8 episodes

Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!

10 Questions to Cyber Resilience Assurance IT

    • Technology

Cyber resilience is the ultimate IT goal for every business. Twice per month, join Assurance IT as they discuss various cyber security topics with IT leaders to help you get closer to your cyber security goals. Each episode includes best practices that can be applied to your enterprise. Cyber resilience is a collaborative effort; let's work toward it together!

    Is the cloud secure? with CISO from Insurity, Jay Wilson

    Is the cloud secure? with CISO from Insurity, Jay Wilson

    Assurance IT invited Insurity's CISO, Jay Wilson to discuss SaaS platform, cloud security and data privacy.
     
    In this episode, Jay Wilson from Insurity and co-founder of Assurance IT, Luigi Tiano, discuss: 
    Pros and cons of SaaS platformsShould hardware be back on-prem?Cloud security: Is it where it needs to be?Are security risks between cloud and on-prem similar?How to backup SaaS applicationsDifficulty of complying with data privacy regulations from around the worldAre the Data privacy regulations make us better?
     
    Resources: 
    Watch the episode: https://youtu.be/a8YWmt-QcVU
    Jay Wilson’s LinkedIn: https://www.linkedin.com/in/jaywwilson/
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/
     
     
    About Jay Wilson: 
    As an experienced technology executive across multiple disciplines and sectors, Jay leads operations, delivery and strategy across global cross-discipline teams to produce and protect innovative products, growth strategies and measurable results.

    In his role of Chief Information Security Officer at Mercury Healthcare, he is responsible for advancing the information security and compliance program, ensuring our business operations and client-facing product technologies are safe from attack, exceed regulatory standards and protect the critically important protected health data assets that Mercury Healthcare manages for over 1000 hospitals. Additionally he lead our efforts to align to industry leading compliance and security frameworks, including HITRUST certification of the Mercury Patient Engagement Solution / CRM. Further, he also leads and directs the IT function at Mercury Healthcare to improve the efficacy, efficiency and effectiveness of IT/Helpdesk functions within the organization.

    He is CISM, CHP and CSCS certified and has over 20 years of experience in various technology development and leadership roles. Also a graduate of SapientNitro's CMTO University program, with a background as a professional marketing technologist and a consummate student of innovation and psychology, he focuses additional effort on the potential of people in the world of business+technology convergence. He has previously led (at Healthgrades) the Learning Academy program, part of HG's previous leadership development program, to help grow our people in communication, leadership and creating impact.

    His experiences in technologies are broad and diverse, but he has had the privilege of working in: Security Infrastructure, Network Engineering, Automation Engineering, Advertising Technologies, Data Engineering, Distributed Computing, Professional Video, Cloud Computing, DevOps, Containers, Front End Web Technologies, Server-side Technologies, Microservices & API Development.


    About 10 Questions to Cyber Resilience: 
    Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 
     

    About Assurance IT: 
    Assurance IT (www.assuranceit.ca) specializes in data...

    • 21 min
    How small companies should get started in cyber security, with Franco Perrotta

    How small companies should get started in cyber security, with Franco Perrotta

    Franco Perrotta is a cyber security consultant at Bell. Over his decade of experience helping businesses with cyber security, he noticed trends he shares in this episode - specifically for small businesses.
     
    In this episode, Franco Perrotta and co-founder of Assurance IT, Luigi Tiano, discuss: 
    How much budget should you have for cyber security?How small companies should get started in cyber securityBenefits of being small when attracting IT talentFirst step to identifying weal spots in a small businessCan you grow a business and do it prudently?Cyber insurance for small companiesUse case: helping small business with low budget and one IT person with cyber security
     
    Resources: 
    Watch the episode: https://youtu.be/mPUy-RoUkrw
    Franco Perrotta’s LinkedIn: https://www.linkedin.com/in/francoperrotta/
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/
     
     
    About Franco Perrotta: 
    "10+ years experience in IT; this includes hardware, software and client relations. Through my attention to detail and always providing over the top service, I present an excellent addition to any team looking to strengthen their IT security posture."


