Preview Mode Links will not work in preview mode

Every week on the pm73media, Matt Stephenson interviews leading authorities in the security industry to gain an expert perspective on topics including risk, control friction, compliance, and building a culture of security. Each episode provides relevant insights for security practitioners and business leaders working to improve their organization’s security posture and bottom line.

Dec 16, 2019

Jho Low and Paris Hilton


If you like global intrigue, financial crime, wealth porn, and absurdity, “Billion Dollar Whale,” by Tom Wright and Bradley Hope, is for you. It’s the story of Jho Low, an enterprising businessman from Malaysia who used his social connections to the country’s former Prime Minister Najib Razak to transform...

Dec 10, 2019



Blockchain and AI and IoT, OH MY!


“Whereas most technologies tend to automate workers on the periphery doing menial tasks, blockchains automate away the center. Instead of putting the taxi driver out of a job, blockchain puts Uber out of a job and lets the taxi drivers work with the customer directly.”


Dec 2, 2019

“Your most unhappy customers are your greatest source of learning

 -- Business @ the Speed of Thought; Bill Gates, 1999


“I think most people either forget or don’t know that Microsoft only hires people with IQs well over 130”

 -- NY Times; Douglas Coupland, 1998


Last week, Microsoft Windows turned 34 years...

Nov 22, 2019

Tinder bot exchange


In the summer of 2017, a group of political activists in the UK figured out how to use Tinder to attract new supporters.


They understood how the platform worked and how its users tended to use the app. Most importantly, they understood how Tinder’s algorithms distributed content, so they built a bot to...

Nov 20, 2019

Brian Haugli: Livin’ La Vida CISO

CISO Lifespan

According to our friends at Ponemon… in a 24 month period, a business has a 1 in 4 chance of being hit with a significant threat.


A separate study shows that nearly 75% of businesses do NOT have an established incident response strategy that is applied consistently across their...