Look for any podcast host, guest or anyone
Showing episodes and shows of

Richard Stiennon

Shows

Redefining CyberSecurityRedefining CyberSecurityBlack Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco CiappelliIn this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what’s scheduled.Daniel Cuthbert, member of the Blac...2025-07-311h 00On Location With Sean Martin And Marco CiappelliOn Location With Sean Martin And Marco CiappelliBlack Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco CiappelliIn this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what’s scheduled.Daniel Cuthbert, member of the Blac...2025-07-301h 00ITSPmagazine PodcastsITSPmagazine PodcastsBlack Hat 2025: More Buzzwords, Same Breaches? | What’s Heating Up Before Black Hat 2025: Top Trends Set to Shake Up this Year’s Hacker Conference | An ITSPmagazine Webinar: On Location Coverage with Sean Martin and Marco CiappelliIn this thought leadership session, ITSPmagazine co-founders Sean Martin and Marco Ciappelli moderate a dynamic conversation with five industry leaders offering their take on what will dominate the show floor and side-stage chatter at Black Hat USA 2025.Leslie Kesselring, Founder of Kesselring Communications, surfaces how media coverage is shifting in real time—no longer driven solely by talk submissions but now heavily influenced by breaking news, regulation, and public-private sector dynamics. From government briefings to cyberweapon disclosures, the pressure is on to cover what matters, not just what’s scheduled.Daniel Cuthbert, member of the Blac...2025-07-301h 00Reimagining Cyber - real world perspectives on cybersecurityReimagining Cyber - real world perspectives on cybersecurityMid-Year Trends & 2026 Predictions with Richard Stiennon - Ep 159In this episode of Reimagining Cyber, host Rob Aragao talks with Richard Stiennon, author of the legendary 'Security Yearbook'. Stiennonn discusses his career as an industry analyst and his recent focus on mergers and acquisitions within cybersecurity. The conversation dives into the meticulous process behind the Security Yearbook, AI's growing role in cybersecurity, and the state of M&A activities in 2025. Stiennon also offers predictions for the cybersecurity landscape in 2026 and beyond, emphasizing the value of automation and the impact of AI on both cyber defense and attacks. Don't miss this insightful discussion on the future of cybersecurity.2025-07-2230 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechIs SaaS Dead? The Hidden Cost of AI Agentic CompaniesJosh Bruyning and Richard Stiennon explore how AI agents are fundamentally changing the SaaS industry and traditional software models. They discuss the shift from feature-based to outcome-based solutions and why companies must adapt to survive.• Richard Stiennon shares insights about Security Yearbook 2025 and IT Harvest's database tracking over 4,340 cybersecurity vendors• Introduction to Compliance Aid, a disruptive platform supporting 366 global compliance frameworks through conversational AI• Analysis of why traditional SaaS companies must incorporate AI agents to remain competitive• Discussion of the "agentification" trend: adding AI capabilities to specialized software platforms• Exploration of how specialized knowledge...2025-05-2046 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechMarket Watch - Will AI Replace Your Security Team? Hard Truths and Bold PredictionsAI agents equipped with computer use capabilities will transform the cybersecurity landscape within the next year, shifting from augmenting to potentially replacing human SOC analysts with systems that can perform 100% alert triage. The investment landscape reflects this shift, with 78% of venture capital reportedly flowing into AI companies despite many firms simply adopting AI terminology without substantive implementation.• Computer use abilities allowing AI to operate systems like humans will be the next major advancement• Within 12 months, expert AI agents will function like "super employees" in security operations• Ephemeral AI agents that complete specific tasks before dissolving enable...2025-04-2929 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechMarket Watch - AI and the Future of Security OperationsIn this episode, Richard Stiennon makes some bold predictions about the future of AI in Cybersecurity. Artificial intelligence is transforming cybersecurity at an unprecedented pace, with large language models increasing in intelligence tenfold every 12 months and reaching a potential critical mass by 2027.• SOC automation represents the most immediate and profound application of AI in cybersecurity• Approximately 15 startups are developing AI solutions to replace tier-one SOC analysts• AI will eventually enable 100% automated triage of security alerts• The shift from tactical to strategic skills will be critical for cybersecurity professionals• As defensive AI improves, cybercrime may dramat...2025-04-2137 minTrust.ID Talk: The Digital Certificate and Identity Security PodcastTrust.ID Talk: The Digital Certificate and Identity Security PodcastWhy Banning AI in Your Company Is a Huge Mistake with Richard StiennonIn this episode of Trust.ID Talk: The Digital Certificate and Identity Security Podcast, host Steven Hall is joined by Richard Stiennon, Chief Research Analyst at IT-Harvest. Together, they explore the revolutionary impact of AI on cybersecurity operations. From practical applications in threat hunting to essential PKI management practices, Richard shares how security teams can leverage AI tools while maintaining robust protection.2025-04-1025 minThe Security StrategistThe Security StrategistMeeting of the Minds: State of Cybersecurity in 2025 Part IIWelcome back to Meeting of the Minds, a podcast series that brings industry leaders together for the most engaging conversations of the year. In our inaugural episode, cybersecurity experts Christopher Steffen, Richard Stiennon, and Brad LaPorte, joined by Evgeniy Kharam, provided a comprehensive overview of the current cybersecurity landscape. They explored the complexities and challenges that organisations face in today's digital age, setting the stage for a deeper exploration of what the future holds.This episode, Steffen, Stiennon, and LaPorte were joined by moderator Alejandro Leal, a senior analyst specialising in cybersecurity, digital identity, and AI at...2025-03-2545 minAdventures of Alice & BobAdventures of Alice & BobEp. 