From ransomware attacks to supply chain compromises, eSentire’s Cyber Talks podcast will delve into the world of the latest cyber threats that are impacting businesses globally. Join our team of security experts as we speak with C-level executives and security practitioners about the cyber risks affecting their business and how they’re addressing these challenges. eSentire is The Authority in Managed Detection and Response, protecting the critical data and applications of 2000+ organizations ...
…
continue reading
Esentire Podcasts
1
Agentic AI in the SOC: Risk, Reliability, and the Future of Security Operations
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32Agentic AI is moving from hype to reality, reshaping how enterprises operate, and how cyber defenders must adapt. In this CyberTalks episode, Mark Gillett (Chief Product Officer, eSentire) is joined by Ben Wilde (Head of Innovation, Georgian) to break down the risks, reliability challenges, and opportunities presented by autonomous AI agents. In th…
…
continue reading
1
The Hidden Costs of M&A: A CISO’s Perspective on Cyber Due Diligence
18:37
18:37
Play later
Play later
Lists
Like
Liked
18:37In this episode of Cyber Talks, Greg Crowley and Dwayne Smith delve into the critical role of cybersecurity in mergers and acquisitions (M&A). They discuss how cyber risks can significantly affect company valuations and the challenges that arise during these transactions. Dwayne shares his experiences, highlighting the importance of educating stake…
…
continue reading
1
In Conversation With Tia Hopkins, Chief Cyber Resilience Officer & Field CTO
58:30
58:30
Play later
Play later
Lists
Like
Liked
58:30In today's episode of the Cyber Culture Café series, Andy and John speak to Tia Hopkins, Chief Cyber Resilience Officer & Field CTO. As Chief Cyber Resilience Officer & Field CTO, Tia Hopkins is focused on engaging with the cybersecurity community, providing thought leadership, supporting strategic customer and partner engagements, and working clos…
…
continue reading
1
In Conversation With Ciaran Luttrell, VP of Global Security Operations
43:45
43:45
Play later
Play later
Lists
Like
Liked
43:45In today's episode of the Cyber Culture Café series, Andy and John speak to Ciaran Luttrell, VP of Global Security Operations. As the VP, Global Security Operations, Ciaran began our European HQ and Security Operations Centre in Cork, Ireland in 2015, and led its initial setup and continued growth to form part of a best-of-breed 24/7/365 Global SOC…
…
continue reading
1
Tackling People, Process, and Perception in Cybersecurity
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47In this episode of Cyber Talks, we speak with Craig Peppard, CISO at Ivari Canada, about why people and processes - not just technology - are the real frontline in cybersecurity. The conversation unpacks the limitations of traditional security awareness training, explores how to move beyond blame to address systemic process failures, and highlights…
…
continue reading
1
In Conversation With Alexander Feick, VP of eSentire Labs
1:19:34
1:19:34
Play later
Play later
Lists
Like
Liked
1:19:34In today's episode of the Cyber Culture Café series, Andy and John speak to Alexander Feick, VP of our eSentire Labs team. As the VP of Labs, Alex Feick leads a team responsible for fostering innovations from security professionals on our platform and integrating new technologies into the company's services. Over the past year, his efforts have cen…
…
continue reading
1
Introducing the Cyber Culture Cafe Series with Andy Lalaguna and John Moretti
33:24
33:24
Play later
Play later
Lists
Like
Liked
33:24Cybersecurity isn't just about platforms and processes—it’s about people. If relationships matter in cybersecurity, this is where they begin. So, we're introducing a new, breakout series from the eSentire Cyber Talks Podcast – the Cyber Culture Café series! In this series, John Moretti and Andy Lalaguna will sit down for a candid conversation with …
…
continue reading
1
From Critical Alerts to Business Context: Why CTEM is the Future of Cybersecurity
41:00
41:00
Play later
Play later
Lists
Like
Liked
41:00In this episode of Cyber Talks, Tia Hopkins, Chief Cyber Resilience Officer & Field CTO at eSentire, and Roselle Safran, Founder & CEO at KeyCaliber, discuss the evolution of Continuous Threat Exposure Management (CTEM) and its role in modern cybersecurity. They explore the practical application of CTEM, its benefits for business context in securit…
