halmans | Redefining CyberSecurity with Sean MartinSean Martin
Hiring for the Present Is Hurting the Future of Cybersecurity: Why “Entry-Level” Rarely Means Entry | A Conversation with John Salomon | Redefining CyberSecurity with Sean MartinSean Martin
Making Honeypots Useful Again: Identity Security, Deception, and the Art of Detection | A Conversation with Sean Metcalf | Redefining CyberSecurity with Sean MartinSean Martin
Black Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco CiappelliSean Martin
From Gatekeeper to Growth Partner: How Modern CISOs Build Trust, Drive Innovation, and Shape AI-Enabled Business Security | A Conversation with Legendary CISO, Andy Ellis | Redefining CyberSecurity with Sean MartinSean Martin
AI in Application Security: Why False Positives Still Overwhelm Teams Despite the Hype | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 1 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
The Problem With Threat Modeling in Application Security: Too Slow, Too Theoretical, Not Agile | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 2 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
Why Cybersecurity Training Isn’t Working — And What To Do Instead | Human-Centered Cybersecurity Series with Co-Host Julie Haney and Guest Dr. Aunshul Rege | Redefining CyberSecurity with Sean MartinSean Martin
SBOMs in Application Security: From Compliance Trophy to Real Risk Reduction | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 3 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
The Hidden Cost of Too Many Cybersecurity Tools (Most CISOs Get This Wrong) | A Conversation with Pieter VanIperen | Redefining CyberSecurity with Sean MartinSean Martin
When the Coders Don’t Code: What Happens When AI Coding Tools Go Dark? | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
The Once and Future Rules of Cybersecurity | A Black Hat SecTor 2025 Conversation with HD Moore | On Location Coverage with Sean Martin and Marco CiappelliSean Martin
First CISO Charged by SEC: Tim Brown on Trust, Context, and Leading Through Crisis - Interview with Tim Brown | AISA CyberCon Melbourne 2025 Coverage | On Location with Sean Martin and Marco CiappelliSean Martin
Beyond the Title: What It Really Takes to Be a CISO Today — Insights Following A Conversation with Solarwinds CISO, Tim Brown | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
The Silent Risk in AI-Powered Business Automation: Why No-Code Needs Serious Oversight | A Conversation with Walter Haydock | Redefining CyberSecurity with Sean MartinSean Martin
CI/CD Pipeline Security: Why Attackers Breach Your Software Pipeline and Own Your Build Before Production | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 4 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
How to Stay Resilient When Cybercrime Becomes Your Competition | A Conversation with Author and Former FBI Agent, Eric O'Niell | Redefining CyberSecurity with Sean MartinSean Martin
Bridging the Cybersecurity Divide Between the Haves and Have-Nots: Lessons from Australia’s CISO Community | A Conversation with Andrew Morgan | Redefining CyberSecurity with Sean MartinSean Martin
Building a Real Security Culture: Why Most AppSec Champion Programs Fall Short | AppSec Contradictions: 7 Truths We Keep Ignoring — Episode 5 | A Musing On the Future of Cybersecurity with Sean Martin and TAPE9 | Read by TAPE9Sean Martin
Beg Bounty: The New Wave of Unrequested Bug Claims and What They Mean | A Conversation with Casey Ellis | Redefining CyberSecurity with Sean MartinSean Martin
Inside the Economics That Shape Modern Cybersecurity Innovations: How the Cybersecurity Startup Engine Really Works | A Conversation with Investor and Author, Ross Haleliuk | Redefining CyberSecurity with Sean MartinSean Martin
