PLAY PODCASTS
The ITSPmagazine Podcast

The ITSPmagazine Podcast

2,024 episodes — Page 10 of 41

Ep 2207Effectively Managing a Growing Compliance Program While Minimizing Audit Fatigue | 7 Minutes on ITSPmagazine From HITRUST Collaborate 2024 | A Schellman Short Brand Innovation Story with Michael Parisi and Ryan Meehan

Schellman, founded in 2002 as SAS 70 Solutions, was originally focused on just one audit standard; the SAS 70 (subsequently replaced by SOC 2). As the client base grew so did the request to perform other audits outside of the SAS 70. Schellman grew its offerings over the past 20+ years by identifying client needs and then determining if we have the skillset and expertise to deliver high quality work. We have always stayed true to our core strengths and expertise, which is why Schellman is the only Top 100 CPA firm that specializes in IT Audit and Cybersecurity.Schellman provides full-spectrum cybersecurity third-party audits, assessments, and certifications. In a marketplace with growing cybersecurity compliance needs, organizations are struggling to incorporate additional framework and regulations in an efficient and effective way. At Schellman we harnesses our expertise and deep knowledge across the compliance standards to roadmap audits throughout the year that promotes the highest return on evidence collection and subject matter expert time.By performing specific assessments in a staggered or parallel fashion, Schellman is able to collect once and test many; both in terms of information from subject matters experts and evidence from business stakeholders. The broad range of our compliance offerings, along with our combined audit approach and depth of expertise sets Schellman apart. Schellman's approach was built to provide expertise and quality work while valuing and respecting the time and stress assessments/audits place on an organization.Learn more about Schellman: https://itspm.ag/schellman9a6vNote: This story contains promotional content. Learn more.Guests:Michael Parisi, Head of Client Acquisition, Schellman [@Schellman]On LinkedIn | https://www.linkedin.com/in/michael-parisi-4009b2261/Ryan Meehan, Director, Schellman [@Schellman]On LinkedIn | https://www.linkedin.com/in/ryan-meehan-cisa-cissp-ccsfp-iso-lead-cipp-71a5939ResourcesLearn more and catch more stories from Schellman: https://www.itspmagazine.com/directory/schellmanLearn more about HITRUST: https://itspm.ag/itsphitwebLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 23, 20247 min

Ep 2206Mastering Multi-Cloud Management | 7 Minutes on ITSPmagazine from Black Hat SecTor 2024 | An OpenText Short Brand Innovation Story with Michael Mychalczuk

In this 7 Minutes on ITSPmagazine Short Brand Story recorded during Black Hat SecTor 2024, host Sean Martin sits down with Michael Mychalczuk, Director of Product Management for ArcSight at OpenText, to dissect the complexities of multi-cloud environments. Hosted during Black Hat SecTor 2024 in Toronto, they share invaluable insights into why businesses are increasingly finding themselves managing multiple cloud services.Mychalczuk explains that while many organizations initially hoped to stick with a single cloud provider, factors such as mergers, acquisitions, and specific technological pushes from giants like Microsoft and Google have made multi-cloud unavoidable. This proliferation presents unique challenges, particularly in maintaining security across varied platforms. He highlights the critical need for collaboration between security operations and IT operations teams. “No one person can know all of this,” Mychalczuk notes, emphasizing the importance of teamwork and specialization. He advises focusing on essential areas like identity management and automation to minimize human error and ensure consistent and secure deployments.Sean Martin and Michael Mychalczuk also discuss the importance of leveraging technologies such as Kubernetes and container security to manage and secure multi-cloud environments effectively. Mychalczuk stresses the value of robust monitoring tools like ArcSight to detect and respond to threats across these diverse systems, ultimately enabling businesses to succeed securely in today’s fast-paced world. In closing, the emphasis on understanding one’s maturity as a security operations team and aligning efforts accordingly stands out as a key takeaway.Note: This story contains promotional content. Learn more.Guest: Michael Mychalczuk, Director of Product Management at OpenText [@opentext]On LinkedIn | https://www.linkedin.com/in/michaelmychalczuk/ResourcesLearn more and catch more stories from OpenText: https://www.itspmagazine.com/directory/opentextLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 22, 20247 min

Ep 2205Islamic and Hindu Astronomers of the Middle Ages | Stories From Space Podcast With Matthew S Williams

Host | Matthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode NotesDuring the Middle Ages, Arab, Persian, and Indian astronomers made incredible contributions to the fields of astronomy and cosmology. In addition to preserving knowledge from Classical Antiquity, they introduced innovations and breakthroughs that would revolutionize the sciences and helped inspire Copernicus' heliocentric model!______________________ResourcesIslamic Science's India Connection - Aramco World (2017): https://www.aramcoworld.com/Articles/September-2017/Islamic-Science-s-India-Connection______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 22, 202418 min

Ep 2204LevelBlue Futures Report: Cyber Resilience in Retail | 7 Minutes on ITSPmagazine | A LevelBlue Short Brand Innovation Story with Theresa Lanowitz

Retailers today continue to grapple with unforeseen issues as supply chain attacks become more common and vulnerabilities from third-party sources emerge as major threats.Of the 1,050 C-suite and senior executives surveyed, 86% of respondents anticipate that dynamic computing will enhance operational performance within the next three years, especially in AI strategy development and leveraging sophisticated supply chains. However, 82% acknowledge the increased exposure to risk.In this age of dynamic computing, retail organizations encounter both significant opportunities and risks. With traditional security boundaries fading and conventional security measures proving inadequate, retail leaders must adopt a comprehensive approach to ensure overall cyber resilience.To better achieve cyber resilience in the retail industry, LevelBlue shares five specific steps that can be applied across industries, directly in response to these findings: identify the barriers to cyber resilience; be secure by design; align cyber investment with business; build a support ecosystem; and transform cybersecurity strategies.To learn more, download the complete findings of the 2024 LevelBlue Futures Report: Cyber Resilience in Retail here:https://itspm.ag/levelbjk57Learn more about LevelBlue: https://itspm.ag/levelblue266f6cNote: This story contains promotional content. Learn more.Guest: Theresa Lanowitz, Chief Evangelist of AT&T Cybersecurity / LevelBlue [@LevelBlueCyber]On LinkedIn | https://www.linkedin.com/in/theresalanowitz/ResourcesLearn more and catch more stories from LevelBlue: https://www.itspmagazine.com/directory/levelblueLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 21, 20247 min

Ep 2203The Tribe of Wandering Shoes Part Two | A Story Under the Stars in Four Parts. Just like the seasons! The Autumn Adventure (Read In English) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

