show episodes
 
This podcast features the latest interview in the areas of compliance, risk management and e-learning. Topics include ESG, AML, GDPR, harassment, FCPA, anti-bribery and more. Founded in 2004, VinciWorks is a leading provider of online compliance training and risk management software. With over 200,000 users across 70 countries, VinciWorks has established itself as the definitive authority in online compliance. VinciWorks offers a range of compliance and regulatory training courses on topics ...
 
The Consumer Financial Services industry is changing quickly. This weekly podcast from national law firm Ballard Spahr focuses on the consumer finance issues that matter most, from new product development and emerging technologies to regulatory compliance and enforcement and the ramifications of private litigation. Our legal team—recognized as one of the industry's finest— will help you make sense of breaking developments, avoid risk, and make the most of opportunity.
 
Welcome to the FEDSpace Podcast - your source for all things federal data privacy and governance. Join us as we talk to federal agency leaders, privacy pioneers, and information governance experts about current topics in the Federal space.
 
Bob Seng, J.D. and the other experts at Benefit Comply, LLC discuss the most pressing regulatory issues affecting employers who sponsor employee benefits. Become a Benefit Comply client to receive these podcasts sooner and have access to robust show notes and other compliance resources.Bob Seng J.D. is a Principal and Senior Compliance Consultant for Benefit Comply, LLC. An ERISA and employee benefits lawyer with 25 years of experience, he was formerly a partner with Dorsey & Whitney in Minn ...
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
GRC is comprised of the ethical management of an organization combined with the organization’s ability to identify, quantify, and manage risk, along with the ability to demonstrate compliance for these things in connection with internal, industry, and regulatory standards, frameworks, and requirements. If defined, implemented, and managed correctly…
 
With ALI’s members poised to approve the current draft of the new Restatement, providers need to understand the Restatement’s impact on their consumer agreements, particularly those entered into online. After reviewing the rationale for the new Restatement and ALI’s approach to developing the rules it contains, we look at the issues covered by each…
 
In this episode, Nick speaks to VinciWorks' CMO Yehuda Solomont to look at the trends in compliance training and what they mean. Yehuda has all the numbers and statistics at hand to give some real insight into the most popular topics, as well as other trends, such as the increased need for relevant training, how long a course should be and whether …
 
In this new episode of KnightLife, I unbox the new PTZOptics 30X-SDI Gen 2 Live Streaming Broadcast Camera and Ubiquiti Networks UniFi Switch for building the ultimate live stream tech stack! I also present a detailed architecture diagram for how it will all be connected in my upcoming live streams at RSA Conference 2022. __________________________…
 
Mentor and former IT directory Mark Harvey shares his story and path from IT to cybersecurity. Mark took a non traditional approach to getting into cybersecurity through popular well known hands on learning resources to go from IT director to cybersecurity consultant. _______________________ Guest Mark Harvey Security Engineer at Alias On LinkedIn …
 
We first review the scope of the CFPB’s supervisory authority granted by Dodd-Frank and the source of its authority to supervise nonbanks that present risks to consumers. We then discuss how we expect the CFPB to use its risk-based authority, including the types of products it may target and its decision to make public the identities nonbanks. We a…
 
At an early age, Daniel Hall was fortunate to discover his creative outlet within software development. Coming from an abusive orphanage home to teaching coding to college students at the age of 13 to hacking the app, Clubhouse. Dan has dedicated 45 years to the technology field but beyond that, he provides a powerful voice in our industry. Join us…
 
Learn how BlackGirlsHack is making a difference by providing cybersecurity resources and training to black girls and women to obtain their dream careers. Hear from the Executive Director and Chairwoman at BlackGirlsHack, Tennisha Martin, on how to get involved in the mission. ______________________________ Guest Tennisha Martin Executive Director &…
 
How can backups protect you from ransomware? Richard chats with Karinne Bessette about how backup technology has responded to the need for ransomware protection. Whether it's intelligent backup tape systems that automatically pop out tapes so they won't overwrite or other air-gap strategies for backups, you need to have a backup you can rely on to …
 
Some say that nobody wants war, and yet here we are. They are different because technology has changed, but they still suck. Is there a clear distinction between cyber and kinetic warfare? Does it even matter? What can we learn about it from this war in Ukraine? Despite the distinction between different kinds of war for headlines and panel conversa…
 
In this episode, we are joined by VinciWorks' Director of Global Compliance Sandy Erez. Sandy has been breaking boundaries in the field of compliance since the 70s, when she broke the school dress code to wear trousers of all things to her elementary school graduation. She shares how she got involved in the world of compliance and tackles assumptio…
 
