Dr Ben Webb public
[search 0]
More

Download the App!

show episodes
 
C
Culinary School Stories

1
Culinary School Stories

Dr. Colin Roche, PhD, MBA, CEC, CCE, FMP, CHE

Unsubscribe
Unsubscribe
Monthly+
 
Culinary School Stories is a weekly podcast with engaging interviews that shares the stories of people from around the world that have an association with a culinary school in some way. Every Monday we bring you the best stories from people around the food service world whose lives have been influenced, impacted, touched and/or enriched, for good or for bad, from their culinary school experience. And this Podcast is dedicated to telling their story! From current students and alumni, to facul ...
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
Giving us some insight into what's being discussed in the US government and how previous cyber attack scenarios played out and will ultimately define how we prepare and respond in the future, guests Gregory Touhill and Chase Cunningham join us to discuss the "good guy vs bad actor" scenarios they play out the narrative of their new book, Rip Tide: …
 
Jason Haddix, world renowned bug bounty researcher, shares his story and valuable advice that has helped many aspiring pentesters and bug hunters. Jason shares his story of starting in IT, becoming a pentester, to helping a top bug bounty company in the beginning stages. Jason's advice includes learning resources, and career advice that he has shar…
 
“There’s a place in tech for everyone.” Tyler Menezes, Executive Director of CodeDay, is changing the narrative of CS education -- simply by getting students excited to learn and create. Tyler describes his spark with building cool things using tech after stumbling across a programming book for slot machines. Since then, Tyler has been helping thou…
 
A MetaThanksGiving Special where Diana, Sean, and Marco talk about The Metaverse, The FoodVerse, The Turkey Something that has nothing to do with your meal | And many more thoughts on what the MetaVerse is, could be, or not?! | Through The TechVine Radio Program Episode TwentyFive We have officially decided to keep Through The TechVine a live recor…
 
Did you know 1/3 of cybersecurity professionals have had personal experience of harassment online? This episode dives into how companies can help, and the Respect in Security pledge. ______________________________ Guests Lisa Forte On LinkedIn | https://www.linkedin.com/in/lisa-forte/ On Twitter | https://twitter.com/LisaForteUK Nikki Webb On Linke…
 
Security executive, researcher and professor Ken Pyle joins Tech Done Different to dig deep into security research and what we can all do better. You'll learn: why complacency exists everywhere, and why it's a problem why it's a problem when a system works as designed but not as intended why you have to put in the work if we ever hope to make thing…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: Do we still sit at the edge of our seats watching a movie, or are we too used to technology? | What is a “Drop-in Fuel” and why it is an excellent idea | Smart building material that can switch between heating and cooling properties | Luxury items …
 
GUEST’S NAME: LaToya Larkin CULINARY SCHOOL AFFILIATION: The Art Institute; Houston, TX & Atlanta, GA. BIO: Chef LaToya Larkin, MBA, CCE, has over 20 plus years of expansive knowledge and culinary passion which has led to a lifetime of achievement opportunities. Chef Larkin recently retired from her 8-year position as the Culinary Arts Program Coor…
 
Are we getting it right? Do we need to reevaluate the model of cyber education and training? JC Vega and I dig in. _______________________ Guest JC Vega On LinkedIn | https://www.linkedin.com/in/jcvega-cyber-colonel/ On Twitter | https://twitter.com/teamvega ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/its…
 
Joe Brinkley—or The Blind Hacker as he is most commonly known in the InfoSec community—shares his story of overcoming a disability to achieve his dream job in cybersecurity. Joe is not only a very talented pentester, but a community contributor, speaker, mentor, and Innocent Lives Foundation Ambassador. Joe shares his story and advice on getting st…
 
Heading to the kitchen for some serious cooking for the winter holidays? Chris Roberts joins us as we talk about cool, and secure, kitchen tech and gadgets. Chestnuts roasting on an open fire and automatically stirred by a pot bot? Holiday turkey that you can check for doneness from your office? There’s some very cool tech to help make your holiday…
 
So you want to become an ethical hacker? What next? What steps do you take and in what order? In this new episode of KnightLife, I talk about my journey in becoming an ethical hacker/penetration tester. I then walk you through what steps I recommend you take in a step-by-step playbook for becoming a penetration tester. _____________________________…
 
Cyber influencers are making quite the splash around social media and as we are well aware. Yet, they are not created equally. During this episode we have the privilege of speaking to one of cyber space’s most uplifting influencers. Stephen Semmelroth is a powerful voice who has organically established a tribe of followers due to his natural leader…
 
As the cybersecurity industry progresses, we need to be more open to diversity in many forms. Neurodiversity is prominent within the tech industry. Neurodivergent is to tech as gay is to fashion! In this episode we chat with Kim Crawley about how employers need to start looking at creating diverse teams with a new lens. From hiring candidates with …
 