The Tribe of Wandering ShoesA Story Under the Stars in Four Parts. Just like the seasons!This Is The Second Part: The Autumn Adventure.The season was changing. The warm, sunny days of summer had given way to crisp and fresh mornings, often with a layer of fog beginning to cover the fields. The days were getting shorter, and the cool wind made the leaves fall — the street sweepers with their brooms couldn't gather them fast enough before another strong gust brought down just as many.The Tribe of the Wandering Shoes gathered for an extraordinary meeting; they all agreed that it was time to leave the beaches and resume their adventure before dark clouds full of rain appeared on the horizon.They packed their bags, put together some provisions, and cheerfully set off toward the Tuscan countryside. They walked through fragrant woods, where the leaves crunched under their feet and the colors of the trees painted the landscape with shades of red, orange, and gold.The Wandering Shoes felt the first drops of autumn rain as they wandered through winding paths and small villages. Everywhere they went, they saw other signs of the seasonal change: pumpkins on porches, scarecrows guarding the last cornfields, and the smell of spices in the air.At one point, they reached a small country town, where preparations for Halloween were already in full swing, and that’s when the rain began to pour down heavily. The streets, flooded with water, looked like small streams, and the shoes were completely soaked.They tried to climb onto the roofs of the houses, but the tiles, slippery like soap, made them fall back down. They didn’t know what to do anymore, but luckily, at that moment, along came Senapino the donkey, pulling a cart.It was Halloween, and his load consisted of yellow pumpkins, round and of various sizes. Senapino stopped and kindly said to the shoes: "Hop on, I'll give you a lift!"The shoes didn’t need to be told twice, and full of joy, they jumped on in the blink of an eye. They squeezed together as much as possible to make room among the pumpkins, and the good donkey, understanding they needed a dry place, took them out of town.After a short journey, they arrived in front of an abandoned barn with a very tall tower."In the tower, you'll be warm, and from its top, you can enjoy a beautiful view: the starry sky at night and the red roofs of the town by day. A perfect place for Halloween night."Senapino invited them to get off and, after saying goodbye, resumed his journey, slowly disappearing into the distance.No door blocked the dark entrance of the tower, so the Wandering Shoes went in and climbed the old stone staircase worn by time. As they climbed slowly, they heard a bouncing noise behind them. Turning around, they saw the pumpkins following them step by step.Some torches lit up by magic, and suddenly the stairs were illuminated by faint, flickering flames. Once they reached the top, the whole Tribe settled into the tower-barn, accompanied by the pumpkins that had followed them. They dried off well and thought it would be fun to celebrate Halloween together.To create the right atmosphere, they carved the pumpkins from Senapino’s cart, placed candle stubs found among the barn’s junk inside them, and after lighting them, placed them on the windowsills and terrace. The tower, with its glowing pumpkins, could be seen from afar, and it was a sight to behold. Surely the villagers would appreciate the view.But then, suddenly, incredibly, and unexpectedly, all the pumpkins, with a jump, transformed into spiders with long legs and big, glowing red eyes. They quickly started hunting down the Wandering Shoes, as if they had always been their favorite prey.What a fright! What chaos!There were shoes running in every direction and others hiding behind the braver ones, who, stretching out their laces, tied themselves together like a magical web. In no time, this web intertwined and grew out of control, forming an enchanted shield around the shoes to protect them.The spiders, furious, began jumping and climbing everywhere like mad but were unable to catch any prey. After several attempts, disappointed, they scurried down the stairs, abandoning the barn and heading toward the town in search of new victims. But the streets were filled with floating ghosts, white like sheets, and as they brushed against the scary spiders, they transformed them back into friendly glowing pumpkins.The danger had been averted. It was Halloween night, and as we all know, on this enchanted night, anything can happen.Even in the tower, the Wandering Shoes were breathing a sigh of relief as the remaining bits of candles were burning out. Soon, darkness fell, and the restless evil forces launched a new attack.In the large, dark, and gloomy room, a gust of icy wind slammed all the doors and windows shut, and enormous sabers appeared, crossed and wrapped in iron chains; as if that weren’t enough, in the center was a large rusty bolt with keys hanging, but out

Oct 19, 20249 min

Ep 2202The Battle Of Halloween | A Story Under the Stars (Read In English) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

The Battle Of HalloweenThree friends, neighbors and very curious, met every afternoon, after finishing their homework, at the playground in their village nestled in the green Tuscan hills. There, sitting on a bench in the middle of the lawn, they plotted how to end the day with fun. Usually, they got up to mischief and sometimes ended up in peculiar situations.The days passed, and summer was now just a memory. But despite a bit of rain and an autumn breeze, one afternoon they met on the usual bench. After much scheming, they gathered all their courage and decided that one of these nights, they would secretly go to the old abandoned cemetery. It was located behind the church, at the foot of the hill, about 2 kilometers from the village center.Ghost stories linked to the cemetery, whispered by the elders, had discouraged them many times; moreover, they had heard rumors of a strange character, somewhere between real and imaginary—a mysterious guardian who sometimes watched over the main gate at night.It was autumn, dense clouds darkened the sky, and the days were gray and foggy—the perfect season for the adventure of the three kids, before winter arrived. The calendar marked October 31, and that very night, Halloween night, would be simply perfect.A handshake, then a goodbye, and each went home. They had dinner and went to bed early as usual, not to arouse suspicion. Lying in bed, they dozed off, but in their half-sleep, every noise—the bang of a shutter, the creaking of the floor, or the squeak of a door—seemed like spirits moving, maybe ready to join them on their adventure. As planned, at exactly the tenth toll of the bell from the church tower, they snuck out, each from their bedroom window, slipping out through the back of their houses.Almost at the same time, they met at the designated spot and in the darkness made their way toward the cemetery. Lina, who seemed the bravest, held a small flashlight, pointing it behind her to light the way for Sara and Teo, the other two companions in the adventure.They were all a bit nervous, stopping to hide at the slightest rustle or the appearance of a sudden shadow. Once they reached the church, they hurried determinedly towards the entrance of the cemetery, and that’s where the night started to get interesting.For starters, Martino, the mysterious guardian they had heard so much about, was really there. They saw him with their own eyes in front of the old, rusty, and decaying gate. He was sitting, half-asleep, but certainly alert to the slightest noise. He held a still-lit pipe in one hand and a harmonica in the other. A jet-black raven perched on his right shoulder, and a small yet regal-looking dog sat by his left side, keeping him company.The fear of being discovered froze them instantly. They caught their breath and, in the blink of an eye, reached the wobbly fence barely standing at the back of the cemetery. From there, they climbed a large elm tree and sat on the highest branches. The call of some owls with big, piercing eyes echoed like a dark omen, but a glow unexpectedly appeared on the other side of the crumbling wall.From the large elm, Lina, Sara, and Teo witnessed an unusual and astonishing sight. In front of them lay a well-kept green park, like a secret garden. Small graves, with tombstones shaped like dogs, cats, and other pets, adorned with flowers of every shade, were scattered in every corner.In the central part stood imposing statues representing sacred figures for the cemetery and its inhabitants. These were the statues of the Royal Frog, the Wise Turtle, the Noble Horse, the Mysterious Cat, and the Faithful Dog.Looking around from their vantage point, they saw pumpkins of various sizes, carved with images of animals and lit by candles. Lanterns and various objects typical of Halloween Night were placed around the graves. Curious, they decided to climb down from the elm and, little by little, started walking toward the park, paying attention to the movements of the faint, flickering lights that cut through the mist. The atmosphere was enchanted and magical.They moved quietly, Lina always leading the way. Every now and then, she would stop Sara and Teo, saying, “Do you hear that noise? Are we sure it’s not a ghost?”“N-n-no, just the wind... we hope,” whispered Sara and Teo — But it was Halloween Night, and anything could happen.In the center of the park, the spirits of the animals living in the cemetery jumped and flew, carried by the air with the help of colorful pinwheels spun by a gentle breeze. It was a full-on celebration. Paper lanterns lit up small stalls filled with all kinds of treats for the joy of the animals. Cookies and snacks shaped like little ghosts, skulls, and bats, small fruit pumpkins, and—believe it or not—mini chicken and turkey sausages for dogs, and fish ones for cats!Several spotlights rose into the sky at the edges of the park, operated by magpies that vigilantly watched over the cemetery. Suddenly, all the beams of ligh

Oct 18, 202413 min

Ep 2201Leveraging AI for Effective Healthcare Solutions | A Brand Story Conversation From HITRUST Collaborate 2024 | A HITRUST Story with Walter Haydock and Steve Dufour

The Emergence of Innovative Partnerships: As AI becomes increasingly integral across industries, healthcare is at the forefront of adopting these technologies to improve patient outcomes and streamline services. Sean Martin emphasizes the collaboration between StackAware and Embold Health, setting the stage for a discussion on how they leverage HITRUST to enhance healthcare solutions.A Look into StackAware and Embold Health: Walter Haydock, founder and CEO of StackAware, shares the company's mission to support AI-driven enterprises in measuring and managing cybersecurity compliance and privacy risks. Meanwhile, Steve Dufour, Chief Security and Privacy Officer of Embold Health, describes their initiative to assess physician performance, guiding patients toward top-performing providers.Integrating AI Responsibly: A key theme throughout the conversation is the responsible integration of generative AI into healthcare. Steve Dufour details how Embold Health developed a virtual assistant using Azure OpenAI, ensuring users receive informed healthcare recommendations without long-term storage of sensitive data.Assessment Through Rigorous Standards: Haydock and Dufour also highlight the importance of ensuring data privacy and compliance with security standards, from conducting penetration tests to implementing HITRUST assessments. Their approach underscores the need to prioritize security throughout product development, rather than as an afterthought.Navigating Risk and Compliance: The conversation touches on risk management and compliance, with both speakers emphasizing the importance of aligning AI initiatives with business objectives and risk tolerance. A strong risk assessment framework is essential for maintaining trust and security in AI-enabled applications.Conclusion: This in-depth discussion not only outlines a responsible approach to incorporating AI into healthcare but also showcases the power of collaboration in driving innovation. Sean Martin concludes with a call to embrace secure, impactful technologies that enhance healthcare services and improve outcomes.Learn more about HITRUST: https://itspm.ag/itsphitwebNote: This story contains promotional content. Learn more.Guests: Walter Haydock, Founder and CEO, StackAwareOn LinkedIn | https://www.linkedin.com/in/walter-haydock/Steve Dufour, Chief Security & Privacy Officer, Embold HealthOn LinkedIn | https://www.linkedin.com/in/swdufour/ResourcesLearn more and catch more stories from HITRUST: https://www.itspmagazine.com/directory/hitrustView all of our HITRUST Collaborate 2024 coverage: https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texasAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 17, 202425 min