A Practical Look at Incident Handling: How a Sunday Night Bug Bounty Email Triggered a Full Investigation | A Screenly Brand Spotlight Conversation with Co-founder of Screenly, Viktor PeterssonSean Martin
Book: Spy's Mate | A Conversation with Bradley W. Buchanan About Chess, Cold War Espionage, and His Journey Into Writing This Story | Audio Signals Podcast With Marco CiappelliSean Martin
AI, Quantum, and the Changing Role of Cybersecurity | ISC2 Security Congress 2025 Coverage with Jon France, Chief Information Security Officer at ISC2 | On Location with Sean Martin and Marco CiappelliSean Martin
5G: Impact Of Speed & Scale On Security & Privacy | Redefining CyberSecurity With Patrick English (British Telecom), Jason Hoffman (Deutsche Telekom), Chris Novak (Verizon)Sean Martin
The Value Of Investing In CyberSecurity — A Story About Stories In Film And Television Production | Redefining CyberSecurity With Ramy Katrib And Nancy JundiSean Martin
From Reactive To Proactive — The Evolution Of Security And Of The CISO Role | Redefining CyberSecurity With Matthew RosenquistSean Martin
Zero To Trust In 60 Seconds | The Race To Overcoming Our Cybersecurity Challenges | Redefining CyberSecurity With Siân John, Zulfikar Ramzan, Chris Roberts, And Francesco CipolloneSean Martin
Simplifying Information Security And Making It A Business Driver | Redefining CyberSecurity With Joshua ScottSean Martin
No Hollywood Ending Here: Prepare For A Doomsday Cybersecurity Conversation | Redefining CyberSecurity With Marcus J. RanumSean Martin
PCI-DSS Version 4 Is In The Works—What Impact Might It Have On Security Operations And The Business' Bottom Line | Redefining CyberSecurity One-On-One With Mitch ParkerSean Martin
The Relationship Between Roles: Legal Counsel And Information Security | Redefining CyberSecurity With Cody Wamsley And Diego FernándezSean Martin
Information Security Automation: Can You Automate Security Culture? | Redefining CyberSecurity With Tomasz BaniaSean Martin
Patents Versus Progress: The State Of Technology And Innovation Protection | Redefining CyberSecurity With Joanna Chen And Puya PartowSean Martin
Taking The Insanity Out Of Incident Response | Take Control Of Your Security Operations Center | Redefining CyberSecurity With Melissa Duncan And Kristy WestphalSean Martin
The Relationship Between Roles: Human Resources And Information Security | HR Is The Organization's Communications Super Glue | Redefining CyberSecurity Culture With Dora Ross, Global Security Culture SpecialistSean Martin
The Connection Between Product Quality Assurance And Application Security In Business | Redefining CyberSecurity With Tom Morrissey And Cassio GoldschmidtSean Martin
The Relationship Between Roles — PR/Media Relations And Information Security | Redefining CyberSecurity With Melanie Ensign And Ed AmorosoSean Martin
It's #TableTopTuesday On Twitter | What Serious Silliness Did We Spot While Redefining CyberSecurity With Meg Hargrove?Sean Martin
Don’t Be Afraid Of A Crisis And Don’t Let The Crisis Define You | Redefining CyberSecurity With Parham EftekhariSean Martin
The State Of Worldwide Cybersecurity From The People Who Run It | Redefining CyberSecurity With Dr. Reem Faraj AlShammariSean Martin
Supply Chain Resilience In A Time Of Techtonic Geopolitical Shifts | Redefining CyberSecurity With Andrea Little LimbagoSean Martin
Automated Feeds Are Killing The CTI Community; I Only Want Human Created Threat Intel!!! | Redefining CyberSecurity With CyberSquarePeg And Andy PiazzaSean Martin
Practical Cybersecurity Architecture: A Guide To Creating And Implementing Robust Designs For Cybersecurity Architects | Redefining CyberSecurity With Diana Kelley And Ed MoyleSean Martin
Ethical Issues In Cybersecurity Research And Practice | Redefining CyberSecurity With Kevin Macnish And Jeroen Van Der HamSean Martin
