show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
“The New Grand Strategy" tells the story of a plan, born within the Pentagon, to recapture America’s greatness at home and abroad by elevating sustainability as our new strategic imperative. We talk about the need for change, the business of sustainability, and so much more with the author, Joel Makower. __________________________ About The Book "T…
 
In this week's episode of Through The TechVine Live Radio Program, we talk about a brilliant young astronomer named Jocelyn Bell Burnell that In 1967 Discovered Radio Pulsars, But A Dude Took The Noble Prize For That, and we are not happy about it. Then We Take A Turn Into Smart Glasses, Wearables, And Life-Changing Medical Devices — when is the be…
 
Hutch started out majoring in philosophy and realizes he was better fit for coding and hacking. Hutch continued to develop his coding and pentesting skills to become a very highly skilled penetration tester. _______________________ Guest Justin "Hutch" Hutchens On Linkedin 👉 https://www.linkedin.com/in/justinhutchens/ On Twitter 👉 https://twitter.c…
 
The future is already here, or it is about to happen. Depending on how long you are willing to hold that fast-forward button and how much you want to know about it. Today we are going to be both in the present and the far-away future. Come with us. Our guest today is Matthew Griffin, often described as “The Adviser behind the Advisers” and a “Young…
 
Real legislation and executive support are critical for any breach verification or breach related legislation that is coming. _______________________ Guest Alyssa Miller On Twitter 👉https://twitter.com/AlyssaM_InfoSec On Linkedin 👉https://www.linkedin.com/in/alyssam-infosec/ ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.its…
 
Is it ever too early to start understanding the world we live in, the technology that drives and supports us, the past that got us to today, and the future that we can and should contribute to? Of course not — and it is never too late either, but that is a conversation for another podcast. Today we are happy to host one more time a good friend of I…
 
It's an annual tradition to catch up with Black Hat's General Manager, Steve Wylie, right before the USA edition of the Black Hat event kicks into gear. This year was no different, and we got to learn about the format and the upcoming trainings, briefings, tools, trends, themes, topics, and, of course, about the keynote speakers. It is an hybrid ev…
 
The Cryptocurrency Village at DEF CON 29 will explore blockchain technologies, the regulatory landscape, and the general cryptocurrency ecosystem — the intersection of cryptocurrency and cybersecurity. In this episode, I connect with two organizers of the Cryptocurrency Village for a preview of what’s to come at DEF CON 29 and the crypto landscape.…
 
With the recent activities in space tourism, there has been increased awareness and excitement for the possibilities in space. But, are those possibilities safe AND secure? Rather than leaving this answer to chance, a team of aerospace and aviation experts, fanatics, and hackers come together to host the Aerospace Village at DEF CON. They also do a…
 
Lately, our societies have been dealing with more technology than ever before — some expected — some not so much. Nevertheless, rushing technology into the public should always require a lot of testing and even more thinking. We know that we cannot predict the future, but we do know that looking at things from every possible angle and asking as man…
 
Adrian Crisan has the ultimate authority to make decisions about tech for his company. However, in this episode of Tech Done Different, he walks us through the power of listening, how to build consensus, and new ways to think about problem-solving. You'll learn why to reframe yourself from "technologist" to "problem-solver" how (and why!) to priori…
 
Critical Infrastructure is the ground floor for all things built in our society. Every sector is built upon the rules of Cyber. Learn more about the ICS Village. _______________________ Guest Bryson Bort On Linkedin 👉 https://www.linkedin.com/in/brysonbort/ On Twitter 👉 https://twitter.com/brysonbort ______________________ Host Keenan Skelly On ITS…
 
Abhijith once lived in a home without electricity but he overcame all obstacles to become a red teamer and eventually red team manager. Abhijith not only excelled as a red teamer, he is an educator and founder of the DEF CON Adversary Village. Abhijith's passion is well known through his efforts in the cybersecurity community. _____________________…
 
WeOpenTech is a global community of marginalized genders who work in security and tech. “You are welcome to join us if you are of a marginalized gender (even if you are unsure at this time), including non-men and/or non-cis individuals, and other genders which have been systematically oppressed. We welcome members across all nationalities, races, r…
 
In this week's episode of Through The TechVine Live Radio Program, we talk about AI-Generated Voice, Is It Ever Ok To Use It? The Antony Bourdain Case | The Right To Repair Your Tech, Sure, But Can/Should You? | This Day In Tech History: The Invention Of The Bicycle - From The Dandy Horse To The Self Driven Ones. An old invention that is now more r…
 
