Knowledge At Wharton public
[search 0]
More

Download the App!

show episodes
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
In 1950, physicist Enrico Fermi posed the question that launched a thousand explanations. "Where is Everybody?" Where are the extraterrestrial civilizations that are supposed to be out there? Addressing that question requires immense research, further studies, and (above all) that we confront how little we know about life and intelligence in the Un…
 
Kim shares her passion for helping others through her volunteer efforts in numerous cybersecurity organizations helping the under-represented. Kim not only volunteers in multiple cybersecurity organizations, she also founded her own non profit. Not only does she focus on helping people gain skills in cybersecurity, she wants to educate people at al…
 
Have a listen as Alyssa and Liz entertain each other and their audience. ________________________________ It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube. Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later. Our ability to …
 
We pack a lot into this conversation, looking at what to learn, how to learn, and who to learn from, getting a fantastic overview of the conference from many angles and positions. *Threat intelligence* *Development processes* *Cyber security M&A market* *Sales* *Marketing messaging* *Cyber law* *Standards* Tune in to this conversation as we wrap up…
 
In this episode, we are joined by long-time medical device veteran Chris Barron, to help walk us through the many challenges that early-stage medical device startups face, and how to overcome them. You'll learn: why fundraising is a long process what you need to make clear to investors in order to get them to invest in your startup what role your m…
 
SecAura is an amateur YouTuber whose post I came across caught my attention. SecAura creates free educational videos for ethical hacking and does so while going the extra mile to hand-craft many of the animations used in the videos. All of this is done outside of the 9-5 job SecAura has as a penetration tester. Realizing that the technical subjects…
 
Cryptocurrency can be used for almost any purchase these days. However, a lot goes on underneath and behind the scenes. In this episode, we learn the basics, the history, and the future of Bitcoin, Ethereum, Filecoin, NFTs, smart contracts, and so much more. We talk about this with Robert Dowling, which is not only extremely knowledgeable on the ma…
 
Dive into the ways to improve online safety with kids and why diversity matters... and her books! ______________________________ Guest Zinet Kemal Mom of 4, Author, & Associate Cloud Security Engineer at Best Buy [@BestBuy] On Twitter | https://twitter.com/zinet_kemal On LinkedIn | https://linkedin.com/in/zinet-kemal ______________________________ …
 
What an inspiring conversation! In this episode of Sound Signals, we put together music, ocean life, environment conservation, and multimedia experiences that, thanks to new technologies, could be soon available in the comfort of your home. So, get your headset, make-believe scuba gear on, and dive into the ocean with us. With our guest Joshua Mill…
 
A new year and a new Bad Bot Report from Imperva. How is it looking? Well, this year, we see an increase in the sophistication level of bad bots compared to last year, with advanced bad bots accounting for 25.9% of all bad bot traffic in 2021, compared to 16.7% in 2020. In addition, evasive bad bots are on the rise, no industry is immune, and Accou…
 
In this Audio Signals episode, we again turn our attention to space. Just like our early ancestors and those who came after them, humanity has always been fascinated by the space above — well, all around — our Pale Blue Dot, which we call Earth. We made up most of the stories, some were fantastic, and some were almost true, but lately, technology h…
 
The venture market in cybersecurity continues to shift as the economy ebbs and flows throughout the world. However, when you have a good idea, it still gets the attention of the users and the investors, even if that means starting at the bottom and working your way up. Join us for a live stream conversation with CrowdSec CEO, Philippe Humeau, as we…
 
Sometimes the best ideas are the craziest ones. In this episode of Tech Done Different, entrepreneur Zach Belanger walks us through how to think big, think creatively, and pursue big goals. You'll learn: why sometimes the right ideas sound the craziest why crazy ideas are better than boring ideas why to do it "indie" rather than "industry" why to a…
 
Courtney Cohen did not take a traditional route into cybersecurity. She started working in humanitarian assistance for an agriculture tech company leveraging technology to help farmers improve their business in the face of climate change to being a Senior Director at CyberGRX. During this discussion listen to Courtney's story of going from the NGO …
 
What do kinky boots have to do with building bridges between security and the business, take a listen to this discussion between Alyssa and her guest Larisa Breton. They delve into the power of finding common ground and how that can build stronger collaboration and alignment. ________________________________ It is a podcast, yes, but you can join u…
 
Marc had an interest in computer science in high school and to find a way to pay for his education enlisted in the US Army to fund his education. To educate himself and make his dreams a reality, Marc Sanchez joined the US Army as a way to fun his education for a career in cybersecurity. Marc shares his journey, the importance and lessons learned f…
 
Health has become intertwined with technology — or the other way around — to a point where we should have a clear vision of where things are heading. Unfortunately, telemedicine is an excellent example of a path not being as straightforward as it should be. With the advancement of technology comes cultural changes. It also happens the other way aro…
 