Ep 2200Using Clean Energy to Level the Economic Playing Field | A conversation with David Cash | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman

Guest: David Cash, Regional Administrator, EPA New EnglandOn LinkedIn | https://www.linkedin.com/in/david-w-cashHosts: Alejandro Juárez CrawfordOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawfordMiriam Plavin-MastermanOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman______________________Episode IntroductionIn this episode with Dr. David Cash, the regional administrator for New England at the EPA. We explore the critical intersection of clean energy, environmental justice, and economic equity. Dr. Cash shares insights on recent federal initiatives aimed at providing communities with access to affordable heating solutions, such as heat pumps, which promise not only comfort but also significant cost savings for low- and middle-income families. The discussion emphasizes the importance of integrating energy policy with social equity, highlighting how thoughtful investments can transform underserved communities while promoting job growth in the clean energy sector. Tune in for an enlightening dialogue on how clean energy can reshape our economic landscape and benefit all.______________________ResourcesEPA: https://www.epa.govEPA Instagram: https://www.instagram.com/epa_newengland/EPA New England Region Facebook: https://www.facebook.com/EPARegion1/______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________For more podcast stories from What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman, visit: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford and https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 17, 202450 min

Ep 2199The Life-Altering Hacking Incident That Changed Everything | A Conversation with Gary Berman | The Soulful CXO Podcast with Dr. Rebecca Wynn

Guest: Gary Berman, CEO, Cyberman SecurityOn LinkedIn | https://www.linkedin.com/in/gary-bermanHost: Dr. Rebecca WynnOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn________________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network________________________________Episode DescriptionIn this episode of the Soulful CXO, host Dr. Rebecca Wynn speaks with Gary Berman, CEO of Cyberman Security. Gary shares his harrowing journey from victim to voice in the fight against cybercrime. As we continue to recognize Cybersecurity Awareness Month, the conversation covers the emotional toll of experiencing a major breach, the lessons learned, and actionable advice for individuals and organizations to bolster their cybersecurity defenses. Tune in for an eye-opening exploration of resilience and awareness in the digital age!________________________________ResourcesNational Cybersecurity Alliance Free Events and Programs: https://staysafeonline.org/events-programs/CyberSecure My Business Program: https://staysafeonline.org/programs/cybersecure-my-business/Cybersecurity Awareness Month Resources: https://staysafeonline.org/programs/cybersecurity-awareness-month/Data Privacy Week Resources: https://staysafeonline.org/programs/data-privacy-week/________________________________Support:Buy Me a Coffee: https://www.buymeacoffee.com/soulfulcxo________________________________For more podcast stories from The Soulful CXO Podcast With Rebecca Wynn: https://www.itspmagazine.com/the-soulful-cxo-podcastITSPMagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 15, 202415 min

Ep 2198Books | Redefining Society and Technology in the Age of “Virtual Natives” and “Interconnected Realities” | A conversation with Author Leslie Shannon | Redefining Society Podcast With Marco Ciappelli

Interconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever (Book): https://amzn.to/4egYeVmVirtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture (Book): https://amzn.to/4eh4NqLGuest: Leslie Shannon, Head of Trend and Innovation Scouting, Nokia [@nokia]On LinkedIn | https://www.linkedin.com/in/leslie-shannon-75856718/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsBlackCloak 👉 https://itspm.ag/itspbcweb_____________________________Episode IntroductionWelcome to another thought-provoking discussion on the Redefining Society and Technology Podcast. I'm Marco Ciappelli, your host, and today we delve into the blurred boundaries of our hybrid analog-digital world. It's time to stop ignoring the profound impact of technology on our society because the future is now.The Blurring Line: Physical vs. VirtualImagine a world where the line between the physical and virtual realms no longer exists—a figment of our imagination. We live in such a world today. In a conversation with Leslie Shannon, we explore her insightful books, Virtual Natives and Interconnected Realities, which delve into the dynamics of emerging technology and its impact on society.Leslie, Head of Trend and Innovation Scouting at Nokia, elaborates on the concept of integrating digital tools into our physical environments. Whether through augmented reality or AI-infused devices, technology is increasingly woven into the fabric of our daily lives.Technology Adoption: More Than Meets the EyeLeslie's exploration into mixed reality, AR, VR, and the metaverse opens up new avenues for understanding how technology is adopted—not just how it’s designed. Her insights highlight the intrinsic need for technology to solve real, tangible problems for users, emphasizing convenience and utility over novelty.Although immersive digital worlds offer fascinating experiences, they must provide genuine solutions to gain widespread acceptance. This is the metaverse’s core challenge—bridging the digital with physical in a fulfilling way.Virtual Natives: A New Generation with Old WisdomLeslie's book, Virtual Natives, describes a generation that grew up in a truly digital world unencumbered by remnants of analog processes. This new breed, adept at digital multitasking and unburdened by past paradigms, promises to be a potent force for innovation and disruption.Yet, despite concerns about social skills and real-world interactions, Leslie and I discuss the resiliency and empowerment of these digital descendants. They are not bound by traditional workplace expectations, questioning norms with an arsenal of digital alternatives at their disposal.Redefining Society, Redefining OurselvesOur society is being redefined by dynamic interactions with technology. From embracing tools like CHAT GPT in daily life to questioning long-held norms in education and workplace practices, our relationship with technology is continuously evolving.In conclusion, the next steps in societal evolution depend on how we integrate these digital realities into our everyday lives. As Leslie suggests, the spatial internet and technological advancements offer opportunities we haven’t fully realized yet but promise significant societal shifts.Let’s embrace the change, question the status quo, and redefine what it means to be a part of this connected and innovative society. The future is not somewhere you go; it’s something you create.I invite you to stay tuned as we continue to explore these fascinating intersections between technology and society on the Redefining Society and Technology Podcast. Stay curious, stay questioning._____________________________ResourcesInterconnected Realities: How the Metaverse Will Transform Our Relationship with Technology Forever (Book): https://amzn.to/4egYeVmVirtual Natives: How a New Generation is Revolutionizing the Future of Work, Play, and Culture (Book): https://amzn.to/4eh4NqL_____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWatch the webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllTUoWMGGQHlGVZA575VtGr9Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 15, 202442 min

Ep 2197Books | “Kilimanjaro and Beyond” & ”The Secret Truth" | A Conversation with Author Barry Finlay | Audio Signals Podcast With Marco Ciappelli