    About 10 Questions to Cyber Resilience: 
    Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 
     
    About Assurance IT: 
    Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.

    • 28 min
    The Future of Data Privacy in Canada, with Vanessa Henri

    The Future of Data Privacy in Canada, with Vanessa Henri

    Vanessa Henri has been working in data privacy for 10 years. As a lawyer, she approaches data differently than most of us. So on today's episode of 10 Questions to Cyber Resilience, we wanted to pick her brain about her perspective of data privacy as a lawyer and where Canada is headed in terms of laws and compliance.
     
    In this episode, Vanessa Henri from Henri and Wolf, and co-founder of Assurance IT, Luigi Tiano, discuss: 
    Using due diligence to grow an organizationThe relationship between legal and ITOne strategy to get more cyber security budgetIs Canada behind on data privacy laws?Defining C27 and what it could mean for CanadaWill C26 and C27 be passed as laws?How AI fits into new legislationWhy consumers are scared of AIHow to start implementing AI in your business
     
    Resources: 
    Watch the episode: https://youtu.be/ng2SQk2OBi8
    Vanessa Henri’s LinkedIn: https://www.linkedin.com/in/vanessahenri/
    Henri & Wolf website: https://henriwolf.law/
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/
     
     
    About Vanessa Henri: 
    "I work with emerging growth organizations to help them articulate a data governance strategy taking into consideration data privacy, information security, intellectual property, and ethics. I bring value and a competitive edge to data-driven organizations by helping them to manage their legal risks, enhance consumers trust and fast-forward the adoption of disruptive technologies through trust-by-design. I have an extensive experience negotiating and drafting tech agreements with data governance implications (including data acquisition, derivative data management and contracts involving data analytics and anonymization requirements), and enjoy working with entrepreneurs to build contractual structures that reflect their business strategies. I am fascinated by ethical innovation, the economic value of trust, and nurturing purpose-driven organizations.

    Organizations reach out to me to understand the legal impacts of their strategy for managing and securing their information assets, which may include trade secrets, intellectual property and personal information, and for advices on how to improve governance, risk management and decision making regarding such informational assets. I also work with organizations on issues of economic cyber-espionage and national security impacts. The organizations I work with are principally in the field of emerging technologies, cybersecurity and data-driven industries, including IIoT.

    I am a member of the Quebec Bar Association, a Certified Data Protection Officer ("CDPO") and a Senior Lead Implementor for ISO 27701 (Privacy Information Management System), with a proven track record of helping organizations of all sizes and industries implementing compliance measures for their informational assets, including through privacy-by-design in emerging technologies. I have experience deploying information management systems for organizations of all sizes by drafting policies, procedures and establishing risk management methodologies. I perform risk assessments and audits to prepare organizations for certification or for new compliance obligations, or for pre-market validation...

    • 31 min
    The Evolution of Cyber Security, with Mark Salinas

    The Evolution of Cyber Security, with Mark Salinas

    Assurance IT invited Security Engineer Manager, Mark Salinas, to chat about the evolution of cyber security.
     
    In this episode, Mark Salinas and co-founder of Assurance IT, Luigi Tiano, discuss: 
    Evolution of networkingCyber security in 2000 vs 2022End-users in 2000 vs 2022The reality of buying cyber security toolsCyber security vs cyber resilienceCyber attacks on critical infrastructureGetting hacked through a clockWhat the Googles of the world are doing to mitigate the skillset shortage in IT
     
    Resources: 
    Watch the episode: https://youtu.be/TUA01zTVbw0
    Mark Salinas' LinkedIn: https://www.linkedin.com/in/mark-salinas-75b9363/
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/
     
     
    About Mark Salinas: 
    Over 20 years industry experience as a security & network architect and engineer, including: design & installation of: networking, Cloud, Network Security, Firewalls, IDS/IPS, Application Security /Firewall, Application Acceleration, WAN Optimization. WAF and DAM. Cloud Services. PCI & NERC Compliance and GRC. CISSP. Pre-Sales as well as Post Sales Support. Network & Security Architecture designs. Security Audits & reviews. US citizen. Mentor.

