IoT Security Podcast

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Show Notes

Richard Stiennon, Chief Research Analyst for IT-Harvest, joins us for The Return: Episode 2. Author of the recent Security Yearbook 2022, Richard started his career before cyber was cyber, a story he originally shared with Brian on a walk along some train tracks. How does a guy go from an ISP start-up to Gartner to IT-Harvest and being a bestselling author?

Richard started IT-Harvest to literally harvest data, and that’s resulted in his latest project, an app for data obsessives called the Analyst Dashboard. He talks about what it took to get there and some surprising results he’s discovered from the tool.

The cybersecurity space, he’s found, has focused and refocused and reframed and refocused again. Now, it’s apparent globally that cybercriminals and nation-states are looking at IoT as the new frontline. When new technologies come up, they’re developed with no thought to security, says Richard. Now we’re reaping what was sown.

Let’s get into Things on the IoT Security Podcast!

Follow Richard Stiennon on all his platforms:
https://www.linkedin.com/in/stiennon
https://stiennon.substack.com
https://twitter.com/stiennon
https://www.it-harvest.com

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos/.
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi/.

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast/.


Let’s get into Things on the IoT Security Podcast!

Follow Brian Contos on LinkedIn at https://www.linkedin.com/in/briancontos
And you can follow John Vecchi at https://www.linkedin.com/in/johnvecchi

The IoT Security Podcast is powered by Phosphorus Cybersecurity. Join the conversation for the IoT Security Podcast — where xIoT meets Security. Learn more at https://phosphorus.io/podcast

What is IoT Security Podcast?

The IoT Security Podcast explores the Security of Things. The Internet of Things (IoT) is a giant network of over 50 billion connected devices, and it’s transforming the way we live and work. But a breakdown in security will prevent this IoT transformation. Join John Vecchi as he speaks with the biggest names and the biggest brains in cybersecurity, including CISOs, analysts, security researchers, and other industry thought leaders, to give you the information you need to navigate security and threats in an increasingly Thing-based world.

Join us on the IoT Security Podcast, powered by Phosphorus Cybersecurity.
https://phosphorus.io/