The Secret Truth: A Jake Scott Mystery (Book): https://amzn.to/3BVs9UoKilimanjaro and Beyond: A Life-Changing Journey (Book): https://amzn.to/3Noyk64Guest: Barry Finlay, AuthorOn LinkedIn | https://www.linkedin.com/in/barry-finlay-01484825/Website | https://www.barry-finlay.com/Facebook | https://www.facebook.com/AuthorBarryFinlay/Goodreads | https://www.goodreads.com/author/show/5213951.Barry_Finlay_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network_____________________________Episode IntroductionIn this episode of the Audio Signal Podcast, I had the distinct pleasure of diving into the world of storytelling with the remarkable Barry Finlay. Barry is renowned for his ability to captivate audiences through his thrilling mystery novels, and his newest release, "The Secret Truth," promises to be another page-turner.Meet Barry Finlay: The Accidental AdventurerBarry's journey into the world of writing is itself a fascinating tale. Born in central Canada and initially rooted in a career defined by numbers as an accountant for the Canadian federal government, he made a surprising transition into becoming a full-time author. His leap from the predictable world of accountancy to the unpredictable world of writing wasn’t just a career change; it was a life change prompted by a major physical challenge—climbing Mount Kilimanjaro at nearly 60 years old. This adventure sparked his first book and led him on a wildly different trajectory than he ever imagined.Crafting Stories: A Journey from Nonfiction to MysteryBarry's transformation into a storyteller wasn't immediate. Initially, he penned nonfiction works based on his life experiences, like "Kilimanjaro and Beyond." However, his creativity truly found its calling in the world of mystery and thrillers. Our conversation revealed how Barry's characters, much like his writing process, developed organically, often leading him on unpredictable paths.The difference Barry outlines between mystery and thrillers is profound—mysteries are character-driven, requiring readers to guess the perpetrator until the very end, while thrillers often present a transparent dichotomy between hero and villain from the onset. For Barry, this distinction is critical and reflects in the intricate layering found in his writing."The Secret Truth": A Peek into Barry’s Latest WorkBarry's latest novel, "The Secret Truth," is the third installment in his Jake Scott Mystery Series. Set against a backdrop of intrigue, peril, and personal stakes, Jake Scott finds himself embroiled in an investigation following the dramatic explosion of a bed and breakfast. Barry describes this suspense as a complex puzzle, filled with subtle clues and misdirections—a true testament to his mastery in the mystery genre.Advice for Aspiring WritersBarry offers invaluable advice for budding writers drawn to the art of storytelling. He emphasizes the importance of simply starting—writing one's thoughts on paper before editing or seeking feedback. Recognizing the significant role marketing plays post-writing, Barry encourages resilience against negative reviews, reminding aspiring authors to stay true to their vision despite criticism.Our conversation illuminated not just the mechanics of writing but the soul behind it. Barry Finlay's stories are powerful reminders of how storytelling transcends genres and media, shaping our perceptions of reality—both virtual and tangible.About the BooksThe Secret Truth: A Jake Scott Mystery - Attention all readers! Get ready for a gripping mystery that will leave you on the edge of your seat. Jake Scott, a retired reporter, is on his way to a peaceful bed and breakfast when his life is suddenly put at risk by a reckless driver. But his journey takes an even more dangerous turn when he approaches the bed and breakfast he is staying at and it explodes, killing all occupants. Homicide detective Dani Perez is determined to uncover the truth, and she enlists Jake's help to investigate the backgrounds of the victims. As Jake delves deeper into the case, he uncovers dark secrets that point to a sinister plot at the bed and breakfast. With the clock ticking and danger lurking at every turn, Jake must use all his investigative skills to solve the mystery before it's too late. Fans of suspense and thrilling plot twists will not want to miss this page-turner. For fans of "Gone Girl," this book is a must-read.Kilimanjaro and Beyond: A Life-Changing Journey - EVERY MOUNTAIN TOP IS WITHIN REACH IF YOU JUST KEEP CLIMBING - Barry Finlay It is January 16, 2009, and 60 year-old BARRY FINLAY and his son CHRIS are propped against a rock,

Oct 15, 202439 min

Ep 2196Road to Product Management - Ridhima Raina's UC Irvine Journey | Off the Record with Saman — Student Abroad Podcast

Guest: Ridhima Raina, MBA Leadership Development Program and ExperianOn LinkedIn | https://www.linkedin.com/in/ridhima-raina/________________________________Host: Saman FatimaOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima________________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network________________________________Episode DescriptionAre you from India? Wishing to come to the USA for your studies? Is your dream university - UC Irvine? If yes, grab a pen, paper, and water; you are all good to know everything. From researching the dream university to getting selected and beating the elephant in the room (i.e. the VISA process) to settling up - you need to know EVERYTHING because it is a foreign land with a lot of newness, loneliness, and self-dependency.________________________________ResourcesBe Cyber Aware in the month of October and the following months: https://www.cisa.gov/cybersecurity-awareness-monthJoin the BBWIC Foundation Community: https://www.bbwic.com/________________________________For more podcast stories from Off The Record With Saman: https://www.itspmagazine.com/off-the-record-with-saman-student-abroad-podcastWatch the video version on-demand on YouTube: https://www.youtube.com/watch?v=0954PDs3hFI&list=PLnYu0psdcllS96iavkI5nQsErJ3795ow6 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 14, 20241h 9m

Ep 2195Unveiling AI's Impact and Challenges at SECTOR 2024 | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Helen Oakley and Larry Pesce | On Location Coverage with Sean Martin and Marco Ciappelli

Guests:Helen Oakley, Director of Secure Software Supply Chains and Secure Development, SAPOn LinkedIn | https://www.linkedin.com/in/helen-oakleyOn Twitter | https://x.com/e2hlnOn Instagram |https://instagram.com/e2hlnLarry Pesce, Product Security Research and Analysis Director, Finite State [@FiniteStateInc]On LinkedIn | https://www.linkedin.com/in/larrypesce/On Twitter | https://x.com/haxorthematrixOn Mastodon | https://infosec.exchange/@haxorthematrix____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesSean Martin and Marco Ciappelli kicked off their discussion by pondering the intricacies and potential pitfalls of the AI supply chain. Martin humorously questioned when Ciappelli last checked the entire supply chain of an AI session, provoking insightful thoughts about how people approach AI today.The conversation then shifted as Oakley and Pesce were introduced, with Oakley explaining her role in leading cybersecurity for the software supply chain at SAP and co-founding the AI Integrity and Safe Use Foundation. Pesce shared his expertise in product security research and pen testing, emphasizing the importance of securing AI integrations.Preventing the AI ApocalypseOne of the session's highlights was the discussion titled "AI Apocalypse Prevention 101." Oakley and Pesce shared insights into the potential risks of AI overtaking human roles and discussed ways to prevent a hypothetical AI apocalypse. Oakley humorously noted her experimentation with deep fakes and emphasized the importance of addressing the root causes to avert catastrophic outcomes.Pesce contributed by highlighting the need for a comprehensive Bill of Materials (BOM) for AI, pointing out how it differs from traditional software due to its unique reliance on multiple layers, including hardware and software components.AI BOM: A Tool for Understanding and ComplianceThe conversation evolved into a discussion about the AI BOM's significance. Oakley explained that the AI BOM serves as an ingredient list, akin to what you would find on packaged goods. It includes details about datasets, models, and energy consumption—critical for preventing decay or malicious behavior over time.Pesce noted the AI BOM's potential in guiding pen testing and compliance. He emphasized the challenges that companies face in keeping up with rapidly evolving AI technology, suggesting that AI BOM could potentially streamline compliance efforts.Engagement at the CISO Executive SummitThe speakers touched on SECTOR 2024's CISO Executive Summit, inviting senior leaders to join the conversation. Oakley highlighted the summit's role in providing a platform for addressing AI challenges and regulations. Martin and Ciappelli emphasized the value of attending such events for exchanging knowledge and ideas in a secure, collaborative environment.Conclusion: A Call to Be PreparedAs the episode wrapped up, Sean Martin extended an invitation to all interested in preventing an AI apocalypse to join the broader discussions at SECTOR 2024. Helen Oakley and Larry Pesce left listeners with a pressing reminder of the importance of understanding AI's potential impact.____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190SBe sure to share and subscribe!____________________________ResourcesLearn more about SecTor Cybersecurity Conference Toronto 2024: https://www.blackhat.com/sector/2024/index.html____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell your Brand Story as part of our event coverage?Learn More 👉 https://itspm.ag/evtcovbrfTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 10, 202422 min

