Marco Ciappelli public
[search 0]
More

Download the App!

show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
In this third episode, the group discusses the value of taking some time to reflect on the definition and desired outcome for the business process being implemented as you begin to execute and get it into the hands of the end user. Many found that ignoring or bypassing user acceptance training as part of the process could make things that much hard…
 
The Your Everyday Cyber audience has questions and we have answers: welcome to our special “Ask Us Anything” episode, crafted especially for you, our listener. Tune in to hear our answers to these questions: How do you find guests for the podcast? Why did you decide to focus on the Everyday consumer? What’s your favorite part about being in cyber s…
 
"Perhaps the most underused person in healthcare is the patient." — Prof. David Cutler | A quote that reminds us that any Healthcare system should be patient-centric — built for and around it. In our societies, this is not the case, but technology can help create such a system. We all know that we should be moving away from a system that prioritize…
 
In this episode, we meet with George Tang to discuss professional certifications. What tips or tricks do you use to prepare for Certification exams? How to prioritize the certifications you want to obtain? All of these questions and more will be answered during this episode. We are thankful you are here, please enjoy. Guest George Tang, Principal S…
 
Bots have been around for a very long time. At its basic level, a bot is merely a script that can automate a computer task on behalf of the human; as such, it can do good things or bad things. Like most technology, the line is thin and blurry. It can get ugly too. Bots have also come a long way since their inception. They can provide automated cust…
 
In this episode of Tech Done Different, we chat with serial entrepreneur Josh Little, CEO and Founder of Volley App. In his pursuit of solving the disaster that is overwhelming calendars and neverending video meetings, Josh has learned a few things about how to solve problems worth solving. You'll learn: that 93% of communication is nonverbal why t…
 
Is there such a thing as human morality that can help us distinguish between good and evil. Or, is it influenced by cultures? Nowadays, we talk quite a bit about ethics because technology amplifies the issue: AI, algorithms, privacy, security, and surveillance. The meaning of life? Bathing at the beach naked or fully dressed? Was Big Brother right …
 
When businesses rely on their own infrastructure to protect their customers' products and services, security analysts are left with very little room for error and no time to waste. Long waiting times on database search results is most certainly not a good thing. Many might be skeptical that the latest and greatest methods and technologies can meet …
 
During this episode, we meet with the brilliant and extremely humble JR who has over 15 years of experience in the cyber space. She talks about her unique experience going from medical work to now be working in the cyber threat space where she now works with Cyber Crime, Human Intel and so much more. Anyone considering getting into the cyber threat…
 
Virtual and Augmented Reality solutions are racing forward to the future! In this episode we explore the impact these technologies are having on the future of work, edtech and the human experience. JJ Snow is joined by Cortney Harding, Founder and CEO of Friends with Holograms, an entrepreneur and social impact technologist who is using her powers …
 
When thinking of pentesting, you think of computers, networks, and other technologies, but there are pentesters that specialize in hacking humans and buildings. During this episode, Crystal shares how she got into physical pentesting and social engineering coming from a military career. Guest Crystal, Social Engineer, Physical Pentester, Veteran (@…
 
Nowadays, every company is pretty much a technology company, and as such, they all should have some understanding of quality assurance (QA). Also, an understanding of information security would be nice. The question is, how and where do these two worlds collide? And, is that security world AppSec or DevSecOps? Or is it something completely differen…
 
Cybersecurity is a complex topic to understand. A plethora of standards, frameworks, processes, tools, conferences, presentations, courses, and even certifications may help but can also be a bit overwhelming. This is where the community comes in. Understanding the threats and the risk faced by a university is one thing; understanding the high educa…
 
Thank you for joining us for another candid conversation with one very special guest who's very well known in the industry: none other than Tanya Janca: she's an author, a CEO, a startup founder, a programmer, a hacker, and a philanthropist. In this episode, we're going to touch upon some really special aspects about who Tanya is and how she is mak…
 
Looking for signs of fraud and the loss of intellectual property or customer data is not the same. What's the difference? What's the overlap? Are there organizations set up to do both well? Glad you asked. You will find the answers by listening to this podcast. As organizations take their journey on a digital transformation and move to the cloud, m…
 
In this episode of Tech Done Different, we chat with Dr Wanda Toro Turini, who shares insights about how to adapt in order to make sure that a given piece of innovative tech can best service the market. You'll learn: why you gotta listen to what the marketplace is telling you why you need strategy in order to wield the power of technology why (and …
 
