Skip to content
Secure Access

Secure Access

TechnologyBusiness5 episodes
In a world where security defines success, are you leading the way? “Secure Access” by Sign In Solutions empowers tech visionaries and executives with groundbreaking insights to master every aspect of security. Join us weekly as we dive deep into the heart of security challenges facing businesses today. Through candid conversations with industry insiders, we uncover the hidden truths and strategies needed to thrive. Whether you're striving to safeguard your organization or propel your career, our podcast equips you with the insights to outperform competitors and secure your future. Don't be left behind—discover the secrets to staying compliant and...Show more
Latest episode

All Episodes

Building Resilient Teams Through Kindness and Innovation in Security

Building Resilient Teams Through Kindness and Innovation in Security

2025-06-26
1 hr 28 min
In this episode of the Secure Access Podcast, sponsored by Sign in Solutions, host John Dillard is joined by Tim Winzel. Tim, the creator of the Kindness Games and Associate Managing Director at Kroll, shares his remarkable journey in global security and leadership. He unpacks his humble beginnings, pivotal experiences in Iraq, State Department, and his influential tenure at Facebook. Tim reveals how kindness can be a potent tool in security, building resilient and effective teams. He discusses his innovative approaches, including security techniques to counter espionage, the importance of integrating culture and customer service into security, and the relevance of AI in future security measures. His experiences as a foster parent and working with victims of domestic violence have shaped his holistic approach to leadership and security. The conversation also delves into the post-COVID-19 workplace culture, highlighting current challenges and future trends in security and risk management. Key takeaways Cultural Integration: Security professionals must understand the business context and align their practices with organizational culture for effective security management. Embracing Kindness: Implementing kindness as a leadership strategy can improve team dynamics and organizational culture. Risk Management: Effective communication of risk in business terms is essential for security professionals to gain support and resources. Adapting to AI: Proper implementation of AI can enhance security operations, but understanding and defining processes is crucial. Coping with Insecurity: Recognizing and managing imposter syndrome can lead to personal and professional growth. Holistic View: Integrate personal and professional lives for a cohesive and authentic approach to leadership and relationships. Quotes “If you want to be invited back, they have to look forward to you coming back.” “Kindness is the endeavor to recognize the humans on the other side of each life situation with the intention to create the best available outcome for them.” “Risk is the language of business internationally.” “Being liked by everybody that's out the window, it's impossible. However, you can be easy to work with, maybe even fun to work with.” “If you can figure out how to deliver a wonderful experience to someone, reducing their risk so that they feel safer and it doesn't make their day suck— that's gold.” “We have the ability to touch and change the trajectory of lives with very simple things.” Connect and learn more about Tim Wenzel. https://www.linkedin.com/in/relevant-perception https://www.kroll.com/ Tim’s Book (The Kindness Games: How a Single Post Changed Our Mindset About Community) https://amzn.eu/d/02zwcDF This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.
Play episode
From CIA to SpaceX: Reinventing Security in the Age of AI

From CIA to SpaceX: Reinventing Security in the Age of AI

2025-06-12
48 min 48 sec
Join me on Secure Access as I sit down with Paul, a former CIA agent turned security innovator, to explore his fascinating journey from national service to SpaceX and beyond. In this episode titled "From CIA to SpaceX: Reinventing Security in the Age of AI," Paul shares how a NASA rejection letter led him to build SpaceX's security infrastructure from the ground up. We delve into his unique career path, from protecting national monuments to shaping security for cutting-edge startups. Discover how Paul leverages his diverse experiences to create tailored security solutions in an era of rapid technological advancement. Whether you're interested in the intersections of physical and cyber security or the challenges of protecting game-changing innovations, this episode offers a compelling look at the future of security. Tune in for insights that could redefine how we think about safeguarding people, data, and spaces.
Play episode
Why You Should Comply with SOC 2 and ISO Standards