Jennifer an Air Force vet, mom, and electrical engineer shares her journey into offensive security. Jennifer shares her struggles starting a career in offensive security. Not only is she a mother of three and she is the mother of a neurodiverse son. Jennifer tells how she used a targeted approach to networking and job hunting. _____________________…
 
Creating machine learning and artificial intelligence algorithms for chatbots and robots is no laughing matter. Or is it? Our guests, Sarah Rose Siskind and Carolyn Ayers, think that laughter is a critical element in making machine-based systems function and act more like humans. What does that actually mean, though? That's what we want to find out…
 
On this episode of Focal Point, Angela dives deep into some of the personal aspects of working in a cybersecurity role with AppSec Engineer, Cara Zissman. While we all have different experiences on different teams, in different roles, there are many underlying issues that we have to keep in mind in order to maintain our well-being and be our best. …
 
We discuss the industries and practices that have been the subject of recent FTC enforcement focus, including: marketing, servicing, and collection practices involving small business financing such as merchant cash advances; auto add-on product sales practices; product endorsements and reviews; dark patterns; marketing practices of for-profit schoo…
 
Can we move away from Active Directory? Richard talks to Travis Roberts about the prospect of moving organizations off of Windows Active Directory and solely onto Azure Active Directory with Microsoft Intune. Travis talks about the critical aspects of Windows Active Directory - NTLM and Kerberos. Can your organization live without them? That means …
 
How can an industry have so much data and information yet still lack the knowledge necessary to make quick, meaningful, impactful decisions? There could be many reasons, but one is no longer a missing intelligence-sharing platform. In this second chapter of our conversation with CrowdSec CEO, Philippe Humeau, we invite The Hacker Maker, Phillip Wyl…
 
Everything is interconnected. We need to turn around and face the bear together, instead of working against each other when it comes to cybersecurity. The old adage of "If a bear is chasing you, you just need to run faster than the other person(s) being chased" no longer applies. Caroline Wong and Sounil Yu talk about how we can do better and help …
 
In this episode, Alyssa talks to "the other Alissa" about speaking at cybersecurity conferences, preparing a novel talk for your call-for-papers (CFP) submission, and the value of telling these stories to audiences everywhere even if you don't think anyone would be interested. ________________________________ It is a podcast, yes, but you can join …
 
Christoff's professional career includes Unix and Linux administration, and software development, but his passion was hacking. Christoff shares how he pivoted from a system engineer during difficult COVID times. During his education journey to become a pentester he earned the OSCP certification. His networking skills paid off and helped him land a …
 
Why is the sky blue? How come there are no more dinosaurs? Are we there yet? Why do we spend money on space exploration? On this podcast, we will not answer the first two questions, but we will discuss the fourth one extensively. As far as the third one goes, well, it depends where you want to go. Join our returning guest Matthew Williams and us as…
 
Sean found the Internet on the Internet, Marco found it in his garden, but Professor Justin Smith will explain to us that maybe we didn’t “find” or “invented” it all. The Internet could have always been present around us, and the latest technological achievements are nothing more than a natural extension of our humanity. “Ranging over centuries of …
 
We discuss the growing trends in privacy litigation, particularly litigation targeting company practices regarding the sharing and sale of consumer personal data, plaintiffs’ liability theories, including the right of publicity, and best practices for companies to consider in order to reduce the risk of privacy claims. Aliza Karetnick, a Ballard Sp…
 
David Cross has to balance both engineering and business priorities. He teaches us how to get veterans involved in cybersecurity, how to grow & pivot your career, and the ways to establish influence. As CISO for Oracle SaaS, David Cross has to balance both engineering and business priorities. He joins Tech Done Different to teach us how to get vete…
 
Jax and Erika sit down for a long-awaited chat with the one and only, “Haunted Hacker,” Mike Jones. Mike shares his journey in the dark arts, his involvement with Anonymous, and lessons learned from a career dedicated to hacking. We tap into topics like the Colonial Pipeline, ransomware, our critical infrastructure; and to spice things up, Mike jus…
 
How do you manage the sprawl of Teams? Richard chats with Erica Toelle and John Gruszczyk about the governance of Teams, starting with allowing a bit of sprawl in the first place - people give up on tools that are too locked down. You have to leave room to explore! But once folks engage with Teams and the sprawl gets a bit out of control, there are…
 
Loading …

Quick Reference Guide

Copyright 2022 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login