In the heat of a "cyber moment," how do you figure things out so you can get out of it quickly and cleanly? How do you handle a period of chaos when you've not experienced that particular situation before? It comes down to critical thinking — but how do you "get" that? According to our guest, Dan Borges, critical thinking comes from practice. Not f…
 
Savannah Lazzara shares her story on how she went from a marketing professional to a red teamer and social engineer. Savannah Lazzara is not only a red teamer and social engineer but is a coordinator for the DEFCON Red Team Village and Hack The Box Tampa meetup co-host. _______________________ Guest Savannah Lazzara On Linkedin 👉 https://www.linked…
 
#ShareTheMicInCyber is a critical online conversation campaign on systemic racism in cybersecurity while shining a light on amazing Black practitioners... and providing career opportunities. Changemakers Camille Stewart and Lauren Zabierek came together to make the campaign a reality. Since mid-2020, the campaign has turned into an incredible movem…
 
What does privacy data look like in the mixed reality of tomorrow? _______________________ Guests Suchi Pahi On Twitter 👉https://twitter.com/SuchiPahi On Linkedin 👉https://www.linkedin.com/in/suchismitapahi/ Joel Scharlat On Twitter 👉https://twitter.com/jscharlat On Linkedin 👉https://www.linkedin.com/in/joel-scharlat/ ______________________ Host Ke…
 
Sonya Moisset is a long time techie and an epic woman in Cybersecurity. She walks us through her professional metamorphosis and how her experiences have shaped who she is today. Sonya is an advocate for women and inclusion in Cybersecurity. Not only does she mentor women through her initiatives but she inspires all by example by being a voice for s…
 
It's time to catch the signal from the Red Team Village at DEF CON 29. What can you expect? Listen in to find out: Why and when was the village founded? What is the Red Team Village all about? What should the participants expect from the village? What activities is the Red Team Village is hosting this year at DEF CON? ____________________________ G…
 
Lakshmi Hanspal both leads teams and drives the future of security. She joins to help examine security as an art form, the talent pipeline, and the shared responsibility model of cloud. You'll learn: why security, like any art form, requires practice why diverse teams can solve the hardest problems why you should manage around weaknesses, and hire …
 
When you take humanity out of any equation, you most probably end up with many unintended consequences — yes, for us as individuals, communities, society, and as Earthlings. It doesn't take much more than reading the news to see what happens when we make unsustainable decisions and when we fail to take the future of our species, other species, and …
 
In this week's episode of Through The TechVine Live Radio Program, we talk about Very Tiny Solar Charged Computers On Snails and how technology can help us to save our environment | Going To Concerts On Your Couch and how that can help new artists to monetize with technology | This Day In Tech History: July 16, 1969 Apollo 11 takes off for the Moon…
 
Patrick Laverty shares his story how he went from a sports medicine professional to pentester and social engineer. Patrick is not only a pentester and social engineer, he is a podcast host, conference founder and coordinator. _______________________ Guest Patrick Laverty On Linkedin 👉https://www.linkedin.com/in/plaverty9/ On Twitter 👉https://twitte…
 
The nature, methods, technology, and even public perception of wars have changed. But, unfortunately, they still exist, as humans haven’t changed as much. In this conversation, we take a historic walk, and we discuss the present and future of conflicts that, at this point, for the most part, have already crossed that blurry line between physical an…
 
Jax Scott has had an incredible career from the front lines in Afghanistan all the way to leading Threat Intel teams in the private sector. Hear her inspiring story. Conversation highlights: The of success for the Cultural Support Leader program in Afghanistan How Jax started her cyber military career What Electronic Warfare Officers do The differe…
 
We can’t stop the signal. DEF CON 29 will be a hybrid conference, partially in-person, and partially online. DEF CON will not be a “normal” con, but more like DEF CON “Different.” "Signals From The Villages" is the ITSPmagazine theme for our Coverage Conversations at this year's DEF CON. It's become a tradition to connect with the organizers of the…
 
16-year-old startup engineer, Calix Huang, has sold 2 EdTech companies, scaled to 20k users in 6 months, and underwent a 6-figure acquisition. Here’s his story on how he did it. From self-learning Python and web development online to getting his first software engineering internship at 14, Calix talks about his approach for rapidly learning new ski…
 
Want kids to learn? Research shows that bringing education into a game can make a huge difference in engagement and, in turn, learning. Of course, it can't just be any game; results are better when it is in a game they are already playing. This is precisely what the crew at Connected Camps is doing. Connected Camps is a nonprofit that provides hand…
 
So, you're making a move to bring your business to the cloud. But, do you do it as a slow dribble, or are you going "all in" with a mad rush to transition everything to cloud-enabled systems and processes? Either way, you have some things you need to consider. First and foremost, it's all about the opportunities; what is possible for the business w…
 
