<?xml version="1.0" encoding="UTF-8"?><?xml-stylesheet href="https://feeds.captivate.fm/style.xsl" type="text/xsl"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:podcast="https://podcastindex.org/namespace/1.0"><channel><atom:link href="https://feeds.captivate.fm/10-questions-to-cyber-resilience/" rel="self" type="application/rss+xml"/><title><![CDATA[10 Questions to Cyber Resilience]]></title><podcast:guid>b4310854-fb7e-50a2-930d-42cb2d698a5d</podcast:guid><lastBuildDate>Fri, 14 Feb 2025 16:38:14 +0000</lastBuildDate><generator>Captivate.fm</generator><language><![CDATA[en]]></language><copyright><![CDATA[Copyright 2025 Assurance IT]]></copyright><managingEditor>Assurance IT</managingEditor><itunes:summary><![CDATA[Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!]]></itunes:summary><image><url>https://artwork.captivate.fm/57299232-daa2-4343-9c17-aa8a9a7ec6b2/4Cyx9c4ubgebhmaRgoaPV0Iz.png</url><title>10 Questions to Cyber Resilience</title><link><![CDATA[https://assuranceit.co]]></link></image><itunes:image href="https://artwork.captivate.fm/57299232-daa2-4343-9c17-aa8a9a7ec6b2/4Cyx9c4ubgebhmaRgoaPV0Iz.png"/><itunes:owner><itunes:name>Assurance IT</itunes:name></itunes:owner><itunes:author>Assurance IT</itunes:author><description>Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let&apos;s work toward it together!</description><link>https://assuranceit.co</link><atom:link href="https://pubsubhubbub.appspot.com" rel="hub"/><itunes:explicit>false</itunes:explicit><itunes:type>episodic</itunes:type><itunes:category text="Technology"></itunes:category><itunes:category text="Business"></itunes:category><podcast:locked>no</podcast:locked><podcast:medium>podcast</podcast:medium><item><title>Operational resilience vs. Cyber resilience: Cybersecurity challenges for SMBs &amp; Growing talent gap</title><itunes:title>Operational resilience vs. Cyber resilience: Cybersecurity challenges for SMBs &amp; Growing talent gap</itunes:title><description><![CDATA[<p>In this episode, we sit down with François Guay, Founder of the Canadian Cybersecurity Network and a leader in cybersecurity talent search, to talk about the future of cybersecurity in Canada. But this conversation goes beyond just cyber threats. François dives deep into operational resilience—how businesses can not only defend against cyber risks but also ensure their entire operations stay strong in the face of disruption.</p><p>We cover:</p><p>✅ The biggest cybersecurity challenges for Canadian SMBs</p><p>✅ Key trends shaping the cybersecurity landscape</p><p>✅ The growing talent gap and how to bridge it</p><p>✅ Why operational resilience is just as critical as cyber resilience</p><p>✅ How businesses can future-proof themselves against cyber and operational threats</p><p>✅ Predictions for 2025—what’s next for cybersecurity in Canada and beyond</p><p>If you’re a business leader, cybersecurity professional, or looking to break into the field, this episode is packed with insights you won’t want to miss!</p><p><br></p><p>Resources:</p><p>François Guay's LinkedIn:  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjRkRWx0cjdkUEhKcXR1TmVkT3Bsd3JXYnVPd3xBQ3Jtc0tuajljSkJDSW9MMGVyRzJ3X1o0TWd4SlNFYnRyV0FScFRRQlR4V0pGYkVtVWNjRDRHbjdBTjcwTk5NN2RmRHZ4dVEtdm9jdXRpM29tWF9ObTZEcU05RW96VFczSV9Ndi1tVktpdWVzbHlvMWk5TmQxNA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ffrancoisguay%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjRkRWx0cjdkUEhKcXR1TmVkT3Bsd3JXYnVPd3xBQ3Jtc0tuajljSkJDSW9MMGVyRzJ3X1o0TWd4SlNFYnRyV0FScFRRQlR4V0pGYkVtVWNjRDRHbjdBTjcwTk5NN2RmRHZ4dVEtdm9jdXRpM29tWF9ObTZEcU05RW96VFczSV9Ndi1tVktpdWVzbHlvMWk5TmQxNA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ffrancoisguay%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;francoisguay&nbsp;&nbsp;</a></p><p>CCN Linkedin: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjZqcGdpN3Y2dGMyNTVBeHVaTmUzUXZuSlNVUXxBQ3Jtc0trOGplcEhzTS1maEh0SjBheWMtdndsZEhQYlN0Tm9hUGFSTjgwRlZFSnZUaTFQUnM1UlhSNHVLazJieGlBdjdxbk03dTZBNm1rSHNqaUNKSm5qUDNkNWRWVURtcnl1WkttcnMzVEJkNzNLNzN5bW83NA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fcanadiancybersecuritynetwork%2Fposts%2F%3FfeedView%3Dall&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cana...</a></p><p>Luigi Tiano’s LinkedIn: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXlRRktJVk5yb0EzM3hBdVZKX3ktdEZuRjlIZ3xBQ3Jtc0tscFg1cENkb3o2NDVUbFVxczMzc0hCNWhJVVVESDZsclVfa0FTZ3A2RW1yWVpOTUtTTkg0ZlV5cEtvRzRiUWYzeGxZaTF1QVN2U05nXy1ndjhKWHFjNFg4cGE5Y1puZG5JanphYWowREhfRlR3aUpCZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXlRRktJVk5yb0EzM3hBdVZKX3ktdEZuRjlIZ3xBQ3Jtc0tscFg1cENkb3o2NDVUbFVxczMzc0hCNWhJVVVESDZsclVfa0FTZ3A2RW1yWVpOTUtTTkg0ZlV5cEtvRzRiUWYzeGxZaTF1QVN2U05nXy1ndjhKWHFjNFg4cGE5Y1puZG5JanphYWowREhfRlR3aUpCZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;luigitiano&nbsp;&nbsp;</a> </p><p>Assurance IT Website: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWxhV25SbTRwNzJrNzhaOGJ0Xzc4YWQ5N2Fqd3xBQ3Jtc0tscC1yUGRRMjlYbmp1ZjEtQ3ByTTM5d0RuWkdDZko0YUxHSlJhMWN2RkQxVlBVajBfQlA4VHR6TW00VEt2TnRDTTE3cjhaLW9KdHFhZ0RyT2lsdXpBV1FuUWpPVEk1di12Q211MWFtOHduT1JqWnk4SQ&amp;q=http%3A%2F%2Fwww.assuranceit.co%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">http://www.assuranceit.co/</a></p><p> </p><p>About the guest: </p><p>François Guay is the founder of Canada’s largest cybersecurity network, the Canadian Cybersecurity Network (CCN), which...]]></description><content:encoded><![CDATA[<p>In this episode, we sit down with François Guay, Founder of the Canadian Cybersecurity Network and a leader in cybersecurity talent search, to talk about the future of cybersecurity in Canada. But this conversation goes beyond just cyber threats. François dives deep into operational resilience—how businesses can not only defend against cyber risks but also ensure their entire operations stay strong in the face of disruption.</p><p>We cover:</p><p>✅ The biggest cybersecurity challenges for Canadian SMBs</p><p>✅ Key trends shaping the cybersecurity landscape</p><p>✅ The growing talent gap and how to bridge it</p><p>✅ Why operational resilience is just as critical as cyber resilience</p><p>✅ How businesses can future-proof themselves against cyber and operational threats</p><p>✅ Predictions for 2025—what’s next for cybersecurity in Canada and beyond</p><p>If you’re a business leader, cybersecurity professional, or looking to break into the field, this episode is packed with insights you won’t want to miss!</p><p><br></p><p>Resources:</p><p>François Guay's LinkedIn:  <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjRkRWx0cjdkUEhKcXR1TmVkT3Bsd3JXYnVPd3xBQ3Jtc0tuajljSkJDSW9MMGVyRzJ3X1o0TWd4SlNFYnRyV0FScFRRQlR4V0pGYkVtVWNjRDRHbjdBTjcwTk5NN2RmRHZ4dVEtdm9jdXRpM29tWF9ObTZEcU05RW96VFczSV9Ndi1tVktpdWVzbHlvMWk5TmQxNA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ffrancoisguay%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjRkRWx0cjdkUEhKcXR1TmVkT3Bsd3JXYnVPd3xBQ3Jtc0tuajljSkJDSW9MMGVyRzJ3X1o0TWd4SlNFYnRyV0FScFRRQlR4V0pGYkVtVWNjRDRHbjdBTjcwTk5NN2RmRHZ4dVEtdm9jdXRpM29tWF9ObTZEcU05RW96VFczSV9Ndi1tVktpdWVzbHlvMWk5TmQxNA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Ffrancoisguay%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;francoisguay&nbsp;&nbsp;</a></p><p>CCN Linkedin: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbjZqcGdpN3Y2dGMyNTVBeHVaTmUzUXZuSlNVUXxBQ3Jtc0trOGplcEhzTS1maEh0SjBheWMtdndsZEhQYlN0Tm9hUGFSTjgwRlZFSnZUaTFQUnM1UlhSNHVLazJieGlBdjdxbk03dTZBNm1rSHNqaUNKSm5qUDNkNWRWVURtcnl1WkttcnMzVEJkNzNLNzN5bW83NA&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fcompany%2Fcanadiancybersecuritynetwork%2Fposts%2F%3FfeedView%3Dall&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/company/cana...</a></p><p>Luigi Tiano’s LinkedIn: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXlRRktJVk5yb0EzM3hBdVZKX3ktdEZuRjlIZ3xBQ3Jtc0tscFg1cENkb3o2NDVUbFVxczMzc0hCNWhJVVVESDZsclVfa0FTZ3A2RW1yWVpOTUtTTkg0ZlV5cEtvRzRiUWYzeGxZaTF1QVN2U05nXy1ndjhKWHFjNFg4cGE5Y1puZG5JanphYWowREhfRlR3aUpCZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbXlRRktJVk5yb0EzM3hBdVZKX3ktdEZuRjlIZ3xBQ3Jtc0tscFg1cENkb3o2NDVUbFVxczMzc0hCNWhJVVVESDZsclVfa0FTZ3A2RW1yWVpOTUtTTkg0ZlV5cEtvRzRiUWYzeGxZaTF1QVN2U05nXy1ndjhKWHFjNFg4cGE5Y1puZG5JanphYWowREhfRlR3aUpCZw&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;luigitiano&nbsp;&nbsp;</a> </p><p>Assurance IT Website: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbWxhV25SbTRwNzJrNzhaOGJ0Xzc4YWQ5N2Fqd3xBQ3Jtc0tscC1yUGRRMjlYbmp1ZjEtQ3ByTTM5d0RuWkdDZko0YUxHSlJhMWN2RkQxVlBVajBfQlA4VHR6TW00VEt2TnRDTTE3cjhaLW9KdHFhZ0RyT2lsdXpBV1FuUWpPVEk1di12Q211MWFtOHduT1JqWnk4SQ&amp;q=http%3A%2F%2Fwww.assuranceit.co%2F&amp;v=iwUmAySQoEs" rel="noopener noreferrer" target="_blank">http://www.assuranceit.co/</a></p><p> </p><p>About the guest: </p><p>François Guay is the founder of Canada’s largest cybersecurity network, the Canadian Cybersecurity Network (CCN), which connects over 44,000 members across various sectors. He also founded Canadian Cybersecurity Jobs, Canada’s dedicated cybersecurity job portal, and launched CyberVoices, a platform driving discussions on key cybersecurity trends in Canada.</p><p><br></p><p>François has authored pivotal reports like the State of Cybersecurity in Canada and CyberTowns, shaping how organizations approach cybersecurity. An expert recruiter and consultant, he regularly speaks at conferences and summits, offering strategic insights to global corporations.</p><p><br></p><p>Passionate about mentorship, François is committed to developing the next generation of cybersecurity professionals. Outside of work, he enjoys solo adventures exploring Canada’s natural landscapes.</p><p><br></p><p>About 10 Questions to Cyber Resilience: </p><p><br></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. </p><p> </p><p>About Assurance IT: </p><p><br></p><p>Assurance IT (www.assuranceit.co) specializes in data protection and data privacy for the mid-market since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p><p><br></p><p>👉 Don’t forget to like, comment, and subscribe for more expert insights!</p><p><br></p><p><a href="https://www.youtube.com/hashtag/cybersecurity" rel="noopener noreferrer" target="_blank">#Cybersecurity</a> <a href="https://www.youtube.com/hashtag/operationalresilience" rel="noopener noreferrer" target="_blank">#OperationalResilience</a> <a href="https://www.youtube.com/hashtag/cyberresilience" rel="noopener noreferrer" target="_blank">#CyberResilience</a> <a href="https://www.youtube.com/hashtag/businesscontinuity" rel="noopener noreferrer" target="_blank">#BusinessContinuity</a> <a href="https://www.youtube.com/hashtag/cyberthreats" rel="noopener noreferrer" target="_blank">#CyberThreats</a> <a href="https://www.youtube.com/hashtag/canadiancybersecurity" rel="noopener noreferrer" target="_blank">#CanadianCybersecurity</a> <a href="https://www.youtube.com/hashtag/cyberjobs" rel="noopener noreferrer" target="_blank">#CyberJobs</a></p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/operational-resilience-vs-cyber-resilience-cybersecurity-challenges-for-smbs-growing-talent-gap]]></link><guid isPermaLink="false">1058ba44-67f2-47c8-bc9a-e7f87efccbda</guid><itunes:image href="https://artwork.captivate.fm/9093b2ab-6551-4cb5-95b4-1ea587ef9b1c/lZdh6gjIEIvRCORwL8fGrZqP.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 14 Feb 2025 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/e7217d79-6cc5-4d19-8541-01c9c69af0be/FRANCOIS-PODCAST.mp3" length="33648313" type="audio/mpeg"/><itunes:duration>35:03</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>11</itunes:episode><itunes:season>2</itunes:season><podcast:episode>11</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>How to Outsmart Ransomware: AI, Digital Forensics &amp; Insider Secrets with Andria Delia</title><itunes:title>How to Outsmart Ransomware: AI, Digital Forensics &amp; Insider Secrets with Andria Delia</itunes:title><description><![CDATA[<p>In this episode, we’re joined by Andria Delia, a Cyber Threat Intelligence Expert and a nominee for the Cellebrite Digital Justice Rising Star Award at the C2 Summit. Andria dives into her extensive experience in cybersecurity, sharing valuable insights on the psychology of cyber attackers and how she handles ransomware without paying ransoms. She discusses the real-world application of threat intelligence, the role of law enforcement, and the often-overlooked behaviors of threat hunters.</p><p>Andria takes us through the evolution of ransomware attacks, the key steps in responding to a breach, and how attackers adapt in the ever-changing landscape of digital threats. We also explore the role of AI in both facilitating and combating cyber threats, and Andria shares her thoughts on how predictive analytics and behavior analysis can help thwart attacks before they even happen.</p><p>She gives an eye-opening perspective on digital forensics, particularly in relation to mobile devices, and highlights the lingering threats in the mobile world. To wrap up, Andria offers practical advice for the general public on staying safe in the digital world.</p><p>If you’re interested in learning how threat intelligence works, the psychology behind attacks, or what you can do to protect yourself online, this episode is a must-watch!</p><p><strong>Resources:</strong></p><p>Andria Delia's LinkedIn:&nbsp;https://www.linkedin.com/in/andriadelia/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.co/</p><p>&nbsp;</p><p><strong>About the guest:&nbsp;</strong></p><p>Andria Delia is a leading expert in cyber threat intelligence, specializing in ransomware mitigation, incident response, penetration testing, and forensics. She is a Certified Cyber Threat Intelligence Expert and has led high-profile engagements, developed response plans, and contributed to digital forensics. With a background in public interest law, Andria has successfully led cases that have shaped case law. Notably, she is one of the few women globally to have mitigated ransomware attacks on major organizations. Additionally, she has expertise in Bitcoin, Blockchain, AI, and machine learning, with research focused on AI’s impact on financial markets. A sought-after speaker and mentor, Andria is dedicated to advancing the field of cybersecurity.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (www.assuranceit.co) specializes in data protection and data privacy for the mid-market since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>In this episode, we’re joined by Andria Delia, a Cyber Threat Intelligence Expert and a nominee for the Cellebrite Digital Justice Rising Star Award at the C2 Summit. Andria dives into her extensive experience in cybersecurity, sharing valuable insights on the psychology of cyber attackers and how she handles ransomware without paying ransoms. She discusses the real-world application of threat intelligence, the role of law enforcement, and the often-overlooked behaviors of threat hunters.