How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...

Channel:
Subscribers:
4,690
Published on ● Video Link: https://www.youtube.com/watch?v=zZvFDXnFMIw



Duration: 0:00
5 views
0


Black Hat USA 2025 has wrapped, and for Sean Martin, CISSP, Co-Founder of ITSPmagazine, and Marco Ciappelli, Co-Founder of ITSPmagazine, the end of the event is both an exhale and a moment to reflect on what was learned, heard, and felt. After days of conversations with industry leaders, CISOs, vendors, and attendees from around the globe, one recurring message stands out: cybersecurity decision-makers are tired of buzzwords and hungry for real solutions.


Sean shares that during sessions and informal meetups, CISOs expressed frustration with marketing pitches that fail to connect to their real challenges. Sitting across from security leaders, marketers heard it directly—stop with the jargon and explain how your solution genuinely makes their lives easier, reduces stress, and improves security outcomes. In other words, trust and honesty carry far more weight than flashy claims.


Marco emphasizes that hype not only wastes time but also adds “noise” to the already complex job of running a security program. The more a vendor can be direct about what they do—and what they don’t do—the more likely they are to earn a lasting relationship with a CISO and their team. Both agree that connecting the dots between a product and an organization’s operational reality is key: what does adoption require, how will it fit into existing systems, and will it force a major operational shift?


Beyond the messaging critique, the duo reflects on the community element of Black Hat. They reconnected with peers, met new contacts from as far as Toronto, and discussed future events in places like Melbourne, Barcelona, and Amsterdam. They also teased the upcoming “Transatlantic Broadcast” podcast series, which will explore cybersecurity voices from across Europe while maintaining a global view.


While the Black Hat booths are now dismantled and the floors mopped, the conversations are far from over. Sean and Marco head back to Los Angeles ready to produce interviews, publish articles, and share the many stories captured during the week—stories that cut through the noise and get to the heart of what matters in cybersecurity.


___________


Hosts:
Sean Martin, Co-Founder at ITSPmagazine | Website: https://www.seanmartin.com/


Marco Ciappelli, Co-Founder at ITSPmagazine | Website: https://www.marcociappelli.com/


___________


Episode Sponsors


ThreatLocker: https://itspm.ag/threatlocker-r974


BlackCloak: https://itspm.ag/itspbcweb


Akamai: https://itspm.ag/akamailbwc


DropzoneAI: https://itspm.ag/dropzoneai-641


Stellar Cyber: https://itspm.ag/stellar-9dj3


___________


Resources


Learn more and catch more stories from our Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25


Learn more about ITSPmagazine Studio: https://www.itspmagazine.studio/


Learn more about ITSPmagazine Europe: https://www.itspmagazine.com/europe


Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage


ITSPmagazine Webinar: What’s Heating Up Before Black Hat 2025: Place Your Bet on the Top Trends Set to Shake Up this Year’s Hacker Conference — An ITSPmagazine Thought Leadership Webinar (https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference) | https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference


Want to tell your Brand Story Briefing as part of our event coverage? Learn More 👉 https://itspm.ag/evtcovbrf


Want Sean and Marco to be part of your event or conference? Let Us Know 👉 https://www.itspmagazine.com/contact-us


___________


KEYWORDS


sean martin, marco ciappelli, black hat usa 2025, ciso, cybersecurity, vendors, marketing, trust, ai, community, event coverage, on location, conference




Other Videos By ITSPmagazine


2025-08-10When Bots Rewrite the Buyer’s Journey: Protecting Brand Value in the Age of AI Agents | An Akamai...
2025-08-10Simplifying CyberSecurity Without Sacrificing Control | A ThreatLocker Story From Black Hat USA 25
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber
2025-08-09How Novel Is Novelty? Security Leaders Try To Cut Through the Cybersecurity Vendor Echo Chamber |...
2025-08-09The Agentic AI Myth in Cybersecurity and the Humanity We Risk When We Stop Deciding for Ourselves...
2025-08-07How to Lose a CISO in 10 Words (or Less) | Straight Talk, Not Spin: Black Hat’s Hard Truths | On...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | E-V-E GRC Origin Story
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-04Leading Without Losing Yourself | A Conversation with Avani Desai | The Soulful CXO Podcast with ...
2025-08-04Solving GRC Fatigue: How AI Is Helping Compliance Teams Do More With Less | An E-V-E GRC Brand Or...
2025-08-03Episode 106 - Megastructures (Part III)
2025-08-03When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 20...
2025-08-03Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | A Black Hat U...
2025-08-03From Hacker Defense to Civil Liberties: Threat Modeling Meets Constitutional Law | A Black Hat US...
2025-08-03Fake Identities, Real Consequences: The Data Trail Behind Your Political Donation | Michaels & Byers
2025-08-03When the C-Suite Becomes the Attack Surface | A BlackCloak Pre-Event Coverage of Black Hat USA 20...