Ep 2194SecTor 2024 Announces Summit Schedule | 2 Minutes on ITSPmagazine

SecTor, Canada’s largest cybersecurity conference, today announced the release of its full schedule of Summits for SecTor 2024. The live, in-person event will take place from October 22 to October 24 at the Metro Toronto Convention Centre in downtown Toronto. Summits will take place on Tuesday, October 22 and include:SecTor Executive Summit – This Summit will offer CISOs and other cybersecurity executives an opportunity to hear from industry experts helping to shape the next generation of information security strategy. Sponsors include: Armis, Sysdig, Cyera, and Trend Micro. To apply, please visit blackhat.com/sector/2024/executive-summit.html.Inaugural AI Summit at SecTor – This Summit will take place as part of The AI Summit Series, a global conference and expo series focusing on practical applications of AI technologies. This Summit will underscore the importance of artificial intelligence (AI) as an organization’s newest and greatest weapon within the ever-evolving cybersecurity landscape. Passes can be purchased here: blackhat.com/sector/2024/ai-summit.html.Cloud Security Summit at SecTor – This Summit is Canada’s leading cloud security event featuring keynote speakers, panel discussions, and networking opportunities, and provides an invaluable opportunity for every security professional to engage with leaders and discuss the future of cloud security. Sponsors include: CrowdStrike, Cyera, Kyndryl, Okta, OpenText, StrongDM, Sysdig, and Lookout. Passes can be purchased here: blackhat.com/sector/2024/cloud-summit.html.Note: This story contains promotional content. Learn more.ResourcesLearn more and catch more stories from SecTor Cybersecurity Conference Toronto 2024: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 10, 20242 min

Ep 2193Strategies for Effective Cybersecurity Governance and Protection to Better Balance Innovation and Regulation in Cybersecurity | CISO Circuit Series with Mandy Huth and Whitney Merrill | Michael Piacente and Sean Martin | Redefining CyberSecurity Podcast

About the CISO Circuit SeriesSean Martin and Michael Piacente will join forces roughly once per month to discuss everything from looking for a new job, entering the field, finding the right work/life balance, examining the risks and rewards in the role, building and supporting your team, the value of the community, relevant newsworthy items, and so much more. Join us to help us understand the role of the CISO so that we can collectively find a path to Redefining CyberSecurity. If you have a topic idea or a comment on an episode, feel free to contact Sean Martin.____________________________Guests: Michael Piacente, Managing Partner and Cofounder of Hitch PartnersOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/michael-piacenteMandy Huth, Global CISO - VP of Cybersecurity, Kohler Co.On LinkedIn | https://www.linkedin.com/in/mandyhuth/Whitney Merrill, Head of Global Privacy & Data Protection Officer, Asana [@asana]On LinkedIn | https://www.linkedin.com/in/whitney-merrill-5ab05012/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martin____________________________This Episode’s SponsorsImperva | https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Episode NotesIn this episode of the CISO Circuit series on the Redefining CyberSecurity podcast, co-hosts Sean Martin and Michael Piacente lead an engaging discussion about the current state of cybersecurity leadership, liability, and protection. Their conversation features insights from two distinguished guests: Mandy Huth, an enterprise security leader with over 20 years of experience, and Whitney Merrill, a privacy attorney with a strong background in computer science and legal frameworks around consumer protection.The discussion opens with an exploration of individual liability for cybersecurity leaders and broader business leadership within organizations. Whitney Merrill argues that regulators like the FTC and SEC are increasingly holding individuals accountable for security and privacy lapses. The conversation highlights notable cases where executives have faced scrutiny, emphasizing the growing expectation for tangible processes and proper security postures within organizations.Mandy Huth underscores the importance of shared responsibility and accountability within a business, noting that security decisions are not made in isolation. She advocates for a collaborative approach where security leaders outline risks comprehensively to allow for informed decision-making across the executive team. Huth also expresses concern over the proliferation of CYA (Cover Your Ass) practices that prioritize documentation over meaningful risk mitigation, warning that this can dilute the effectiveness of security programs.Another central theme in the episode centers on the need for standardized frameworks and a common language to articulate risk across an organization. Both guests highlight the need for clear, consistent communication of risks to build a unified understanding among all stakeholders, from the board to individual teams. Piacente and Merrill emphasize that while existing frameworks like NIST and ISO provide a foundation, there is an ongoing need to adapt these frameworks to align with industry-specific contexts and evolving regulatory expectations.A significant takeaway from the conversation is the role of systemic risk and the potential outsized impact of seemingly minor vulnerabilities. Huth and Merrill caution against underestimating these risks and advocate for continuous improvement and adaptation of security measures. They suggest that prioritizing business-friendly security practices can help foster greater adoption and collaboration across the enterprise.The episode concludes with reflections on the future landscape of cybersecurity regulation and practice. Whitney Merrill envisions a shift towards democratizing security, making it more accessible and achievable for small businesses through standardized, affordable solutions. Meanwhile, Huth calls for a balance between regulatory clarity and flexibility to ensure innovative small businesses can thrive without being stifled by onerous security requirements.Overall, the conversation provides valuable insights into the complexities of cybersecurity management, emphasizing the importance of collaboration, clear communication, and adaptability in navigating modern security challenges. These discussions are essential for any business leader or security professional looking to enhance their organization's resilience against cyber threats.____________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9

Oct 10, 202447 min

Ep 2192China's Space Program | Stories From Space Podcast With Matthew S Williams

Host | Matthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode NotesSince the turn of the century, China has emerged as a major power in space. In the future, the country plans to establish a base on the Moon, send taikonauts to Mars, and become a direct rival to NASA. Like all space programs, its inception was tied to the Cold War and the development of nuclear weapons. However, it has since evolved to become a major player in space exploration and research.______________________ResourcesChina: A Global Power’s Celestial Ambitions - Asia Pacific Foundation of Canada: https://www.asiapacific.ca/publication/china-global-powers-celestial-ambitions______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 9, 202428 min

Ep 2191A Sneak Peek into SecTor 2024: AI, Open-Source, and Cybersecurity Trends | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Steve Wylie | On Location Coverage with Sean Martin and Marco Ciappelli

Guest: Steve Wylie, Vice President, Cybersecurity PortfolioOn LinkedIn | https://www.linkedin.com/in/swylie650/On Twitter | https://twitter.com/swylie650____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe Black Hat SecTor Conference, scheduled for October 22-24, 2024, in Toronto, promises an array of discussions and insights into the cybersecurity domain. Steve Wylie, General Manager of Black Hat, joins ITSP Magazine's Sean Martin and Marco Ciappelli to preview the upcoming event. Wylie highlights the acquisition of SecTor by Black Hat in 2019, underscoring its unique focus on the Canadian cybersecurity community while maintaining global research standards.This year's event features three main components: summits, briefings, and a business hall. The summits, including a new AI summit, address various specialized topics, while the briefings provide in-depth research presentations. Keynote speakers like New York University’s Omkhar Arasaratnam, who will discuss security in open-source platforms, further enrich the event. Arasaratnam's focus on the XZ Utils backdoor incident emphasizes the critical nature of open-source security, highlighting both risks and mitigation strategies.The agenda also includes a diverse range of sessions on AI, reflecting its significant role in current cybersecurity practices. Talks range from AI vulnerabilities to the protection and utilization of AI in enterprise security. Sessions such as "15 Ways to Break Your Co-Pilot" and discussions on deepfake image detection systems present real-world challenges and solutions in this area.Wylie also discusses the importance of community engagement, noting the sector's provisions for networking and collaboration. The founders of the original event continue to contribute actively, ensuring the event remains closely tied to its original mission of serving Canada's cybersecurity professionals. Martin expresses enthusiasm for meeting regional participants and learning about their unique challenges and solutions, emphasizing the value of shared knowledge and strategies. The event is positioned as a vital convergence point for both local and international cybersecurity insights and advancements.In summary, SecTor 2024 aims to foster a robust exchange of ideas and solutions, drawing from a wide array of expertise within the cybersecurity field. Attendees can look forward to engaging with high-profile speakers, participating in focused discussions, and exploring the latest industry innovations.____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190SBe sure to share and subscribe!____________________________ResourcesLearn more about SecTor Cybersecurity Conference Toronto 2024: https://www.blackhat.com/sector/2024/index.html____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell your Brand Story as part of our event coverage?Learn More 👉 https://itspm.ag/evtcovbrfTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 9, 202423 min

Ep 2190Ransomware: To Pay or Not to Pay? with Ian Thornton Trump | Cybersecurity Insights Podcast with Matthew Rosenquist