</p><p>Andria takes us through the evolution of ransomware attacks, the key steps in responding to a breach, and how attackers adapt in the ever-changing landscape of digital threats. We also explore the role of AI in both facilitating and combating cyber threats, and Andria shares her thoughts on how predictive analytics and behavior analysis can help thwart attacks before they even happen.</p><p>She gives an eye-opening perspective on digital forensics, particularly in relation to mobile devices, and highlights the lingering threats in the mobile world. To wrap up, Andria offers practical advice for the general public on staying safe in the digital world.</p><p>If you’re interested in learning how threat intelligence works, the psychology behind attacks, or what you can do to protect yourself online, this episode is a must-watch!</p><p><strong>Resources:</strong></p><p>Andria Delia's LinkedIn:&nbsp;https://www.linkedin.com/in/andriadelia/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.co/</p><p>&nbsp;</p><p><strong>About the guest:&nbsp;</strong></p><p>Andria Delia is a leading expert in cyber threat intelligence, specializing in ransomware mitigation, incident response, penetration testing, and forensics. She is a Certified Cyber Threat Intelligence Expert and has led high-profile engagements, developed response plans, and contributed to digital forensics. With a background in public interest law, Andria has successfully led cases that have shaped case law. Notably, she is one of the few women globally to have mitigated ransomware attacks on major organizations. Additionally, she has expertise in Bitcoin, Blockchain, AI, and machine learning, with research focused on AI’s impact on financial markets. A sought-after speaker and mentor, Andria is dedicated to advancing the field of cybersecurity.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (www.assuranceit.co) specializes in data protection and data privacy for the mid-market since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/ransomware-psychology-ai-threats-digital-forensics]]></link><guid isPermaLink="false">4b7c1514-c684-4677-b084-543909002e0a</guid><itunes:image href="https://artwork.captivate.fm/595e629e-9550-4329-a219-5e3ae119cdeb/bwkcZ-NX63YgJT4N_E_DzeNl.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Wed, 29 Jan 2025 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bc98c683-36d3-4530-8b43-39952d59a6d2/PROPER-PODCAST.mp3" length="31232089" type="audio/mpeg"/><itunes:duration>32:32</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>10</itunes:episode><itunes:season>2</itunes:season><podcast:episode>10</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>EXPERT DISCUSSION: Chris Catanzaro on Ransomware Defense with Halcyon&apos;s Micro-Agent Technology</title><itunes:title>EXPERT DISCUSSION: Chris Catanzaro on Ransomware Defense with Halcyon&apos;s Micro-Agent Technology</itunes:title><description><![CDATA[<p>Welcome to 10 Questions to Cyber Resilience, presented by Assurance IT. In this bi-monthly series, we dive into the strategies and practices IT leaders use to enhance their cybersecurity. Each episode brings you closer to mastering cyber resilience through engaging interviews with industry experts.</p><p>In this episode, we sit down with Chris Catanzaro, Worldwide VP of Channels and MSSP at Halcyon, a leading player in ransomware protection. </p><p><br></p><p>Chris shares his insights on Halcyon's innovative approach to cybersecurity, including their unique micro-agent technology and its impact on preventing and recovering from ransomware attacks. </p><p><br></p><p>Discover how Halcyon stands out by working in tandem with your existing EDR solutions to enhance protection, and learn about the significant benefits for cyber insurance premiums when using Halcyon's solutions.</p><p><br></p><p>Episode Highlights:</p><p>- Introduction to Chris Catanzaro and Halcyon’s role in the cybersecurity landscape</p><p>- The function and advantages of Halcyon’s micro-agent technology</p><p>- How Halcyon supports customers before, during, and after a ransomware attack</p><p>- Insights into the relationship between ransomware protection and cyber insurance premiums</p><p><br></p><p>About Chris: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa19HYWhVY2RNSWdkam5JaDZYVE1vbUx0UG5RUXxBQ3Jtc0tsTXBmcDRkVVhnSXNGb3FCVnZkWllTV2hjSlZWelBRSUVVVldvUTFQMUFlcGZQbjR6RW9TLU4tTlZiTkpTTWdfRmx3WTFrTmpkVjAzWUhQN1JKeGlWQUhIRGF4Q0VhOEJYVmlHa1Y5NUxFM0RueWxIWQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fchris-c-68a3352%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa19HYWhVY2RNSWdkam5JaDZYVE1vbUx0UG5RUXxBQ3Jtc0tsTXBmcDRkVVhnSXNGb3FCVnZkWllTV2hjSlZWelBRSUVVVldvUTFQMUFlcGZQbjR6RW9TLU4tTlZiTkpTTWdfRmx3WTFrTmpkVjAzWUhQN1JKeGlWQUhIRGF4Q0VhOEJYVmlHa1Y5NUxFM0RueWxIWQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fchris-c-68a3352%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;chris-c-68a3352&nbsp;&nbsp;</a></p><p><br></p><p>With 25+ years in channel sales, Chris Catanzaro drives growth by expanding relationships with resellers, system integrators, and MSSPs. Chris excels in channel strategy, partner ecosystem development, and enablement programs, with notable achievements including the CRN 5-Star Channel Program Award. Fluent in Spanish, he effectively engages with a diverse global partner network.</p><p><br></p><p>About Luigi: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2RzOGM3cFd3bm15R1Y4Z3lTYndfeTNwaE5fZ3xBQ3Jtc0ttUm1rLWllME9LUjFCdVZSczdNNzhXdm9MOVFzMC14R0ozTmRiUS12c3BISGVfSV8wT3dwcURPTklGeEF3SXM0bzdLRlRzZGhWMlhJNU11X09aRl96Nm5EZUI2T0lRTjFWUmR2QmkzdFkzLWtVYnNISQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2RzOGM3cFd3bm15R1Y4Z3lTYndfeTNwaE5fZ3xBQ3Jtc0ttUm1rLWllME9LUjFCdVZSczdNNzhXdm9MOVFzMC14R0ozTmRiUS12c3BISGVfSV8wT3dwcURPTklGeEF3SXM0bzdLRlRzZGhWMlhJNU11X09aRl96Nm5EZUI2T0lRTjFWUmR2QmkzdFkzLWtVYnNISQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;luigitiano&nbsp;&nbsp;</a></p><p><br></p><p>25 Years of IT Experience: Luigi boasts extensive experience in cyber security, working with Fortune 100 companies. Assurance IT's Edge: At Assurance IT, we manage 1PB+ of data in our certified data center, offering DRaaS and protecting 5000+ endpoints. Collaborative Approach: Luigi collaborates with CISOs to enhance cyber security and minimize risks.</p><p><br></p><p>About 10 Questions to Cyber Resilience: </p><p><br></p><p>Learn about how IT leaders are strengthening their cyber...]]></description><content:encoded><![CDATA[<p>Welcome to 10 Questions to Cyber Resilience, presented by Assurance IT. In this bi-monthly series, we dive into the strategies and practices IT leaders use to enhance their cybersecurity. Each episode brings you closer to mastering cyber resilience through engaging interviews with industry experts.</p><p>In this episode, we sit down with Chris Catanzaro, Worldwide VP of Channels and MSSP at Halcyon, a leading player in ransomware protection. </p><p><br></p><p>Chris shares his insights on Halcyon's innovative approach to cybersecurity, including their unique micro-agent technology and its impact on preventing and recovering from ransomware attacks. </p><p><br></p><p>Discover how Halcyon stands out by working in tandem with your existing EDR solutions to enhance protection, and learn about the significant benefits for cyber insurance premiums when using Halcyon's solutions.</p><p><br></p><p>Episode Highlights:</p><p>- Introduction to Chris Catanzaro and Halcyon’s role in the cybersecurity landscape</p><p>- The function and advantages of Halcyon’s micro-agent technology</p><p>- How Halcyon supports customers before, during, and after a ransomware attack</p><p>- Insights into the relationship between ransomware protection and cyber insurance premiums</p><p><br></p><p>About Chris: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa19HYWhVY2RNSWdkam5JaDZYVE1vbUx0UG5RUXxBQ3Jtc0tsTXBmcDRkVVhnSXNGb3FCVnZkWllTV2hjSlZWelBRSUVVVldvUTFQMUFlcGZQbjR6RW9TLU4tTlZiTkpTTWdfRmx3WTFrTmpkVjAzWUhQN1JKeGlWQUhIRGF4Q0VhOEJYVmlHa1Y5NUxFM0RueWxIWQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fchris-c-68a3352%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa19HYWhVY2RNSWdkam5JaDZYVE1vbUx0UG5RUXxBQ3Jtc0tsTXBmcDRkVVhnSXNGb3FCVnZkWllTV2hjSlZWelBRSUVVVldvUTFQMUFlcGZQbjR6RW9TLU4tTlZiTkpTTWdfRmx3WTFrTmpkVjAzWUhQN1JKeGlWQUhIRGF4Q0VhOEJYVmlHa1Y5NUxFM0RueWxIWQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fchris-c-68a3352%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;chris-c-68a3352&nbsp;&nbsp;</a></p><p><br></p><p>With 25+ years in channel sales, Chris Catanzaro drives growth by expanding relationships with resellers, system integrators, and MSSPs. Chris excels in channel strategy, partner ecosystem development, and enablement programs, with notable achievements including the CRN 5-Star Channel Program Award. Fluent in Spanish, he effectively engages with a diverse global partner network.</p><p><br></p><p>About Luigi: <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2RzOGM3cFd3bm15R1Y4Z3lTYndfeTNwaE5fZ3xBQ3Jtc0ttUm1rLWllME9LUjFCdVZSczdNNzhXdm9MOVFzMC14R0ozTmRiUS12c3BISGVfSV8wT3dwcURPTklGeEF3SXM0bzdLRlRzZGhWMlhJNU11X09aRl96Nm5EZUI2T0lRTjFWUmR2QmkzdFkzLWtVYnNISQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;</a></p><p><a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqa2RzOGM3cFd3bm15R1Y4Z3lTYndfeTNwaE5fZ3xBQ3Jtc0ttUm1rLWllME9LUjFCdVZSczdNNzhXdm9MOVFzMC14R0ozTmRiUS12c3BISGVfSV8wT3dwcURPTklGeEF3SXM0bzdLRlRzZGhWMlhJNU11X09aRl96Nm5EZUI2T0lRTjFWUmR2QmkzdFkzLWtVYnNISQ&amp;q=https%3A%2F%2Fwww.linkedin.com%2Fin%2Fluigitiano%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">&nbsp;/&nbsp;luigitiano&nbsp;&nbsp;</a></p><p><br></p><p>25 Years of IT Experience: Luigi boasts extensive experience in cyber security, working with Fortune 100 companies. Assurance IT's Edge: At Assurance IT, we manage 1PB+ of data in our certified data center, offering DRaaS and protecting 5000+ endpoints. Collaborative Approach: Luigi collaborates with CISOs to enhance cyber security and minimize risks.</p><p><br></p><p>About 10 Questions to Cyber Resilience: </p><p><br></p><p>Learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. </p><p><br></p><p> </p><p>About Assurance IT: </p><p>Assurance IT (www.assuranceit.co) specializing in data protection and data privacy for the mid-market in North America, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p><p><br></p><p>Resources Mentioned:</p><p>- <a href="https://www.youtube.com/redirect?event=video_description&amp;redir_token=QUFFLUhqbDlFcFk3cGZmSmJBSi1oUk0tSC1saEhIX0RpZ3xBQ3Jtc0trRUYxenA0dWxLZEE3UVhWSlZfNmtXVEhtTDdBcWlvYUpmQjNDM1psQ1BRSXlkTEN3V0tLdHFfSEI5QXVWMk9sdE1xbC1mQ0lnQ2IxcUhQYU9KZEJvZXlKbGJIcGgwTFIzb094ckIwTVR2VW5od0xmQQ&amp;q=https%3A%2F%2Fwww.halcyon.ai%2F&amp;v=WEWnoqd59AI" rel="noopener noreferrer" target="_blank">https://www.halcyon.ai/</a></p><p><br></p><p>Don't miss out on future episodes—subscribe now to stay updated with the latest in cybersecurity resilience.</p><p><br></p><p>Subscribe to our channel to catch every episode and stay ahead in the world of cyber resilience!</p><p><br></p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/expert-discussion-chris-catanzaro-on-ransomware-defense-with-halcyons-micro-agent-technology]]></link><guid isPermaLink="false">7698822c-39f0-4564-9932-bf1c252d30fe</guid><itunes:image href="https://artwork.captivate.fm/58ad73b0-f797-46de-a2db-14edd9824d8f/kQGl7vteN-u9-oouHbkbO5wX.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Tue, 17 Sep 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/a0d2273b-5084-4a53-9ab5-56ee19be08b4/FINAL-HALCYON-PODCAST-CHRIS-LUIGI-converted.mp3" length="38785715" type="audio/mpeg"/><itunes:duration>26:56</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>9</itunes:episode><itunes:season>2</itunes:season><podcast:episode>9</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>Evolution of Cybersecurity Threats and Future Challenges</title><itunes:title>Evolution of Cybersecurity Threats and Future Challenges</itunes:title><description><![CDATA[<p>Join us on our 8th episode of season 2, as Julien and Troy from GoSecure explore the transformation of cybersecurity threats over the years, from traditional phishing attacks to the emergence of sophisticated ransomware campaigns. Gain insights into the role of artificial intelligence and IoT in enhancing security measures, while also introducing new challenges and vulnerabilities.</p><p>Looking ahead, our guests discuss the potential impact of deepfakes and quantum computing on cybersecurity, shedding light on the future challenges that organizations may face in safeguarding their digital assets.</p><p><br></p><p>Throughout the conversation, Julien and Troy emphasize the importance of continuous learning and staying proactive in the field of cybersecurity. They share valuable advice for aspiring professionals, highlighting the significance of community engagement and understanding the underlying technologies driving the industry forward.</p><p><br></p><p>Whether you're an IT leader, cybersecurity enthusiast, or simply curious about the evolving threats in the digital realm, this episode offers a wealth of knowledge and insights to help you navigate the complex world of cybersecurity.</p><p><br></p><p><strong>About Julien Turcot: </strong></p><p><br></p><p>Julien Turcot, a seasoned professional with over two decades of experience in the dynamic realm of information security, stands as a formidable figure in the industry. Armed with a wealth of expertise in large-scale information security, cyber resilience programs, and risk management, he has been a guiding force for organizations of all sizes in both public and private sectors. Recognized as a preeminent authority, Julien is not just a practitioner; he is a visionary who effortlessly translates intricate technological challenges into tangible, commercially viable solutions. His renowned speaking engagements at international cybersecurity conferences underscore his commitment to knowledge sharing. Driven by a relentless pursuit of results, Mr. Turcot has successfully implemented cutting-edge IT solutions across diverse industry verticals in Canada, significantly enhancing operational efficiency and reducing total cost of ownership for his clients. With a natural flair for leadership and a positive attitude, Julien thrives under pressure, firmly believing that every problem has a solution.