…
continue reading
1
Building Resilience Through Long-term MDR Partnerships with Rich Raether and Andrew DeBratto
33:38
33:38
Play later
Play later
Lists
Like
Liked
33:38In this episode of Cyber Talks, Rich Raether, CIO of Quarles & Brady, and Andrew DeBratto, CISO of Hunton Andrews Kurth LLP, discuss their decades-long journey in IT and cybersecurity. They recount shared projects, including navigating early security challenges, and reflect on how the industry has transformed, focusing on threat management and resi…
…
continue reading
1
The Role of Threat Intelligence Sharing and Collaboration in Cyber Defense with Ryan Westman
50:00
50:00
Play later
Play later
Lists
Like
Liked
50:00The cyber threat landscape is evolving at an unprecedented pace, with increasingly sophisticated attacks from both nation-state actors and cybercriminals. Organizations must not only stay informed about emerging threats but also act swiftly to operationalize threat intelligence. Effective cybersecurity requires collaboration, cutting-edge tools, an…
…
continue reading
1
Aligning Cybersecurity with Business Goals: Insights from Mark Benaquista
45:59
45:59
Play later
Play later
Lists
Like
Liked
45:59In this episode, Erin McLean chats with Mark Benaquista, a seasoned cybersecurity leader and Managing Director at Thomas H. Lee Partners. Mark shares his career journey from starting as an associate at JPMorgan to leading cybersecurity portfolios across various industries. He offers valuable insights into the importance of aligning technology with …
…
continue reading
1
Why Continual Learning and Adaptability are Critical in Cyber with Greg Crowley
39:58
39:58
Play later
Play later
Lists
Like
Liked
39:58How did Greg Crowley, eSentire's CISO, go from a potential career in broadcast television to IT? In this episode of eSentire Cyber Talks, Greg shares what influenced his pivot into cybersecurity, how he transitioned from being a Systems Engineer to a leadership role at WWE (formerly WWF) to developing the company’s first security program amidst its…
…
continue reading
1
Safeguarding Manufacturing Operations with Ray Texter
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36The manufacturing threat landscape is evolving rapidly, with increased automation and remote access needs making Operational Technology (OT) environments more vulnerable to cyber threats. As attackers become more sophisticated, manufacturers must adapt to protect their critical infrastructure and maintain business continuity. Join Tia Hopkins, Fiel…
…
continue reading
1
From Ransomware to Remote Access: Key Cyber Threats in Manufacturing
27:08
27:08
Play later
Play later
Lists
Like
Liked
27:08The manufacturing industry is facing an increasingly complex threat landscape, characterized by expanding attack surfaces due to continuous IT transformation and interconnected OT environments. Key threats such as ransomware and sophisticated social engineering attacks are exploiting these vulnerabilities, making robust security measures and swift …
…
continue reading
1
Debunking Cybersecurity Myths with Eldon Sprickerhoff
40:13
40:13
Play later
Play later
Lists
Like
Liked
40:13In this episode of Cyber Talks, Erin McLean and Eldon Sprickerhoff, Founder & Advisor of eSentire, to discuss the latest trends and misconceptions in cybersecurity. Eldon shares his recent experience of being inducted into the Waterloo Entrepreneur Hall of Fame, reflecting on his journey and the importance of support from his family and colleagues.…
…
continue reading
1
Unlocking the Key to Success, Differentiation, and Excellence for MSSPs with Tommy Wald and Bob Layton
47:07
47:07
Play later
Play later
Lists
Like
Liked
47:07In this episode of Cyber Talks, Erin McLean, Chief Marketing Officer at eSentire, sits down with Bob Layton, Chief Channel Officer, and Tommy Wald, CEO of RIATA Technologies, to discuss the evolution of MSSP services, the importance of building strong client relationships, and the necessity of robust vendor partnerships. Tommy and Bob also share th…
…
continue reading
1
Handling Mergers & Acquisitions as a Security Leader with Ron Park and Dwayne Smith
56:15
56:15
Play later
Play later
Lists
Like
Liked
56:15Although mergers and acquisitions (M&As) are strategic moves that can propel companies toward greater market share, enhanced capabilities, and increased innovation, one critical aspect often overlooked is cybersecurity. Ensuring robust cybersecurity during the M&A process is paramount, as it safeguards the integrity of both companies involved, prot…
