ITSPmagazine public
[search 0]
More

Download the App!

show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
What happens in society when consumers have little control over their customer service experience? Join us for this episode as consumer advocate, Christopher Elliott, shares some insights into the consumer/business relationship. You'll learn: why consumers need to understand the basics of security, and pay attention to what companies are claiming w…
 
As one of the core members in implementing the Julia programming language, Keno Fischer shares the advantages of Julia, behind the scenes of creating a coding language, and his vision for the future. Keno Fischer is the cofounder of Julia Computing and a Forbes 30 Under 30 in Enterprise Technology. Julia is one of the fastest modern open-source lan…
 
We are back with another Candid CyberSec podcast with a very amazing guest: none other than Shara Shamban. She's an amazing entrepreneur and information security person and we talked about the things we care about mutually. Shara has served for the armed forces. Listen in to hear about her experience in the military where in the country both men an…
 
Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one. The…
 
If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sen…
 
Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of…
 
In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conver…
 
You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human! From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a …
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened. Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemente…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that…
 
In this episode Jon Helmus guest hosts a special episode on ITSPradio on behalf of Caroline Wong. His guest is Dr. Gerald Auger, Ph.D, Cyber Advisor, Speaker, and Educator. They talk about finding your passion within cybersecurity, how to get started in the field, and what companies should look for to build out their security programs. Guest Dr. Ge…
 
On this episode, Rafal and Chris discuss how a Washington state agency screwed its vulnerable users using an irresponsible vendor's 20-year-old software. You know what, they're both wrong. Even though there are technicalities, and someone is going to win in the upcoming court battles (quote us on this one), the real victims are those who have had t…
 
During this episode, Ted and Will talked about a gazillion things related to startups, investments, leadership, the cybersecurity market, and so much more. Here are some of the highlights: why venture capital is not about money; it's about helping founders succeed why to succeed you don't need to have a solution that 100% of CISOs need, you just ne…
 
Who are you today? Is there one true self, or are we adapting behaviors to different social situations and goals? The answer is yes, and yes. Whether we realize it or not, we are all social engineers; we are all human hackers. Some of us are good at it and do it intentionally. Some are just being human and part of a social species. And, a few are s…
 
We know that SOC team members are burning out as they try to protect companies, yet many InfoSec programs repeat the same strategies expecting different results. Can we take insanity out of the incident response? That's a good question. One that we're not going to answer, but one that we will discuss and hopefully encourage you all to think about w…
 
Cybersecurity is a multi-faceted discipline that needs brains — a lot, and of all kinds. As such, there is plenty of room for diversity, but it is not welcoming and retaining talent as fast as it could and should. Why? The answers — yes, plural — likely sit inside each of us. Unfortunately, as humans, we all have preconceived notions and perspectiv…
 
Getting and setting up a new phone has become a regular occurrence for many of us. Rachel Arnold helps us understand what we should do to protect our privacy when setting up a new device. Tune in to hear: What smartphone privacy means How law enforcement uses cell information to track suspects How exercising the same place a crime is committed coul…
 
Ben Stanbury has been a top executive at some of the largest content creators in the world, from EA Sports to Disney to Amazon Studios, where he currently serves as the Worldwide Head of Technology. In this episode, he shares a number of insights about how to get your ideas to resonate with top executives. Perhaps most surprising of them all? The k…
 
Aaron Lebel is a Carnegie Mellon ML and Statistics dropout and co-founder @ Pairi, a Techstars startup which has raised $250k. He discusses the value of self-learning, untraditional pathways, and taking risks. College is not the only path to success. Initially building an eyelash extension business, Lebel and his co-founder pivoted to building a no…
 
"Whether he wrote DOWN WITH BIG BROTHER, or whether he refrained from writing it, made no difference... The Thought Police would get him just the same. He had committed... the essential crime that contained all others in itself. Thoughtcrime, they called it.”―George Orwell, 1984 It was the year 1949 when, in the dystopian novel, 1984, George Orwell…
 
Cybersecurity has a big problem with metrics — whether it's showing progress, regress, or just telling a narrative. We're historically bad at understanding how to make the thousands of metrics our security products throw at us make sense to people that are in our leadership chain. The point of using metrics is to show a trend, or an impact — but th…
 
As with most laws, the first question that comes to mind when technology is involved is: are they keeping pace with it? However, there is a fundamental follow-up question: how are these laws interpreted in relation to how new technologies shape business and society? The Computer Fraud and Abuse Act (CFAA), enacted by the United States Congress in 1…
 
Are technology patents helping us with innovation and collaborative creativity, or do they generate hyper complexity that is slowing our societies' advancement? Listen up, and maybe you will decide on your own. By awarding and defending technological patents, we promote innovation by offering intellectual property protection to the invention and th…
 
In this episode of Tech Done Different, we chat with Peter Harris, a partner at University Growth Fund. Peter explains how venture capitalists think about security, what they see their portfolio companies get right, and what they get wrong. In particular, we discuss: how VCs generally don't focus much on security, but if they see a company who has …
 
During this episode, we had the opportunity to speak with Chloé Messdaghi, Chief Strategist, InfoSec Advocate, Board Member, Keynote Speaker, and Activist, about diversity and Inclusion. We focus on what diversity and inclusion mean to Chloé, what they look like to her in the workplace, and how she has dealt with non-diverse and non-inclusive situa…
 
The article in the WSJ was wrong... The big recent hack was NOT a "digital turning point," here's why. Oh, you want the answer - well you'll have to listen to the show but the condensed version is that there isn't really anything in "the way we handle third party supply chains" that COULD change to make a difference with what happened. If you think…
 