</p><p><br></p><p>LinkedIn: https://www.linkedin.com/in/julienturcot/</p><p><br></p><p>Cybersecurity Executive at GoSecure - Help clients thrive through the darkness of Hackers tyranny</p><p><br></p><p><strong>About Troy Vennon:</strong></p><p><br></p><p>Troy Vennon, Certified | CISO , GoSecure Security Product Manager, Information Security Expert, Threat Intelligence Tradecraft and Mitre Att&amp;ck Evangelist. Former United States Marine. Real Estate Investor. Firearms Instructor. Wrestling Coach. Ohio State Football and Wrestling Fanatic.</p><p> </p><p>Troy Vennon’s career spans 25 years and focused entirely on Information Security roles across every security domain, beginning in 1998 with the United States Marine Corps as SNCOIC of the Marine Corps Network Operations &amp; Security Center’s (MCNOSC) Marine Computer Emergency Response Team (MarCERT), until he joined the private sector in 2006.</p><p> </p><p>As a Certified Chief Information Security Officer, Troy focuses on coaching CISO’s and security teams in their efforts in building security programs that can rapidly identify effective control coverage strategies for risk identification, risk treatment, and security investment.</p><p> </p><p>LinkedIn: https://www.linkedin.com/in/troyvennon/</p><p><br></p><p>GoSecure Website: https://www.gosecure.net/</p><p><br></p><p><strong>About Luigi:</strong></p><p><br></p><p>25 Years of IT Experience: Luigi boasts extensive experience in cyber security, working with Fortune 100 companies.</p><p><br></p><p>Assurance IT's Edge: At Assurance IT, we manage 1PB+ of data in our certified data...]]></description><content:encoded><![CDATA[<p>Join us on our 8th episode of season 2, as Julien and Troy from GoSecure explore the transformation of cybersecurity threats over the years, from traditional phishing attacks to the emergence of sophisticated ransomware campaigns. Gain insights into the role of artificial intelligence and IoT in enhancing security measures, while also introducing new challenges and vulnerabilities.</p><p>Looking ahead, our guests discuss the potential impact of deepfakes and quantum computing on cybersecurity, shedding light on the future challenges that organizations may face in safeguarding their digital assets.</p><p><br></p><p>Throughout the conversation, Julien and Troy emphasize the importance of continuous learning and staying proactive in the field of cybersecurity. They share valuable advice for aspiring professionals, highlighting the significance of community engagement and understanding the underlying technologies driving the industry forward.</p><p><br></p><p>Whether you're an IT leader, cybersecurity enthusiast, or simply curious about the evolving threats in the digital realm, this episode offers a wealth of knowledge and insights to help you navigate the complex world of cybersecurity.</p><p><br></p><p><strong>About Julien Turcot: </strong></p><p><br></p><p>Julien Turcot, a seasoned professional with over two decades of experience in the dynamic realm of information security, stands as a formidable figure in the industry. Armed with a wealth of expertise in large-scale information security, cyber resilience programs, and risk management, he has been a guiding force for organizations of all sizes in both public and private sectors. Recognized as a preeminent authority, Julien is not just a practitioner; he is a visionary who effortlessly translates intricate technological challenges into tangible, commercially viable solutions. His renowned speaking engagements at international cybersecurity conferences underscore his commitment to knowledge sharing. Driven by a relentless pursuit of results, Mr. Turcot has successfully implemented cutting-edge IT solutions across diverse industry verticals in Canada, significantly enhancing operational efficiency and reducing total cost of ownership for his clients. With a natural flair for leadership and a positive attitude, Julien thrives under pressure, firmly believing that every problem has a solution.</p><p><br></p><p>LinkedIn: https://www.linkedin.com/in/julienturcot/</p><p><br></p><p>Cybersecurity Executive at GoSecure - Help clients thrive through the darkness of Hackers tyranny</p><p><br></p><p><strong>About Troy Vennon:</strong></p><p><br></p><p>Troy Vennon, Certified | CISO , GoSecure Security Product Manager, Information Security Expert, Threat Intelligence Tradecraft and Mitre Att&amp;ck Evangelist. Former United States Marine. Real Estate Investor. Firearms Instructor. Wrestling Coach. Ohio State Football and Wrestling Fanatic.</p><p> </p><p>Troy Vennon’s career spans 25 years and focused entirely on Information Security roles across every security domain, beginning in 1998 with the United States Marine Corps as SNCOIC of the Marine Corps Network Operations &amp; Security Center’s (MCNOSC) Marine Computer Emergency Response Team (MarCERT), until he joined the private sector in 2006.</p><p> </p><p>As a Certified Chief Information Security Officer, Troy focuses on coaching CISO’s and security teams in their efforts in building security programs that can rapidly identify effective control coverage strategies for risk identification, risk treatment, and security investment.</p><p> </p><p>LinkedIn: https://www.linkedin.com/in/troyvennon/</p><p><br></p><p>GoSecure Website: https://www.gosecure.net/</p><p><br></p><p><strong>About Luigi:</strong></p><p><br></p><p>25 Years of IT Experience: Luigi boasts extensive experience in cyber security, working with Fortune 100 companies.</p><p><br></p><p>Assurance IT's Edge: At Assurance IT, we manage 1PB+ of data in our certified data center, offering DRaaS and protecting 5000+ endpoints.</p><p><br></p><p>Collaborative Approach: Luigi collaborates with CISOs to enhance cyber security and minimize risks.</p><p><br></p><p>Luigi's LinkedIn: https://www.linkedin.com/in/luigitiano/</p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/evolution-of-cybersecurity-threats-and-future-challenges]]></link><guid isPermaLink="false">4a413b53-e68c-4a9d-9834-4bee86b2dab3</guid><itunes:image href="https://artwork.captivate.fm/d27c1672-1406-4c4c-bcf3-b66954634790/pyyHfajHo93cEPfvpuDzldQA.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 23 Feb 2024 09:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/bca574be-41b7-4e45-8c70-98d1a3ce85b5/GOSECURE-PODCAST-converted.mp3" length="39807625" type="audio/mpeg"/><itunes:duration>27:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>8</itunes:episode><itunes:season>2</itunes:season><podcast:episode>8</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>AI&apos;s Watch: Defending the Enterprise with Paul Baker from Purilock</title><itunes:title>AI&apos;s Watch: Defending the Enterprise with Paul Baker from Purilock</itunes:title><description><![CDATA[<p>On the seventh episode of 10 Questions to Cyber Resilience, Assurance IT welcomes Director of Cybersecurity, Paul Baker, from Purilock, to explore the vital theme of safeguarding AI in the enterprise. With the escalating popularity of AI, especially tools like ChatGPT, join us as we uncover insights from expert Paul Baker on how enterprises are proactively securing themselves against potential risks posed by AI and ensuring a robust and safe integration of these technologies.</p><p>&nbsp;</p><p>In this episode, Paul Baker from Purilock and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Potential Risks of AI, Specifically ChatGPT</li><li>Ethical Considerations in Implementing AI</li><li>Measures to Ensure Responsible AI Use</li><li>Ensuring Accuracy and Validity of AI Responses</li><li>Overview of Purilock's Solution - Prompt Guard</li><li>Best Practices for Secure AI Utilization</li><li>The importance of education and awareness in AI usage</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Transcript:&nbsp;</p><p><a href="https://www.youtube.com/@AssuranceITca" rel="noopener noreferrer" target="_blank">Watch the episode</a>:&nbsp;</p><p><a href="https://www.linkedin.com/in/paul-baker-uk/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Paul Baker's LinkedIn:&nbsp;</a></p><p><a href="https://plurilock.com/" rel="noopener noreferrer" target="_blank">Purilock's website:&nbsp;</a></p><p><a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">Luigi Tiano’s LinkedIn:&nbsp;</a></p><p><a href="https://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">Assurance IT Website:&nbsp;</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Paul Baker:&nbsp;</strong></p><p>Customer-facing manager who collaborates with all levels of stakeholders, from developers and technical staff through to C-Suite executives. Builds solid relationships and quickly becomes the reliable "go-to" person internally and externally. Analytical thinker with a creative edge, who deftly identifies client needs, and assesses both financial and technical viability. Passionate about helping clients discover new possibilities, maximizing investment in technology, and driving revenue for their company. Translates customer requests into detailed requirements, then follows through to delivery and beyond. </p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Discover the strategies IT leaders employ to fortify their cybersecurity practices in every enlightening episode. Uncover the answers to 10 questions, each bringing you a step closer to achieving cyber resilience. Stay ahead in the ever-evolving landscape of cybersecurity by subscribing and staying up-to-date with the latest insights on hot topics in the field.</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>On the seventh episode of 10 Questions to Cyber Resilience, Assurance IT welcomes Director of Cybersecurity, Paul Baker, from Purilock, to explore the vital theme of safeguarding AI in the enterprise. With the escalating popularity of AI, especially tools like ChatGPT, join us as we uncover insights from expert Paul Baker on how enterprises are proactively securing themselves against potential risks posed by AI and ensuring a robust and safe integration of these technologies.</p><p>&nbsp;</p><p>In this episode, Paul Baker from Purilock and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Potential Risks of AI, Specifically ChatGPT</li><li>Ethical Considerations in Implementing AI</li><li>Measures to Ensure Responsible AI Use</li><li>Ensuring Accuracy and Validity of AI Responses</li><li>Overview of Purilock's Solution - Prompt Guard</li><li>Best Practices for Secure AI Utilization</li><li>The importance of education and awareness in AI usage</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Transcript:&nbsp;</p><p><a href="https://www.youtube.com/@AssuranceITca" rel="noopener noreferrer" target="_blank">Watch the episode</a>:&nbsp;</p><p><a href="https://www.linkedin.com/in/paul-baker-uk/?originalSubdomain=ca" rel="noopener noreferrer" target="_blank">Paul Baker's LinkedIn:&nbsp;</a></p><p><a href="https://plurilock.com/" rel="noopener noreferrer" target="_blank">Purilock's website:&nbsp;</a></p><p><a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">Luigi Tiano’s LinkedIn:&nbsp;</a></p><p><a href="https://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">Assurance IT Website:&nbsp;</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Paul Baker:&nbsp;</strong></p><p>Customer-facing manager who collaborates with all levels of stakeholders, from developers and technical staff through to C-Suite executives. Builds solid relationships and quickly becomes the reliable "go-to" person internally and externally. Analytical thinker with a creative edge, who deftly identifies client needs, and assesses both financial and technical viability. Passionate about helping clients discover new possibilities, maximizing investment in technology, and driving revenue for their company. Translates customer requests into detailed requirements, then follows through to delivery and beyond. </p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Discover the strategies IT leaders employ to fortify their cybersecurity practices in every enlightening episode. Uncover the answers to 10 questions, each bringing you a step closer to achieving cyber resilience. Stay ahead in the ever-evolving landscape of cybersecurity by subscribing and staying up-to-date with the latest insights on hot topics in the field.</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/ais-watch-defending-the-enterprise-with-paul-baker-from-purilock]]></link><guid isPermaLink="false">0341ce35-dadb-40ed-b87f-dcc907c90c27</guid><itunes:image href="https://artwork.captivate.fm/546af2b0-d2f6-4b6f-a867-f0b9162aff13/KFjB3cEYveaXmvYBVVkwA9Qo.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Thu, 18 Jan 2024 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/651a9dc2-6460-431e-9ebb-3249910468f2/audio1720207335-converted.mp3" length="17824876" type="audio/mpeg"/><itunes:duration>18:34</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>7</itunes:episode><itunes:season>2</itunes:season><podcast:episode>7</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/c0f2e3f7-db17-403f-8a3f-54538a2ef54d/index.html" type="text/html"/></item><item><title>Navigating Data Storage: On-Premises vs. Cloud, with Christopher Reily from ExaGrid</title><itunes:title>Navigating Data Storage: On-Premises vs. Cloud, with Christopher Reily from ExaGrid</itunes:title><description><![CDATA[<p>In this episode, Luigi Tiano interviews Christopher Reily from ExaGrid, focusing on topics related to on-premises storage versus the cloud. Christopher introduces himself as the Director of Solutions Engineering for the eastern half of the Americas at ExaGrid. </p><p>The conversation covers the challenges, benefits, and strategies around data storage, emphasizing the importance of local backup storage even as more businesses adopt a cloud-first model. They discuss the risks of relying solely on cloud-based storage for backup, touching on cost unpredictability and performance issues during data restoration. </p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/uvyskcvyllE</p><p>Chris' LinkedIn: https://www.linkedin.com/in/chrisreily/</p><p>ExaGrid's website:&nbsp;https://www.exagrid.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Christopher Reily:&nbsp;</strong></p><p>25+ year industry professional with a history of holding influential positions in the field of Information Technology. Prior roles include: Principal Consultant, VP Solutions Architecture, University Senior Lecturer, Chief Technology Officer and Managing Director. </p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>In this episode, Luigi Tiano interviews Christopher Reily from ExaGrid, focusing on topics related to on-premises storage versus the cloud. Christopher introduces himself as the Director of Solutions Engineering for the eastern half of the Americas at ExaGrid. </p><p>The conversation covers the challenges, benefits, and strategies around data storage, emphasizing the importance of local backup storage even as more businesses adopt a cloud-first model. They discuss the risks of relying solely on cloud-based storage for backup, touching on cost unpredictability and performance issues during data restoration. </p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/uvyskcvyllE</p><p>Chris' LinkedIn: https://www.linkedin.com/in/chrisreily/</p><p>ExaGrid's website:&nbsp;https://www.exagrid.