This is a story that you haven’t heard yet, but we guarantee that it won’t be the last of its kind. It is a tale of art, technology, digital collectors, Artificial Intelligence, creativity, NFTs (Non-fungible tokens), and so much more. It starts with a painter that has spent precious time creating an original piece of art. As soon as the brush rest…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome their guest, Keenan Skelly, and together they talk about: The Possible Future And Hope Of Pain Therapies | Robots Cooking With Lasers | Tech History: The Regency T-R1, Transistor Radios And They Way They Changed Technology Consumption | Music And The P…
 
Security entrepreneur Terry Dunlap joins TDD to talk both about the mechanics of reverse engineering, as well as to explore what he did right to help get his company acquired by Microsoft. You'll learn: the difference between "vulnerable" vs. "exploitable," and why the distinction matters the role of outside security validation, testing, and certif…
 
It seems that nearly every enterprise is in the midst of a cloud transformation. This begs the question, how and where does information security transformation fit in to this bigger IT and business picture? That's exactly what we get to discuss with our guest, Helen Oakley, as she shares some thought-provoking insights regarding secure cloud transf…
 
This is certainly not a new or revolutionary statement: "Words Matter." What is new nowadays is the pace at which our business, relationships, and society change. Technology is fueling many of these changes, and we are all learning new ways as we go. As we're trying to figure out what we are doing and where we're going to go next, the words we use …
 
Social Engineering expert Chris Hadnagy entrepreneur, DEFCON Social Engineering Village, and Innocent Lives Foundation founder shares his story. Chris shares story of being recruited by Offensive Security, discovering his talent and interest for social engineering. Chris has authored multiple books on social engineer, founded the DEFCON Social Engi…
 
Learn how to make a better workplace for neurodiverse employees. This episode explores misconceptions and what it means to be neurodiverse. ______________________________ Guests Devin Harris On LinkedIn | https://www.linkedin.com/in/dharrisdevelop/ Nathan Chung On LinkedIn | https://linkedin.com/in/nathanchung808 On Twitter | https://twitter.com/na…
 
The problem is not the problem, it is the way you think about the problem. Get outside the box. Fear, manipulation, influence and deceit are some of the most powerful tools in the arsenal used by nation state attackers and criminal actors. The most significant breaches have not occurred just because of flaws in software, or lack of proper controls.…
 
What’s the connection between banking and finance, and how does the retail industry play in this sandbox? The game is changing, and the future can be awesome or scary. So how does it sound like a retailer that finances you and also manages your money? In this episode, we talk about what is happening and future scenarios for online and bricks and mo…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: The Power Of Huna Philosophy | Can An Algorithm Flip Homes? Apparently Not | Radio Milky Way Is Blasting Sounds We Cannot Understand | Climate Change Is Changing The Way We Look At Big Dams. Let’s Consider Micro Local Projects Instead | Through The…
 
Learn everything you need to know about cameras, lenses, and lighting techniques for the ultimate home studio for YouTubers, podcasters, and those wanting better Zoom video conferences. In this episode, I go over the most commonly asked question I get on social media, which is, "how do I make my videos look more cinematic or just plain better?" I d…
 
In this fifth episode, the group gets into some real-world stories where multiple workflows come together in an orchestrated fashion to amplify the investments in workflow management and automation exponentially. In the previous four episodes, we looked at what it takes to transition from manual, human-driven (frequently paper-bound) processes to a…
 
GUEST’S NAME: Judy Doherty CULINARY SCHOOL AFFILIATION: Culinary Institute of America, Hyde Park, NY & Johnson & Wales University, Providence, RI BIO: Chef Judy Doherty’s passion for cooking began with helping her grandmother make raisin oatmeal for breakfast. From there she held her first food service job at 15 and was then accepted into the Culin…
 
Rey Bango goes from a long-time developer to security advocate and freelance pentester. Rey shares his story, his path to security, and his vast experience with numerous cybersecurity training providers making him a subject matter expert in offensive cybersecurity education. _______________________ Guest Rey Bango On Linkedin | https://www.linkedin…
 
Nikin discovered his love for electronics at 9, and became the youngest research assistant at India’s DoD. He discusses his journey in accelerated learning pathways and founding a medtech startup. “Don’t ever be afraid to ask for help or to ask for opportunities. Very few opportunities land in your lap… you have to hustle and create the opportunity…
 
Social media, a fun way to share photos of the kids and pets or toxic soup of misinformation? Anthony Coggins, Director of Social Media at West Michigan Cloud Security Alliance explains. Social media, it’s a household staple, but it’s not all fun photos - governments are concerned about how social use has impacted everything from privacy to electio…
 
Product Management: the team responsible for new product development. Information Security: the team responsible for ensuring systems and data are protected from inaccessibility, loss, theft, and misuse. How and where do these two teams collide? Let's find out. In today's episode, we catch up with information security leader Christie Chaffee. We di…
 
There are plenty of challenges when it comes to securing the clinical and IT infrastructure of healthcare delivery organizations. But this is only half the picture. Technology—devices, networks, systems, and data— plays a key role in creating an environment that can make life better in both preventative medicine and ongoing patient healthcare. The …
 
