Secure Access

John Dillard

In a world where security defines success, are you leading the way? “Secure Access” by Sign In Solutions empowers tech visionaries and executives with groundbreaking insights to master every aspect of security. Join us weekly as we dive deep into the heart of security challenges facing businesses today. Through candid conversations with industry insiders, we uncover the hidden truths and strategies needed to thrive. Whether you're striving to safeguard your organization or propel your career, our podcast equips you with the insights to outperform competitors and secure your future. Don't be left behind—discover the secrets to staying compliant and ahead in the ever-evolving security arena.

Episodes

  1. Fixing Broken Clearance Systems & Stopped Insider Threats With Tricia Stokes

    SEP 25

    Fixing Broken Clearance Systems & Stopped Insider Threats With Tricia Stokes

    In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard is joined by Tricia Stokes, a security expert with over 41 years of experience in various key security roles across the Defense sector. Tricia shares her journey from starting in administrative work to becoming a senior executive, and her experience working with the Army, Navy, and other defense agencies. The conversation explores the importance of a multifunctional approach, continuous improvement, and the critical role of technology in security operations. Tricia also discusses the impact of high-profile security incidents, the challenges of transformation in large organizations, and the value of mentorship and relationships in driving change. Tune in for insights on security leadership, adapting to technological advancements, and fostering a problem-solving culture in security teams. Key Takeaways Embrace continuous improvement: Always look for ways to make things better, no matter your role or organization. Multifunctional experience is a gift: Gaining expertise across disciplines opens doors and builds resilience. Relationships and trust are essential: Success in large organizations depends on credibility, trust, and strong relationships. Leadership buy-in is critical for change: Lasting transformation requires leadership support and clear communication. Listen more than you talk: Effective leaders listen to their teams and align actions with words. Don’t be afraid to take risks: Progress often comes from taking on challenges and being willing to change course. Technology is essential, but people matter most: Leverage the best tools, but never lose sight of the human element. Quotes “Sometimes when you don't look so hard, but you just do a good job at what you're doing, it happens.” “Continuous improvement applies to everything you touch. It's your mindset when you go to work: how can I make it better?” “It's so easy to say no, and it's much harder to say yes, but you gotta get to yes, and you gotta be results oriented.” “You don't want to boil the whole ocean. Start out in the pond, get some success, and then build on that.” “My motto was: don’t say no, say how.” “Always look inward at yourself on how you can make things better before you cast aspersions on other people.” “Never count anybody out. Always believe, if there’s a mountain to climb, you can do it.” Connect and learn more about Tricia Stokes. https://www.linkedin.com/in/tricia-stokes-807819220/ This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    1h 5m
  2. The Future of Security: AI, Remote Work & Leadership featuring Michelle Lambiasi

    SEP 11

    The Future of Security: AI, Remote Work & Leadership featuring Michelle Lambiasi

    In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard is joined by Michelle Lambiasi, the Chief Security Officer (CSO) at SAIC. Michelle shares her journey from an HR intern to a high-profile role in national security, highlighting key career milestones, the impact of mentorship, and battling imposter syndrome. She discusses the evolution of the security landscape, the role of insider threats, and the importance of adaptability. Michelle delves into the unique challenges and strategies related to AI, data centers, and hybrid work environments, stressing the need for policy reforms and inter-agency cooperation. The discussion also covers the future of security talent, the importance of passion in the field, and Michelle's personal interests, including her background in herbalism. Key takeaways Career paths in security are often unplanned; passion and adaptability are essential. Leadership requires shifting from individual contribution to enabling others. The security landscape is rapidly evolving, with remote work and AI presenting new challenges. Breaking down silos and prioritizing the organization's mission over personal interests leads to better security outcomes. Policy and clearance reform are critical to attracting top talent and enabling innovation in national security. Quotes "Nobody ever says I want to be a facility security officer when I grow up." "What got you here won’t get you there." "I always say we need to think about SOY: SAIC first, others second, yourself last." "Never ever, ever let fear get in your way." "I can teach anybody security, but I can’t teach the passion." "Find the source of the problem, don’t treat the symptom." "It’s not a nuclear arms race now, it’s an AI arms race." Connect and learn more about Michelle Lambiasi. https://www.linkedin.com/in/michelle-joy-lambiasi-isp-shrm-scp-b49b665/ This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    1h 2m
  3. Predicting and Preventing Security Threats featuring James Bourie