Guest: Ian Thorton Trump, CISO at Cyjax Limited and the CTO at Octopi Managed ServicesOn LinkedIn | https://www.linkedin.com/in/ian-thornton-trump-cd-77473a26/Host: Matthew RosenquistOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionWith the continuing rise of digital extortion, such as ransomware, the world has realized that typical security practices cannot keep pace and the impacts are threatening the critical infrastructure sector. That has significant ramifications to the security and safety of entire nations. The idea of criminalizing digital extortion payments, to choke the money going to cybercriminals and thereby deter them, is a contentious idea that has the community polarized. I welcome back Ian Thorton Trump, the CISO at Cyjax Limited and the CTO at Octopi Managed Services to constructively discuss a path forward to address the growing threat. ______________________Resources______________________For more podcast stories from Cybersecurity Insights with Matthew Rosenquist, visit: https://www.itspmagazine.com/cybersecurity-insights-with-matthew-rosenquistWatch this episode on YouTube: https://www.youtube.com/watch?v=levZ_e-8WwoITSPmagazine's YouTube Channel: 📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 8, 20241h 1m

Ep 2189Hara Marano: Unconventional Wisdom | After 40 Podcast with Dr. Deborah Heiser

Guest: Hara Estroff Marano, Editor-at-Large, Psychology TodayHost: Dr. Deborah HeiserOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/deborah-heiser-phd______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionHara Marano: I'm not trained as a psychologist. I'm a journalist and writer. Now, I've been in the business long enough to have acquired a lot of information, but not in an organized way. So I know tons about some things and a little less about other things. But one of the things is I've gained confidence, confidence about writing, confidence about researching information, confidence about understanding things and how to explain things in something of an interesting way - to write and edit.______________________ResourcesPsychology Today: https://www.psychologytoday.com/us/contributors/hara-estroff-maranoA Nation of Wimps: https://www.psychologytoday.com/us/articles/200411/nation-wimpsUnconventional Wisdom: https://www.psychologytoday.com/intl/articles/201703/unconventional-wisdom-diagnostic-dilemma______________________For more podcast stories from After 40 with Dr. Deborah Heiser, visit: https://www.itspmagazine.com/after-40-podcastWatch the The Right Side of 40 playlist on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllRiYCWyyhoLJqyUE0ERuMfdITSPmagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 7, 202421 min

Ep 2188Post-AGI Economics | Cyber Cognition Podcast with Hutch and Len Noe

Hosts: HutchOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/hutchLen Noe, Technical Evangelist / Whitehat Hacker at CyberArk [@CyberArk]On ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/len-noe______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionIf the tech industry does achieve its goal of building artificial general intelligence (AGI), how will that transform the global economic system?______________________ResourcesNew Articles Discussed:Hezbollah targeted in hardware supply-chain attack (exploding pagers)https://www.bbc.com/news/articles/cz04m913m49oOpenAI releases preview of first “reasoning model” o1https://openai.com/index/introducing-openai-o1-preview/Donald Trump rolls out his own Cryptocurrency Business (World Liberty Financial)https://www.usatoday.com/story/money/2024/09/16/trump-world-liberty-financial-crypto/75256100007/______________________For more podcast stories from Cyber Cognition Podcast with Hutch, visit: https://www.itspmagazine.com/cyber-cognition-podcastWatch the video podcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllS12r9wDntQNB-ykHQ1UC9U Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 4, 202443 min

Ep 2187HITRUST Collaborate 2024 Keynote—Industry Perspectives: Charting The Path Forward—Innovations in Security and Assurance | A Conversation with Dan Nutkis, Robert Booker, Omar Khawaja, Cliff Baker, and Andrew Hicks | On Location Coverage with Sean Martin

Guests:Dan Nutkis, Founder and Chief Executive Officer of HITRUSTOn LinkedIn | https://www.linkedin.com/in/daniel-nutkis-339b93b/Robert Booker, Chief Strategy Officer at HITRUSTOn LinkedIn | https://www.linkedin.com/in/robertbooker/Omar Khawaja, CISO, Client at DatabricksOn LinkedIn | https://www.linkedin.com/in/smallersecurity/Cliff Baker, CEO at CORL TechnologiesOn LinkedIn | https://www.linkedin.com/in/cliffbaker/Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & DeeterOn LinkedIn | https://www.linkedin.com/in/aehicks2000/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin____________________________Episode NotesThis episode of the On Location series takes place during HITRUST Collaborate 2024 brought together leading figures in cybersecurity to share their experiences and insights. Moderated by Sean Martin, host of the Redefining CyberSecurity Podcast, the panel included Dan Nutkis, Founder and Chief Executive Officer of HITRUST; Robert Booker, Chief Strategy Officer at HITRUST and former Chief Information Security Officer at UnitedHealth Group; Omar Khawaja, CISO, Client at Databricks and former Chief Information Security Officer at Highmark Health; Cliff Baker, CEO at CORL Technologies and Managing Partner at Meditology Services; and Andrew Hicks, Partner and National HITRUST Practice Lead at Frazier & Deeter.The session kicked off with Sean Martin highlighting the importance of collaboration and conversation within the cybersecurity community. Dan Nutkis reflected on the early beginnings of HITRUST in 2007 and discussed the initial goal of establishing a comprehensive and effective framework for security. Nutkis highlighted the organization's ongoing commitment to continuous improvement and adaptability in addressing security needs.Omar Khawaja emphasized the need for setting high-security bars and how HITRUST has been instrumental in providing robust frameworks that simplify complex compliance requirements. He shared how Highmark Health leveraged the HITRUST certification to streamline their third-party risk management, ensuring better outcomes with fewer resources. According to Khawaja, HITRUST’s efforts in adapting to market needs and developing new assurance levels like the i1 and e1 have been vital in meeting evolving security demands.Cliff Baker discussed the innovation driven by HITRUST in the compliance space. Baker stressed the importance of the HITRUST ecosystem, which is designed not only to meet today’s security challenges but to anticipate future needs. The assurance framework and transparency provided by HITRUST have proven essential in building and maintaining trust within the healthcare industry.Andrew Hicks praised the rigorous QA process that HITRUST employs, which ensures that certified organizations maintain high standards of security. He emphasized how this rigorous process not only helps organizations achieve certification but also transforms their overall approach to cybersecurity.Robert Booker spoke about the continuous curiosity and commitment required to stay ahead in cybersecurity. He highlighted how HITRUST’s data-driven approach and innovations in areas like AI and continuous monitoring are crucial in maintaining relevance and enhancing security outcomes.Throughout the discussion, the panelists collectively underscored the importance of a robust, adaptable, and comprehensive security framework. HITRUST's continuous innovation and commitment to addressing real-world security challenges position it as a leader in the industry. The collaborative efforts of HITRUST and its community not only improve organizational security but also strengthen the overall reliability of the healthcare system.As HITRUST continues to evolve and introduce new initiatives, it remains a pivotal player in setting high security and compliance standards. The insights shared during this episode of On Location provide a glimpse into the future of cybersecurity and the ongoing efforts to safeguard sensitive data in the healthcare sector.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our HITRUST Collaborate 2024 coverage: https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texasBe sure to share and subscribe!____________________________ResourcesLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/hitrusmxayLearn more about and hear more stories from HITRUST: https://www.itspmagazine.com/directory/hitrust____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more R

Oct 4, 202449 min

Ep 2186HITRUST Achieves Major Milestone with Availability of Solution Making it Practical to Manage Third-Party (Information Security) Risk | 2 Minutes on ITSPmagazine

