Keenan Skelly public
[search 0]
More

Download the App!

show episodes
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
Naked As A Jaybird: Amazon Astro, Privacy For The Elderly And Disabled, And Centralized Privacy In The U.S. _______________________ Guest Liz Wharton On LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/ On Twitter | https://twitter.com/LawyerLiz ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/itspmaga…
 
Joe Vest started his journey as an aspiring herbalist, then his focus turned to IT working as a sysadmin. Joe's knack for technology as a sysadmin led him to cybersecurity and then red teaming when the discipline was not very known or practiced. _______________________ Guest Joe Vest On Linkedin | https://www.linkedin.com/in/joe-vest/ On Twitter | …
 
In a world where technology accelerates the speed of change in our society, the only way to stay grounded is to accept that you can’t. We have to learn how to keep up with the times and prepare the next generation for that. With three books and a long carrier as editor of Psychology Today, Hara Estroff Mariano shares her personal and professional e…
 
Stalkerware can monitor all of your device activity. Martijn Grooten, Coordinator The Coalition Against Stalkerware talks us through what to do if you’re being cyberstalked. Stalkerware is software that is installed by abusers and predators on a victim’s device without their consent. Stalkerware can monitor your emails, texts, social media posts, p…
 
The pandemic has brought out a sense of work and personal balance. Now it's time to dive in further. Learn about burnout, PCSD, and what organizations can do to make a better environment for employees' health. Guest Dr. Ryan Louie On LinkedIn | https://www.linkedin.com/in/ryanlouie/ On Twitter | https://twitter.com/ryanlouie _______________________…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Chloé Messdaghi as a guest on the show — together they talk about: Dogs and Halloween | Technology making the old way of spying obsolete and more dangerous | From climate crisis to child labor; the many reasons for keeping our phones and gadgets | Robo…
 
As a security consultant who transitioned to lead product security in-house, Jason Geffner has seen both sides of the application security process. He joins Tech Done Different to provide insights about consulting vs. in-house, leadership, the role of kindness in team dynamics, and managing third party security risk. You'll learn: why it's the cons…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! How and where do the SOC and the SOC analyst make positive impacts on the business? That's exactly what we explore in this new episode. In this third of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Nipun Gupta, a security…
 
The cybersecurity gaming event, Hack For Troops, takes place on October 30, 2021 from 9AM–4PM ET. Listen in to learn how you can play, watch, and support this program which helps raise money for the non-profit, Tech For Troops. About the Hack For Troops Event Hack For Troops is an annual capture the flag fundraising event to support Tech For Troops…
 
Many paths can bring you to a specific place — no single one of them is the absolute best. One can be faster, another easier, another more pleasing to the eye, sunnier, darker; it is up to you to decide. What you do need to know is what the options are to make the decision that is right for you. Maybe you’ll even change your mind a bit while on the…
 
During Louis Nyffenegger's education at a university, he discovered his interest in information security. Louis went on to create a globally popular web app pentesting learning platform used by aspiring pentesters and bug hunters. Louis is passionate about educating and helping others, which is more obvious the more you learn about him. ___________…
 
Companies are putting more resources than ever into producing innovative solutions, yet nearly every executive expresses some level of dissatisfaction with their company's innovation performance. That's because while innovation is still critical, it's no longer enough. Join us as we talk to a technological thought leader and investor, William Kilme…
 
While InfoSec teams must mature their cybersecurity programs to protect digital assets, it's just as essential to synchronize programs with business objectives. Only then can InfoSec teams ensure their activities strategically support market penetration, revenue generation, and cost-saving business processes—rather than continually functioning in f…
 
Cybersecurity is so hot companies can’t hire fast enough. What’s the blocker? Experience. But how can recent grads and those in school get it? CTF expert Akshay Rohatgi explains how to get involved. One of the most common questions we get is: how can I get experience if I can’t get that first job? Even entry-level cyber roles often require 1-3 year…
 
The state of API Security is in constant flux, with traditional WAF technologies being paired with, and extended by, newer models of application-driven protections. With Gartner recognizing this trend and introducing a Web Application & API Protection market, what do two long-time API security leaders think about WAFs and their immediate and long-t…
 
Nicolas is creating the next reality for online learning using VR - the intersection of accessible education and movement towards the metaverse. After realizing the difficulties and lack of immersiveness of online learning, Nicolas took a gap year from his studies at Cornell as an Applied Mathematics major to found a VR company, combining technolog…
 