…
continue reading
1
Building a Career in Cyber by Thinking Outside the (Technical) Box with Kristin Kelly
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57For those who want to enter the cybersecurity field, especially if they come from a non-technical background, there is no shortage of opportunities. Just ask Kristin Kelly, our Growth Marketing Programs Specialist, who was recently recognized as a Young Professional to Watch by the International Legal Technology Association (ILTA). In this conversa…
…
continue reading
1
Behind the Screens: Developing an Industry-Leading Security Operations Program with Rob Watson and Ciaran Luttrell
39:55
39:55
Play later
Play later
Lists
Like
Liked
39:55In this episode, Ciaran Luttrell, Sr. Director of SOC Operations, EMEA, is joined by Rob Watson, SVP Security Services, to discuss security operations. Specifically, they chat about how SOCs should be structured, how to build a high-performing team of SOC Analysts, helping your team tackle burnout, and what it really takes to build an in-house SOC.…
…
continue reading
1
Inside the Ransomware Economy: The Industries and Businesses at Risk with Spence Hutchinson
28:18
28:18
Play later
Play later
Lists
Like
Liked
28:18In this episode, we sit down with Spence Hutchinson, Sr. Staff Threat Intelligence Researcher with our Threat Response Unit (TRU), and chat about the ransomware landscape, the cybercriminal "gig" economy, and which industries and types of businesses are most at risk of ransomware attacks. Key takeaways from the conversation include: The evolution o…
…
continue reading
1
Sustainability, Innovation, and the Future of MSPs/MSSPs with Joe Panettieri
41:04
41:04
Play later
Play later
Lists
Like
Liked
41:04In this episode, we sit down with Joe Panettieri, Founder of Channel Angels, Sustainable Tech Partner, and Mentore Ventures, to discuss how Joe got his start as a communications intern at IBM, his approach to making cybersecurity communications clear and digestible, and the dynamic nature of the cybersecurity industry. He also shares the lessons le…
…
continue reading
1
Decoding AlphV/BlackCat’s Ransomware Operations with Joe Stewart and Keegan Keplinger
35:26
35:26
Play later
Play later
Lists
Like
Liked
35:26The AlphV/BlackCat ransomware-as-a-service gang has been in the news lately thanks to the recent ransomware attack on Change Healthcare that resulted in widespread disruptions to healthcare services and allegedly resulted in the organization paying a $22 million ransom. Shortly thereafter, an affiliate claimed that BlackCat cheated them out of thei…
…
continue reading
1
Investing in Security: Reducing Cyber Risks in Private Equity with Eldon Sprickerhoff and Ryan Westman
24:51
24:51
Play later
Play later
Lists
Like
Liked
24:51Private Equity (PE) firms are increasingly targeted due to their comprehensive disclosure requirements, possession of sensitive data, and wide network of portfolio companies, making them lucrative targets for cybercriminals. What's more, threat actors exploit these characteristics to gain access to an extensive network by breaching just one entity.…
…
continue reading
1
Breaking Barriers and Leading with Purpose with Andrea Markstrom and Tia Hopkins
54:15
54:15
Play later
Play later
Lists
Like
Liked
54:15Since its emergence in 1911, every year on March 8, we celebrate International Women's Day to recognize the inspiring contributions that women have made in the professional and personal lives of those around them. In this episode, Erin McLean talks to Tia Hopkins and Andrea Markstrom, the Chief Information Officer at Schulte Roth & Zabel LLP and Fo…
…
continue reading
1
Dissecting LockBit’s Ransomware Operations with Keegan Keplinger and Brandon Stencell
31:52
31:52
Play later
Play later
Lists
Like
Liked
31:52Since their emergence in 2019 under the moniker 'ABCD', the LockBit ransomware-as-a-service gang has carved out a notorious reputation as a leading purveyor of ransomware. Their notoriety was cemented by pioneering triple extortion techniques and causing unprecedented disruption across the globe. However, they suffered a significant blow with the o…
…
continue reading
1
Shaping the Cybersecurity Program: Top Priorities and the Power of Mentorship with Michael Smith
42:41
42:41
Play later
Play later
Lists
Like
Liked