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Christopher Reily:&nbsp;</strong></p><p>25+ year industry professional with a history of holding influential positions in the field of Information Technology. Prior roles include: Principal Consultant, VP Solutions Architecture, University Senior Lecturer, Chief Technology Officer and Managing Director. </p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/backup-storage]]></link><guid isPermaLink="false">99c18ef5-43e3-478c-ba3b-4e3e711a1f77</guid><itunes:image href="https://artwork.captivate.fm/70254341-7fba-4d9a-9c67-d8a318396c06/GBp4yDjAmrtTOUc7yYvVH4lA.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 15 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/eb30fd50-fdd2-486e-9742-2970611d5cff/Christopher-Reily-converted.mp3" length="39240236" type="audio/mpeg"/><itunes:duration>27:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>6</itunes:episode><itunes:season>2</itunes:season><podcast:episode>6</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/bfb54f0b-5acb-4721-af5e-b452499f7c02/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/bfb54f0b-5acb-4721-af5e-b452499f7c02/index.html" type="text/html"/></item><item><title>Mastering Manufacturing Cybersecurity: Bridging IT and OT for Operational Excellence, with Tom Molden from Tanium</title><itunes:title>Mastering Manufacturing Cybersecurity: Bridging IT and OT for Operational Excellence, with Tom Molden from Tanium</itunes:title><description><![CDATA[<p>In this podcast episode, Luigi Tiano interviews Tom Molden from Tanium to delve into the challenges of manufacturing cybersecurity. The conversation explores the convergence of IT and OT, emphasizing the critical need for collaboration between the two domains. Tom emphasizes three key points for manufacturers to enhance their cybersecurity:</p><ol><li><strong>Cultural Collaboration:</strong> Build a bridge between the IT and manufacturing engineering teams. Establish a collaborative culture that recognizes and utilizes the distinct skill sets present in each domain.</li><li><strong>Visibility:</strong> Gain comprehensive visibility into all technology assets, from lower-tier OT devices to more IT-like devices. Recognize the importance of modern technology tools to track, monitor, and assess the state of assets in real time.</li><li><strong>Hygiene Culture:</strong> Introduce a hygiene culture in manufacturing plants, focusing on practices like patching, maintaining cleanliness, and adhering to security best practices. This cultural shift toward cybersecurity resilience is essential for protecting manufacturing environments.</li></ol><br/><p>The conversation also touches on the historical perspective of manufacturing security, the challenges posed by legacy systems, and the evolving landscape of cybersecurity in an era of increased connectivity. </p><p>Throughout the discussion, Tom emphasizes the potential for operational efficiency gains through the convergence of IT and OT, and he briefly touches on the role of AI in manufacturing, highlighting its potential for preventative maintenance.</p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/t07G8fOwUZ8</p><p>Tom Molden’s LinkedIn:&nbsp;https://www.linkedin.com/in/tmolden/</p><p>Tanium website:&nbsp;https://www.tanium.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Tom Molden:&nbsp;</strong></p><p>"I am a versatile technology executive with an international background and a successful leadership track record in IT, Strategy, Finance, and Operations. I have a reputation as a change agent, and a unique combination of business and technology expertise.</p><p>I have led growth and transformation strategies, as well as multiple M&amp;A initiatives, in high-tech, semiconductor and automotive. I have built and led high performing teams in large global enterprises as well as in rapidly growing mid-sized companies.</p><p>I have an MBA in finance and MIS from the University of Texas, a BA in International Studies from the University of Washington and an Advanced Computer Security Certificate from Stanford University. I also speak French, German and English.</p><p>Specialties:</p><p>• Strategic Planning - FP&amp;A, M&amp;A deal side, JV’s, short and long-range plans</p><p>• IT Strategy and Governance - Portfolio &amp; PMO, budgets, post-merger integration, carve-outs, cybersecurity</p><p>• Business/Digital Transformation - Roadmap development, program structuring, organizational design</p><p>• Innovation - Data &amp; analytics, ERP, custom development"</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializing in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology...]]></description><content:encoded><![CDATA[<p>In this podcast episode, Luigi Tiano interviews Tom Molden from Tanium to delve into the challenges of manufacturing cybersecurity. The conversation explores the convergence of IT and OT, emphasizing the critical need for collaboration between the two domains. Tom emphasizes three key points for manufacturers to enhance their cybersecurity:</p><ol><li><strong>Cultural Collaboration:</strong> Build a bridge between the IT and manufacturing engineering teams. Establish a collaborative culture that recognizes and utilizes the distinct skill sets present in each domain.</li><li><strong>Visibility:</strong> Gain comprehensive visibility into all technology assets, from lower-tier OT devices to more IT-like devices. Recognize the importance of modern technology tools to track, monitor, and assess the state of assets in real time.</li><li><strong>Hygiene Culture:</strong> Introduce a hygiene culture in manufacturing plants, focusing on practices like patching, maintaining cleanliness, and adhering to security best practices. This cultural shift toward cybersecurity resilience is essential for protecting manufacturing environments.</li></ol><br/><p>The conversation also touches on the historical perspective of manufacturing security, the challenges posed by legacy systems, and the evolving landscape of cybersecurity in an era of increased connectivity. </p><p>Throughout the discussion, Tom emphasizes the potential for operational efficiency gains through the convergence of IT and OT, and he briefly touches on the role of AI in manufacturing, highlighting its potential for preventative maintenance.</p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/t07G8fOwUZ8</p><p>Tom Molden’s LinkedIn:&nbsp;https://www.linkedin.com/in/tmolden/</p><p>Tanium website:&nbsp;https://www.tanium.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Tom Molden:&nbsp;</strong></p><p>"I am a versatile technology executive with an international background and a successful leadership track record in IT, Strategy, Finance, and Operations. I have a reputation as a change agent, and a unique combination of business and technology expertise.</p><p>I have led growth and transformation strategies, as well as multiple M&amp;A initiatives, in high-tech, semiconductor and automotive. I have built and led high performing teams in large global enterprises as well as in rapidly growing mid-sized companies.</p><p>I have an MBA in finance and MIS from the University of Texas, a BA in International Studies from the University of Washington and an Advanced Computer Security Certificate from Stanford University. I also speak French, German and English.</p><p>Specialties:</p><p>• Strategic Planning - FP&amp;A, M&amp;A deal side, JV’s, short and long-range plans</p><p>• IT Strategy and Governance - Portfolio &amp; PMO, budgets, post-merger integration, carve-outs, cybersecurity</p><p>• Business/Digital Transformation - Roadmap development, program structuring, organizational design</p><p>• Innovation - Data &amp; analytics, ERP, custom development"</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializing in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/manufacting-cybersecurity-2]]></link><guid isPermaLink="false">1ca6572f-f9d8-4bef-8e84-cfc57ffd2a94</guid><itunes:image href="https://artwork.captivate.fm/54fa5914-493a-492d-86d2-cc1edc60f21c/4X8GTW_GQ-qc4vgfkKKQw_SJ.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 08 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ad39f71e-aacf-4b49-a924-f820249aad63/Tom-Molden-converted.mp3" length="33920660" type="audio/mpeg"/><itunes:duration>23:33</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>5</itunes:episode><itunes:season>2</itunes:season><podcast:episode>5</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/e05ae500-6481-4fb2-866c-f66a16e20a17/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/e05ae500-6481-4fb2-866c-f66a16e20a17/index.html" type="text/html"/></item><item><title>Unlocking the Secrets of Manufacturing Cybersecurity, with Tanium&apos;s Ashley McGlone</title><itunes:title>Unlocking the Secrets of Manufacturing Cybersecurity, with Tanium&apos;s Ashley McGlone</itunes:title><description><![CDATA[<p>Dive into the world of manufacturing cybersecurity with an insightful podcast episode featuring Ashley McGlone, a seasoned technology strategist from Tanium. Join your host, Luigi Tiano, as he engages in a riveting conversation with Ashley, unraveling the complexities of Industry 4.0, IoT, and the critical role of cybersecurity in the manufacturing landscape.</p><p>In this episode, Ashley shares his wealth of expertise, drawing on decades of experience in the tech industry, including roles at Microsoft, Toyota, and his current tenure at Tanium. The duo delves into the challenges posed by the convergence of IT and OT, exploring the unique cybersecurity concerns faced by manufacturing companies in an era of increased connectivity and automation.</p><p>Discover the significance of standards like ISA 62443 and the Purdue model in structuring cybersecurity practices for manufacturing environments. Luigi and Ashley explore the pressing need for visibility and control in OT environments, shedding light on the evolving trends and the potential risks associated with cloud integration.</p><p>As the conversation unfolds, Ashley provides valuable insights into the diverse mix of devices in manufacturing and how strategic platform partnerships can be the key to effective cybersecurity. The duo navigates the landscape of resources available for companies venturing into cybersecurity enhancements, with a special spotlight on the SANS Institute's industrial controls training.</p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/1u6Ot5s-sXI</p><p>Ashley's LinkedIn:&nbsp;https://www.linkedin.com/in/ashleymcglone/</p><p>Tanium's website:&nbsp;https://www.tanium.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Ashley McGlone:&nbsp;</strong></p><p>Ashley McGlone has spent his life in IT. Between recordings of Tanium Tech Talks he enjoys advocating for customers, getting in the weeds of tech, and savoring a particular retro variety of red licorice. In his role as Technology Strategist he researches and creates vertical-specific guidance for customers to maximize their Tanium experience. He also is a megaphone for customer feedback to the Tanium product teams. As a frequent conference speaker he's always looking for opportunities to share the "Wow Tanium" experience with new audiences. Message him just to say hi or to talk Tanium and tech.</p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Dive into the world of manufacturing cybersecurity with an insightful podcast episode featuring Ashley McGlone, a seasoned technology strategist from Tanium. Join your host, Luigi Tiano, as he engages in a riveting conversation with Ashley, unraveling the complexities of Industry 4.0, IoT, and the critical role of cybersecurity in the manufacturing landscape.</p><p>In this episode, Ashley shares his wealth of expertise, drawing on decades of experience in the tech industry, including roles at Microsoft, Toyota, and his current tenure at Tanium. The duo delves into the challenges posed by the convergence of IT and OT, exploring the unique cybersecurity concerns faced by manufacturing companies in an era of increased connectivity and automation.</p><p>Discover the significance of standards like ISA 62443 and the Purdue model in structuring cybersecurity practices for manufacturing environments. Luigi and Ashley explore the pressing need for visibility and control in OT environments, shedding light on the evolving trends and the potential risks associated with cloud integration.</p><p>As the conversation unfolds, Ashley provides valuable insights into the diverse mix of devices in manufacturing and how strategic platform partnerships can be the key to effective cybersecurity. The duo navigates the landscape of resources available for companies venturing into cybersecurity enhancements, with a special spotlight on the SANS Institute's industrial controls training.</p><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/1u6Ot5s-sXI</p><p>Ashley's LinkedIn:&nbsp;https://www.linkedin.com/in/ashleymcglone/</p><p>Tanium's website:&nbsp;https://www.tanium.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Ashley McGlone:&nbsp;</strong></p><p>Ashley McGlone has spent his life in IT. Between recordings of Tanium Tech Talks he enjoys advocating for customers, getting in the weeds of tech, and savoring a particular retro variety of red licorice. In his role as Technology Strategist he researches and creates vertical-specific guidance for customers to maximize their Tanium experience. He also is a megaphone for customer feedback to the Tanium product teams. As a frequent conference speaker he's always looking for opportunities to share the "Wow Tanium" experience with new audiences. Message him just to say hi or to talk Tanium and tech.</p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/manufacting-cybersecurity]]></link><guid isPermaLink="false">6ff8995b-6af6-4ec4-ae1c-61df80913fc6</guid><itunes:image href="https://artwork.captivate.fm/6444665a-5060-4883-a294-795bba781217/Q2rW017VR_vnWETIFgx98QAh.