Deshawn joins us to share with us how the security departments and the business relate, how to drive personal growth, and what to do when you feel like an imposter. As the Director of Cloud Ops & IT for a software company, Deshawn joins to share with us how the security departments and the business relate, how to drive personal growth, and what to …
 
Cybersecurity has become too technology-focused. Not only is the field becoming needlessly complicated to those who need to understand these issues most—developers, managers, executives—but the focus on technology-driven solutions is forcing us to miss some of the basics of a sound cybersecurity strategy. Most people simply do not understand cybers…
 
Why the Computer Fraud and Abuse Act (CFAA) is ruining hacks for good. _______________________ Guest John Jackson On Twitter 👉https://twitter.com/johnjhacking On Linkedin 👉https://www.linkedin.com/in/johnjhacking/ ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly _…
 
Just when you thought you had some reasonable handle on security, your companies goes and does a merger/acquisition. Of course, what you inherit is a beautiful box wrapped in a bow - otherwise known as Pandora's Box. What's inside? Will it be a company where security is part of the culture? Or does everyone have local and/or domain admin? You just …
 
In this week's episode of Through The TechVine Live Radio Program, we talk about an AI Pastry Scanner Is Now Helping To Fights Cancer | How Powerful Biofibers Can Now Be Create On Industrial Scale | This Day In Tech History: The Internet’s Birth | Let’s Talk About The Importance Of Knowing How Tech Works. All this and more on Through The TechVine R…
 
David Diaz shares how he went from an asylum seeker to a professional hacker. David fled his home country, starting over in the US not knowing English; he succeeded in a big way. He achieved what some have said is dead: The American Dream. Listen and be inspired! _______________________ Guest David Diaz On Linkedin 👉https://www.linkedin.com/in/0xda…
 
Stalkerware is an exceptionally terrifying tool that allows someone without permission to creep & access one’s mind... and it's easy to get and use. Changemaker Eva Galperin is trying to stop it. 1 out of 10 Americans have admitted to using stalkerware to spy on their partner or ex. The number is likely higher than 1 out of 10. It's common to get a…
 
Grace Jung has a unique journey into the cyber security space. She joins the Hackerz and Haecksen fam to share advice for students coming out of university programs and finding their “home” in the professional field. She provides a peek into the Identity and Access management area of cyber. She also shares life hacks on the transition from her coll…
 
Ted's longtime friend Sarah Robinson joins Tech Done Different. She currently serves Facebook as the Privacy Risk Manager in the General Counsel's Office and answers questions about big tech, privacy, security, and leadership. What is the role of big tech in society? How should privacy and security work together? What happens when leadership embrac…
 
Cybersecurity finally has a seat at the table. Both at home and internationally. _______________________ Guest Andrea Little Limbago On Twitter 👉https://twitter.com/limbagoa On Linkedin 👉https://www.linkedin.com/in/andrea-little-limbago/ ______________________ Host Keenan Skelly On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-rad…
 
Suppose you're like Rudi, who, six years ago, tried to bring his organization to an effective level of compliance and increase his security posture by managing multiple spreadsheets. In that case, you're probably finding yourself going nuts — just like Rudi did, and many others do, when faced with a similar complex and overwhelming situation. On th…
 
Security teams are very technical and tactical by nature, often looking at risk through a specific lens they've developed over time. But, of course, the reality is that the possible security incident can — and likely will be — much more extensive and require different teams and expertise. One bad mishandle and an event or incident could become an e…
 
In this week's episode of Through The TechVine Live Radio Program, we talk about Bird Songs Recognition App and Bioacoustics Science, AI And Robots Learn To Predict Human Behavior, And Nikola Tesla's Vision Came True. Plus a new segment: Tech New History - July 1, 1979 The Walkman goes on sale. And we test a game with a mysterious word. All this an…
 
Online shopping is awesome and easy, but when it comes to paying how can you be sure your hard earned money is safe? In this episode, we cover: From Credit cards to Apple/Google Pay to Venmo - how can you pay online? Who’s on the hook if there’s fraud? Is one payment method is more secure than the other? Why your credit card could be at risk even i…
 
Former UNIX Sysadmin Rich Mirch shares his story on how he became a pentester and security researcher. In his highly successful career Rich has found numerous zero day vulnerabilities. _______________________ Guest Rich Mirch On Twitter 👉https://twitter.com/0xm1rch On Linkedin 👉https://www.linkedin.com/in/richmirch/ ______________________ Host Phil…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login