Brazilian hacker Filipi Pires discusses hacking, community, mentoring, and learning. During this episode Phillip Wylie and his guest Filipi Pires discusses hacking, community, mentoring, and learning how to become a hacker. Filipi shares his path of going from a non-technical sales role and his path to becoming a hacker. Guest Filipi Pires, Securit…
 
How good of a dish are you going to get when you use bad ingredients? Are you going to blame the recipe? Some people would, and by doing so, they would keep baking bad cooks and blaming the recipe for it. Algorithms work the same. You give AI bad data, you get bad results. The metaphor works well until you realize that, when you end up with a lousy…
 
If we don't open our eyes and think about how we are all different—in so many ways—we will never truly understand that our personal quality of life and behaviors affects that of the group and society we are part of. Is technology helping diversity and inclusivity? Join this conversation with our guest, Becca Lory Hector, as she helps us open our ey…
 
Tanya Janca walks us through how her need for community inspired her to develop one of her own. Join us for an inclusive conversation on how to navigate a male-dominated field and how to create your own success. Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack…
 
In this episode, JJ is joined by Samuel Bertram to discuss the impact that robotics, AI and new plant cultivation technologies will have on conservation and the future of global food production. Food security and conservation issues associated with current industrial farming practices have been a continuing concern due to increased risks from pollu…
 
Upon coming across a Tweet, curiosity quickly rose for what network security fundamentals actually are these days. Have the networks changed so much that "Network Security 101" no longer applies? The best way to find out is to take a walk down memory lane. The most apparent change to the network landscape comes in the form of the cloud, with "every…
 
It may be hard to believe, but data doesn’t just magically appear; it is generated by apps, services, AND, well, all of it, by humans. Storage systems and databases do not magically show up on the scene either; they have to be built and hosted to handle the scenarios encapsulated in the business requirements, desired user experience, and data secur…
 
In this episode of Tech Done Different, you'll hear from a tech entrepreneur who has hit all of the dream milestones: started a company, obtained massive funding, sold the company for over $550m. Brian Requarth, Founder of Latitude and author of Viva The Entrepreneur takes you behind the scenes of how to start and scale a successful tech business. …
 
Need—Innovation—Change—Growth—Mistakes—Fixes—Results—Sprawl—Trim—Repeat. This path seems like the standard road for most businesses, but the truth is that there is no predetermined way to success for any organization. However, there is one clear and a common path to failure—not preparing for, expecting, nor embracing change. "The art of simplicity …
 
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
 
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
 
Let's face it, hacking got a bad reputation—it has been in the making for over 30 years, it got worse, and we have to change that. Humans want to have it simple; they want to define things as bad or good, white or black, heaven or hell—but there is so much more in between. ITSPmagazine has always taken a firm stand on the differentiation between ha…
 
There are many things to ponder when planning for a multi-factor authentication (MFA) project. They all can be positioned between two extremes: how to get away without implementing it at all, and multi-locking everything, everywhere, 365 - 24/7. Obviously, the two extremes aren't the correct answer—they never are—so what does that big vast middle g…
 
During this episode, Erika and Jax talk about life hacks, time blocking, and goal setting. You will enjoy listening to a relaxed conversation while learning more about your hosts and what keeps them at the top of their game as high performers within cybersecurity. Do you have a burning question, reach out to us on our social media platforms. We lov…
 
Helena founded Glimpse at Y Combinator (the startup accelerator that spun out Airbnb, DoorDash, Dropbox, etc). Listen along as she discusses her untraditional journey to where she is today! From dropping out of Duke to pivoting days before pitching in front of investors during Demo Day, Helena has an incredible mindset towards taking risks and bein…
 
In this episode of Tech Done Different, we sit down with one of the most inspiring guests yet. Marcus Bullock shares his journey from incarceration to tech entrepreneur, showing us all why and how to be grateful for the lives we get to live every day, and how to apply that gratitude to overcome our many difficulties You'll learn: why gratitude help…
 
When climbing to reach the summit for the business, a security management failure can happen at any moment, resulting in missed opportunities or lost revenue. The good news? Your logs have the solutions. We're not only talking about finding the solution to fix problems when it is too late. We're talking about focusing the resources on knowing the b…
 
Who hasn't heard grandparents say something like: back in my days, life was simpler, better, safer. That's probably—kinda—true. But as time goes by, looking back, even one generation has to take into consideration the technology variable. It is all another story—this one, to be exact. In this Audio Signals episode, we talk with Sonia Livingstone, a…
 
When defined and executed well, a Center of Excellence can be more than a model or process to follow; it can set the bar for the organization by which each part can play a role in making things better. It's not automatic—it requires dedication—and customization. When an organization embarks on its journey to transform how they do business both exte…
 