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 01 Dec 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/f1a11ddd-05d3-4a6a-a929-0b547dc6c09e/Ashley-McGlone-converted.mp3" length="39248386" type="audio/mpeg"/><itunes:duration>27:15</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>4</itunes:episode><itunes:season>2</itunes:season><podcast:episode>4</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/da2d4f66-bf11-441c-9895-343b6acfdfdd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/da2d4f66-bf11-441c-9895-343b6acfdfdd/index.html" type="text/html"/></item><item><title>An honest chat about Zero Trust Security, with Paul Baker</title><itunes:title>An honest chat about Zero Trust Security, with Paul Baker</itunes:title><description><![CDATA[<p>Zero trust is a hot topic, so we invited the Director of Cybersecurity from Plurilock, Paul Baker, to discuss the subject in detail. </p><p>&nbsp;</p><p>In this episode, Paul Baker from Plurilock and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>What is zero trust?&nbsp;</li><li>How do you never assume someone is a good actor?</li><li>How do you get an enterprise to prioritize zero trust?</li><li>Is it easy to calculate the cost to protect a network?</li><li>How do you get people to buy into cybersecurity?</li><li>What role does zero-trust play in identity&nbsp;access management?</li><li>What is continuous authentication? Compared to MFA?</li><li>Is continuous authentication safe?</li><li>How does a team measure the effectiveness of implementing zero-trust initiatives?</li><li>Has zero trust helped you get cyber insurance?</li><li>What are the long-term benefits of zero-trust?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/D5oL9B1-0qw</p><p>Paul Baker’s LinkedIn:&nbsp;https://www.linkedin.com/in/paul-baker-uk/</p><p>Plurilock website:&nbsp;https://plurilock.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p><strong>About Paul Baker:&nbsp;</strong></p><p>A customer-facing manager who collaborates with all levels of stakeholders, from developers and technical staff through to C-Suite executives. Builds solid relationships and quickly becomes the reliable "go-to" person internally and externally. Analytical thinker with a creative edge who deftly identifies client needs and assesses financial and technical viability. Passionate about helping clients discover new possibilities, maximizing investment in technology, and driving revenue for their company. Translates customer requests into detailed requirements, then follows through to delivery and beyond. </p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Learn about how IT leaders are strengthening their cyber security practices twice a month. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Zero trust is a hot topic, so we invited the Director of Cybersecurity from Plurilock, Paul Baker, to discuss the subject in detail. </p><p>&nbsp;</p><p>In this episode, Paul Baker from Plurilock and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>What is zero trust?&nbsp;</li><li>How do you never assume someone is a good actor?</li><li>How do you get an enterprise to prioritize zero trust?</li><li>Is it easy to calculate the cost to protect a network?</li><li>How do you get people to buy into cybersecurity?</li><li>What role does zero-trust play in identity&nbsp;access management?</li><li>What is continuous authentication? Compared to MFA?</li><li>Is continuous authentication safe?</li><li>How does a team measure the effectiveness of implementing zero-trust initiatives?</li><li>Has zero trust helped you get cyber insurance?</li><li>What are the long-term benefits of zero-trust?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/D5oL9B1-0qw</p><p>Paul Baker’s LinkedIn:&nbsp;https://www.linkedin.com/in/paul-baker-uk/</p><p>Plurilock website:&nbsp;https://plurilock.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p><strong>About Paul Baker:&nbsp;</strong></p><p>A customer-facing manager who collaborates with all levels of stakeholders, from developers and technical staff through to C-Suite executives. Builds solid relationships and quickly becomes the reliable "go-to" person internally and externally. Analytical thinker with a creative edge who deftly identifies client needs and assesses financial and technical viability. Passionate about helping clients discover new possibilities, maximizing investment in technology, and driving revenue for their company. Translates customer requests into detailed requirements, then follows through to delivery and beyond. </p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Learn about how IT leaders are strengthening their cyber security practices twice a month. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/what-is-zero-trust]]></link><guid isPermaLink="false">17b27d9f-4450-4c97-aa11-d59cbaea6df3</guid><itunes:image href="https://artwork.captivate.fm/9fd8421d-219e-405e-a8aa-bd71018957a0/-x6k_vEu66I1fOoAVIWf38oh.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 17 Nov 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/5c9e3c81-4e96-45be-acf9-976c357f6251/AIT-podcast-Paul-Baker-converted.mp3" length="23402090" type="audio/mpeg"/><itunes:duration>24:23</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>3</itunes:episode><itunes:season>2</itunes:season><podcast:episode>3</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/85cc17e8-f845-4178-9559-0f23f084fe65/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/85cc17e8-f845-4178-9559-0f23f084fe65/index.html" type="text/html"/></item><item><title>Breaking down the infamous Uber, Cisco and LastPass breaches, with David Lindstrom</title><itunes:title>Breaking down the infamous Uber, Cisco and LastPass breaches, with David Lindstrom</itunes:title><description><![CDATA[<p>Assurance IT&nbsp;invited Identify and Deception Specialist, David Lindstrom, from SentinelOne, to chat about how unsophisticated attacks breached high-profile companies like Uber, Cisco, and LastPass. </p><p>&nbsp;</p><p>In this episode, David Lindstrom and co-founder of Assurance IT, Luigi Tiano, answer the following questions:&nbsp;</p><ol><li>Do you need someone with high credentials to hack a system?</li><li>Is Active Directory good at protecting the enterprise?</li><li>Is it possible to understand the full scope of a data breach?</li><li>What is a honey pot?</li><li>Can you buy credentials on the dark web?</li><li>How do you prevent an employee from being a target of social phishing?</li><li>Is there a golden rule for creating a safe password?</li><li>How do you avoid being the softest target for dark web credentials?</li><li>What does it mean to secure your identity in an enterprise?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/9zs2MzInI50</p><p>David Lindstrom's LinkedIn:&nbsp;https://www.linkedin.com/in/davidlindstrom/</p><p>SentinelOne's website:&nbsp;https://www.sentinelone.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p><br></p><p>&nbsp;</p><p><strong>About David Lindstrom:&nbsp;</strong></p><p>Passionate cybersecurity sales professional focused on successful security and business outcomes. I’ve had the pleasure of working on behalf of enterprise and educational organizations across industries and have excelled in the role of start-up evangelist, team leader, and practice expert for established companies.</p><p><br></p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Assurance IT&nbsp;invited Identify and Deception Specialist, David Lindstrom, from SentinelOne, to chat about how unsophisticated attacks breached high-profile companies like Uber, Cisco, and LastPass. </p><p>&nbsp;</p><p>In this episode, David Lindstrom and co-founder of Assurance IT, Luigi Tiano, answer the following questions:&nbsp;</p><ol><li>Do you need someone with high credentials to hack a system?</li><li>Is Active Directory good at protecting the enterprise?</li><li>Is it possible to understand the full scope of a data breach?</li><li>What is a honey pot?</li><li>Can you buy credentials on the dark web?</li><li>How do you prevent an employee from being a target of social phishing?</li><li>Is there a golden rule for creating a safe password?</li><li>How do you avoid being the softest target for dark web credentials?</li><li>What does it mean to secure your identity in an enterprise?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;https://youtu.be/9zs2MzInI50</p><p>David Lindstrom's LinkedIn:&nbsp;https://www.linkedin.com/in/davidlindstrom/</p><p>SentinelOne's website:&nbsp;https://www.sentinelone.com/</p><p>Luigi Tiano’s LinkedIn:&nbsp;https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website:&nbsp;http://www.assuranceit.ca/</p><p>&nbsp;</p><p><br></p><p>&nbsp;</p><p><strong>About David Lindstrom:&nbsp;</strong></p><p>Passionate cybersecurity sales professional focused on successful security and business outcomes. I’ve had the pleasure of working on behalf of enterprise and educational organizations across industries and have excelled in the role of start-up evangelist, team leader, and practice expert for established companies.</p><p><br></p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/infamous-cybersecurity-breaches]]></link><guid isPermaLink="false">ccbf4458-7f1b-4050-99c2-925cc9173a59</guid><itunes:image href="https://artwork.captivate.fm/c86c8851-283a-4469-a557-0f2d53c6bf25/2qy9BzElGXj2xz9wfLgl1UnV.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Wed, 25 Oct 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c1309d9f-58b7-4c59-932f-969a879d0515/David-Lindstrom-converted.mp3" length="24312432" type="audio/mpeg"/><itunes:duration>25:20</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>2</itunes:episode><itunes:season>2</itunes:season><podcast:episode>2</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/61d348d2-554f-41ad-8aca-86815c547bcc/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/61d348d2-554f-41ad-8aca-86815c547bcc/index.html" type="text/html"/></item><item><title>How to Succeed in Ethical Hacking, with Laurent Deslauriers</title><itunes:title>How to Succeed in Ethical Hacking, with Laurent Deslauriers</itunes:title><description><![CDATA[<p>Assurance IT invited our favorite ethical hacker, Laurent Desaulniers. In this episode, Laurent Desaulniers, Security Cloud Manager, and co-founder of Assurance IT, Luigi Tiano, discuss: </p><p>1. What does ethical hacking really mean?</p><p>2. Should pentests be done multiple times per year?</p><p>3. Who was Mafia Boy? </p><p>4. How did he give ethical hacking a bad name?</p><p>5. What will the lack of IT talent result in?</p><p>6. The truth behind the ethical hacking community</p><p>7. What are some ways to get started in ethical hacking?</p><p>8. How do you identify great hacking talent?</p><p>9. The #1 question to ask ethical hackers in interviews.</p><p>10. How much money you can make as an ethical hacker.</p><p><strong>BONUS TOPICS</strong></p><p>What schools should really be teaching about tech?</p><p>Resources for learning cyber security.</p><p><br></p><p><br></p><p><strong class="ql-size-large">Resources</strong><span class="ql-size-large">: </span></p><p>Laurent Desaulniers’s LinkedIn: https://www.linkedin.com/in/laurentdesaulniers/</p><p>Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website: http://www.assuranceit.ca/</p><p><br></p><p>  </p><p><br></p><p><strong class="ql-size-large">About Laurent Desaulniers: </strong></p><p>Laurent Desaulniers combines a strong technical experience with creative thinking to achieve elegant solutions with a passion for security, especially forensic, web and penetration testing.</p><p><br></p><p>Laurent Desaulniers is knowledgeable in the following technologies : </p><p><br></p><p>- Operating systems: Linux (Ubuntu/Debian) , Windows (2008, 2003 Server, Windows 2000 Server), Cisco IOS</p><p>- Programming languages: PHP, Javascript, Python, Java (J2EE, EJB3, Servlet, Swing), JSP, Struts</p><p>- Framework: PCI-DSS, ISO-27001, ISO27034, ISO17799, ISO13335, ITIL, COBIT.</p><p>- Methodology: OSSTM, OWASP, OCTAVE</p><p>- Security: IDS systems, Honeypots, Penetration Testing</p><p><br></p><p>Specialties: Forensic, Web application intrusion, Vulnerability Analysis</p><p><br></p><p><br></p><p><strong class="ql-size-large">About 10 Questions to Cyber Resilience: </strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. </p><p><br></p><p><br></p><p><strong class="ql-size-large">About Assurance IT: </strong></p><p>Assurance IT (<a href="https://www.assuranceit.ca" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializing in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Assurance IT invited our favorite ethical hacker, Laurent Desaulniers. In this episode, Laurent Desaulniers, Security Cloud Manager, and co-founder of Assurance IT, Luigi Tiano, discuss: </p><p>1. What does ethical hacking really mean?</p><p>2. Should pentests be done multiple times per year?</p><p>3. Who was Mafia Boy? </p><p>4. How did he give ethical hacking a bad name?</p><p>5. What will the lack of IT talent result in?</p><p>6. The truth behind the ethical hacking community</p><p>7. What are some ways to get started in ethical hacking?</p><p>8. How do you identify great hacking talent?</p><p>9. The #1 question to ask ethical hackers in interviews.</p><p>10. How much money you can make as an ethical hacker.</p><p><strong>BONUS TOPICS</strong></p><p>What schools should really be teaching about tech?</p><p>Resources for learning cyber security.</p><p><br></p><p><br></p><p><strong class="ql-size-large">Resources</strong><span class="ql-size-large">: </span></p><p>Laurent Desaulniers’s LinkedIn: https://www.linkedin.com/in/laurentdesaulniers/</p><p>Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/</p><p>Assurance IT Website: http://www.assuranceit.ca/</p><p><br></p><p>  </p><p><br></p><p><strong class="ql-size-large">About Laurent Desaulniers: </strong></p><p>Laurent Desaulniers combines a strong technical experience with creative thinking to achieve elegant solutions with a passion for security, especially forensic, web and penetration testing.</p><p><br></p><p>Laurent Desaulniers is knowledgeable in the following technologies : </p><p><br></p><p>- Operating systems: Linux (Ubuntu/Debian) , Windows (2008, 2003 Server, Windows 2000 Server), Cisco IOS</p><p>- Programming languages: PHP, Javascript, Python, Java (J2EE, EJB3, Servlet, Swing), JSP, Struts</p><p>- Framework: PCI-DSS, ISO-27001, ISO27034, ISO17799, ISO13335, ITIL, COBIT.</p><p>- Methodology: OSSTM, OWASP, OCTAVE</p><p>- Security: IDS systems, Honeypots, Penetration Testing</p><p><br></p><p>Specialties: Forensic, Web application intrusion, Vulnerability Analysis</p><p><br></p><p><br></p><p><strong class="ql-size-large">About 10 Questions to Cyber Resilience: </strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. </p><p><br></p><p><br></p><p><strong class="ql-size-large">About Assurance IT: </strong></p><p>Assurance IT (<a href="https://www.assuranceit.ca" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializing in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/ethicalhacking101]]></link><guid isPermaLink="false">ebaa5b8d-ebc8-4824-a24c-8247d81969f6</guid><itunes:image href="https://artwork.captivate.fm/4026bf0d-c347-42a4-9735-2ddeae8695e7/QMVwvU6RgD8fFgn2v6oJzteE.