Not All B2B Content Is Created Equal

We create pixel, pitch-perfect content to drive listener engagement and show growth. Please see examples of assets created for different clients below 👇

Audio

Our audio production team take raw audio and sculpt it into what we like to call "addictive audio". Episodes that our ideal listener persona can't stop listening to...

Be More - A Workday Podcast - Trailer
Retain: The Customer Retention Podcast - Episode 1
Be More - A Workday Podcast - Episode 2
A Change Mindset - Episode 0
Cloud Unplugged - Episode 37
The Future Of - Trailer

Long form video

We record video as default and encourage all clients to publish a long-form version of each episode on YouTube (and now Spotify), sometimes with a trailer...

The Future Of - Episode 22
The Money Movement - Episode 77
The Money Movement - Episode 74 Trailer

Video snippets

Pulling out the most engaging, valuable or controversial clips from the episode, in live or audio form style, is a very effective way to generate attention and engagement on social platforms.

Visual

A striking, brand-aligned visual identity is crucial for show growth.

Visual Image
Visual Image
Visual Image
Visual Image
Visual ImageVisual Image

Ganjar Imansantosa Bio:

Ganjar Imansantosa is VP and CISCO at Tropical Smoothie Cafe, a nationally franchised quick-service restaurant. He has over 25 years of experience leading information security teams at global brands like Ernst and Young, Arthur Anderson, and Dominos. As an information security leader, Ganjar assists enterprise technology leaders in defining and executing their information security strategies. He is equally passionate about safeguarding digital assets against emerging cyber threats while supporting the business in achieving its strategic goals. 

Get to Know Your Hosts:

Max Aulakh

Max Aulakh

Co-Founder | Chief GRC Automator | RMF expert

Max is the CEO of Ignyte Assurance Platform and a Data Security and Compliance leader delivering DoD-tested security strategies and compliance that safeguard mission-critical IT operations. He has trained and excelled while working for the United States Air Force. He maintained and tested the InfoSec and ComSec functions of network hardware, software, and IT infrastructure for global unclassified and classified networks.

Linkdin
Joel Yonts

Joel Yonts

New Podcast Launch: Emerging Cyber Risk

Joel is the CEO and Research Scientist at Secure Robotics and the Chief Research Officer and Strategist at Malicious Streams. Joel is a Security Strategist, innovator, advisor, and seasoned security executive with a passion for information security research. He has over 25 years of diverse Information Technology experience with an emphasis on Cybersecurity. Joel is also an accomplished speaker, writer, and software developer with research interests in enterprise security, digital forensics, artificial intelligence, and robotic & IoT systems.

Linkdin

Episode Highlights :

Episode Image

09:26 - 11:09 - Cybersecurity in a Shared Risk Environment

Ganjar explains that while the risk of a breach is spread between the brand and its franchisee, the legal impact that rests solely with the brand and its effect ripples across the brand and franchisee in terms of lost customer confidence and a drop in sales. Creating security awareness for the small business owner franchisee is a challenge. In the U.S., the master franchisee for a region works with franchisees in their region to drive awareness and compliance. 
‍
“I think the most important thing is for you to start having conversations with these different individuals, and you take your win. If you can move the needle a little bit daily, that's a win”.

See Examples 👉

14:26 - 16:43 - Why Does the Retail Industry Lag in Adopting Cyber Security Protocols?

The retail industry finds itself at the tail end of adopters regarding digital security adoption. Ganjar highlights how the tech industry adopted zero trust five years ago while the retail industry is just discovering it. The late adoption is down to industry-specific factors like wafer-thin margins and limited security budgets at retail companies. Another reason is that retail companies only discovered the value of a digital channel during the pandemic. As an industry, the focus is scaling the digital footprint, and security awareness and implementation will follow.

‍“We are now witnessing the digitalization of the retail industry with companies building their mobile app and infrastructure. I guess we're still slowly adapting these new things whereas, for other industries, it's considered like yesterday.”

See Examples 👉
Episode Image
Episode Image

28:19 - 30:39 - Data Privacy at Retail Brands

Ganjar mentions that retail brands follow one of two strategies when it comes to managing the privacy of customer data. The first is where the brand holds all customer data and manages its security, while the other is where individual franchisees collect and input customer data, and the brand manages the security. The most critical customer data is their credit card information and their address. Protecting this is a big step forward for the retail industry. Brands must be careful while unlocking customer data to gather insights like browsing and buying patterns, geolocation, and non-loyalty customer data. Brands are increasingly using a privacy-first policy when it comes to analyzing first-party data.

‍“You must look at the problem, talk with the business, and understand what they're trying to do. Then consider different options that you can combine, mix, and provide to the business that enables business scaling without compromising security and privacy”.

See Example 👉

35:59 - 37:45 - The Role of Legal Teams in Defining a Brands Cybersecurity Policy

Ganjar mentions that the legal teams at retail brands have matured in the Infosec space. The legal teams play a pivotal role in defining your cyber insurance strategy, communicating with the board, and the strategy to manage and mitigate residual risk. In the ideal case, you would have a healthy debate between the stakeholders and the General Counsel about prioritizing data protection.

‍“It’s important to remember that given the proliferation of digital data, it becomes impossible to protect everything unless you have an unlimited information security budget. Hence, prioritization of assets is a must”. 

See Examples 👉
Episode Image
Written
A Successful Pivot to a Subscription-Based Model at Scale
Written
Selling the Experience Instead of the Product with Dennis Robinson, Marketing Manager at Midgett Realty

Social posts

We sculpt social posts that add value, increase the chances our guests share and then of course, link back to the full episode.