
We care about your data, and we'd use cookies only to improve your experience. By using this website, you accept our Cookies Policy.
In this episode of 10 Questions to Cyber Resilience, Assurance IT co-founder Luigi Tiano is joined by David Lindstrom, Identity and Deception Specialist at SentinelOne, to break down how even unsophisticated cyberattacks managed to breach high-profile companies like Uber, Cisco, and LastPass.
🔓 Do Hackers Need High Credentials? – The surprising truth behind cybercriminals.
🛡️ Is Active Directory Secure Enough? – How well does it really protect enterprises?
📊 Understanding a Data Breach – Is it possible to grasp the full scope of an attack?
🕵️ What is a Honeypot? – How security teams use deception tactics.
🕶️ Buying Credentials on the Dark Web – How easy is it to access stolen data?
📩 Preventing Phishing Attacks – Steps to safeguard employees from social engineering.
🔑 The Golden Rule of Password Security – What makes a strong password?
🚫 Avoiding Dark Web Exposure – How to prevent your credentials from being the weakest link.
👤 Securing Enterprise Identities – Best practices for identity protection in organizations.
🔗 David Lindstrom on LinkedIn
🔗 SentinelOne
🔗 Luigi Tiano on LinkedIn
🔗 Assurance IT
David Lindstrom is a cybersecurity sales professional passionate about driving security and business success. With experience across industries, he has excelled as a start-up evangelist, team leader, and practice expert for established companies, helping organizations strengthen their security posture.
A bi-monthly podcast where IT leaders share strategies for enhancing cybersecurity. Each episode tackles 10 critical questions designed to bring businesses closer to cyber resilience.
Since 2011, Assurance IT has helped mid-market businesses in Canada with data protection and privacy. Their PPR Methodology—Prepare, Protect, and Recover—offers a structured approach to cybersecurity, ensuring businesses stay resilient against cyber threats.
Access monthly conversations with IT & Tech Leaders about the hottest cyber security topics in the industry.