show episodes
 
I
ITSPmagazine

1
ITSPmagazine

ITSPmagazine, Sean Martin, Marco Ciappelli

Unsubscribe
Unsubscribe
Daily
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
What would you do differently if you knew then what you know now? Good question, but not practical, because that is obviously not going to happen. Still, some people have “been there” before you, and even if they cannot guide you step by step — they can lay out some master plans and give you some tips on how to advance your cybersecurity career. Th…
 
Joe Vest started his journey as an aspiring herbalist, then his focus turned to IT working as a sysadmin. Joe's knack for technology as a sysadmin led him to cybersecurity and then red teaming when the discipline was not very known or practiced. _______________________ Guest Joe Vest On Linkedin | https://www.linkedin.com/in/joe-vest/ On Twitter | …
 
What does nutrition, rest, and movement have to do with peak performance in your career? Surgeon Dr. Glen Robison, MD joins Tech Done Different to help explain. You'll learn: why people will do anything to escape pain, and when you're in pain, cognition diminishes why to eat organic, and avoid the toxins & chemicals omnipresent in food, which lower…
 
In a world where technology accelerates the speed of change in our society, the only way to stay grounded is to accept that you can’t. We have to learn how to keep up with the times and prepare the next generation for that. With three books and a long carrier as editor of Psychology Today, Hara Estroff Mariano shares her personal and professional e…
 
Stalkerware can monitor all of your device activity. Martijn Grooten, Coordinator The Coalition Against Stalkerware talks us through what to do if you’re being cyberstalked. Stalkerware is software that is installed by abusers and predators on a victim’s device without their consent. Stalkerware can monitor your emails, texts, social media posts, p…
 
The pandemic has brought out a sense of work and personal balance. Now it's time to dive in further. Learn about burnout, PCSD, and what organizations can do to make a better environment for employees' health. Guest Dr. Ryan Louie On LinkedIn | https://www.linkedin.com/in/ryanlouie/ On Twitter | https://twitter.com/ryanlouie _______________________…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Chloé Messdaghi as a guest on the show — together they talk about: Dogs and Halloween | Technology making the old way of spying obsolete and more dangerous | From climate crisis to child labor; the many reasons for keeping our phones and gadgets | Robo…
 
Naked As A Jaybird: Amazon Astro, Privacy For The Elderly And Disabled, And Centralized Privacy In The U.S. _______________________ Guest Liz Wharton On LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/ On Twitter | https://twitter.com/LawyerLiz ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/itspmaga…
 
As a security consultant who transitioned to lead product security in-house, Jason Geffner has seen both sides of the application security process. He joins Tech Done Different to provide insights about consulting vs. in-house, leadership, the role of kindness in team dynamics, and managing third party security risk. You'll learn: why it's the cons…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! How and where do the SOC and the SOC analyst make positive impacts on the business? That's exactly what we explore in this new episode. In this third of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Nipun Gupta, a security…
 
The cybersecurity gaming event, Hack For Troops, takes place on October 30, 2021 from 9AM–4PM ET. Listen in to learn how you can play, watch, and support this program which helps raise money for the non-profit, Tech For Troops. About the Hack For Troops Event Hack For Troops is an annual capture the flag fundraising event to support Tech For Troops…
 
Many paths can bring you to a specific place — no single one of them is the absolute best. One can be faster, another easier, another more pleasing to the eye, sunnier, darker; it is up to you to decide. What you do need to know is what the options are to make the decision that is right for you. Maybe you’ll even change your mind a bit while on the…
 
During Louis Nyffenegger's education at a university, he discovered his interest in information security. Louis went on to create a globally popular web app pentesting learning platform used by aspiring pentesters and bug hunters. Louis is passionate about educating and helping others, which is more obvious the more you learn about him. ___________…
 
Companies are putting more resources than ever into producing innovative solutions, yet nearly every executive expresses some level of dissatisfaction with their company's innovation performance. That's because while innovation is still critical, it's no longer enough. Join us as we talk to a technological thought leader and investor, William Kilme…
 
While InfoSec teams must mature their cybersecurity programs to protect digital assets, it's just as essential to synchronize programs with business objectives. Only then can InfoSec teams ensure their activities strategically support market penetration, revenue generation, and cost-saving business processes—rather than continually functioning in f…
 
Cybersecurity is so hot companies can’t hire fast enough. What’s the blocker? Experience. But how can recent grads and those in school get it? CTF expert Akshay Rohatgi explains how to get involved. One of the most common questions we get is: how can I get experience if I can’t get that first job? Even entry-level cyber roles often require 1-3 year…
 
The state of API Security is in constant flux, with traditional WAF technologies being paired with, and extended by, newer models of application-driven protections. With Gartner recognizing this trend and introducing a Web Application & API Protection market, what do two long-time API security leaders think about WAFs and their immediate and long-t…
 
Nicolas is creating the next reality for online learning using VR - the intersection of accessible education and movement towards the metaverse. After realizing the difficulties and lack of immersiveness of online learning, Nicolas took a gap year from his studies at Cornell as an Applied Mathematics major to found a VR company, combining technolog…
 
Join Jax and Erika for an interactive conversation with returning guest, George, surrounding the work style changes and life hacks that COVID- 19 has presented. We talk through the challenges that were faced by many, hacks for managing workload and battling meeting exhaustion. __________________________ Guest George Tang On Linkedin | https://www.l…
 
How is making meatless meat similar or different from hacking software? to answer that (and more), we're joined by Josh Nixon, CTO of meat alternative pioneer Prime Roots. We discuss what tech even is (hint: not always software), and how to think about the acceleration of innovation. You'll learn: why tech typically refers to software (but it shoul…
 
Suppose you still believe the narrative of a hooded figure with ski gloves and a crowbar attacking a company network. In that case, this may be hard to digest: Cybercrime is a business. Cybercriminals are well organized. They share data; sell information; rent, lease, and trade tools; and market their business. It's time to source the crowd of cybe…
 
SOC analysts are often overworked and under-appreciated — but that needs to change! Many look to improve their work environment through the use of technology and innovation. In the SOC, we need a lot of tuning to find that delicate balance between business goals, technology innovation, and the humanity in the machine. Scripting, coding, and other f…
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Ellen Xu as a guest on the show — together they talk about: 3D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation | Bugs in machines, computers, and c…
 
Breach verification reform has been needed for a long time. Now with legislation on the floor, CISA has the opportunity to change the paradigm. _______________________ Guest Phillip Wylie On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie ______________________ Host Keenan Skelly On ITSPmagazine 👉https://w…
 
As the industry returns to work, how are companies planning to secure and retain talent in a time where employees are choosing to work remotely? How are critical jobs in cybersecurity and cloud maintained to ensure businesses and activities remain online and secure at all times? As the demand for tech talent grows, NPower has a proven pipeline for …
 
Cory Billington a former member of the US Navy, worked with car racing, and in pawn shops before he found his passion. Cory found his passion in pentesting and red teaming and now works for a large national insurance company. He shares his story and recommendations on becoming an ethical hacker. _______________________ Guest Cory Billington On Link…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login