HITRUST, leader in information security and third-party risk management (TPRM), has announced significant enhancements to its HITRUST Assessment XChange. This comprehensive solution addresses longstanding challenges in TPRM by integrating with leading TPRM platforms to streamline vendor risk management processes. These integrations solve the "last mile" challenge by enabling organizations to efficiently capture, consume, and analyze detailed assurance data.The HITRUST Assessment XChange operationalizes third-party risk management through end-to-end workflows that cover the entire vendor lifecycle—from initial evaluation to results analysis. This approach significantly improves information security risk capabilities, reducing time, costs, and complexity. It also allows organizations to manage risk with updated threat-adaptive controls, broad assessment options, and real-time updates on risk mitigation.Legacy approaches to TPRM have proven inefficient, with many organizations relying on outdated methods like spreadsheets or self-assessment questionnaires. In contrast, HITRUST’s solution offers a practical, effective, and comprehensive approach, making TPRM more manageable and secure across industries.HITRUST’s first planned integration with ServiceNow’s TPRM solution is set for release by the end of 2024, allowing users to leverage HITRUST's capabilities within the ServiceNow platform. This integration marks a new era in operationalizing information security TPRM, providing organizations with unprecedented visibility into vendor risk.Learn more about and stay up to date by visiting hitrustalliance.net/news.Note: This story contains promotional content. Learn more.ResourcesLearn more and catch more stories from HITRUST: https://www.itspmagazine.com/directory/hitrustLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 3, 20242 min

Ep 2185Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals | Part 3 of 3 | A Conversation with Kush Sharma | Redefining CyberSecurity with Sean Martin

Guest: Kush Sharma, Director Municipal Modernization & Partnerships, Municipal Information Systems Association, Ontario (MISA Ontario)On LinkedIn | https://www.linkedin.com/in/kush-sharma-9bb875a/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martin___________________________Episode NotesIn the third and final installment of the series titled "Building a CISO Office: Mastering Enterprise Risk Management and Aligning Cybersecurity with Business Goals," Sean Martin continues his compelling conversation with Kush Sharma. This episode focuses on the critical aspects of team dynamics, project management, and stakeholder engagement in the realm of cybersecurity.Kush Sharma elaborates on the importance of establishing a well-structured and communicated vision for security operations within an organization. He emphasizes the necessity of setting expectations with security teams before any major project initiation. According to Sharma, transparency is vital. Security leaders must candidly discuss with their teams that not every decision will tip in their favor, but their role is to advocate for security while being adaptable to business needs. He stresses the importance of documenting and following up on risk mitigation measures even if they aren't implemented immediately.Sharma also sheds light on the concept of integrating business and security functions more seamlessly. He proposes not just embedding security into business but also bringing business personnel into the security fold. By having business unit members work within security teams temporarily, organizations can build a robust line of communication and mutual understanding. This cross-functional approach creates internal champions for security measures and helps significantly cut costs as internal personnel generally have lower operational costs compared to external consultants.A significant portion of the episode revolves around the nuanced engagement with different stakeholders, particularly at the executive level. Sharma advises CISOs to view themselves as peers to other C-suite executives, prepared to defend their positions and decisions vigorously. It's crucial for CISOs to maintain this executive-level mindset and openly communicate the broader business implications of security decisions. Sharma highlights that making a business case for security and showing tangible returns on investment can secure better funding and support from the executive team, leading to more substantial investments in long-term security measures.Sean Martin wraps up the episode by touching on the importance of storytelling in cybersecurity. By translating technical achievements and risk mitigation efforts into relatable stories, CISOs can effectively communicate the value of their work across the organization. These narratives help ensure security remains a priority in business strategies and operations, fostering an environment where security considerations are integral to planning and executing new initiatives.In conclusion, the episode provides essential insights for current and aspiring CISOs on navigating the complexities of internal communications, leadership, and strategic planning in cybersecurity. Both Kush Sharma and Sean Martin offer practical advice and strategies that can help elevate the role of security within any organization, thereby protecting its infrastructure and supporting its growth objectives.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe!___________________________Resources___________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring this show with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplc Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 2, 202427 min

Ep 2184Exploring the Future of Automotive Technology | An AutoSens and InCabin Europe 2024 Conversation with Sara Sargent and Rob Stead | On Location Coverage with Sean Martin and Marco Ciappelli

Guests: Sara Sargent, AutoSens Automotive Technology SpecialistOn LinkedIn | https://www.linkedin.com/in/sarasargent17/Rob Stead, Managing Director and Founder, Sense Media GroupOn LinkedIn | https://www.linkedin.com/in/robertjstead/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society and Technology PodcastOn ITSPmagazine | https://www.itspmagazine.com/marco-ciappelli____________________________Episode NotesThe episode kicks off with a playful exchange between Sean and Marco, setting the tone for an engaging discussion about the future of automotive tech. Marco points out the rapid advancements in the industry, comparing it to the evolution from the Flintstones' manually-powered car to today's sophisticated autonomous vehicles. Sean highlights the significance of these advancements and the pivotal role conferences like AutoSens and InCabin play in shaping the industry's future.A Brief History of AutoSens and InCabinRob Stead, the managing director and founder of SenseMedia, provides a historical overview of the AutoSens conference. Established in 2015, AutoSens was born out of a need to bring together experts from various sectors of the automotive industry to foster collaboration and innovation. The event has grown exponentially, and in 2016, the first AutoSens conference was held. Today, AutoSens and its sister event, InCabin, attract a diverse audience, including engineers, regulators, and manufacturers.Key Themes and DiscussionsThe conversation dives into the core themes of the upcoming conferences. Sara Sargent, an Automotive Technology Specialist at SenseMedia, explains her dual role in ensuring technical integrity and leading the InCabin event. She emphasizes the importance of addressing current safety concerns, such as child presence detection and airbag deployment accuracy. These technologies not only enhance safety but also pave the way for future innovations in autonomous driving.The Complexity of Autonomous VehiclesRob elaborates on the challenges faced by the industry, emphasizing the difficulty of achieving full autonomy (L4) in consumer vehicles. He notes that while L4 technology is feasible, it is costly and likely to be limited to fleet operators rather than individual consumers. The transition to higher levels of automation will be gradual, with most vehicles remaining at Level 2 (L2) for the foreseeable future.The Importance of Redundancy and CollaborationSean questions the need for various sensor modalities in vehicles, to which Rob responds by explaining the concept of redundancy. Multiple sensors, including cameras, radar, and LiDAR, work together to create a comprehensive and reliable system. This redundancy is crucial for ensuring safety and reliability in autonomous driving systems. Additionally, the conversation touches upon the importance of vehicle-to-infrastructure (V2X) technology and its potential to enhance transportation systems.InCabin: Advancing Interior SensingThe discussion shifts to the interior sensing technologies covered in the InCabin conference. Sara highlights the significance of these technologies in ensuring passenger safety and comfort. From detecting medical emergencies to preventing drunk driving, interior sensors can play a critical role in enhancing the overall driving experience. However, Sara acknowledges the privacy concerns that come with increased interior monitoring.Looking Forward to the ConferencesRob and Sara both express their excitement for the upcoming conferences in Barcelona. They provide a sneak peek into some of the keynotes and technical sessions, emphasizing the collaborative nature of the events. Notably, the conferences will feature discussions on HMI design, simulation validation, and insights from the Chinese automotive market.ConclusionAs the episode wraps up, Sean and Marco reflect on the importance of conferences like AutoSens and InCabin in driving innovation and ensuring the safety and reliability of future automotive technologies. They encourage listeners to attend the events and stay tuned for more insightful discussions on the evolving landscape of automotive technology.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllQtJTmj9bp2RMzfkXLnN4--Be sure to share and subscribe!____________________________ResourcesLearn more about AutoSens Europe 2024: https://auto-sens.com/europe/Learn more about InCabin Europe 2024: https://incabin.com/europe/____________________

Oct 2, 202438 min

Ep 2183HITRUST Announces Continuous Assurance through the Proven HITRUST Ecosystem | 2 Minutes on ITSPmagazine

HITRUST has announced the launch of HITRUST Continuous Assurance, a new strategic evolution aimed at enhancing security sustainability and outcomes through continuous control monitoring. This initiative builds upon the proven HITRUST ecosystem, providing organizations with an efficient way to manage security and compliance risks in the face of evolving cyber threats. Traditional approaches that prioritize compliance over security are increasingly inadequate, especially in the era of generative AI and sophisticated cyber-attacks.Continuous Assurance minimizes the risk of evidence decay by enabling organizations to monitor security controls continuously, ensuring that security requirements remain relevant and reliable. Key features of this initiative include automated evidence collection, a continuous monitoring taxonomy integrated with the HITRUST CSF, and enhanced workflows in HITRUST’s MyCSF platform. The system also supports integration with Governance, Risk, and Compliance (GRC) systems, ensuring streamlined risk management.HITRUST's Continuous Assurance will leverage its extensive certification framework, which has shown significant success. Notably, the 2024 HITRUST Trust Report highlighted that 99.4% of HITRUST-certified organizations did not report a breach over the past two years. Continuous Assurance offers new capabilities that further solidify HITRUST’s role as a leader in information security risk management.Learn more about and stay up to date by visiting hitrustalliance.net/news.Note: This story contains promotional content. Learn more.ResourcesRead the Press Release: https://hitrustalliance.net/press-releases/hitrust-announces-continuous-assurance-through-the-proven-hitrust-ecosystemLearn more and catch more stories from HITRUST: https://www.itspmagazine.com/directory/hitrustLearn more about 2 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programs Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 2, 20242 min