    About 10 Questions to Cyber Resilience: 
    Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 
     

    About Assurance IT: 
    Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.

    • 41 min
    Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev

    Behind the Scenes of a CIO at a $50 million Startup, with Jahn Karsybaev

    Jahn Karsybaev is the CIO at myBasePay - a small startup that raised $60 million in funding and are on their way to closing the year at $50 million in revenue. In today's episode, Assurance IT's co-founder Luigi Tiano asks Jahn about the following topics:
    The difficulty attracting IT talent as a startup & how Jahn works around thatDefining cyber resilienceTips on implementing digital transformation & debunking myths around itJahn's best tip to staying up-to-date with the tech industry (we're stealing this one)What keep's Jahn up at nightWhat Jahn looks for in a company that potentially acquires myBasePay
     
    Resources: 
    Watch the episode: https://youtu.be/2wlSQeXbPHQ
    Jahn Karsybaev’s LinkedIn: https://www.linkedin.com/in/jahnibek/
    myBasePay: https://www.mybasepay.com/
    The book about Business experiments Jahn referred to: https://amzn.to/3dyyHN4
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/
     
     
    About Jahn Karsybaev: 
    Jahn Karsybaev is a Technology Executive who has led IT teams for Fortune 500 companies. He is currently a Co-Founder and CIO at myBasePay.
    Jahn has co-founded, launched, successfully sold as well as successfully failed several start-ups. He is an Angel Investor and sits on Boards of several tech startups. He loves teaching angel investing, growth hacking & fundraising for startups.
    Fund-raising is one of Jahn's strengths and passions. Cumulatively, he has successfully raised close to $70MM for the startups he has launched or advised on.
    About 10 Questions to Cyber Resilience: 
    Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 
     
    About Assurance IT: 
    Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.

    • 30 min
    How to apply the 80/20 rule to your cyber security strategy

    How to apply the 80/20 rule to your cyber security strategy

    Cyber criminals are getting smarter. Protecting your enterprise is getting expense.
    Where do you start in your cyber security journey?
    The co-founders of Assurance IT discuss the top 5 cyber security tools every enterprise should start with. 
    In this episode, Luigi Tiano, and Ernesto Pellegrino also discuss: 
    13 Cyber Secure MeasuresIncident Response PlansReason to increase cyber security awareness among executivesHow the workspace changed over the last two years and how it's affecting IT#1 cause of cyber attacksFeedback from cyber security insurance companiesTop 5 things you need to protect against ransomware
     

    Resources: 
    Watch the episode: https://youtu.be/FejMyQmT9hA
    Blog: www.assuranceit.ca/blog/13-parts-of-an-effective-business-continuity-plan-to-protect-against-ransomware
    CyberSecure Canada: https://cyber.gc.ca/en/guidance/baseline-cyber-security-controls-small-and-medium-organizations
    Ernesto Pellegrino’s LinkedIn: https://www.linkedin.com/in/ernestopellegrino/
    Luigi Tiano’s LinkedIn: https://www.linkedin.com/in/luigitiano/
    Assurance IT Website: http://www.assuranceit.ca/



    About 10 Questions to Cyber Resilience: 
    Twice per month, learn about how IT leaders are strengthening their cyber security practices. Every episode comprises of 10 questions that get you one step closer to cyber resilience. Subscribe to stay up-to-date with hot topics in cyber security. 
     
    About Assurance IT: 
    Assurance IT (www.assuranceit.ca) specializes in data protection and data privacy for the mid-market in Canada, since 2011. The Montreal-based company’s unique approach to helping customers become cyber resilient is called the PPR Methodology which stands for Prepare, Protect and Recover. Based on industry best practices, the PPR Methodology is an easier way to achieve cyber security and compliance objectives.

    • 24 min

Top Podcasts In Technology

Lex Fridman
Jason Calacanis
NPR
Boston Consulting Group BCG
The New York Times
Jack Rhysider