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 15 Sep 2023 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/fb583af6-0399-4103-a652-5a69f80ad13c/Laurent-Deslauriers-converted.mp3" length="22928573" type="audio/mpeg"/><itunes:duration>23:53</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>2</itunes:season><itunes:episode>1</itunes:episode><itunes:season>2</itunes:season><podcast:episode>1</podcast:episode><podcast:season>2</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/da41ba06-db48-4d79-bfe1-4dcf22a226dd/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/da41ba06-db48-4d79-bfe1-4dcf22a226dd/index.html" type="text/html"/></item><item><title>Is the cloud secure? with CISO from Insurity, Jay Wilson</title><itunes:title>Is the cloud secure? with CISO from Insurity, Jay Wilson</itunes:title><description><![CDATA[<p>Assurance IT invited Insurity's CISO, Jay Wilson to discuss SaaS platform, cloud security and data privacy.</p><p>&nbsp;</p><p>In this episode, Jay Wilson from Insurity and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Pros and cons of SaaS platforms</li><li>Should hardware be back on-prem?</li><li>Cloud security: Is it where it needs to be?</li><li>Are security risks between cloud and on-prem similar?</li><li>How to backup SaaS applications</li><li>Difficulty of complying with data privacy regulations from around the world</li><li>Are the Data privacy regulations make us better?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/a8YWmt-QcVU" rel="noopener noreferrer" target="_blank">https://youtu.be/a8YWmt-QcVU</a> </p><p>Jay Wilson’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/jaywwilson/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jaywwilson/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jay Wilson:&nbsp;</strong></p><p>As an experienced technology executive across multiple disciplines and sectors, Jay leads operations, delivery and strategy across global cross-discipline teams to produce and protect innovative products, growth strategies and measurable results.</p><p><br></p><p>In his role of Chief Information Security Officer at Mercury Healthcare, he is responsible for advancing the information security and compliance program, ensuring our business operations and client-facing product technologies are safe from attack, exceed regulatory standards and protect the critically important protected health data assets that Mercury Healthcare manages for over 1000 hospitals. Additionally he lead our efforts to align to industry leading compliance and security frameworks, including HITRUST certification of the Mercury Patient Engagement Solution / CRM. Further, he also leads and directs the IT function at Mercury Healthcare to improve the efficacy, efficiency and effectiveness of IT/Helpdesk functions within the organization.</p><p><br></p><p>He is CISM, CHP and CSCS certified and has over 20 years of experience in various technology development and leadership roles. Also a graduate of SapientNitro's CMTO University program, with a background as a professional marketing technologist and a consummate student of innovation and psychology, he focuses additional effort on the potential of people in the world of business+technology convergence. He has previously led (at Healthgrades) the Learning Academy program, part of HG's previous leadership development program, to help grow our people in communication, leadership and creating impact.</p><p><br></p><p>His experiences in technologies are broad and diverse, but he has had the privilege of working in: Security Infrastructure, Network Engineering, Automation Engineering, Advertising Technologies, Data Engineering, Distributed Computing, Professional Video, Cloud Computing, DevOps, Containers, Front End Web Technologies, Server-side Technologies, Microservices &amp; API Development.</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data...]]></description><content:encoded><![CDATA[<p>Assurance IT invited Insurity's CISO, Jay Wilson to discuss SaaS platform, cloud security and data privacy.</p><p>&nbsp;</p><p>In this episode, Jay Wilson from Insurity and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Pros and cons of SaaS platforms</li><li>Should hardware be back on-prem?</li><li>Cloud security: Is it where it needs to be?</li><li>Are security risks between cloud and on-prem similar?</li><li>How to backup SaaS applications</li><li>Difficulty of complying with data privacy regulations from around the world</li><li>Are the Data privacy regulations make us better?</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/a8YWmt-QcVU" rel="noopener noreferrer" target="_blank">https://youtu.be/a8YWmt-QcVU</a> </p><p>Jay Wilson’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/jaywwilson/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jaywwilson/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jay Wilson:&nbsp;</strong></p><p>As an experienced technology executive across multiple disciplines and sectors, Jay leads operations, delivery and strategy across global cross-discipline teams to produce and protect innovative products, growth strategies and measurable results.</p><p><br></p><p>In his role of Chief Information Security Officer at Mercury Healthcare, he is responsible for advancing the information security and compliance program, ensuring our business operations and client-facing product technologies are safe from attack, exceed regulatory standards and protect the critically important protected health data assets that Mercury Healthcare manages for over 1000 hospitals. Additionally he lead our efforts to align to industry leading compliance and security frameworks, including HITRUST certification of the Mercury Patient Engagement Solution / CRM. Further, he also leads and directs the IT function at Mercury Healthcare to improve the efficacy, efficiency and effectiveness of IT/Helpdesk functions within the organization.</p><p><br></p><p>He is CISM, CHP and CSCS certified and has over 20 years of experience in various technology development and leadership roles. Also a graduate of SapientNitro's CMTO University program, with a background as a professional marketing technologist and a consummate student of innovation and psychology, he focuses additional effort on the potential of people in the world of business+technology convergence. He has previously led (at Healthgrades) the Learning Academy program, part of HG's previous leadership development program, to help grow our people in communication, leadership and creating impact.</p><p><br></p><p>His experiences in technologies are broad and diverse, but he has had the privilege of working in: Security Infrastructure, Network Engineering, Automation Engineering, Advertising Technologies, Data Engineering, Distributed Computing, Professional Video, Cloud Computing, DevOps, Containers, Front End Web Technologies, Server-side Technologies, Microservices &amp; API Development.</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/cloud-security]]></link><guid isPermaLink="false">99252387-2cea-4371-a7f0-0d376e28f534</guid><itunes:image href="https://artwork.captivate.fm/62db90df-2bf0-45cf-8971-f18c07536229/EYxf4Wv_fLGbTFXuLMz6z8wA.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 16 Dec 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/46ced70c-33e9-44e2-9997-f553c45f1d78/AIT-Podcast-Jay-Wilson-converted.mp3" length="20977126" type="audio/mpeg"/><itunes:duration>21:51</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>8</itunes:episode><itunes:season>1</itunes:season><podcast:episode>8</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/3c1a947a-2eb5-4b33-9a3e-1dc8142a650d/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/3c1a947a-2eb5-4b33-9a3e-1dc8142a650d/index.html" type="text/html"/></item><item><title>How small companies should get started in cyber security, with Franco Perrotta</title><itunes:title>How small companies should get started in cyber security, with Franco Perrotta</itunes:title><description><![CDATA[<p>Franco Perrotta is a cyber security consultant at Bell. Over his decade of experience helping businesses with cyber security, he noticed trends he shares in this episode - specifically for small businesses.</p><p>&nbsp;</p><p>In this episode, Franco Perrotta and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>How much budget should you have for cyber security?</li><li>How small companies should get started in cyber security</li><li>Benefits of being small when attracting IT talent</li><li>First step to identifying weal spots in a small business</li><li>Can you grow a business and do it prudently?</li><li>Cyber insurance for small companies</li><li>Use case: helping small business with low budget and one IT person with cyber security</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/mPUy-RoUkrw" rel="noopener noreferrer" target="_blank">https://youtu.be/mPUy-RoUkrw</a></p><p>Franco Perrotta’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/francoperrotta/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/francoperrotta/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Franco Perrotta:&nbsp;</strong></p><p>"10+ years experience in IT; this includes hardware, software and client relations. Through my attention to detail and always providing over the top service, I present an excellent addition to any team looking to strengthen their IT security posture."</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Franco Perrotta is a cyber security consultant at Bell. Over his decade of experience helping businesses with cyber security, he noticed trends he shares in this episode - specifically for small businesses.</p><p>&nbsp;</p><p>In this episode, Franco Perrotta and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>How much budget should you have for cyber security?</li><li>How small companies should get started in cyber security</li><li>Benefits of being small when attracting IT talent</li><li>First step to identifying weal spots in a small business</li><li>Can you grow a business and do it prudently?</li><li>Cyber insurance for small companies</li><li>Use case: helping small business with low budget and one IT person with cyber security</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/mPUy-RoUkrw" rel="noopener noreferrer" target="_blank">https://youtu.be/mPUy-RoUkrw</a></p><p>Franco Perrotta’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/francoperrotta/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/francoperrotta/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Franco Perrotta:&nbsp;</strong></p><p>"10+ years experience in IT; this includes hardware, software and client relations. Through my attention to detail and always providing over the top service, I present an excellent addition to any team looking to strengthen their IT security posture."</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/cyber-security-small-business]]></link><guid isPermaLink="false">c12f117b-bd68-4836-a0d4-7bd53548131e</guid><itunes:image href="https://artwork.captivate.fm/a914ebec-5d46-4a38-8a86-9759162330e6/hu_rwC0ynl5e5AhYrc6PfWNd.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 11 Nov 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/4c6f57a8-7576-4a4b-864b-2196ed65ece8/AIT-20Podcast-20-20Franco-20Perotta.mp3" length="27035794" type="audio/mpeg"/><itunes:duration>28:10</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>7</itunes:episode><itunes:season>1</itunes:season><podcast:episode>7</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>The Future of Data Privacy in Canada, with Vanessa Henri</title><itunes:title>The Future of Data Privacy in Canada, with Vanessa Henri</itunes:title><description><![CDATA[<p>Vanessa Henri has been working in data privacy for 10 years. As a lawyer, she approaches data differently than most of us. So on today's episode of 10 Questions to Cyber Resilience, we wanted to pick her brain about her perspective of data privacy as a lawyer and where Canada is headed in terms of laws and compliance.</p><p>&nbsp;</p><p>In this episode, Vanessa Henri from Henri and Wolf, and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Using due diligence to grow an organization</li><li>The relationship between legal and IT</li><li>One strategy to get more cyber security budget</li><li>Is Canada behind on data privacy laws?</li><li>Defining C27 and what it could mean for Canada</li><li>Will C26 and C27 be passed as laws?</li><li>How AI fits into new legislation</li><li>Why consumers are scared of AI</li><li>How to start implementing AI in your business</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/ng2SQk2OBi8" rel="noopener noreferrer" target="_blank">https://youtu.be/ng2SQk2OBi8</a></p><p>Vanessa Henri’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/vanessahenri/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/vanessahenri/</a></p><p>Henri &amp; Wolf website:&nbsp;<a href="https://henriwolf.law/" rel="noopener noreferrer" target="_blank">https://henriwolf.law/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/ " rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/ </a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Vanessa Henri:&nbsp;</strong></p><p>"I work with emerging growth organizations to help them articulate a data governance strategy taking into consideration data privacy, information security, intellectual property, and ethics. I bring value and a competitive edge to data-driven organizations by helping them to manage their legal risks, enhance consumers trust and fast-forward the adoption of disruptive technologies through trust-by-design. I have an extensive experience negotiating and drafting tech agreements with data governance implications (including data acquisition, derivative data management and contracts involving data analytics and anonymization requirements), and enjoy working with entrepreneurs to build contractual structures that reflect their business strategies. I am fascinated by ethical innovation, the economic value of trust, and nurturing purpose-driven organizations.</p><p><br></p><p>Organizations reach out to me to understand the legal impacts of their strategy for managing and securing their information assets, which may include trade secrets, intellectual property and personal information, and for advices on how to improve governance, risk management and decision making regarding such informational assets. I also work with organizations on issues of economic cyber-espionage and national security impacts. The organizations I work with are principally in the field of emerging technologies, cybersecurity and data-driven industries, including IIoT.