    AUG 28

    Predicting and Preventing Security Threats featuring James Bourie

    In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard explores the intersection of technology, security, and business with James Bourie, a former Army officer turned entrepreneur and a CEO at Torchlight. Jim shares his journey from military service in Afghanistan and Iraq to founding Torchlight, a company leveraging geolocation data and behavioral analytics to predict and prevent security threats. He discusses the evolution of security technology, the importance of integrating physical and cyber security, and ethical considerations for handling personal data. Jim emphasizes the increasing need for data-driven approaches in security and the vital role of AI in transforming how organizations protect their assets. Key takeaways Data-driven security is the future—understand which data matters most for your organization. The integration of physical and cyber security is essential for modern threat defense. AI and behavioral analytics are transforming how we detect and prevent security incidents. Human judgment and ethical guidelines remain critical, even as technology advances. Security teams must become more data-driven and cross-functional to stay ahead of threats. Quotes “The door's barely even open to this revolution, and I really want to be a part of it.” “The more you can understand how [security tools] work together to solve the use cases you’re working for, the better.” “As Americans, we don’t like the government knowing much about us… The question is how do we use this in a morally, legally righteous way?” “I just don’t see the human coming out of the loop when it comes to security and defense.” “Security professionals need to really understand how [AI] is made, what that is, it’s coming from, and really understand the quality of the data that’s going into it.” “The government is not separate from the corporate world when it comes to security threats. They’re the same threats.” Connect and learn more about James Bourie. https://www.linkedin.com/in/jamesbourie/ This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    47 min
  4. Rethinking How We Protect Data with Debbie Gordon

    AUG 14

    Rethinking How We Protect Data with Debbie Gordon

    In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard is joined by Debbie Gordon, CEO of Cloud Range, to discuss her journey from technical education in the mid-90s to creating a pioneering cybersecurity training platform. Debbie shares her experiences in building and selling an IT asset management company before founding Cloud Range, which focuses on hands-on, practical cyber defense training. They delve into the importance of preparedness, the human factor in cybersecurity, and the evolving threat landscape. The conversation also touches on Debbie's leadership philosophy, the emotional aspect of risk management, and the integration of AI in both offensive and defensive cyber strategies. Additionally, Debbie shares insights on the future of cybersecurity, the need for continuous skill development, and Cloud Range’s expansion into sectors like higher education and critical infrastructure. Key takeaways Preparation and practice are essential for effective risk reduction in cybersecurity and beyond. The biggest gap in cyber defense is not just skills, but real-world experience—simulation training bridges this gap. Human factors—communication, collaboration, and team dynamics—are as critical as technical skills in security. Risk is both an objective and emotional issue for organizations; evidence of readiness builds confidence. The threat environment is constantly evolving; ongoing, dynamic training is necessary to stay ahead. Leadership is about authenticity, alignment, and empowering others to grow. Quotes “Preparation and practice is number one.” “You can know the rules, but if you’ve never played the game, can you actually do it?” “People are the weakest link in the chain… the SOC analysts and incident responders are the last line of defense.” “Simulation training is not something that should be an option—it’s becoming a standard.” “Leadership is like golf. You’re never done being good at it, and you have to continue to practice.” “If you can make somebody’s life easier, you have won.” Connect and learn more about Debbie Gordon. https://www.linkedin.com/in/degordon/ This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    50 min
  5. Building Resilient Teams Through Kindness and Innovation in Security

