ITSPmagazine public
[search 0]
More

Download the App!

show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
What do we think about this cybersecurity strategy? We wait for an attack to happen, then we respond to the threat by paying a criminal organization to get out of the trouble. Does it seem like a good one? Probably not, especially when it is illegal to do so. Let's discuss. Ransomware is a digital attack against an individual or organization that h…
 
Way too often, we think of cybersecurity professionals as if they come from another galaxy; Aliens, with no understanding of the business and not much to contribute to it. Well, it's not true. In this series, we explain why. There are exciting intersections between law, compliance, security, privacy, contracts, and business. It's time we talk about…
 
January is a great time to take stock of what you’d like to change. Why shouldn’t that apply to your cyber-life too? In this episode, Ron Craig explains how to make your 2021 cyber-safe. Tune in to hear: Ways password wallets/managers keep your data safe Why it’s important to use unique passwords How our emotions impact the online information we sh…
 
In this episode of Tech Done Different, retail leadership titan, Andrew Smith, joins to discuss insights about the human element of leadership and cross-team trust. Amongst many things, we discuss: why to define what "innovation" even is, as a way to bring technology and operations together how to break vernacular into simple, human language why to…
 
Not every 19 year old knows as much about moonshots and deep tech as Rahul Rana does. As an author, venture builder, and investor, Rahul shares his story chasing moonshots and inspiring others to do the same. Rahul is the author of Making Moonshots—a deep dive into the mindsets, philosophies, and strategies conducive to building moonshot companies.…
 
Prehistoric warfare refers to conflicts that occurred before recorded history. Still, we do not need a book to depict a bunch of humans throwing stones at each other to win their respective possessions. What happened since? We sure have come a long way; humanity has matured and we no longer need to resort to conflict — just kidding. Things may be w…
 
This is a Candid CyberSec conversation with a very amazing Lidia Giuliana. An amazing mentor, Cyber Security leader and Black Hat Asia Reviewer. We talked about her journey from Public to Private sector; from a developer to a security leader in Australia. Her humbling experience as a Black Hat Review Board Member and mentoring lot of first time spe…
 
Culture is defined as the customs, arts, social institutions, and achievements of a particular nation, people, or another social group—with modifiers in the attitudes and behavioral characteristics of a specific social group. In this podcast, we talk about the role of culture, and specifically, we apply two modifiers: Company and Security. Social g…
 
Students need real-world scenarios to help them round out their education as they prepare to build their career in the real world. If this is true for any educational curriculum, it is even more critical in cybersecurity. A balanced diet of theory, tools, knowledge, and hands-on experience is recommended, and the Florida Tech model of learning offe…
 
"I've done a few consulting calls about 'Zero Trust' and left the client practically in tears. It's fascinating, to me, that someone can read a bunch of marketing drivel and conclude from that, that it's the future of networking. Really? Do they think it's going to work? Why?" —Marcus J. Ranum This note from Marcus was enough for me to want to foll…
 
Robin Dreeke is an FBI Special Agent who was Chief of the Counterintelligence Behavioral Analysis Program. He's a best selling author who teaches people why solid, quality relationships are the foundation of all success and how to achieve it. In this episode of Tech Done Different, we discuss: - why trust is actually a survival instinct - why you s…
 
Cyber security companies are absolutely awful at acquisitions. In this edition of IfM, Rafal and Chris talk about some of the ways that acquisitions go wrong, who does them the worst, and what could be better. We've been through a few of these, so we can tell you what's important not to f**k up... Hosts Rafal Los | Chris Abramson This Episode’s Spo…
 
Design and technology are both important in the field of startups, yet a dichotomy prevents some from pursuing both. Caelin Sutch shows that one can not only do both, but also excel doing so. As a 17 year old founder and designer, Caelin is passionate about startups, having founded two, product design with human-centric designs, and visual storytel…
 
Why do we continue to apply old filters and place unnecessary barriers in our hiring processes, leaving out diverse and underprivileged candidates that don't fit the traditional cybersecurity professional profile? Good question. Here’s another one: Do you remember the last time you took a chance on someone, and it paid off in a big way? Or maybe yo…
 
A car is not just a car — it has never been that simple. The same applies to any other object that we humans envision, create, and use. But today, we are talking about cars — the autonomous kind — and the race to build them. The concept was not new, and partial autonomous transportation solutions have been around for a long time. Still, something h…
 
Since the dawn of humanity, fear of the unknown has been part of who we are as individuals and societies. On one side, it drove our desire to learn; on the other, it created some of our civilizations' worst traits. While it seems fair enough many moons ago, it is hard to believe that today, our societies are still experiencing the harmful waves of …
 