The founder's journey can directly impact what a company focuses on and why. In this Asgardeo by WSO2 story, you'll get to hear how their work is making the world a better place through software. Starting a business built on the premise of offering open-source software wasn't something IBM wanted to do a couple of decades ago. That didn't stop WSO2…
 
Achieving goals, whatever they may be, is never an overnight event. It takes time, dedication, and, most of all it takes resiliency. Once you have a dream and you want to make it happen, there is one thing you can do “Keep On Pushing.” In this episode, our guest is Devon Harris, Three Times Olympian & Member Of The Jamaican Bobsled Team That Inspir…
 
This conversation reflects on the challenges that women face in the tech industry and how we can make the workplace inclusive for better. Jess Dodson and Amina Aggarwal talk about some of their experiences in the tech industry and in life in general. Mom of @lilgirlgerms, proudly owns the title of SecOps witch at Microsoft. Jess talks about: 💕 Her …
 
Rob started his career path in Unit 8200 Intelligence Force and went on to be a CEO and cofound a cybersecurity startup. Prior to Unit 8200 Rob got interested in technology at 13 years old. His intelligence experience in Unit 8200 helped him in his professional career and cofounding a startup. Along with his story Rob shares his career advice, he s…
 
MiC is on a mission to support women and minorities in cybersecurity. Learn about the nonprofit and how to get involved. ______________________________ Guest Mary N. Chaney Chairman, CEO & President at Minorities in Cybersecurity (MiC) [@MiCLeadership] On Twitter | https://twitter.com/MaryNChaney On LinkedIn | https://linkedin.com/in/marynchaney __…
 
Take a walk with us in the past, present, and future of 3D in retail and in all the unexpected places where we can run into 3D images nowadays. What does it mean for shoppers, manufacturing, and marketing — and yes, of course, its role in the Metaverse. We look at cloud computing to overcome technical challenges such as real-time content sharing, r…
 
As we build complex software systems, we also need to ensure we understand what to some might feel unscientific: how does this system make me feel? Mariana Muntean joins Tech Done Different to help us understand the differences between artistic thinkers and engineers, and how the two can partner to produce great results. You'll learn: why creatives…
 
The Artemis Program will send astronauts to the lunar surface for the first time in over 50 years. Why did it take us this long to get "Back To The Moon"? Basically, the Apollo Program was a massive (and expensive) undertaking that was all about "getting there first." To go to the Moon in a way that ensures we can keep going back, several steps had…
 
For our next Chats On The Road for RSA Conference 2022, we talk about security program transformation through the successful development and implementation of security framework and program management. About the RSAC 2022 Session, The Zoom Effect: A Framework for Security Program Transformation: “When companies experience rapid growth, information …
 
Parker shares his path into offensive security, career advice, and about his non profit The Information Security Collective. Parker was pursuing a career in engineering and got a degree in physics, but he discovered an interest for technology and cybersecurity. He completed a masters degree in cybersecurity and went on to be a consultant performing…
 
Candice Lu joins Tech Done Different to teach us about entrepreneurship, building teams, and developing leaders. You'll learn: why being a founder is about control why autonomy matters how to create a culture that people want to be part of why emotional intelligence is the most important factor to being truly consultative why doing right by your pe…
 
Three graduating high school seniors (who have each received full-rides to college) reveal their regrets, lessons learned, and defining moments that made their last 4 years memorable. Have you ever wondered how differently things would be looking back? Aaryan, Kyler, and Sneha have recently graduated high school and are heading off to their respect…
 
Streaming live from RSA Conference 2022, Alyssa Miller is joined by Jen Easterly, Director, Cybersecurity & Infrastructure Security Agency (CISA) to discuss her journey and role at CISA, public/private sector collaboration, the increased focused on the human element, and so much more. ________________________________ It is a podcast, yes, but you c…
 
Sometimes it takes a good story to make the connection between technology, risk, humanity, and society. Sometimes we need to tell that story early and often. In this case, the story is about dragons and a mighty young threat intelligence warrior. About The Book Why are dragons so tricky? The only way to find out is to study their behavior. This is …
 
Angela Marafino chats with Katie Nickels (Red Canary) about her upcoming panel: The Five Most Dangerous New Attack Techniques, and more! Check out “The Five Most Dangerous New Attack Techniques” on Wednesday, June 8th at 11:30am PT! ____________________________ Guests Katie Nickels Certified Instructor and Director of Intelligence, SANS Institute a…
 
On the surface, building an information security program may appear as is in its name, a single program. However, in reality, there are countless elements — sub-programs and adjacent programs, if you will — that comprise a comprehensive information security program. In this conversation, we explore the overarching program, of course, including: Who…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login