73 - How a Magazine Article Led to a Cybersecurity Empire // Richard StiennonIn this episode, James chats with Richard Stiennon—cybersecurity analyst, author, and former aerospace engineer—whose 20+ year journey spans from designing car seats to hacking corporate systems for giants like Dell. Hear how a 1992 magazine article led him to launch his own ISP and rise to prominence at Gartner. Richard shares his personal stories from the frontlines of cybersecurity, his crusade against risk management jargon, and bold predictions on AI’s impact on security. Plus, private jet mishaps and the unconventional wisdom behind IT Harvest. 2025-02-2855 minThe Cyber PMM PodcastThe Cyber PMM PodcastRichard StiennonJoin this conversation with cybersecurity industry and market expert Richard Stiennon. Learn about his industry origin story, the IT Harvest beginnings, how he's categorizing 10,000+ products, overall market trends, and his advice for Cyber PMMs on how to meet buyers in the coming age of AI-assisted buyer research. 2025-01-1539 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechCurrent State of Cybersecurity Vendors with Richard Stiennon, CEO and Co-Founder @IT-HarvestEver wondered what it takes to be a trailblazer in cybersecurity? Join us as Richard Stiennon, the first-ever Gartner security analyst and the visionary behind IT Harvest, shares his incredible journey. From dreaming of space exploration and making strides in aerospace and the automotive industry to founding Michigan's first ISP, Richard’s story is one of relentless innovation. We also explore his book "Curmudgeon," where he reveals his unique philosophy on taking bold stances and being comfortable with being wrong to drive real breakthroughs. Richard’s experiences offer a treasure trove of insights for anyone passionate about technology and secu...2025-01-0233 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechA Look back at Cybersecurity Investment in 2024Richard Stiennon, the acclaimed author of "Security Yearbook 2024" and CEO of IT Harvest, joins us to unravel the intricacies of the cybersecurity landscape. Discover how IT Harvest is redefining industry analysis with its SaaS platform, offering a fresh, data-driven alternative to traditional analyst firms. Richard shares his journey from independent publishing to a partnership with Wiley and previews the much-anticipated 2025 edition of his yearbook series. Our discussion highlights the role of AI in transforming industry practices, emphasizing efficiency and innovation in identifying security solutions through natural language queries.Explore the evolving dynamics of cybersecurity investment amidst economic...2024-12-2047 minThe Key Point PodcastThe Key Point PodcastRichard Stiennon on Cybersecurity and His Cyber 150 List IT-Harvest Founder and industry analyst Richard Stiennon makes his second 2024 appearance on The Key Point Podcast, this time to discuss the area he’s well known for: Cybersecurity. In this conversation with Keypoint Intelligence’s Carl Schell and Jamie Bsales, Richard details his latest creation—the Cyber 150, a list of the fastest-growing organizations in  today—as well as challenges, trends, and otherwise in the rapidly evolving security space.2024-10-2326 minThe Key Point PodcastThe Key Point PodcastRichard Stiennon on Cybersecurity and His Cyber 150 ListIT-Harvest Founder and industry analyst Richard Stiennon makes his second 2024 appearance on The Key Point Podcast, this time to discuss the area he’s well known for: Cybersecurity. In this conversation with Keypoint Intelligence’s Carl Schell and Jamie Bsales, Richard details his latest creation—the Cyber 150, a list of the fastest-growing organizations in  today—as well as challenges, trends, and otherwise in the rapidly evolving security space.2024-10-2326 minScale to Zero - No Security Questions Left UnansweredScale to Zero - No Security Questions Left UnansweredSelecting The Right Security Vendor | Cloud | Ft. Richard Stiennon | S2 Ep.45 | ScaleToZero podcastAre you struggling to navigate the complex landscape of cloud security? Our latest podcast episode features Richard Stiennon, a seasoned cybersecurity expert who shares invaluable insights and practical advice. From vendor selection to multi-cloud strategies and beyond, this podcast covers it all. YouTube: https://youtu.be/XVcXBZVgfeA 00:00 Teaser and Introduction 05:58 Key factors to evaluate cloud security needs - vendor selection. 14:29 Key considerations in case of multi-cloud environments. 16:34 Common mistakes organizations make while evaluating cloud security platforms. 18:18 Showing security tool values to...2024-10-091h 00Detection Engineering DispatchDetection Engineering DispatchEpisode 31: The Cybersecurity Dilemma | Platformization vs. Best-of-Breed Solutions with Richard StiennonIn this episode of Detection Dispatch, we are excited to present a conversation with Richard Stiennon, a seasoned industry analyst. Tune in to hear Richard and host Alex Hurtado explore the intricacies of detection engineering and the critical decision-making processes involved in selecting the most effective cybersecurity solutions. Discover the pitfalls of single-vendor platforms and the benefits of a defense-in-depth strategy, providing actionable insights for security leaders.Join our live conversation bi-weekly on Thursdays! You only have to register once:➡️ Register Here Stay in the...2024-09-3032 minNPC Update-1 PodcastNPC Update-1 PodcastStaying Cyber Safe in 2024How secure is your data? In this episode of Update-1, Press Club member and cybersecurity industry analyst Richard