42:41In this episode, we explore Michael Smith's journey from an Air Force IT Manager to VP of Infrastructure and Operations at Trinity Industries, Inc., highlighting his pivotal roles and the cybersecurity landscape within the architecture, engineering, and construction sectors. Michael shares insights on outsourcing cybersecurity teams, the strategic …
…
continue reading
1
More Responsibility, Less Resources: How Security Leaders Can Do More With Less
37:39
37:39
Play later
Play later
Lists
Like
Liked
37:39Given the macroeconomic climate, security leaders are constantly tasked to do more with less – you’re being asked to take on more responsibility and protect your organizations against increasing cyber threats while balancing evolving regulatory frameworks and third-party vendor risk management. In this episode, Tia Hopkins, Chief Cyber Resilience O…
…
continue reading
1
Tackling Threats: Building a Winning Cyber Defense with Terrell Davis
51:58
51:58
Play later
Play later
Lists
Like
Liked
51:58Whether you're on the football field or on the cybersecurity battlefield, being resilient means being able to bounce back stronger after a setback. On the field, it's about how quickly your team is able to adapt to a bad start or a late-game deficit to take the win. In cybersecurity, it's about how your organization can anticipate, withstand, and r…
…
continue reading
1
From the Arena to the Boardroom: Greg Crowley's First 90 Days Blueprint
27:12
27:12
Play later
Play later
Lists
Like
Liked
27:12The role of any security leader – be it the CISO, CIO, VP Security, or even Director of Security, is that of a grandmaster in chess. Every move in the first phase sets the tone for the game, and the world of cybersecurity is no different. As a new security leader, your first 90 days can either establish a robust defense against cyber threats or lea…
…
continue reading
1
The Power of eSentire's Threat Response Unit (TRU): Office Hours with John Moretti
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07Modern threat response requires the ability to collect unstructured data from disparate sources associated with attacker tactics, techniques, and procedures (TTPs) and operationalize global protections – all in a timely manner. Unfortunately, many in-house security teams don't have the bandwidth or expertise to perform proactive threat hunting, con…
…
continue reading
The cybersecurity industry is facing a massive talent shortage. In fact, Cybersecurity Ventures has predicted that there will be 3.5 million unfilled positions in cybersecurity by 2025. As cyber threats continue to rise in number and complexity, security leaders are stretching their employees and resources thin to defend their organizations against…
…
continue reading
1
Securing Private Equity Firms from the Risk of Downtime
28:26
28:26
Play later
Play later
Lists
Like
Liked
28:26Private Equity (PE) firms and their portfolio companies are finding themselves, and their assets, in the crosshairs of motivated and well-equipped cybercriminals with increasing frequency. However, many PE firms may struggle with having the right threat detection and response capabilities in place to stop a critical cyberattack from impacting their…
…
continue reading
1
MDR vs. XDR: Office Hours with John & Mike (An e3 Partners Episode)
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33John Moretti, Principal Solutions Architect, and Mike Sci, Senior Channel Solutions Architect, have become the go-tos when our channel partners have questions or need advice. In this Office Hours episode, John and Mike answer some of the most common questions e3 Ecosystem partners have when it comes to Managed Detection and Response (MDR) versus Ex…
…
continue reading
1
Managing Cyber Risk Against Unrealistic Expectations (Live from InfoSec World)
22:41
22:41
Play later
Play later
Lists
Like
Liked
22:41Most organizations fall victim to cyberattacks because business leaders don’t understand the risk. They don’t see their business as a target, they deny the threat, or believe technology alone can prevent any cyberattack. This cyber-cognitive dissonance creates significant challenges for CISOs who must quantify risk and prioritize resources to prote…
…
continue reading
Tia Hopkins, eSentire's Field CTO and Chief Cyber Risk Strategist, is no stranger to security leaders asking her for advice. In this Office Hours episode, she answers some of the most common questions security leaders have. Topics include: how organizations should differentiate between MDR service providers, why compliance-driven security programs …
…
continue reading