Join Jax and Erika for an interactive conversation with returning guest, George, surrounding the work style changes and life hacks that COVID- 19 has presented. We talk through the challenges that were faced by many, hacks for managing workload and battling meeting exhaustion. __________________________ Guest George Tang On Linkedin | https://www.l…
 
How is making meatless meat similar or different from hacking software? to answer that (and more), we're joined by Josh Nixon, CTO of meat alternative pioneer Prime Roots. We discuss what tech even is (hint: not always software), and how to think about the acceleration of innovation. You'll learn: why tech typically refers to software (but it shoul…
 
Suppose you still believe the narrative of a hooded figure with ski gloves and a crowbar attacking a company network. In that case, this may be hard to digest: Cybercrime is a business. Cybercriminals are well organized. They share data; sell information; rent, lease, and trade tools; and market their business. It's time to source the crowd of cybe…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! Many look to improve their work environment through the use of technology and innovation. In the SOC, we need a lot of tuning to find that delicate balance between business goals, technology innovation, and the humanity in the machine. Scripting, coding, and other f…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Ellen Xu as a guest on the show — together they talk about: 3D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation | Bugs in machines, computers, and c…
 
Breach verification reform has been needed for a long time. Now with legislation on the floor, CISA has the opportunity to change the paradigm. _______________________ Guest Phillip Wylie On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie ______________________ Host Keenan Skelly On ITSPmagazine 👉https://w…
 
As the industry returns to work, how are companies planning to secure and retain talent in a time where employees are choosing to work remotely? How are critical jobs in cybersecurity and cloud maintained to ensure businesses and activities remain online and secure at all times? As the demand for tech talent grows, NPower has a proven pipeline for …
 
Cory Billington a former member of the US Navy, worked with car racing, and in pawn shops before he found his passion. Cory found his passion in pentesting and red teaming and now works for a large national insurance company. He shares his story and recommendations on becoming an ethical hacker. _______________________ Guest Cory Billington On Link…
 
Let the games begin! Let your friends compete. Let the best team win! It's all part of a European strategy to attract, train, and nurture the next generations of cybersecurity professionals. Join Sean Martin, and he connects with our on-the-ground reporter and founder of the US Cyber Games, Jessica Gulick, as we discuss this year's European Cyber S…
 
We keep hearing the mantra that CISOs and CSOs need to be business leaders. So how come we keep seeing job descriptions and hearing about interviews that focus on the technical certifications like the CISSP and many others? That's exactly the question posed in a post on LinkedIn that caught our attention - and that of many others! Join us for a can…
 
You may have not seen AI yet, but there is a good chance that AI has seen you. Artificial Intelligence can be used to create tremendous commercial value and can be used to bring significant improvements in how society functions. However, it must, and can, be done at the same time. We need to create and follow international standards that allow us t…
 
In a world where everything is connected and interdependent, complexity has become part of our very way of life, and it must be part of our way of thinking. But, especially when we look at infrastructure security, the boundaries between analog and digital, physical and cyber, are simply not there anymore. In today's conversation, we discuss the imp…
 
Is your organization using old security practices in InfoSec? Then learn more about Kim Crawley's new book on what are the best, up-to-date security practices for organizations. Guest Kim Crawley On LinkedIn | https://www.linkedin.com/in/kimcrawley/ On Twitter | https://twitter.com/kim_crawley ______________________________ Host Chloé Messdaghi On …
 
SOC analysts are often overworked and under-appreciated — but that needs to change! This conversation is designed to encourage organizations to take steps to improve job satisfaction and mental well-being through recognition and rewards. We must remember that SOC analysts aren't robots tasked solely with clicking buttons from start to finish during…
 
Who do you rely on at your organization for data privacy expertise? Your legal team? Your security engineering team? Was "UX designer" among your first thoughts? The answer is likely no. And that's a problem. "States are starting to pass laws protecting consumer privacy, and some, like California’s, have specific requirements around design." — Dr. …
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: Invasion of the Robot Umpires | 30 Moonshots for a Climate Positive Future | The Dream of Carbon Air Capture Edges Toward Reality | Through The TechVine Radio Program Episode Sixteen We have officially decided to keep Through The TechVine a live re…
 