Morgan Sayre walks us through her personal journey into cyber and learnings throughout the way. She sheds light on a very specific area of cybersecurity: assessments; and, in particular, in the area of the payment card industry. Morgan drops some serious career hacks during this episode that have helped to shape her to the successful professional s…
 
Too often, we think about Universities and any place of teaching as places where young people learn about the past and form themselves for the professions that will define their career, and their life. While this is partially true, it is very far off from all the academic world is. As a matter of fact, it is the place where the future is made—somet…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! How and where do the SOC and the SOC analyst make positive impacts on the business? That's exactly what we explore in this new episode. In this special panel held live during the first-ever SOC Analyst Appreciation Day, we get to speak with Kathy Wang, the CISO at V…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Angela Marafino as a guest on this Halloween Special Edition Episode — together they talk about: FrankenPhish A Monster That Feeds On Credentials | Are We Afraid Of Technology, Or Do We Just Like To Be Scared? | The Mystery Of The Hundreds Mummies On B…
 
Gabe's curiosity for how things work as a child is later used as a red teamer, but not leveraged until years later. Gabe shares his story and how his approach to learning and his career reflects how he prepares for 100 mile runs. _______________________ Guest Gabe Thompson On Linkedin | https://www.linkedin.com/in/gabethompson1811/ On Twitter | htt…
 
It's time we break the gates and allow for folks to enter the industry. Learn why we must change the situation and how to get involved. Guest Naomi Buckwalter On LinkedIn | https://www.linkedin.com/in/naomi-buckwalter/ On Twitter | https://twitter.com/ineedmorecyber ______________________________ Host Chloé Messdaghi On ITSPmagazine 👉 https://www.i…
 
What we can learn from other countries about privacy and cybersecurity. We take a look back on each issue discussed during this season of The National Blast. _______________________ Guest Chris Kubecka On LinkedIn | https://www.linkedin.com/in/chris-kubecka/ On Twitter | https://twitter.com/SecEvangelism ______________________ Host Keenan Skelly On…
 
Kyle Tobener has seen many flavors of how to manage third-party security risk. He joins Tech Done Different to share many insights on this critical security domain. You'll learn: - why companies that have a unified system for third party/vendor security risk management are always in the best shape - why experience in third party security is like an…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Philip Wylie (The Hacker Maker)as a guest on the show — together they talk about: How Are Hackers Made? | Contextualizing Technology And Art | Why Computer Power Is Never Enough | What Could Cybersecurity Learn From Plants? | Vinyl Records & Video Cass…
 
GUEST’S NAME: John-Michael Collins CULINARY SCHOOL AFFILIATION: DC Central Kitchen, Washington, DC BIO: Chef John-Michael Collins was born in San Diego, CA and from his earliest memories growing up he can remember a life full of abuse, including physical, mental, and sexual. John-Michael tried to end his life at the age of 10 though thankfully his …
 
Harvard CS and English undergraduate student, Catherine Yeo, talks about her journey founding an AI ethics organization with tens of thousands of article views and discovering her interests through her love of writing. Besides founding her organization Fair Bytes, Catherine is also lead venture partner at Contrary Capital and has previously worked …
 
Rana discovered application security as a software developer which inspired her interest in web app pentesting. During her studies and journey to prepare for the OSCP certification, Rana started sharing what she learned in blogs and went on to create video learning content for aspiring pentesters and security professionals. _______________________ …
 
This is one of those origin stories that we love to share on ITSPmagazine. While each company's story is unique, inspiring, and beautiful in its own way, this one is told by the four friends that happen to be those that had a dream and turned it into reality. It is an extraordinary moment for the four of the co-founders to tell us how Blue Lava cam…
 
According to our guest, Len Noe, “biohackers exist and walk among us.” We have no reason to doubt him. His latest talk called “BioHackers, Augmented Human Attack Vectors” explains the details — but that’s only one side of our conversation: the meaning of transhumanism and the relationship between being human and technology. We all enjoyed this conv…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Lynn Dohm (Executive Director At WiCyS) as a guest on the show — together they talk about: WiCyS | Vladimir The Cat | Lynn’s Scary Mummy | Plants And Solar Panels | A DNA Test That Tells You What To Eat | An Electric Cure to Depression | Happy Bday Pac…
 
Casey Driscoll is a rockstar in the learning and development space. Join Erika, Jax and Casey for an engaging conversation on the importance of soft skills in the workforce. Casey breaks down invaluable soft skills that are relevant for any industry. Starting with how you present yourself, your communication skills and relationship building. Casey …
 
What would you do differently if you knew then what you know now? Good question, but not practical, because that is obviously not going to happen. Still, some people have “been there” before you, and even if they cannot guide you step by step — they can lay out some master plans and give you some tips on how to advance your cybersecurity career. Th…
 
What do nutrition, rest, and movement have to do with peak performance in your career? Surgeon Dr. Glen Robison, MD joins Tech Done Different to help explain. You'll learn: why people will do anything to escape pain, and when you're in pain, cognition diminishes why to eat organic, and avoid the toxins & chemicals omnipresent in food, which lower y…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login