</p><p><br></p><p>I am a member of the Quebec Bar Association, a Certified Data Protection Officer ("CDPO") and a Senior Lead Implementor for ISO 27701 (Privacy Information Management System), with a proven track record of helping organizations of all sizes and industries implementing compliance measures for their informational assets, including through privacy-by-design in emerging technologies. I have experience deploying information management systems for organizations of all sizes by drafting policies, procedures and establishing risk management methodologies. I perform risk assessments and audits to prepare organizations for certification or for new compliance obligations, or for pre-market validation...]]></description><content:encoded><![CDATA[<p>Vanessa Henri has been working in data privacy for 10 years. As a lawyer, she approaches data differently than most of us. So on today's episode of 10 Questions to Cyber Resilience, we wanted to pick her brain about her perspective of data privacy as a lawyer and where Canada is headed in terms of laws and compliance.</p><p>&nbsp;</p><p>In this episode, Vanessa Henri from Henri and Wolf, and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Using due diligence to grow an organization</li><li>The relationship between legal and IT</li><li>One strategy to get more cyber security budget</li><li>Is Canada behind on data privacy laws?</li><li>Defining C27 and what it could mean for Canada</li><li>Will C26 and C27 be passed as laws?</li><li>How AI fits into new legislation</li><li>Why consumers are scared of AI</li><li>How to start implementing AI in your business</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/ng2SQk2OBi8" rel="noopener noreferrer" target="_blank">https://youtu.be/ng2SQk2OBi8</a></p><p>Vanessa Henri’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/vanessahenri/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/vanessahenri/</a></p><p>Henri &amp; Wolf website:&nbsp;<a href="https://henriwolf.law/" rel="noopener noreferrer" target="_blank">https://henriwolf.law/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/ " rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/ </a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Vanessa Henri:&nbsp;</strong></p><p>"I work with emerging growth organizations to help them articulate a data governance strategy taking into consideration data privacy, information security, intellectual property, and ethics. I bring value and a competitive edge to data-driven organizations by helping them to manage their legal risks, enhance consumers trust and fast-forward the adoption of disruptive technologies through trust-by-design. I have an extensive experience negotiating and drafting tech agreements with data governance implications (including data acquisition, derivative data management and contracts involving data analytics and anonymization requirements), and enjoy working with entrepreneurs to build contractual structures that reflect their business strategies. I am fascinated by ethical innovation, the economic value of trust, and nurturing purpose-driven organizations.</p><p><br></p><p>Organizations reach out to me to understand the legal impacts of their strategy for managing and securing their information assets, which may include trade secrets, intellectual property and personal information, and for advices on how to improve governance, risk management and decision making regarding such informational assets. I also work with organizations on issues of economic cyber-espionage and national security impacts. The organizations I work with are principally in the field of emerging technologies, cybersecurity and data-driven industries, including IIoT.</p><p><br></p><p>I am a member of the Quebec Bar Association, a Certified Data Protection Officer ("CDPO") and a Senior Lead Implementor for ISO 27701 (Privacy Information Management System), with a proven track record of helping organizations of all sizes and industries implementing compliance measures for their informational assets, including through privacy-by-design in emerging technologies. I have experience deploying information management systems for organizations of all sizes by drafting policies, procedures and establishing risk management methodologies. I perform risk assessments and audits to prepare organizations for certification or for new compliance obligations, or for pre-market validation requirements.</p><p><br></p><p>I speak frequently in conferences and podcasts, and I contribute to blogs, posts and articles on an ongoing basis. I am involved in the cause of women in cybersecurity and entrepreneurship. I've recently been honored as part of Top 20 Cybersecurity Women Canada." </p><p><br></p><p>- Vanessa Henri</p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/vanessa-henri]]></link><guid isPermaLink="false">e8adcb6d-dc50-4879-be0c-098787dca45e</guid><itunes:image href="https://artwork.captivate.fm/66b7df3f-ad35-49a4-abbd-f32149d8f2e8/tr-QdOvhdntQAokRGVnn67as.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Sat, 22 Oct 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/c06df645-79ca-495d-8304-a35d5773ce96/AIT-20Podcast-20-20Vanessa-20Henri.mp3" length="30321924" type="audio/mpeg"/><itunes:duration>31:35</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>6</itunes:episode><itunes:season>1</itunes:season><podcast:episode>6</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author></item><item><title>The Evolution of Cyber Security, with Mark Salinas</title><itunes:title>The Evolution of Cyber Security, with Mark Salinas</itunes:title><description><![CDATA[<p>Assurance IT&nbsp;invited Security Engineer Manager, Mark Salinas, to chat about the evolution of cyber security.</p><p>&nbsp;</p><p>In this episode, Mark Salinas and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Evolution of networking</li><li>Cyber security in 2000 vs 2022</li><li>End-users in 2000 vs 2022</li><li>The reality of buying cyber security tools</li><li>Cyber security vs cyber resilience</li><li>Cyber attacks on critical infrastructure</li><li>Getting hacked through a clock</li><li>What the Googles of the world are doing to mitigate the skillset shortage in IT</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/TUA01zTVbw0" rel="noopener noreferrer" target="_blank">https://youtu.be/TUA01zTVbw0</a></p><p>Mark Salinas' LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/mark-salinas-75b9363/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/mark-salinas-75b9363/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Mark Salinas:&nbsp;</strong></p><p>Over 20 years industry experience as a security &amp; network architect and engineer, including: design &amp; installation of: networking, Cloud, Network Security, Firewalls, IDS/IPS, Application Security /Firewall, Application Acceleration, WAN Optimization. WAF and DAM. Cloud Services. PCI &amp; NERC Compliance and GRC. CISSP. Pre-Sales as well as Post Sales Support. Network &amp; Security Architecture designs. Security Audits &amp; reviews. US citizen. Mentor.</p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Assurance IT&nbsp;invited Security Engineer Manager, Mark Salinas, to chat about the evolution of cyber security.</p><p>&nbsp;</p><p>In this episode, Mark Salinas and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>Evolution of networking</li><li>Cyber security in 2000 vs 2022</li><li>End-users in 2000 vs 2022</li><li>The reality of buying cyber security tools</li><li>Cyber security vs cyber resilience</li><li>Cyber attacks on critical infrastructure</li><li>Getting hacked through a clock</li><li>What the Googles of the world are doing to mitigate the skillset shortage in IT</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/TUA01zTVbw0" rel="noopener noreferrer" target="_blank">https://youtu.be/TUA01zTVbw0</a></p><p>Mark Salinas' LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/mark-salinas-75b9363/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/mark-salinas-75b9363/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Mark Salinas:&nbsp;</strong></p><p>Over 20 years industry experience as a security &amp; network architect and engineer, including: design &amp; installation of: networking, Cloud, Network Security, Firewalls, IDS/IPS, Application Security /Firewall, Application Acceleration, WAN Optimization. WAF and DAM. Cloud Services. PCI &amp; NERC Compliance and GRC. CISSP. Pre-Sales as well as Post Sales Support. Network &amp; Security Architecture designs. Security Audits &amp; reviews. US citizen. Mentor.</p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><br></p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/evolution-cyber-security]]></link><guid isPermaLink="false">11d993ae-86f1-4611-a489-784c8742252a</guid><itunes:image href="https://artwork.captivate.fm/d72c41fa-ba6a-4408-9940-a96290514838/dXIxec9rJUaSdcyt_f7lDfeE.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 07 Oct 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/ae257cba-47db-4f9d-8a0d-8d299ef41c01/Podcast-20-20Mark-20Salinas-converted.mp3" length="59979996" type="audio/mpeg"/><itunes:duration>41:39</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>5</itunes:episode><itunes:season>1</itunes:season><podcast:episode>5</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/b26df039-87ed-45d0-a79d-69e29cc54445/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/b26df039-87ed-45d0-a79d-69e29cc54445/index.html" type="text/html"/></item><item><title>Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev</title><itunes:title>Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev</itunes:title><description><![CDATA[<p>Jahn Karsybaev is the CIO at myBasePay - a small startup that raised $60 million in funding and are on their way to closing the year at $50 million in revenue. In today's episode, Assurance IT's co-founder Luigi Tiano asks Jahn about the following topics:</p><ol><li>The difficulty attracting IT talent as a startup &amp; how Jahn works around that</li><li>Defining cyber resilience</li><li>Tips on implementing digital transformation &amp; debunking myths around it</li><li>Jahn's best tip to staying up-to-date with the tech industry (we're stealing this one)</li><li>What keep's Jahn up at night</li><li>What Jahn looks for in a company that potentially acquires myBasePay</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/2wlSQeXbPHQ" rel="noopener noreferrer" target="_blank">https://youtu.be/2wlSQeXbPHQ</a></p><p>Jahn Karsybaev’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/jahnibek/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jahnibek/</a></p><p>myBasePay:&nbsp;<a href="https://www.mybasepay.com/" rel="noopener noreferrer" target="_blank">https://www.mybasepay.com/</a></p><p>The book about Business experiments Jahn referred to: <a href="https://amzn.to/3dyyHN4" rel="noopener noreferrer" target="_blank">https://amzn.to/3dyyHN4</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jahn Karsybaev:&nbsp;</strong></p><p>Jahn Karsybaev is a Technology Executive who has led IT teams for Fortune 500 companies. He is currently a Co-Founder and CIO at myBasePay. </p><p>Jahn has co-founded, launched, successfully sold as well as successfully failed several start-ups. He is an Angel Investor and sits on Boards of several tech startups. He loves teaching angel investing, growth hacking &amp; fundraising for startups. </p><p>Fund-raising is one of Jahn's strengths and passions. Cumulatively, he has successfully raised close to $70MM for the startups he has launched or advised on.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Jahn Karsybaev is the CIO at myBasePay - a small startup that raised $60 million in funding and are on their way to closing the year at $50 million in revenue. In today's episode, Assurance IT's co-founder Luigi Tiano asks Jahn about the following topics:</p><ol><li>The difficulty attracting IT talent as a startup &amp; how Jahn works around that</li><li>Defining cyber resilience</li><li>Tips on implementing digital transformation &amp; debunking myths around it</li><li>Jahn's best tip to staying up-to-date with the tech industry (we're stealing this one)</li><li>What keep's Jahn up at night</li><li>What Jahn looks for in a company that potentially acquires myBasePay</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/2wlSQeXbPHQ" rel="noopener noreferrer" target="_blank">https://youtu.be/2wlSQeXbPHQ</a></p><p>Jahn Karsybaev’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/jahnibek/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jahnibek/</a></p><p>myBasePay:&nbsp;<a href="https://www.mybasepay.com/" rel="noopener noreferrer" target="_blank">https://www.mybasepay.com/</a></p><p>The book about Business experiments Jahn referred to: <a href="https://amzn.to/3dyyHN4" rel="noopener noreferrer" target="_blank">https://amzn.to/3dyyHN4</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jahn Karsybaev:&nbsp;</strong></p><p>Jahn Karsybaev is a Technology Executive who has led IT teams for Fortune 500 companies. He is currently a Co-Founder and CIO at myBasePay. </p><p>Jahn has co-founded, launched, successfully sold as well as successfully failed several start-ups. He is an Angel Investor and sits on Boards of several tech startups. He loves teaching angel investing, growth hacking &amp; fundraising for startups. </p><p>Fund-raising is one of Jahn's strengths and passions. Cumulatively, he has successfully raised close to $70MM for the startups he has launched or advised on.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/startup-cio]]></link><guid isPermaLink="false">37fdbc89-f29d-48ef-90c7-9601a67edb9c</guid><itunes:image href="https://artwork.captivate.fm/c3e54b91-4176-498a-9408-097d0f15d031/DRzwBmuhMkzhYIdHnJD7wjba.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 23 Sep 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/dea92d51-791e-41fb-8417-e2bb850ed5d1/AIT-20Podcast-20-20Jahn-20Karsybaev-converted.mp3" length="43364238" type="audio/mpeg"/><itunes:duration>30:07</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>4</itunes:episode><itunes:season>1</itunes:season><podcast:episode>4</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/f3ab2374-30eb-440c-b912-5bd8d38fbf93/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/f3ab2374-30eb-440c-b912-5bd8d38fbf93/index.html" type="text/html"/></item><item><title>How to apply the 80/20 rule to your cyber security strategy</title><itunes:title>How to apply the 80/20 rule to your cyber security strategy</itunes:title><description><![CDATA[<p>Cyber criminals are getting smarter. Protecting your enterprise is getting expense. </p><p>Where do you start in your cyber security journey? </p><p>The co-founders of Assurance IT discuss the top 5 cyber security tools every enterprise should start with.