Through selfstudy, hard work, and persistence Cody Winkler went from an Air Force network engineer into red teaming becoming an adversary emulation expert. Cody shares his story and advice on starting a career in red teaming. With his unique perspective and to the point style he gives helpful advice for aspiring offensive security professionals. __…
 
How do we build things with the user in mind? How do we marry convenience and usability? How do we make the most secure way also be the path of least resistance? As a security researcher focused on human-centered design, Maritza Johnson studies these questions every day. She joins Tech Done Different to share insights from both her research, and he…
 
Want to know how you can crush those bad study habits and gain insight on some new study habits for cybersecurity certifications? Chris is a Special Forces Green berets and is a Sr. Process architect. Chris shares his experience as a special forces operator and how that has allowed him to learn “life hacks” with getting certifications and getting i…
 
In this special Black Hat episode, Andrew Lohn and Micah Musser explain “Disinformation At Scale: Using GPT-3 Maliciously for Information Operations” - the double-edged sword of large language models. The Generative Pre-trained Transformer 3, or GPT-3, is an autoregressive language model that uses deep learning to produce human-like text, created b…
 
Everyone likes to quote De Coubertin, the visionary founder of the modern Olympic Games: "The most important thing in the Olympic Games is not winning but taking part." But let's face it, when we compete, we all try to win. The US Cyber Games is no different; it is about competing and winning, but it is also about learning and promoting a different…
 
Through the tech vine episode 15 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this episode we talk about: WiCyS Advancing Women in Cy…
 
Enterprise resiliency is something many organizations take into account as they manage their business operations to extract the most from their investment. However, the CISO view of what it is and why it matters may look different as we explore different markets and operating environments. In this episode, we take a deep dive into the impact of ent…
 
When it comes to addressing the lack of diversity in technology, the checkbox approach coupled with the measurement of rates and figures may or may not be a good place to start. Regardless, it may be that we need to understand the why before anything else. In this episode, we speak with Di Ciruolo, a top DEI Consultant who asks our listeners to con…
 
Today’s students need to contend with video learning, privacy issues, and cyberbullying. Lisa Plaggemier Executive Director at National Cyber Security Alliance explains how kids can stay safe online. Is online/remote school here to stay and what do parents need to know to help their children stay safe? Tips for staying safe even if you’re going to …
 
David's journey started by majoring in theology; his career took a turn to become a linguist for the US Navy. After leaving the US Navy, David became a red team exploitation analyst for the NSA. David is now a successful businessman and consultant in the cybersecurity space. _______________________ Guest David Evenden On Linkedin | https://www.link…
 
New federal legislation has been proposed to address data security and privacy. Is it the right move? Is it enough? Is it the next CFAA (Computer Fraud and Abuse Act)? ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where…
 
From job postings to gatekeeping, this episode dives into better hiring practices and how to stand out. Deidre Diamond shares guidance and feedback on hiring best practices and how to get the job you want in cybersecurity. Guest Deidre Diamond On LinkedIn | https://www.linkedin.com/in/deidrediamond/ On Twitter | https://twitter.com/DeidreDiamond __…
 
The difference between a problem and a solution is action. It may sound simple, but most of the time, it isn't. It requires motivation, commitment, determination, an open mind, and the will to tackle the issue from different angles. Until you find the one that works well enough. Suppose this is true, and it is, for each problem; it is even more so …
 
Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on how to think about the many ways cybersecurity is synonymous with national security. As the Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on the front lines of how to think about the many ways cybersec…
 
Through the tech vine episode 14 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this week's episode of Through The TechVine Live Radio …
 
Alethe shares the story of her childhood, winning the DEF CON Social Engineering CTF and becoming a cyber security consultant. Some people are born with specific skills, and Alethe seems to have social engineering in her DNA. She shares how her childhood experience was an indicator of what she would do as a career someday. Alethe not only shares he…
 
Privacy Rights And The Right-To-Life Laws Passed In Texas | The Compromise With Alyssa Miller And Keenan Skelly ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where can we find common ground? One thing is for certain, th…
 
As with most things in life that require some thought, before making a decision and taking action, it's often best to figure out the "why" behind the result. In this case, start with the "Why are we hiring a CISO" question. But then what? That's where things get interesting. Undoubtedly, the answer to "Why" sets the stage for the play that's about …
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login