Think about it as a sports team — or any team really; if one player doesn’t play for the whole, it weakens the defense and makes it vulnerable. No matter how good or how important any one individuals seems to be, everyone has a role to play. Executive leadership team members are unique and get treated like VIPs. They get special compensation packag…
 
What if we could format our data shared with the organizations we interact with the same way we reinstall an operating system and start fresh? We may be too deep for it, but what about a new Social Contract for our Cyber Society. One can start thinking back and try to figure out where things got out of control. The chance of that being a successful…
 
It should be evident by now that Information security should be a core value to any organization—and even more so for those that interact with government entities—and furthermore for those that operate within the government defense space. It's easy to say. But even for those that want to honestly act on this objective, how can they make "this" actu…
 
In this episode we talk to Farah Hawa about her work at Bugcrowd, her roots in getting started as an ethical hacker, and her educational videos that she publishes via YouTube. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the infosec bar and sit down for a conversation with Farah Hawa. We t…
 
Imagine a world where there are no dreams, no role models, no mentors — just a bunch of no. Now imagine that we can do something about changing that world that is the harsh reality for too many. Together, we can. In this podcast, we all get to be inspired by two fantastic role models that not only want to change the world but are actually doing it.…
 
There are entire groups of people who can become effective cybersecurity resources if trained correctly and given the opportunity. Unfortunately, for many, this is not the case. Why? Why aren't more people from various backgrounds given a shot to succeed? Why do organizations tend to stick to hiring models that are based on "prove that you can by s…
 
In this episode, our special guest, William Benner, explores what to do when you're told "it can't be done,” how to push through failure, and why it matters to assume things will break (and test your assumptions about what happens when they do). William has been on the front lines of laser show innovation for decades, and reveals how to think diffe…
 
Welcome to the 1st podcast of Elevate the Future podcast - a journey into AI and the future from the eyes of a 23 year old who has a vision to make an impact using Machine Learning and education. Elevate the Future podcast will delve into the stories of successful youth and young leaders of the world and unpack topics in emerging technology, busine…
 
If you wish there was a Pentester Blueprint, this is your lucky day! What's the typical path into CyberSecurity? Is there one? What about becoming a penetration tester? We had a chance to talk about this, a new book, and much more. In today's podcast, we connect with the co-authors of the book, "The Pentester Blueprint: Starting a Career as an Ethi…
 
🎉🍾Traditional Virtual Annual ITSPmagazine Holiday Party. This gathering has been a display of honesty, empathy, support, friendship, and hope for what to come. To be surrounded by such an amazing infosec community inspires us. ♥️✨ 2020 has forced us to look at life, family, and business very differently. As we adjusted to our new physically-distant…
 
In today’s episode, I am joined by two InfoSec veterans who have held a variety of leadership roles and are now leading and managing a fund at ClearSky Ventures — Jay Leek and Patrick Heim. I am thrilled to get a slice of their time to ask some hard questions and to get a view of their world as they try to figure our which investments to make, why,…
 
Cybercriminals don't follow the rules—they aren't bound to laws and regulations—they even toss morals and ethics out the window on some occasions. This doesn't mean your business shouldn't follow the rules, nor be stuck because of them. In today's episode, we get to chat with our good friend and host of the Tech Done Different Podcast, Ted Harringt…
 
Endpoint security is a mess — so many providers doing effectively the same thing, most of them poorly. In this episode Chris and Rafal bemoan the volume of indistinguishable endpoint vendors, the different acronyms (MDR, EPP, XDR) and the lack of true innovation for the customer. While more and more products and service categories continue to pop u…
 
No matter what you’re celebrating this month, chances are buying gifts is on your to-do list. With guest Gabriel Friedlander, we explain how to experience the joy of online holiday shopping safely. Criminals are always looking for ways to separate consumers from our hard earned money - even during holidays. Recently the FBI issued an alert to warn …
 
With 25+ years in the CyberSecurity space, as a former CTO and CSO, and as a current adjunct professor, journalist, and member of ENISA, Pierluigi Paganini has seen a lot of CyberSecurity over the years. A few days ago was the 9th birthday of his blog, "Security Affairs," and that inspired us to invite him on our podcast to peek into his mind to ge…
 
In this episode, we talk with Mari Galloway about all her efforts in activism around STEM, founding Women's Society of Cyberjutsu, and using Legos to build additional interest in STEM careers. We also get to discuss her experience interviewing and landing a new job!! Join us once again as Chloe, Phil and Alyssa stroll into the infosec bar and sit d…
 
Nostalgia is not as good as it used to be. 😬 Each generation talks about the "good ole days" and how life was simpler, better; even the toys were so much simpler and more fun back then. Then technology kicked in — what's up next? From manual to mechanical; kinetic to electronic; analog to digital; calculator to a personal computer; telephone to the…
 
