Building A Center Of Excellence For Business Processes And Workflow Automation | A Nintex Story With Josh Waldo And Maggie Malone Swearingen

A Their Story conversation with Sean Martin, Marco Ciappelli, and leaders from Nintex and Protiviti

When defined and executed well, a Center of Excellence can be more than a model or process to follow; it can set the bar for the organization by which each part can play a role in making things better. It's not automatic—it requires dedication—and customization.

Have a listen to learn about what our guests hear every day from organizations of all sizes looking to make things better for the business by transforming their business processes with a clear view for what it means to be excellent in how things are built, managed, and executed.

Enjoy, and automate!

Inside The Mind Of A Hacker Report | Unique Histories, Shared Destiny | A Bugcrowd Story

A Their Story conversation with Sean Martin, Marco Ciappelli, and Bugcrowd executives, business leaders, and security researchers

While similarities exist, the latest research indicates the next era of cybersecurity has more in common with the Renaissance, sharing its characteristics of humanism, exploration, and warfare.

This is a 4-part podcast and webcast series we have discussions with Bugcrowd executives, business leaders, and security researchers. The series will explore the traits, attributes, and mindset of the security researchers that enable the successful crowdsourced security assessment market, specifically focusing on these 4 areas: BUSINESS VALUE | GEOGRAPHICS | DEMOGRAPHICS | PSYCHOGRAPHICS

Bookmark this page to catch all of the episodes as they become available.

Listen and learn as you build out your security program by leveraging the global and diverse crowd.

When Failure Is Not An Option, Organizations Turn To The Mainframe — Incorporating Mainframes Into Your Zero Trust Architecture | A Key Resources Story With Cynthia Overby

A Their Story conversation with Sean Martin, Marco Ciappelli, and Key Resources president and co-founder, Cynthia Overby

As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks.

The last time we checked, they were not sitting underground, disconnected from the rest of the IT infrastructure, and in the general vicinity of Area 51. Nope. They are connected and making most of our lives work throughout society. Let's show them the respect — and the security — they deserve.

Enjoy the conversation, if you please.