Stiennon speaks with NPC Broadcast Podcast team member Shannon Fisher about the dynamic nature of the IT industry and his annual security yearbook. Stiennon's book, "Security Yearbook 2024: A History and Directory of the IT Security Industry," is an in-depth look at the ever-shifting world of cyberthreats and the industry experts trying to stop them. Stiennon offers practical suggestions for newsrooms, journalists, companies, and individuals to keep their data secure.2024-08-2119 minNPC Update-1 PodcastNPC Update-1 PodcastStaying Cyber Safe in 2024How secure is your data? In this episode of Update-1, Press Club member and cybersecurity industry analyst Richard Stiennon speaks with NPC Broadcast Podcast team member Shannon Fisher about the dynamic nature of the IT industry and his annual security yearbook. Stiennon's book, "Security Yearbook 2024: A History and Directory of the IT Security Industry," is an in-depth look at the ever-shifting world of cyberthreats and the industry experts trying to stop them. Stiennon offers practical suggestions for newsrooms, journalists, companies, and individuals to keep their data secure.2024-08-2119 minThe Key Point PodcastThe Key Point PodcastRichard Stiennon on Industry Analysts Today and in the AI FutureKeypoint Intelligence’s Peter Mayhew and Carl Schell sit down with Richard Stiennon, Founder of IT-Harvest and author of Curmudgeon, to discuss being an analyst in the print and smart technology industry. Using many ideas from the book to frame the conversation, they speak at length about analysts vs. journalists vs. influencers as well as what ingredients are needed to be successful in the space in the future.2024-06-1939 minThe Key Point PodcastThe Key Point PodcastRichard Stiennon on Industry Analysts Today and in the AI FutureKeypoint Intelligence’s Peter Mayhew and Carl Schell sit down with Richard Stiennon, Founder of IT-Harvest and author of Curmudgeon, to discuss being an analyst in the print and smart technology industry. Using many ideas from the book to frame the conversation, they speak at length about analysts vs. journalists vs. influencers as well as what ingredients are needed to be successful in the space in the future.2024-06-1939 minCyber InspirationCyber InspirationEpisode 70 - Richard Stiennon - Author of Security YearbookIn this episode of Cyber Inspiration Podcast, we're joined by Richard Stiennon, a prominent figure in the cybersecurity realm. Richard shares his journey, from his beginnings as an industry analyst to becoming a prolific author. He reflects on his experiences at major events like RSA, offering insights gleaned from interacting with cybersecurity thought leaders.Delving into the writing process, Richard discusses how he collects data on cybersecurity vendors and transforms it into comprehensive narratives in his books. He also touches on the challenges and rewards of self-publishing versus traditional publishing in the cybersecurity domain.Richard...2024-05-0225 minTechSpective PodcastTechSpective PodcastFuture of Tech and Cybersecurity Looks Bright Thanks to AITechSpective Podcast Episode 129   You may not have noticed, but the tech and cybersecurity job market has sort of sucked the past few years. Maybe it's just me. My friend Richard Stiennon, research analyst with IT-Harvest and author of Security Yearbook 2024, joins this episode of the TechSpective Podcast to talk about the upcoming 5th edition of the Security Yearbook, and share his insights on why he thinks that is all about to change. "Hiring has been frozen for the last 18 months, but my advice is, 'Hang in there.' All hell is gonna break loose," declared Stiennon. He adds, "I'm convinced th...2024-03-2652 minITSPmagazine PodcastsITSPmagazine PodcastsA Reality Check: Platforms vs. Standalone Solutions and Their Place in an Expanding and Contracting Cybersecurity Market | A Conversation with Eric Parizo and Richard Stiennon | Redefining CyberSecurity Podcast with Sean MartinGuests:Eric Parizo, Managing Principle Analyst at Omdia [@OmdiaHQ]On Linkedin | https://www.linkedin.com/in/ericparizo/On Twitter | https://twitter.com/EricParizoRichard Stiennon, Chief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________2024-02-2354 minRedefining CyberSecurityRedefining CyberSecurityA Reality Check: Platforms vs. Standalone Solutions and Their Place in an Expanding and Contracting Cybersecurity Market | A Conversation with Eric Parizo and Richard Stiennon | Redefining CyberSecurity Podcast with Sean MartinGuests:Eric Parizo, Managing Principle Analyst at Omdia [@OmdiaHQ]On Linkedin | https://www.linkedin.com/in/ericparizo/On Twitter | https://twitter.com/EricParizoRichard Stiennon, Chief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | https://www.linkedin.com/in/stiennon/On YouTube | https://www.youtube.com/channel/UCJbNLvhmVGnRerhrSU1mFug____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________2024-02-2354 minmnemonic security podcastmnemonic security podcastA student/mentor’s perspective on AIHow will AI impact the next generation of people working with computer science?This question is probably relevant for anyone making their way through school now, in all fields of study. Without looking for a definite answer, but to help him navigate this question, Robby has invited two people with quite different backgrounds: Richard Stiennon, author of Security Yearbook 2023 and Founder and Chief Research Analyst at IT-Harvest, and High School Junior, Athena Contos. Athena was recently visiting colleges, together with her father Brian Contos, a long-time veteran of the mnemonic security podcast. They both noticed a...2024-02-1227 minThe Cyberlaw PodcastThe Cyberlaw PodcastSerious threats, unserious responsesIt was a week of serious cybersecurity incidents paired with unimpressive responses. As Melanie Teplinsky reminds us, the U.S. government has been agitated for months about China’s apparent strategic decision to hold U.S. infrastructure hostage to cyberattack in a crisis. Now the government has struck back at Volt