Meet George Tang and Chloé Messdaghi as we dig into the ugly truth of burnout in the cyber industry. We discuss what burnout means to us while providing the listeners, you, some helpful tips to help keep you from hitting burnout. What tips or tricks do you use to avoid burnout? What does self-care look like? What is life hacks can we use to support…
 
When is a building more than just a thing, and it becomes smart? When it can adjust to the needs of its tenants, occupants, workers, and guests, that's when. In this podcast, we learn what this means and how our spaces should adapt to us and not the other way around. Please listen as Sean chats with designer Todd Boucher to discuss this and the fut…
 
The human resources department within any organization is well-positioned to feel the pulse and monitor a company's culture—teams, divisions, and the organization as a whole. Because of this, it could be the ideal ally to the InfoSec team. But is it? Let's find out. Consider the lifecycle of an employee. The initial company awareness, gaining famil…
 
In this episode of Tech Done Different, we hear from compliance expert AJ Yawn. Perhaps the most surprising takeaway from this dynamic chat with a guru in compliance? Security and compliance are not the same thing. Yet, done properly, compliance can be a powerful driver for security. Listen in to learn: why compliance reports should get better over…
 
Security information and event management (SIEM) solutions have evolved quite a bit over the years. Yet, for most, much of what they do and how they tend to do it have not really matured to a point where they can take a lot of the burden off of the security consultant’s shoulders. In this conversation, we speak with Jason Mical, Cyber Security Evan…
 
Today we have a very special guest with us, Bryson Bort. Bryson is an army veteran and served as an officer in the US army. On the episode, we talked about what he has achieved with building a great team and a great culture and a commitment to giving back to the Community. In his free time, Bryson does huge amounts of work with ICS Village alongsid…
 
Sensitive Documents? Proprietary Information? Compliance-controlled data? Sure! Send it over email. Why? Why do you people keep sending critically important data over one of the most insecure channels out there? WHY!? Look, this is why we drink—a lot sometimes—it's because email shouldn't be used for secure transport...and yet... Hosts Rafal Los | …
 
As the founder & executive director of #BlackGirlsHack, Tennisha Martin has set out to change what the cyber security applicant pool consists of and is removing barriers for any and all. Black Girls Hack, a now official 501c3 nonprofit, provides free training and resources for those looking to gain certifications in Security+, eLearnSecurity's Juni…
 
“What drives innovation” is a fundamental question in our society — any society, in any historical time. The capacity to make changes by introducing new ideas, methods, and products is one trait that makes humans unique on this planet. But, again, what drives it? The answer may — actually, most certainly will — vary depending on when, where, and of…
 
During this episode, we chat with Dr. Ruth Gotian who is a Chief Learning Officer and Assistant professor of Education in anesthesiology. She is a contributor to Forbes and Psychology Today where she writes about “optimizing success.” She works with high performers and understands how it feels to be a high performer—yet still has Imposter Syndrome.…
 
In this episode of Tech Done Different, we interview yet another incredible person who has achieved the absolute pinnacle of their field: Las Vegas headliner, Jeff Civillico. Jeff is not just Ted's Georgetown classmate and longtime friend, he's also a world champion juggler who delivered his own Vegas show for 10 years, defying the odds and succeed…
 
It's 2021. How is Vulnerability Management still such a disaster in the enterprise? Shouldn't we have had a grip on this, say, 10 years+ ago?! Seriously. A few weeks ago Rafal asked on LinkedIn for people to post the first 3 words that come to mind when you think "Vulnerability management" — the results may shock you, but the conversation probably …
 
Humans are life-long learners — well, most of them anyway. Hackers are certainly the curious and "challenge accepted!" kind. In fact, learning as they go may even be considered a lifestyle. Instead of taking an exam at a university, they dive into a problem to solve, breaking things apart to see how they work and see how they can make them work bet…
 
Hackerz And Haecksen helps educate, break the stereotype of the cyber security professional and discuss the “tough” topics that come along with being a woman in the field. In this episode, we introduce our amazing hosts. Listen in as Jax Scott, Erika McDuffie, Jon Helmus share their vision for the Hackerz And Haecksen podcast. Our mission is to cas…
 
Close the door. There is no more room. We resolved the cybersecurity skill gap problem, and it feels damn good! Well, maybe not, but is it really that hard? There are so many smart people out there that would do very well in InfoSec—do they even know this is an option? Would you dream of going to the moon if you never looked up to the sky? And even…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login