    JUN 26

    Building Resilient Teams Through Kindness and Innovation in Security

    In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard is joined by Tim Winzel. Tim, the creator of the Kindness Games and Associate Managing Director at Kroll, shares his remarkable journey in global security and leadership. He unpacks his humble beginnings, pivotal experiences in Iraq, State Department, and his influential tenure at Facebook. Tim reveals how kindness can be a potent tool in security, building resilient and effective teams. He discusses his innovative approaches, including security techniques to counter espionage, the importance of integrating culture and customer service into security, and the relevance of AI in future security measures. His experiences as a foster parent and working with victims of domestic violence have shaped his holistic approach to leadership and security. The conversation also delves into the post-COVID-19 workplace culture, highlighting current challenges and future trends in security and risk management. Key takeaways Cultural Integration: Security professionals must understand the business context and align their practices with organizational culture for effective security management. Embracing Kindness: Implementing kindness as a leadership strategy can improve team dynamics and organizational culture. Risk Management: Effective communication of risk in business terms is essential for security professionals to gain support and resources. Adapting to AI: Proper implementation of AI can enhance security operations, but understanding and defining processes is crucial. Coping with Insecurity: Recognizing and managing imposter syndrome can lead to personal and professional growth. Holistic View: Integrate personal and professional lives for a cohesive and authentic approach to leadership and relationships. Quotes “If you want to be invited back, they have to look forward to you coming back.” “Kindness is the endeavor to recognize the humans on the other side of each life situation with the intention to create the best available outcome for them.” “Risk is the language of business internationally.” “Being liked by everybody that's out the window, it's impossible. However, you can be easy to work with, maybe even fun to work with.” “If you can figure out how to deliver a wonderful experience to someone, reducing their risk so that they feel safer and it doesn't make their day suck— that's gold.” “We have the ability to touch and change the trajectory of lives with very simple things.” Connect and learn more about Tim Wenzel. https://www.linkedin.com/in/relevant-perception https://www.kroll.com/ Tim’s Book (The Kindness Games: How a Single Post Changed Our Mindset About Community) https://amzn.eu/d/02zwcDF This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    1h 28m
  6. From CIA to SpaceX: Reinventing Security in the Age of AI

    JUN 12

    From CIA to SpaceX: Reinventing Security in the Age of AI

    In this episode of the Secure Access Podcast, host John Dillard is joined by Paul ‘IX’ Kemppainen, a seasoned security professional with a rich background that spans military service, the CIA, and a significant tenure at SpaceX. Paul shares his unique journey, starting from his Navy days through to his transformative experience at SpaceX, where he was involved in developing and implementing cutting-edge security measures. He discusses the challenges and rewards of transitioning to the private sector, his innovative approach to security, and the launch of his entrepreneurial venture, CISO. The conversation further delves into the need for innovation in the security industry, the impact of AI on security practices, and the importance of adapting to rapid technological advancements. Paul's stories and insights offer a compelling look at the evolving landscape of security and the essential strategies for navigating it successfully. Key takeaways Paul's Diverse Background: Paul has extensive experience spanning national service (Navy, CIA), private sector (SpaceX), and entrepreneurship. Importance of Writing: One of the most valuable skills Paul developed at the CIA was clear, articulate writing, which he uses frequently in his current roles. Security Innovation: There is a significant need for innovation within the security industry to keep up with rapid technological advancements. Security Hiring Cautions: Organizations should be cautious with security hiring, ensuring their recruits fit the culture and mission to avoid potential derailments. AI and Security: AI presents both opportunities and risks, and security professionals need to become AI-literate to leverage and mitigate these effectively. Future of Security: Security professionals should self-educate to stay abreast of new technologies and trends, such as AI and quantum computing, to remain relevant and effective. Quotes "Simplification is incredibly important." – On avoiding the tendency to overdo security measures. "Modern day security professionals should know about quantum computing, AI, and all these emerging technologies." – On the importance of continuous learning. "Protecting at the speed of innovation." – On the need to innovate security practices alongside technological advancements. "It's incumbent upon me to start speaking about these things and to let others know that it's okay to critically think about the industry." – On advocating for open dialogue about the security industry's challenges. Connect and learn more about Paul ‘IX’ Kemppainen. https://www.linkedin.com/in/ixkemppainen/ This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    49 min
  7. Why You Should Comply with SOC 2 and ISO Standards