Typhoon, the Chinese threat actor pursuing that strategy. It claimed recently to have disrupted a Volt Typhoon botnet by taking over a batch of compromised routers. Andrew Adams explains how the takeover was managed through the court system. It was a lot of work, and there is reason to...2024-02-0654 minThe Cyberlaw PodcastThe Cyberlaw PodcastSerious threats, unserious responsesIt was a week of serious cybersecurity incidents paired with unimpressive responses. As Melanie Teplinsky reminds us, the U.S. government has been agitated for months about China’s apparent strategic decision to hold U.S. infrastructure hostage to cyberattack in a crisis. Now the government has struck back at Volt Typhoon, the Chinese threat actor pursuing that strategy. It claimed recently to have disrupted a Volt Typhoon botnet by taking over a batch of compromised routers. Andrew Adams explains how the takeover was managed through the court system. It was a lot of work, and there is reason to...2024-02-0654 minCybersecurity Insights PodcastCybersecurity Insights PodcastCybersecurity and the Board | A Conversation with Richard Stiennon | Cybersecurity Insights Podcast with Matthew RosenquistGuest: Richard Stiennon, Research Analyst, Author of Security Yearbook 2023On LinkedIn | https://www.linkedin.com/in/stiennon/Host: Matthew RosenquistOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionA hot debate where we argue and disagree about how CISOs should engage the board, but this is an example of professionals having a respectful constructive discussion.  At the end of the day, we are both...2023-11-1017 minCybersecurity Insights PodcastCybersecurity Insights PodcastAI and Cybersecurity | A Conversation with Richard Stiennon | Cybersecurity Insights Podcast with Matthew RosenquistGuest: Richard Stiennon, Research Analyst, Author of Security Yearbook 2023On LinkedIn | https://www.linkedin.com/in/stiennon/Host: Matthew RosenquistOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionThe hottest topic of 2023 - Artificial Intelligence.  Richard Stiennon and Matthew Rosenquist discuss the relevance and how Large Language Models (LLMs), like ChatGPT, are adding innovation to the use of AI in the cybersecurity domain.2023-11-0316 minCybernomics: Where Business Meets TechCybernomics: Where Business Meets TechThe Hidden Costs of Navigating The Security Solution Market, The Vendor ProblemGet ready for an enlightening exchange with seasoned industry expert, Richard Stiennon, as he uncovers the secrets behind his successful journey in the security ecosystem. Richard, the mastermind behind IT-Harvest, offers exclusive insights into the creation and operations of a data-driven analyst product that stands in contrast to Gartner as a beacon in the crowded security market. With a deep dive into his Security Yearbook 2023 and the exciting transition to Wiley for the 2024 edition, there’s much to learn from Richard's experiences.The conversation heats up as we tackle the impressive task of categorizing and collecting data po...2023-10-0247 minThe Cyberlaw PodcastThe Cyberlaw PodcastAI Leaders Bring Washington a Bag of PromisesIn our last episode before the August break, the Cyberlaw Podcast drills down on the AI industry leaders’ trip to Washington, where they dutifully signed up to what Gus Hurwitz calls “a bag of promises.” Gus and I parse the promises, some of which are empty, others of which have substance. Along the way, we examine the EU’s struggling campaign to lobby other countries to adopt its AI regulation framework. Really, guys, if you don’t want to be called regulatory neocolonialists, maybe you shouldn’t go around telling former European colonies to change their laws to match Europe’s.2023-07-2654 minThe Cyberlaw PodcastThe Cyberlaw PodcastAI Leaders Bring Washington a Bag of PromisesIn our last episode before the August break, the Cyberlaw Podcast drills down on the AI industry leaders’ trip to Washington, where they dutifully signed up to what Gus Hurwitz calls “a bag of promises.” Gus and I parse the promises, some of which are empty, others of which have substance. Along the way, we examine the EU’s struggling campaign to lobby other countries to adopt its AI regulation framework. Really, guys, if you don’t want to be called regulatory neocolonialists, maybe you shouldn’t go around telling former European colonies to change their laws to match Europe’s.2023-07-2654 minThe Cyberlaw PodcastThe Cyberlaw PodcastWhen AI Poses an Existential Risk to Your Law LicenseThis episode of the Cyberlaw Podcast features the second half of my interview with Paul Stephan, author of The World Crisis and International Law. But it begins the way many recent episodes have begun, with the latest AI news. And, since it’s so squarely in scope for a cyberlaw podcast, we devote some time to the so-appalling- you-have-to-laugh-to keep-from-crying story of the lawyer who relied on ChatGPT to write his brief. As Eugene Volokh noted in his post, the model returned exactly the case law the lawyer wanted—because it made up the cases, the citations, and even the q...2023-05-311h 16The Cyberlaw PodcastThe Cyberlaw PodcastWhen AI Poses an Existential Risk to Your Law LicenseThis episode of the Cyberlaw Podcast features the second half of my interview with Paul Stephan, author of The World Crisis and International Law. But it begins the way many recent episodes have begun, with the latest AI news. And, since it’s so squarely in scope for a cyberlaw podcast, we devote some time to the so-appalling- you-have-to-laugh-to keep-from-crying story of the lawyer who relied on ChatGPT to write his brief. As Eugene Volokh noted in his post, the model returned exactly the case law the lawyer wanted—because it made up the cases, the citations, and even the q...2023-05-311h 16KitecastKitecastRichard Stiennon: The Good, Bad, and Ugly About AI CybersecurityRichard Stiennon, a cybersecurity pioneer, author, and industry executive, spoke about the hottest trending topic of our day in this Kitecast episode: artificial intelligence (AI). He currently serves as the Chief Research Analyst at IT-Harvest, a research organization he founded in 2017, which provides access to data on more than 3,318 cybersecurity vendors. To streamline and automate the compilation of data, Stiennon explains how IT-Harvest is using ChatGPT 4.0. On that note, Stiennon discusses how AI is transforming cybersecurity—both for the good and the bad. Cybercriminals are finding ways around guardrails instituted in commercially available AI solutions like ChatGPT and...2023-05-0344 minKBKASTKBKASTEpisode 172: Richard StiennonRichard Stiennon is Chief Research Analyst for IT-Harvest, the firm he founded in 2005 to cover the 3,051+ vendors that make up the IT security industry. He has presented on the topic of cybersecurity in 31 countries on six continents. He was a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar.  Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner. He has a...2023-03-3052 minLessons from the School of Security Hard KnocksLessons from the School of Security Hard KnocksRichard Stiennon: On Cyber WarfareToday's guest is Richard Stiennon, Chief Research Analyst at IT-Harvest. In a nod to Clausewitz and Gaddis, this episode is called On Cyber Warfare. In this episode, Richard discusses founding IT-Harvest and his current role there, the transition to data-driven research, the biggest industry shifts and trends, the threat and the current state of cyber warfare, his feelings towards cyber defense, and as always, his toughest lesson learned.2023-01-1141 minThe Cyberlaw PodcastThe Cyberlaw PodcastChatGPT Successfully Imitates a Talented Sociopath with Too Many LawyersIt’s been a news-heavy week, but we have the most fun in this episode with ChatGPT. Jane Bambauer, Richard Stiennon, and I pick over the astonishing number of use cases and misuse cases disclosed by the release of ChatGPT for public access. It is talented—writing dozens of term papers in seconds. It is sociopathic—the term papers are full of falsehoods, down to the made-up citations to plausible but nonexistent New York Times stories. And it has too many lawyers—Richard’s request that it provide his bio (or even Einstein’s) was refused on what are almost certa...2022-12-131h 00The Cyberlaw PodcastThe Cyberlaw PodcastChatGPT Successfully Imitates a Talented Sociopath with Too Many LawyersIt’s been a news-heavy week, but we have the most fun in this episode with ChatGPT. Jane Bambauer, Richard Stiennon, and I pick over the astonishing number of use cases and misuse cases disclosed by the release of ChatGPT for public access. It is talented—writing dozens of term papers in seconds. It is sociopathic—the term papers are full of falsehoods, down to the made-up citations to plausible but nonexistent New York Times stories. And it has too many lawyers—Richard’s request that it provide his bio (or even Einstein’s) was refused on what are almost certa...2022-12-131h 00CyberblogCyberblogEpisode 434: ChatGPT Successfully Imitates a Talented Sociopath with Too Many Lawyershttps://www.steptoe.com/podcasts/TheCyberlawPodcast-434.mp3 It’s been a news-heavy week, but we have the most fun in this episode with ChatGPT. Jane Bambauer, Richard Stiennon, and I pick over the astonishing number of use cases and misuse cases disclosed by the release of ChatGPT for public access. It is talented – writing dozens of term papers in seconds. It is sociopathic – the term papers are full of falsehoods, down to the made-up citations to plausible but nonexistent New York Times stories. And it has too many lawyers – Richard’s request that it provide his bio (or even Einstein’s...2022-12-1300 minIoT Security PodcastIoT Security PodcastCybercriminals and Nation-States Look to IoT as the New FrontlineRichard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s di...2022-11-2952 minThe Cyberlaw PodcastThe Cyberlaw PodcastChip WarsDavid Kris opens this episode of the Cyberlaw Podcast by laying out some of the massive disruption that the Biden Administration has kicked off in China’s semiconductor industry—and its Western suppliers. The reverberations of the administration’s new measures will be felt for years, and the Chinese government’s response, not to mention the ultimate consequences, remains uncertain. Richard Stiennon, our industry analyst, gives us an overview of the cybersecurity market, where tech and cyber companies have taken a beating but cybersecurity startups continue to gain funding.  Mark MacCarthy reviews the industry from the viewp...2022-10-1849 minThe Cyberlaw PodcastThe Cyberlaw PodcastChip WarsDavid Kris opens this episode of the Cyberlaw Podcast by laying out some of the massive disruption that the Biden Administration has kicked off in China’s semiconductor industry—and its Western suppliers. The reverberations of the administration’s new measures will be felt for years, and the Chinese government’s response, not to mention the ultimate consequences, remains uncertain. Richard Stiennon, our industry analyst, gives us an overview of the cybersecurity market, where tech and cyber companies have taken a beating but cybersecurity startups continue to gain funding.  