&nbsp;</p><p>In this episode, Luigi Tiano, and Ernesto Pellegrino also discuss:&nbsp;</p><ol><li>13 Cyber Secure Measures</li><li>Incident Response Plans</li><li>Reason to increase cyber security awareness among executives</li><li>How the workspace changed over the last two years and how it's affecting IT</li><li>#1 cause of cyber attacks</li><li>Feedback from cyber security insurance companies</li><li>Top 5 things you need to protect against ransomware</li></ol><br/><p>&nbsp;</p><p><br></p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/FejMyQmT9hA" rel="noopener noreferrer" target="_blank">https://youtu.be/FejMyQmT9hA</a></p><p>Blog: <a href="www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware " rel="noopener noreferrer" target="_blank">www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware </a></p><p>CyberSecure Canada: <a href="https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations" rel="noopener noreferrer" target="_blank">https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations</a></p><p>Ernesto Pellegrino’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/ernestopellegrino/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/ernestopellegrino/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p><br></p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>Cyber criminals are getting smarter. Protecting your enterprise is getting expense. </p><p>Where do you start in your cyber security journey? </p><p>The co-founders of Assurance IT discuss the top 5 cyber security tools every enterprise should start with.&nbsp;</p><p>In this episode, Luigi Tiano, and Ernesto Pellegrino also discuss:&nbsp;</p><ol><li>13 Cyber Secure Measures</li><li>Incident Response Plans</li><li>Reason to increase cyber security awareness among executives</li><li>How the workspace changed over the last two years and how it's affecting IT</li><li>#1 cause of cyber attacks</li><li>Feedback from cyber security insurance companies</li><li>Top 5 things you need to protect against ransomware</li></ol><br/><p>&nbsp;</p><p><br></p><p><strong>Resources:</strong>&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/FejMyQmT9hA" rel="noopener noreferrer" target="_blank">https://youtu.be/FejMyQmT9hA</a></p><p>Blog: <a href="www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware " rel="noopener noreferrer" target="_blank">www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware </a></p><p>CyberSecure Canada: <a href="https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations" rel="noopener noreferrer" target="_blank">https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations</a></p><p>Ernesto Pellegrino’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/ernestopellegrino/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/ernestopellegrino/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p><br></p><p><br></p><p><br></p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/03-cybersecure-controls]]></link><guid isPermaLink="false">a039e08a-aba9-4fc3-aa7e-594a17e5db03</guid><itunes:image href="https://artwork.captivate.fm/e8505e49-52dc-42e7-ab63-169a475c2708/3Wb_uUpTJzDvx-Ifr9S_1apF.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 09 Sep 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/56a77fc1-f6e9-47d7-935f-7cfd337b1b3f/Podcast-20-20ep-203-20-2013-20controls-20audio-converted.mp3" length="35052910" type="audio/mpeg"/><itunes:duration>24:21</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>3</itunes:episode><itunes:season>1</itunes:season><podcast:episode>3</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/78ab9d7c-087f-4e1b-8743-5844674ce314/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/78ab9d7c-087f-4e1b-8743-5844674ce314/index.html" type="text/html"/></item><item><title>10 Burning Questions about the Cyber Security Industry, with Jonathan Victor, from Insurity</title><itunes:title>10 Burning Questions about the Cyber Security Industry, with Jonathan Victor, from Insurity</itunes:title><description><![CDATA[<p>There's a lot going on in the tech world. A huge skill gap, Log4j vulnerabilities, how your cloud strategy is making your security strategy more difficult. It's a lot. </p><p>In this episode, we invited Chief Information Officer of Insurity, Jonathan Victor, to discuss the most pressing questions in the field.</p><p>&nbsp;</p><p>Co-founder of Assurance IT, Luigi Tiano, and Jonathan Victor discuss:&nbsp;</p><ol><li>How Jonathan became CIO</li><li>What happened when John needed surgery during an important project&nbsp;</li><li>How a cloud strategy makes a security strategy more difficult</li><li>What is cyber resilience mean?</li><li>How Log4j affected Insurity</li><li>Why companies are still being affected by Log4j</li><li>Why enterprises should try security by design</li><li>how to improve your cyber resilience with this one thing</li><li>How to overcome the skillset gap</li><li>Discussion about how we are becoming desensitized to online security</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/5XIN-VttSdk" rel="noopener noreferrer" target="_blank">https://youtu.be/5XIN-VttSdk</a></p><p>Jonathan Victor's LinkedIn: <a href="https://www.linkedin.com/in/jonathan-victor-65b2b5a/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jonathan-victor-65b2b5a/</a></p><p>Insurity website:&nbsp;<a href="https://insurity.com/ " rel="noopener noreferrer" target="_blank">https://insurity.com/ </a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a> </p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jonathan Victor:&nbsp;</strong></p><p>Jonathan Victor is the Chief Information Officer of Insurity. He oversees all of Insurity’s SaaS implementations and manages the build, run, and evolution of the company’s cloud platforms. He came to Insurity as part of the company’s acquisition of Oceanwide, where he began in 2005, and assumed the role of Chief Operating Officer in 2014. Before Oceanwide, Jonathan worked as a consultant at Accenture. Jonathan is a graduate of McGill Desautels Faculty of Management with a major in Management Information Systems and Finance.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how Tech leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>There's a lot going on in the tech world. A huge skill gap, Log4j vulnerabilities, how your cloud strategy is making your security strategy more difficult. It's a lot. </p><p>In this episode, we invited Chief Information Officer of Insurity, Jonathan Victor, to discuss the most pressing questions in the field.</p><p>&nbsp;</p><p>Co-founder of Assurance IT, Luigi Tiano, and Jonathan Victor discuss:&nbsp;</p><ol><li>How Jonathan became CIO</li><li>What happened when John needed surgery during an important project&nbsp;</li><li>How a cloud strategy makes a security strategy more difficult</li><li>What is cyber resilience mean?</li><li>How Log4j affected Insurity</li><li>Why companies are still being affected by Log4j</li><li>Why enterprises should try security by design</li><li>how to improve your cyber resilience with this one thing</li><li>How to overcome the skillset gap</li><li>Discussion about how we are becoming desensitized to online security</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;&nbsp;</p><p>Watch the episode:&nbsp;<a href="https://youtu.be/5XIN-VttSdk" rel="noopener noreferrer" target="_blank">https://youtu.be/5XIN-VttSdk</a></p><p>Jonathan Victor's LinkedIn: <a href="https://www.linkedin.com/in/jonathan-victor-65b2b5a/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/jonathan-victor-65b2b5a/</a></p><p>Insurity website:&nbsp;<a href="https://insurity.com/ " rel="noopener noreferrer" target="_blank">https://insurity.com/ </a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a> </p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Jonathan Victor:&nbsp;</strong></p><p>Jonathan Victor is the Chief Information Officer of Insurity. He oversees all of Insurity’s SaaS implementations and manages the build, run, and evolution of the company’s cloud platforms. He came to Insurity as part of the company’s acquisition of Oceanwide, where he began in 2005, and assumed the role of Chief Operating Officer in 2014. Before Oceanwide, Jonathan worked as a consultant at Accenture. Jonathan is a graduate of McGill Desautels Faculty of Management with a major in Management Information Systems and Finance.</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how Tech leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/02-burning-security-questions]]></link><guid isPermaLink="false">c1651032-2ca8-4b5d-84e4-bafce61d8d61</guid><itunes:image href="https://artwork.captivate.fm/1ac33368-1591-485f-9123-bfb2b84d19f1/HuT0NiAtK1EM9P6bhQnaLW2o.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 19 Aug 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/761d681b-6cbf-4859-8b86-9e4bfc514721/AIT-20Podcast-20-20Jonathan-20Victor-converted.mp3" length="24786829" type="audio/mpeg"/><itunes:duration>25:49</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>2</itunes:episode><itunes:season>1</itunes:season><podcast:episode>2</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/650b9561-9ed8-4bfa-a9dd-52838b80f491/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/650b9561-9ed8-4bfa-a9dd-52838b80f491/index.html" type="text/html"/></item><item><title>10 Questions to Better Understanding Data Privacy Roles, with Heather Federman from BigID</title><itunes:title>10 Questions to Better Understanding Data Privacy Roles, with Heather Federman from BigID</itunes:title><description><![CDATA[<p>On the first episode of 10 Questions to Cyber Resilience, Assurance IT&nbsp;invited Chief Privacy Officer, Heather Federman, from BigID, to chat about the responsibilities and scope of a data privacy role.</p><p>&nbsp;</p><p>In this episode, Heather Federman from BigID and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>The evolution of&nbsp;Heather’s data privacy career&nbsp;</li><li>How Heather’s passion for data privacy started in law school&nbsp;</li><li>How the CPO fits in with the rest of the IT team&nbsp;</li><li>How a CPO interacts with other departments &nbsp;</li><li>How not to get overwhelmed with the different data privacy laws&nbsp;</li><li>The possibility of a GDPR for the US&nbsp;</li><li>Examples of employee protection under different state laws&nbsp;</li><li>How BigID plays a part in data privacy&nbsp;</li><li>The current demand for experts in data privacy&nbsp;</li><li>Privacy laws in Canada&nbsp;</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Heather Federman’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/heatherfederman/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/heatherfederman/</a> </p><p>BigID website:&nbsp;<a href="https://bigid.com/" rel="noopener noreferrer" target="_blank">https://bigid.com/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Heather Federman:&nbsp;</strong></p><p>Heather leads the privacy strategy and program at BigID - focused on internal compliance and data risk, product development, go to market strategy, business development and privacy evangelism.&nbsp;&nbsp;</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></description><content:encoded><![CDATA[<p>On the first episode of 10 Questions to Cyber Resilience, Assurance IT&nbsp;invited Chief Privacy Officer, Heather Federman, from BigID, to chat about the responsibilities and scope of a data privacy role.</p><p>&nbsp;</p><p>In this episode, Heather Federman from BigID and co-founder of Assurance IT, Luigi Tiano, discuss:&nbsp;</p><ol><li>The evolution of&nbsp;Heather’s data privacy career&nbsp;</li><li>How Heather’s passion for data privacy started in law school&nbsp;</li><li>How the CPO fits in with the rest of the IT team&nbsp;</li><li>How a CPO interacts with other departments &nbsp;</li><li>How not to get overwhelmed with the different data privacy laws&nbsp;</li><li>The possibility of a GDPR for the US&nbsp;</li><li>Examples of employee protection under different state laws&nbsp;</li><li>How BigID plays a part in data privacy&nbsp;</li><li>The current demand for experts in data privacy&nbsp;</li><li>Privacy laws in Canada&nbsp;</li></ol><br/><p>&nbsp;</p><p><strong>Resources:</strong>&nbsp;</p><p>Heather Federman’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/heatherfederman/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/heatherfederman/</a> </p><p>BigID website:&nbsp;<a href="https://bigid.com/" rel="noopener noreferrer" target="_blank">https://bigid.com/</a></p><p>Luigi Tiano’s LinkedIn:&nbsp;<a href="https://www.linkedin.com/in/luigitiano/" rel="noopener noreferrer" target="_blank">https://www.linkedin.com/in/luigitiano/</a></p><p>Assurance IT Website:&nbsp;<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">http://www.assuranceit.ca/</a></p><p>&nbsp;</p><p>&nbsp;</p><p><strong>About Heather Federman:&nbsp;</strong></p><p>Heather leads the privacy strategy and program at BigID - focused on internal compliance and data risk, product development, go to market strategy, business development and privacy evangelism.&nbsp;&nbsp;</p><p><strong>About 10 Questions to Cyber Resilience:&nbsp;</strong></p><p>Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of&nbsp;10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security.&nbsp;</p><p>&nbsp;</p><p><strong>About Assurance IT:&nbsp;</strong></p><p>Assurance IT (<a href="http://www.assuranceit.ca/" rel="noopener noreferrer" target="_blank">www.assuranceit.ca</a>) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.</p>]]></content:encoded><link><![CDATA[https://podcast.assuranceit.co/episode/01-data-privacy]]></link><guid isPermaLink="false">19f92f53-89dd-4ec5-a7ed-3a6790e5eea4</guid><itunes:image href="https://artwork.captivate.fm/f1a660e3-0f49-4805-b7ec-a4e098181813/I_AJENK6Yqv2pP72JD_rt5Dd.png"/><dc:creator><![CDATA[Assurance IT]]></dc:creator><pubDate>Fri, 29 Jul 2022 06:00:00 -0500</pubDate><enclosure url="https://podcasts.captivate.fm/media/16d223d8-e0a2-4080-99e2-33777a8269c2/AIT-20podcast-20-20Heather-20Federman-converted.mp3" length="27132156" type="audio/mpeg"/><itunes:duration>32:18</itunes:duration><itunes:explicit>false</itunes:explicit><itunes:episodeType>full</itunes:episodeType><itunes:season>1</itunes:season><itunes:episode>1</itunes:episode><itunes:season>1</itunes:season><podcast:episode>1</podcast:episode><podcast:season>1</podcast:season><itunes:author>Assurance IT</itunes:author><podcast:transcript url="https://transcripts.captivate.fm/transcript/273d837e-81a1-4354-91a5-d42dc02e1b25/transcript.srt" type="application/srt" rel="captions"/><podcast:transcript url="https://transcripts.captivate.fm/transcript/273d837e-81a1-4354-91a5-d42dc02e1b25/index.html" type="text/html"/></item></channel></rss>