A successful privacy program needs to be embedded into the foundation of an organization. Join us as we take a journey into the past, present, and future of creating a culture of privacy. While there are many regulations in place to help "nudge" organizations long, many know that data privacy involves more than just compliance. When done correctly,…
 
Privacy is something everyone takes for granted until it is not there. As our daily cyber activities have become an integral part of who we are and what we do, our footprints have crossed from the physical world into the cyber society. The game has changed in many ways, but did this change our expectations for what privacy is and what it means nowa…
 
In a world where technology allows businesses to flourish and humanity to come together online, it should not come as a surprise that such technology can be both attacked and defended remotely from all over the world. In this episode, we will look at the good side of it: the ethical hacker community. Where they are from, what they do, how they do i…
 
There are at least two sides to every story — sometimes even more. It depends on how many characters there are and how they relate to each other. This story is about hackers and journalists in the news — and Godzilla??! To begin, it probably makes sense to take a step back from the people themselves (hackers and journalists) and look at their profe…
 
Your health data is important to you & your family’s wellbeing. It’s also a target for cyber-criminals. We speak with health data expert, Caleb Barlow, to learn how you can keep your medical data safe. As CEO of CynergisTek, a healthcare focused cybersecurity consulting firm, Caleb is on the frontlines of the healthcare data battle and knows what w…
 
At just 16 years old, Pratham Prasoon is already the #1 Machine Learning influencer on Twitter, with an audience of over 40k. In this episode, Pratham talks about his start in machine learning, his rise on Twitter, and how he uses passion in machine learning to help others. Pratham started off with a simple yet strong motivation — wanting to spread…
 
According to our guests, cybersecurity leaders who experience the following symptoms fail to convince business leaders that cybersecurity risk is, in fact, business risk: Failure to garner trust from executive leadership Mis-aligned expectations around risk appetite and capital allocation Misperception of cybersecurity's role in the business Demora…
 
Today we have our esteemed guest, Kim Crawley, and we will speak about her journey in cyber journalism and in cyber security, hearing about how her father motivated her and taught her to write very early on. Kim also shares her experience on being lucky to be able to write about cybersecurity for a living because it is a dream job. We also talked a…
 
Ron Thurston is the #1 best-selling author of Retail Pride and a senior leader at some of the world's most iconic brands. He joins Tech Done Different to help us apply ideas from outside of technology in order to help us think and act differently. During this episode, we discuss: the idea of "going green" — celebrating wins, and encouraging people …
 
It is almost impossible to think about the cybersecurity profession and not envision it as being in constant crisis mode. Does it have to be? Maybe it is time to redefine and apply the concept of human resiliency. The last few years, and even more the most recent one, have fueled the urgency to build on a more robust and resilient approach to the o…
 
The amount of work security teams have to handle is increasing exponentially and takes a severe toll on their ability to keep up with the threats. Thankfully, there is technology. Bring on security automation! Automation sounds simple enough, right? But is it? And do security teams automate the right things? When considering security automation, it…
 
What do we think about this cybersecurity strategy? We wait for an attack to happen, then we respond to the threat by paying a criminal organization to get out of the trouble. Does it seem like a good one? Probably not, especially when it is illegal to do so. Let's discuss. Ransomware is a digital attack against an individual or organization that h…
 
Way too often, we think of cybersecurity professionals as if they come from another galaxy; Aliens, with no understanding of the business and not much to contribute to it. Well, it's not true. In this series, we explain why. There are exciting intersections between law, compliance, security, privacy, contracts, and business. It's time we talk about…
 
January is a great time to take stock of what you’d like to change. Why shouldn’t that apply to your cyber-life too? In this episode, Ron Craig explains how to make your 2021 cyber-safe. Tune in to hear: Ways password wallets/managers keep your data safe Why it’s important to use unique passwords How our emotions impact the online information we sh…
 
In this episode of Tech Done Different, retail leadership titan, Andrew Smith, joins to discuss insights about the human element of leadership and cross-team trust. Amongst many things, we discuss: why to define what "innovation" even is, as a way to bring technology and operations together how to break vernacular into simple, human language why to…
 
Not every 19 year old knows as much about moonshots and deep tech as Rahul Rana does. As an author, venture builder, and investor, Rahul shares his story chasing moonshots and inspiring others to do the same. Rahul is the author of Making Moonshots—a deep dive into the mindsets, philosophies, and strategies conducive to building moonshot companies.…
 
Prehistoric warfare refers to conflicts that occurred before recorded history. Still, we do not need a book to depict a bunch of humans throwing stones at each other to win their respective possessions. What happened since? We sure have come a long way; humanity has matured and we no longer need to resort to conflict — just kidding. Things may be w…
 
This is a Candid CyberSec conversation with a very amazing Lidia Giuliana. An amazing mentor, Cyber Security leader and Black Hat Asia Reviewer. We talked about her journey from Public to Private sector; from a developer to a security leader in Australia. Her humbling experience as a Black Hat Review Board Member and mentoring lot of first time spe…
 
Culture is defined as the customs, arts, social institutions, and achievements of a particular nation, people, or another social group—with modifiers in the attitudes and behavioral characteristics of a specific social group. In this podcast, we talk about the role of culture, and specifically, we apply two modifiers: Company and Security. Social g…
 
Students need real-world scenarios to help them round out their education as they prepare to build their career in the real world. If this is true for any educational curriculum, it is even more critical in cybersecurity. A balanced diet of theory, tools, knowledge, and hands-on experience is recommended, and the Florida Tech model of learning offe…
 
"I've done a few consulting calls about 'Zero Trust' and left the client practically in tears. It's fascinating, to me, that someone can read a bunch of marketing drivel and conclude from that, that it's the future of networking. Really? Do they think it's going to work? Why?" —Marcus J. Ranum This note from Marcus was enough for me to want to foll…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login