Mark MacCarthy reviews the industry from the viewp...2022-10-1849 minCyberblogCyberblogEpisode 426: Chip Warshttps://www.steptoe.com/podcasts/TheCyberlawPodcast-426.mp3 David Kris opens this episode of the Cyberlaw Podcast by laying out some of the massive disruption that the Biden Administration has kicked off in China’s semiconductor industry – and its Western suppliers. The reverberations of the administration’s new measures will be felt for years, and the Chinese government’s response, not to mention the ultimate consequences, remains uncertain. Richard Stiennon, our industry analyst, gives us an overview of the cybersecurity market, where tech and cyber companies have taken a beating but cybersecurity startups continue to gain funding...2022-10-1800 minCyber InspirationCyber InspirationEpisode 10 - Richard Stiennon - Founder of IT-HarvestWelcome to Cyber Inspiration Podcast, you may be familiar with me as Co-host of the Security Architecture Podcast, which I started with Dmitry Raidman CTO of Cybeats in 2020 Richard Stiennon - Founder of IT-HarvestSpecial addition!Richard has been around the cyber security industry for a long time and has a great perspective on the vendor community! He tells about his challenges and success in building a company around the vendors and how the realization of the vision changed several times.Please comment rate and share with your friends...2022-10-0316 minRedefining CyberSecurityRedefining CyberSecurityBlack Hat 25 & DEF CON 30 Live Streaming Coverage With ITSPmagazine | Richard Stiennon | Redefining CyberSecurity Podcast With Sean Martin And Marco CiappelliIt's Hacker Summer Camp time! Thank you for joining this live stream during Black Hat and DEF CON with guest Richard Stiennon!Watch the live stream video on our Black Hat and DEF CON coverage page: https://www.itspm.ag/bhdc22Follow our social media as everything will be streamed live as it is. No editing, no script, and most of all … no BS 🎙✨🤘😬 ITSPmagazine and friends ... connecting the world with InfoSec!GuestRichard StiennonChief Research Analyst at IT-Harvest [@cyberwar]On Twitter | https://twitter.com/stiennonOn LinkedIn | h...2022-08-1222 minTechSpective PodcastTechSpective PodcastRichard Stiennon Talks about Security Yearbook 2022TechSpective Podcast Episode 094   There are nearly 3,000 cybersecurity companies out there--and you can find them all in the Security Yearbook 2022. This is the third annual release of the Security Yearbook by research analyst and author Richard Stiennon. He has compiled them alphabetically, geographically, and by industry category, along with key details such as their location, current headcount, and the percentage of change in headcount from the previous year. Security Yearbook 2022 is truly a comprehensive compendium of the security industry, but it is more than simply a reference book. Stiennon includes chapters at the beginning of the book that examine interesting stories a...2022-07-3155 minRedefining CyberSecurityRedefining CyberSecurityBook | Security Yearbook: A Complete History And Directory Of The Entire Cybersecurity Industry | Redefining CyberSecurity With Richard StiennonDo you think you know all of the cybersecurity vendors on the market? Think again. Need help getting a clear view for how they all fit into the bigger InfoSec picture in your org? Have a listen.In today's episode, long-time industry analyst, Richard Stiennon, takes us on a journey down memory lane into the world of cybersecurity and the ever-growing landscape of innovation, technology, features, products, solutions, and more.About the bookSecurity Yearbook 2020 was launched at RSA Conference 2020 on February 24 and has been identified as One of the Best Cybersecurity Books of 2021...2022-03-1541 minCyber WorkCyber WorkInside the Security Yearbook: Industry trends, career advice and more! | Guest Richard StiennonSecurity Yearbook creator Richard Stiennon joins today’s podcast to share his career journey. He talks about creating the first ISP in the Midwest in the ‘90s, the role of the Security Yearbook in telling the history of cybersecurity and the best place to start your cybersecurity career. Hint: It’s not necessarily with the big firms! – Save 50% on your copy of the Security Yearbook with code "infoseclive": https://it-harvest.com/shop– Start learning cybersecurity for free: https://www.infosecinstitute.com/free – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcast0:0...2021-09-2051 minThe Tech That Connects UsThe Tech That Connects UsCovid Made my Business Evaporate Overnight – So I Did Something Else! Episode 34 - Richard Stiennon, Chief Research Analyst IT-HarvestA true historian, and ex-Gartner VP, Richard is to Cyber Security what Herodotus was to the Ancient Greeks & Romans – researching, writing, and commenting on security since ’95. Experience helps him to separate buzzwords from business value, so we were delighted to chat with him about all manner of topics, including how his working life has changed during Covid, what he feels are the key Cyber innovations, and where he sees the future of the market.2021-05-1939 minTechSpective PodcastTechSpective PodcastRichard Stiennon Talks about Security Yearbook 2021 and Getting Through the PandemicTechSpective Podcast Episode 059 If you have worked in or near cybersecurity in the last 20 years or so, there's a good chance you're familiar with Richard Stiennon. Richard is a former Gartner analyst who has established himself as a leading independent analyst--as well as an author and speaker in the field. His breadth of knowledge about cybersecurity is challenged only by the size of the Rolodex (Kids--that is like the Contacts app on your smartphone, except that every contact was written on its own physical index card and then...just Google for images of a Rolodex) he has accumulated over the...2021-05-1755 minCyware\'s CyberCastCyware's CyberCastCyberCast EP 04: Author, Analyst, and Cyber Thought Leader Richard StiennonThe future of any industry is built upon the foundation of its past. Cybersecurity and where it is today is no different. This week's guest is as much a historian as he is an evangelist for the future of security, Richard Stiennon.Richard's book, Security Yearbook 2020, is the first complete history of the development of IT security solutions. It focuses is on the pioneers in the space and the companies that arose from their efforts. Security Yearbook shares stories from these pioneers, presented in their own voice while the overall story of the space is recounted as it grew from...2021-04-1548 minSecurity on CloudSecurity on CloudThere is No Cloud Security Market Segment with Richard StiennonRichard Stiennon, Chief Research Analyst with IT-Harvest and industry executive, joins the podcast. Richard gives insight on some of the bigger and most known data attacks in reference to what we are learning for future avoidance. What are some of the security lessons that