Lindsay Dare Shoop knows a thing or two about peak performance. She’s a gold medal Olympian, 2x All American, 4x World Champion, the first USA women’s crew to win gold at 2000m, is in the USA Rowing Hall of Fame, and her first book is a #1 bestseller. In this episode, we talk about what it takes to achieve elite performance not just in athletics, b…
 
What the hell is even that? GoDaddy was recently hit by a phishing scam that resulted in potential compromises to several DNS records. What, if any, security controls could protect against this kind of attack? We explore the importance of security awareness and segregation of duties. Remember to stay to the end for the P0sin' Tip of the Week! Host(…
 
Once upon a time, there was one internet for which we all got excited about. It united researchers, opened up economies, fueled technological innovation, offered new opportunities for knowledge and education, and made the world far more understandable for everyone. Then something weird happened to the future; we went backward. Several forces are co…
 
There are plenty of big red buttons, do not enter signs, alarms, alerts, passwords, and off-limit areas — both in real life and in the digital equivalent. But who draws a line in between these any more? Do these expedients work? No! Why? Today, our guest, Sharon Conheady, specializes in the human side of security and has socially engineered her way…
 
The infosec industry appears to be willing to adopt alternative—and innovative—ways of thinking to attract students into the field at a young age. But, there is no clear strategy, and there is no book of rules that outlines the skills to be taught to succeed in this industry As a former chief security officer with over 30 years in security, intelli…
 
Why is it that after every breach or security incident a cavalcade of talking heads show up to hock their wares and speculate wildly? Why is it that after every breach or security incident a cavalcade of talking heads show up to hock their wares and speculate wildly? I'll tell you why - because we're no better than ambulance-chasing lawyers. There,…
 
Many organizations leverage regulations and standards to help them define their security and privacy programs, and in doing so, spend time and money creating policies, implementing controls, and monitoring for exceptions. But what happens when the regulation or standard changes? There's a seemingly constant barrage of change in the law and standard…
 
Together we build a smart, secure future. In silos, we stagnate. Governments, non-profits, and industries re-discover our time's pressing needs and re-connect to share resources, strategies, innovations, and success stories. Once again, and despite these unique times, our friend Lan Jenson was able to pull together her yearly signature event. The u…
 
2020 has been a colossal roller coaster of a year in many ways, and the numbers and depth of submissions hitting the Black Hat events review board for the 2020 European installment this year demonstrate the unique times in which we are all living. Taking into account the runaway trains of ransomware and misinformation to hacking the Sony PS4 and th…
 
What does the CISO role look like at the state level in the United States? We got to speak with the first CISO of the State of California, Mark Weatherford, to get his perspective. He also has vast experience in the commercial sectors, and the comparison helps to highlight the differences and even some similarities. The priorities are quite differe…
 
Threat hunting has become a hot topic throughout the cybersecurity community and a common activity within many information security programs. What is the goal of a hunt, and what real value does it bring to the business? That's precisely what we get into during today's episode. The act of threat hunting sounds really cool, and it definitely seems l…
 
We welcome Malcolm Harkins to discuss the concept of the Cyber Industrial Complex and what we can do to avoid an endless cycle of spending. Malcolm shares his tips for p0s3rs. What is the root cause of security issues? Are the users to blame? Does security technology even work? There's a lot of money being spent in this industry, where is the accou…
 
It’s that time of year! Family meals and festive desserts. Smart gadgets promise to make cooking easier, but are they safe? David Rogers tells us what we need to know to stay cybersafe in the kitchen. Thanks to the pandemic, a lot of us have been at home and cooking more than ever and with the holidays coming up, the heat is on. Wouldn’t it be grea…
 
The future is connected; everything is. Humans have shown a curious tendency to simplify our existence by creating dichotomies, but the sciences of all sorts have been telling us a different story. We should listen. Technological breakthrough development in our society is more often than not made possible by the convergence of different research fi…
 
For an industry that often finds itself building technologies that are too early for the market, for adoption, for positive societal impact, we have fallen behind in cybersecurity awareness. And that is a problem that we simply can not let linger. Talking about the experience in leading the way in technology, our guest Scott McNealy and his success…
 
Today we are talking about child safety and security in the cybersecurity world. We are going to talk about what "Not my child syndrome" is and what are the things most kids are scared of. Hi Everyone, welcome to Candid Conversation Podcast. I am your host Vandana Verma, I am the global board of directors at OWASP and security architect for one of …
 
In this episode, we talk to Katie Paxton Fear about the wonderful educational materials she's made available via her YouTube channel. Join Alyssa, Chloe and Phil as we embark on another trip to the infosec bar where we encounter Katie and explore her experience with Bug Bounty Programs and many other things. Check it out. Guest(s) Katie Paxton Fear…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login