Why You Should Comply with SOC 2 and ISO Standards

2025-05-29
34 min 21 sec
In this episode of the Secure Access Podcast, host John Dillard chats with Jason Mordeno, the Director of Compliance and Security at Sign In Solutions, about the intricacies of SOC 2 and ISO compliance standards. John introduces his background in security and compliance and the mission of Sign In Solutions as a visitor management platform. Jason shares his unconventional journey from 3D animation to compliance and discusses his passion for creating robust security frameworks. The conversation covers key aspects of SOC 2 and ISO, including differences, overlaps, and the practical challenges companies face while implementing these frameworks. Jason emphasizes the importance of a security mindset, effective communication, and foundational security principles in managing compliance across diverse and complex organizations. He also provides insights into current trends in compliance, the role of tools, and the importance of being proactive with incident response. This episode serves as a comprehensive guide for anyone looking to understand and navigate the complexities of SOC 2 and ISO compliance. KEY TAKEAWAYS Importance of security frameworks: Discussion on SOC 2 compliance and ISO standards, and their relevance to businesses. Expert insights: Jason Mordeno shares his journey from 3D animation to compliance, emphasizing the importance of a security mindset. Compliance frameworks overview: Detailed explanation of SOC 2 and ISO, their differences, similarities, and implementation strategies. Challenges in compliance: Importance of human factors and effective communication in maintaining robust security frameworks. Role of tools: Tools assist in compliance but are not a silver bullet; manual processes and human ingenuity are crucial. Global organizational considerations: Strategies for managing compliance in diverse and large-scale enterprises. Common compliance mistakes: Miscommunication and presumption are major pitfalls in compliance execution. Trends in compliance: Importance of staying proactive and preparing for emerging threats and regulatory changes. Final advice: Maintain a security mindset, believe in yourself, and focus on foundational pillars to navigate compliance challenges. QUOTES "Security mindset is thinking, how would we do this? What if we're the attacker?" "The challenge is not going to be money. The challenge is not your process. The challenge is not the business itself. The challenge is always going to be the people." "The first tool is yourself, right? Because without it, nothing runs." "Communication is the most offside answer I can give, but communication." "Never think you're secure. You must assume you'll be breached at any point." "Believe in yourself. If you're a security person, compliance person...keep yourself grounded because you are the foundation of the security mindset in the company." This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.
Play episode
Breaking Down Security Silos: AI, Compliance, and the Future of Security

Breaking Down Security Silos: AI, Compliance, and the Future of Security

2025-05-15
25 min 51 sec
In this inaugural episode of the Secure Access Podcast, guest host Adam Cleveland interviews John Dillard, ex-CIA, Navy Veteran, author of Microslices, and founder of ThreatSwitch—a security compliance platform acquired by Sign In Solutions, to discuss the evolving landscape of security, and our host. They explore key issues such as the fragmented vocabulary in security, the impact of AI on security protocols, and the need for regulatory simplification to enable faster and more effective security measures. John shares insights from his career, including his experiences during 9/11 and his views on the future of security leadership. This episode aims to provide actionable advice for security leaders to prepare for rapidly changing threats. Key takeaways The Complexity of Security Vocabulary: Modern security challenges demand a unified approach, breaking down silos between cyber, personnel, and physical security. Rapid Changes with AI: The fast-paced evolution of AI necessitates a shift in security strategies. The traditional playbook is now outdated. Continuous Learning: For security professionals, continuous education in diverse security domains is crucial to keep pace with new threats. Regulatory Simplification: Simplifying regulations could speed up companies’ ability to implement effective security measures. Effective Leadership: Successful security leadership involves future prediction, continuous learning, and motivating teams toward proactive action. Identity Verification: Investing in robust identity verification can significantly enhance a company’s security posture. Quotes "The biggest thing that maybe people don't mention is that I think our vocabulary is broken." "If agents and AI can adapt their tactics in the midst of conducting the attack, there is no playbook. The playbook changes while it's being played." "If you are not reading and studying... the world is gonna blow by you in about two seconds." "The regulation is not the countermeasure." "Complying with the regulation does not protect you from everything related to that." This episode is brought to you by Sign In Solutions. If you found today’s conversation insightful, be sure to subscribe, leave a review, and share it with your network. For more on transforming compliance, security, and workplace experiences, visit www.signinsolutions.com.
Play episode
Secure Access Trailer

Secure Access Trailer

2025-05-05
1 min 6 sec
Play episode