we’ve learned from these attacks? On both the supplier side as well as the consumer side. Are current verification methods sufficient to assure security from attacks? Scott dives into Richard’s recent publishings including the Forbes article “There is No Cloud Security Segment” and his book the Securi...2021-01-0631 minAVANT Technology InsightsAVANT Technology InsightsRichard Stiennon: IT Security in 2021A major breach captures world attention. Then there's ransomware, the effects of Covid-19, the emergence of SASE, and a whole lot of other IT security impacts. In this episode, analyst and author Richard Stiennon explores these topics with Ken Presti in advance of Stiennon's upcoming release, "The Security Yearbook 2021."2020-12-2333 minTo The Point - CybersecurityTo The Point - CybersecurityRichard Stiennon, Industry Analyst discusses Digital Pearl HarborRichard joins us to discuss what cyber war looks like and how we can prepare for the proverbial "Digital Pearl Harbor". For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e742020-04-1419 minThe OWASP Podcast SeriesThe OWASP Podcast SeriesThe Demise of Symantec by Richard StiennonWhen I read Richard Stiennon's latest article in Forbes, The Demise of Symantec, I thought it was absolutely fascinating. Richard walks through the process of what happened at Symantec, how it was an acquisition engine for so many years, and now how it's started to decline. I got in touch with Richard and told him I'd like to have him read his article for the podcast, and he responded right away. What you'll hear in this episode is Richard talking about and reading from his article, The Demise of Symantec. Resources for this podcast: The Demise of Symantec, Forbes Online ...2020-03-2014 minChannelPro Weekly PodcastChannelPro Weekly PodcastChannelPro Weekly Podcast: Episode #138 - Needle Nose NedHmm, wonder what topic Matt, Rich, and guest host Mike Semel, of Semel Consulting, will talk about this week. Surprise! It’s the Coronavirus outbreak, and the challenges of coping with remote work generally and security specifically these days, a subject they get into in detail with interview guest Richard Stiennon, of security consultancy IT-Harvest. They also discuss the pros and cons of rotating passwords, getting your business right for a sale, and Kaseya Compliance Manager’s new no-wait cyber insurance integration. Hat tip on that last story to Ned Ryerson! Remember folks, if you have cyber insu...2020-03-201h 41To The Point - CybersecurityTo The Point - CybersecuritySuccessful SASE Architecture, with Richard StiennonRichard shares what he thinks a successful SASE architecture looks like and why it will lead us to secure Cloud. For links and resources discussed in this episode, please visit our show notes at https://www.forcepoint.com/govpodcast/e692020-03-1023 minReal CyberSecurityReal CyberSecurityEpisode 6 - Interview of Richard Stiennon, and Security Company LeadersBill and Greg interview Richard Stiennon, who discusses his new book Security Yearbook 2020 and how it is a survey and history of the industry.  We discuss that how non-security CEOs fare in the security market, and why non-security companies don't lead in security.  And how awesome/nasty an "I Told You So, Security Edition" book would be, how small the cybersecurity industry is, and our favorite security leaders.His book is available here:  https://www.amazon.com/dp/1945254041/ref=cm_sw_em_r_mt_dp_U_VwxxEb5J3J4CW We don't have one of thos...2020-03-0330 minGet WiseGet WiseS1E02 - Getting Wise with Richard StiennonIn this episode WiseLaw talks with special guest Richard Stiennon - Chief Research Analyst for IT-Harvest. #WiseLaw #GetWise #Cyberlaw2019-09-2312 minMomenta I Digital ThreadMomenta I Digital Thread#58 Exploring Secure Cloud Transformation with author Richard SteinnonRich Stiennon is a long-time Industry Analyst and Author of Secure Industry Analyst: The Cio's Journey. One of the key points of the book is that businesses are currently in the midst of transitioning to Office 365 for email and Office tools. In the book, Stiennon explores journey of 16 leading enterprises around the world including Schneider, GE, Fannie Mae, Siemens, Google, Microsoft, and Amazon. Our discussion explores how the adoption of SaaS applications becomes a starting point for technological trannsformation, and how Office365 has had the most dramatic impact on enterprise IT infrastructure in decades. We explore how networks are impacted...2019-05-1552 minTechSpective PodcastTechSpective PodcastRichard Stiennon Discusses His New Book 'Secure Cloud Transformation'Inner Circle Podcast Episode 023 My guest for this episode of the Inner Circle podcast is Richard Stiennon. Richard has been waist-deep in cybersecurity for decades. He is a former Gartner analyst, who went on to be a VP of Threat Research at Webroot, and the Chief Marketing Officer of Fortinet, before launching his own analyst firm. Along the way, he has also authored a few books--including the recently launched 'Secure Cloud Transformation: The CIO's Journey'. He is also a fellow Detroiter. Yes, I live outside of Houston and I've been in Texas since 2007--but that doesn't make me Texan. I...2019-02-2500 minPodcasts – Internet AdvisorPodcasts – Internet AdvisorPodcast 1806 Falcon Super Heavy Soars and Meteorites Fall on Michigan[vc_row][vc_column][vc_images_carousel images=”15026,15029,15030,15032,15033,15034,15013″ img_size=”medium” autoplay=”yes” wrap=”yes”][vc_separator color=”black” border_width=”5″][vc_cta h2=”Click the menu below to make sure that you get this week’s podcast. Clicking on the link at the bottom of this page or Subscribing to Internet Advisor Podcast Feed at iTunes or with your favorite podcast app will get you our show. “] Click here to listen to this week’s podcast Clicking on the link at the bottom of this page… Subscribing to Internet Advisor Podcast Feed at iTunes or with  your favorite podcast app. Image al...2018-02-1000 minPodcasts – Internet AdvisorPodcasts – Internet AdvisorPodcast 1728: Unleashing US Cyber Command and Connecting Rural Michigan with Online Jobs[vc_row][vc_column][vc_images_carousel images=”14265,14264,14261,14260,14259″ img_size=”medium” autoplay=”yes” wrap=”yes” title=”US Cyber Security Agencies”][vc_separator color=”black” border_width=”5″][vc_cta h2=”Listen to this week’s full two hour podcast as heard on WJR 760-AM “] Click here to listen to this week’s podcast Clicking on the link at the bottom of this page… Subscribing to Internet Advisor Podcast Feed at iTunes or with  your favorite podcast app or finding our shows at Podcast Detroit each week [/vc_cta][vc_separator color=”black” border_width=”5″][vc_column_text] Show Notes Hour 1 ...2017-07-2200 minPodcasts – Internet AdvisorPodcasts – Internet AdvisorPodcast 1717: Cybersecurity Special: Your Computer is Listening![vc_row][vc_column][vc_single_image image=”13948″ img_size=”large” alignment=”center”][vc_separator color=”black” border_width=”3″][vc_cta h2=”Listen to this week’s full two hour podcast as heard on WJR 760-AM “] Click here to listen to this week’s podcast Clicking on the link at the bottom of this page… Subscribing to Internet Advisor Podcast Feed at iTunes or with  your favorite podcast app or finding our shows at Podcast Detroit each week [/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text] Show Notes Hour 1: CyberSecurity Headlines: French Election Email Bomb…Com...2017-05-0600 minPodcasts – Internet AdvisorPodcasts – Internet Advisor1609 Earables and Scamming the Dark Web[vc_row][vc_column][vc_single_image image=”12056″ img_size=”large” alignment=”center” title=”Earables”][vc_separator color=”black” border_width=”3″][vc_cta h2=”Find us on iTunes by subscribing to “Internet Advisor-Podcast Feed“”] Don’t forget to follow us on Facebook for more information during the week. [/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text] Show Notes: Hour 1 [/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”12057″ img_size=”large”][vc_column_text]Richard Stiennon, chief Analyst at IT-Harvest and an internationally recognized security...2016-03-0500 minRisk RoundupRisk RoundupThe New World Of Cyber-WarfareRichard Stiennon, author of “Surviving Cyberwar and There Will Be Cyberwar: How The Move to NCW Has Set the Stage for Cyberwar” participates in Risk Roundup to discuss The New World of Cyber-warfare. The New World of Cyber-warfare The new world cyber-warfare brings us a vicious power struggle. This new emerging cyber battleground is full of […] The post The New World Of Cyber-Warfare appeared first on Risk Group.2016-02-241h 14Podcasts – Internet AdvisorPodcasts – Internet AdvisorFamily Reunion Special Look Back at 2015[vc_row][vc_column][vc_separator color=”black” border_width=”3″][vc_cta h2=”Click Here to Download This Week’s Pocast” txt_align=”center”] Special Show: Family Reunion and 2015 in Review [/vc_cta][vc_separator color=”black” border_width=”3″][/vc_column][vc_column][vc_single_image image=”11679″ img_size=”full” alignment=”center” title=”Family Reunion”][vc_column_text] Show Notes: Hour 1 [/vc_column_text][/vc_column][/vc_row][vc_row][vc_column][vc_separator color=”black” border_width=”3″][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”11394″ img_size=”medium”][/vc_column][vc...2015-12-2600 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 21. Wrap UpConclusion. And if you want to pursue your MQ strategy with the author reach out at richard@it-harvest.com2015-12-1303 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 20. What Not To DoHere are several things that will set you back on your journey UP and to the RIGHT.2015-12-1305 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 19. Responding to the MQ QuestionnaireResponding to the MQ Questionnaire is one of the most arduous tasks. Doing it properly is also the most important task.2015-12-1305 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 18. Guerrilla TacticsThis is the fun stuff. Mad Men style analyst influence.2015-12-1321 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 17. Leveraging Social MediaTips, tricks, and techniques of using Twitter, Linkedin, etc. for analyst influence.2015-12-1316 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 16. Managing WikipediaTop secret method for presenting your best face to the analyst community via Wikipedia.2015-12-1306 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 15. The Role of the Sales TeamTime to fire back at sales.2015-12-1305 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 14. The CEO's RoleAn analyst influence strategy must bring in the CEO and executive management.2015-12-1307 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 13. SymposiumThe IT/Expo and Symposium is Gartner's biggest event. It's expensive but you will never find such a concentration of buyers in one place.2015-12-1303 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 12. The SummitGartner events are important parts of your influence plan.2015-12-1313 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceChapter 11. The Drop-By BriefingImpromptu visits to the analyst's home town can change everything.2015-12-1303 minUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceUP and to the RIGHT: Strategy and Tactics of Analyst InfluenceIntroductionDedication and About the Author: Richard Stiennon2015-12-1301 minPodcasts – Internet AdvisorPodcasts – Internet AdvisorHalloween Special: Cyberwar and Poisoned Downloads[vc_row][vc_column][vc_separator color=”black” border_width=”3″][vc_cta h2=”Click Here to Download This Week’s Podcast”] Halloween Special: Cyber War & Poisoned Download [/vc_cta][vc_separator color=”black” border_width=”3″][vc_column_text] Show Notes: Hour 1 [/vc_column_text][/vc_column][/vc_row][vc_row][vc_column width=”1/2″][vc_single_image image=”10601″ img_size=”full” alignment=”center”][/vc_column][vc_column width=”1/2″][vc_column_text] Richard Stiennon has been a frequent guest on the Internet Advisor when it comes to all things cyber security.  Richard is a security expert an...2015-10-3000 min