    MAY 29

    Why You Should Comply with SOC 2 and ISO Standards

    In this episode of the Secure Access Podcast, host John Dillard chats with Jason Mordeno, the Director of Compliance and Security at Sign In Solutions, about the intricacies of SOC 2 and ISO compliance standards. John introduces his background in security and compliance and the mission of Sign In Solutions as a visitor management platform. Jason shares his unconventional journey from 3D animation to compliance and discusses his passion for creating robust security frameworks. The conversation covers key aspects of SOC 2 and ISO, including differences, overlaps, and the practical challenges companies face while implementing these frameworks. Jason emphasizes the importance of a security mindset, effective communication, and foundational security principles in managing compliance across diverse and complex organizations. He also provides insights into current trends in compliance, the role of tools, and the importance of being proactive with incident response. This episode serves as a comprehensive guide for anyone looking to understand and navigate the complexities of SOC 2 and ISO compliance. KEY TAKEAWAYS Importance of security frameworks: Discussion on SOC 2 compliance and ISO standards, and their relevance to businesses. Expert insights: Jason Mordeno shares his journey from 3D animation to compliance, emphasizing the importance of a security mindset. Compliance frameworks overview: Detailed explanation of SOC 2 and ISO, their differences, similarities, and implementation strategies. Challenges in compliance: Importance of human factors and effective communication in maintaining robust security frameworks. Role of tools: Tools assist in compliance but are not a silver bullet; manual processes and human ingenuity are crucial. Global organizational considerations: Strategies for managing compliance in diverse and large-scale enterprises. Common compliance mistakes: Miscommunication and presumption are major pitfalls in compliance execution. Trends in compliance: Importance of staying proactive and preparing for emerging threats and regulatory changes. Final advice: Maintain a security mindset, believe in yourself, and focus on foundational pillars to navigate compliance challenges. QUOTES "Security mindset is thinking, how would we do this? What if we're the attacker?" "The challenge is not going to be money. The challenge is not your process. The challenge is not the business itself. The challenge is always going to be the people." "The first tool is yourself, right? Because without it, nothing runs." "Communication is the most offside answer I can give, but communication." "Never think you're secure. You must assume you'll be breached at any point." "Believe in yourself. If you're a security person, compliance person...keep yourself grounded because you are the foundation of the security mindset in the company." This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    34 min
  8. Breaking Down Security Silos: AI, Compliance, and the Future of Security

    MAY 15

    Breaking Down Security Silos: AI, Compliance, and the Future of Security

    In this inaugural episode of the Secure Access Podcast, guest host Adam Cleveland interviews John Dillard, ex-CIA, Navy Veteran, author of Microslices, and founder of ThreatSwitch—a security compliance platform acquired by Sign In Solutions, to discuss the evolving landscape of security, and our host. They explore key issues such as the fragmented vocabulary in security, the impact of AI on security protocols, and the need for regulatory simplification to enable faster and more effective security measures. John shares insights from his career, including his experiences during 9/11 and his views on the future of security leadership. This episode aims to provide actionable advice for security leaders to prepare for rapidly changing threats. Key takeaways The Complexity of Security Vocabulary: Modern security challenges demand a unified approach, breaking down silos between cyber, personnel, and physical security. Rapid Changes with AI: The fast-paced evolution of AI necessitates a shift in security strategies. The traditional playbook is now outdated. Continuous Learning: For security professionals, continuous education in diverse security domains is crucial to keep pace with new threats. Regulatory Simplification: Simplifying regulations could speed up companies’ ability to implement effective security measures. Effective Leadership: Successful security leadership involves future prediction, continuous learning, and motivating teams toward proactive action. Identity Verification: Investing in robust identity verification can significantly enhance a company’s security posture. Quotes "The biggest thing that maybe people don't mention is that I think our vocabulary is broken." "If agents and AI can adapt their tactics in the midst of conducting the attack, there is no playbook. The playbook changes while it's being played." "If you are not reading and studying... the world is gonna blow by you in about two seconds." "The regulation is not the countermeasure." "Complying with the regulation does not protect you from everything related to that." This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.

    26 min

Ratings & Reviews

About

In a world where security defines success, are you leading the way? “Secure Access” by Sign In Solutions empowers tech visionaries and executives with groundbreaking insights to master every aspect of security. Join us weekly as we dive deep into the heart of security challenges facing businesses today. Through candid conversations with industry insiders, we uncover the hidden truths and strategies needed to thrive. Whether you're striving to safeguard your organization or propel your career, our podcast equips you with the insights to outperform competitors and secure your future. Don't be left behind—discover the secrets to staying compliant and ahead in the ever-evolving security arena.