The Role Of General Counsel For Incident Response Planning And Handling | Redefining CyberSecurity With Cody Wamsley And James YarnallSean Martin
CyberSecurity Futures | Aston Martin's Road To Zero Threats | Redefining CyberSecurity At InfoSec London With Robin SmithSean Martin
What Does It Take To Be A CISO? | A Living Social Thread From A Deputy CISO Fresh On The Job At A Billion-Dollar Crypto Company | Redefining CyberSecurity With J.M. PorupSean Martin
Be Fascinated: What It Takes To Find Fulfillment And To Be A Good Leader | Redefining CyberSecurity With Scott OlsonSean Martin
Should We Stop Requiring CISOs To Have A CISSP? Let’s Talk About It | Redefining CyberSecurity With Brian BoboSean Martin
The Relationship Between Roles — When Product Management Meets Information Security | Redefining CyberSecurity With Christie ChaffeeSean Martin
The Psychology Of Cybersecurity And The Value Of Thinking Outside The Box | Redefining CyberSecurity With Morgan WrightSean Martin
The Real Story About LOG4J - No FUD - No Clickbait - No BS | A Special ITSPmagazine Redefining CyberSecurity Webcast Panel With Alyssa Miller, Katie Nickels, Eric Thomas, And Mark NunnikhovenSean Martin
How And When To Put Standards To Work — And Not | Redefining CyberSecurity With Alyssa Miller And Accidental CISOSean Martin
St. Joseph's Health | Cybersecurity & Vendor Risk Management: Why It Matters | Redefining CyberSecurity With Ebony Riley And Jesse FasoloSean Martin
Book | Can. Trust. Will. Hiring For The Human Element In The New Age Of Cybersecurity | Redefining Security With Leeza Garber And Scott OlsonSean Martin
The Playbook To Defend Against Aggressive Cyber Ops: Preparing For A Cyber Crisis As The Crisis Strikes | Redefining CyberSecurity With Mick DouglasSean Martin
How To Create Effective Security Cultures | Redefining CyberSecurity With Dutch Schwartz And Rock LambrosSean Martin
Book | Security Yearbook: A Complete History And Directory Of The Entire Cybersecurity Industry | Redefining CyberSecurity With Richard StiennonSean Martin
Creating A Data Security Strategy And Operationalizing A Mature Data Security Program | A Live Stream Panel With Chris Daskalos And Andy Rappaport | Redefining CyberSecurity With Sean MartinSean Martin
Business Continuity: Building And Operationalizing A Functional Disaster Recovery Plan | A Live Stream Panel With Dr Rebecca Wynn And Gayle Anders | Redefining CyberSecurity With Sean MartinSean Martin
Book | Critical Infrastructure Risk Assessment: The Definitive Threat Identification And Threat Reduction Handbook | Redefining CyberSecurity With Ernie HaydenSean Martin
Large-Scale Data Analytics For Cybersecurity And Solving Real-World Grand Challenges | Redefining CyberSecurity With Professor David BaderSean Martin
Balancing Reward Over Risk | Evolving CyberSecurity Through Systems Engineering And Committee Collaboration | Redefining CyberSecurity With Howard Miller And Ron RossSean Martin
Higher Education And Regulated Research Community Of Practice (RRCoP) | 5 Goals To Raise The Security And Compliance Posture Of Academic Institutions | Redefining CyberSecurity With Carolyn Ellis, Erik Deumens, And Michael ParisiSean Martin
Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean MartinSean Martin
What To Expect At RSA Conference USA 2022 | ITSPmagazine Event Coverage: RSAC 2022 San Francisco, USA | A Conversation With Linda Gray Martin, Britta Glade, And Cecilia Murtagh MarinierSean Martin
Catch 22 | Consumers Hate Sharing Their Data, But There's No Other Option | An Imperva Brand Story About The Findings In The Imperva Global Consumer Survey With Terry RaySean Martin
Autonomous Datacenters On Rails | A Conversation With Amir Levintal About The Complexities, Risk Exposure, Safety Standards, And Protection Measures For Railway Systems | Redefining CyberSecurity With Sean MartinSean Martin