Ep 2182Small Teams, Big Threats: Navigating Cybersecurity on a Budget | A Conversation with Lisa Plaggemier | The Soulful CXO Podcast with Dr. Rebecca Wynn

Guest: Lisa Plaggemier, Executive Director, National Cybersecurity AllianceOn LinkedIn | https://www.linkedin.com/in/lisaplaggemierOn Twitter | https://twitter.com/lisaplaggemierHost: Dr. Rebecca WynnOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn________________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network________________________________Episode DescriptionIn this episode of the Soulful CXO, host Dr. Rebecca Wynn welcomes Lisa Plaggemier, the National Cybersecurity Alliance's Executive Director and an advisor on the U.S. Secret Service Cyber Investigations Advisory Board. Lisa shares, free resources and support for businesses and individuals from the National Cybersecurity Alliance which empowers individuals and organizations to harness the benefits of technology worry-free.________________________________ResourcesNational Cybersecurity Alliance Free Events and Programs: https://staysafeonline.org/events-programs/CyberSecure My Business Program: https://staysafeonline.org/programs/cybersecure-my-business/Cybersecurity Awareness Month Resources: https://staysafeonline.org/programs/cybersecurity-awareness-month/Data Privacy Week Resources: https://staysafeonline.org/programs/data-privacy-week/________________________________Support:Buy Me a Coffee: https://www.buymeacoffee.com/soulfulcxo________________________________For more podcast stories from The Soulful CXO Podcast With Rebecca Wynn: https://www.itspmagazine.com/the-soulful-cxo-podcastITSPMagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 1, 202412 min

Ep 2181Guardians of Academia: Battling Cyber Threats in Higher Education with Donna Kidwell | Cybersecurity Insights Podcast with Matthew Rosenquist

Guest: Donna Kidwell, CISO of Arizona State UniversityOn LinkedIn | https://www.linkedin.com/in/dkidwellHost: Matthew RosenquistOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionToday, we talked about the incredible challenges and forward-thinking that her team is driving at ASU and across partnerships around the globe. Afghan women and their ARISTA internships - so incredibly proud of them - their story is here!______________________ResourcesNew upskilling program offers women in tech future-ready skills to succeed: https://tech.asu.edu/features/arista-upksilling-cohort-2023______________________For more podcast stories from Cybersecurity Insights with Matthew Rosenquist, visit: https://www.itspmagazine.com/cybersecurity-insights-with-matthew-rosenquistWatch this episode on YouTube: https://www.youtube.com/watch?v=k1Olwlqc0CYITSPmagazine's YouTube Channel: 📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Oct 1, 202458 min

Ep 2180Book | Reimagining Education with Transcend: Insights from Extraordinary Learning for All | A Conversation with Author Jenee Henry Wood | Redefining Society Podcast With Marco Ciappelli

Guest: Jenee Henry Wood, Chief Learning Officer, Transcend [@TranscendBuilds]On LinkedIn | https://www.linkedin.com/in/jenee-henry-wood-12ba9871/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsBlackCloak 👉 https://itspm.ag/itspbcwebBugcrowd 👉 https://itspm.ag/itspbgcweb_____________________________Episode IntroductionIn the latest episode of the Redefining Society Podcast, host Marco Ciappelli welcomes Jenee Henry Wood to explore the transformative ideas in her new book, Extraordinary Learning for All. As the Chief Learning Officer at Transcend, Jenee leads a forward-thinking organization dedicated to reimagining the educational system. Together, they discuss the challenges and opportunities that lie ahead for the future of education.A Brief Note on the EpisodeThe episode opens with a friendly exchange, setting the stage for an in-depth discussion on educational reform. Marco and Jenee share a passion for breaking away from outdated educational models and exploring more community-driven, adaptive approaches.Breaking Down the Industrial Era ModelJenee introduces the concept of “industrial era learning,” the traditional model that groups students by age and follows a standardized curriculum. This approach, which has dominated education for over a century, no longer meets the diverse needs of today’s society. At Transcend, Jenee and her team are working to dismantle this one-size-fits-all system, emphasizing the need for more personalized, inclusive learning models.Challenges and the Need for ChangeMarco and Jenee discuss how the current system often stifles creativity and critical thinking. The COVID-19 pandemic exposed these limitations, highlighting the urgency for reform. Jenee explains how Transcend is leading efforts to address these shortcomings, helping schools and communities develop education systems that are more flexible and responsive to individual student needs.Envisioning a New ModelIn Extraordinary Learning for All, Jenee offers a blueprint for reshaping education, with a focus on holistic development rather than standardized testing. She introduces the concept of “community-based design journeys,” which empowers local communities to collaborate with Transcend in redesigning their educational frameworks. This model prioritizes creativity, purpose, and adaptability, preparing students for the uncertainties of the modern world.The Importance of Self-Directed LearningMarco reflects on his own experiences with education, emphasizing how self-directed learning fosters independence and lifelong curiosity. Jenee agrees, pointing out that Transcend’s mission is to cultivate environments where students are encouraged to pursue their passions and take ownership of their learning journeys.The Role of TechnologyWhile technology is a key tool in educational transformation, both Marco and Jenee emphasize that it’s not a silver bullet. Digital platforms and tools can enhance learning, but as Transcend advocates, they must be integrated thoughtfully into a broader strategy of reform. The real power of technology lies in its ability to support more personalized and adaptive learning experiences.Looking AheadAs they conclude their conversation, Marco and Jenee agree that the journey toward educational reform is just beginning. Extraordinary Learning for All is not only a book, but also a call to action for educators, policymakers, and communities to rethink how we approach education. Through the work of Transcend, the future of learning looks promising—one that is inclusive, adaptive, and student-centered.Get InvolvedFor those eager to learn more, Extraordinary Learning for All is available for pre-order on Amazon. The book serves as a guide to the innovative strategies that can reshape education. Stay tuned for part two of this enlightening conversation, where Marco and Jenee will dive deeper into the transformative work that Transcend is doing to redefine education.A Call to ActionDon’t forget to subscribe to the Redefining Society Podcast for more thought-provoking discussions on how technology and societal changes are shaping the world. Be sure to pre-order Extraordinary Learning for All and join Transcend in the movement to create a brighter future for education.About the BookAre you ready to break free from the constraints of an education system that isn’t working for all of our children and embrace a future where every student thrives? You’re not alone. Innovation and change has never been more possible in schools than now, today.Discover the secrets to creating extraordinary learning environments in our new book:Inspiring stories: Learn from real-world examples of schools that have successfully implemented innovative teaching methods.Proven strategies

Sep 30, 202419 min

Ep 2179Hacking Deepfake Image Detection System with White and Black Box Attacks | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Sagar Bhure | On Location Coverage with Sean Martin and Marco Ciappelli

Guest: Sagar Bhure, Senior Security Researcher, F5 [@F5]On LinkedIn | https://www.linkedin.com/in/sagarbhure/At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#sagar-bhure-45119____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesThe authenticity of audio and visual media has become an increasingly significant concern. This episode explores this critical issue, featuring insights from Sean Martin, Marco Ciappelli, and guest Sagar Bhure, a security researcher from F5 Networks.Sean Martin and Marco Ciappelli engage with Bhure to discuss the challenges and potential solutions related to deepfake technology. Bhure reveals intricate details about the creation and detection of deepfake images and videos. He emphasizes the constant battle between creators of deepfakes and those developing detection tools.The conversation highlights several alarming instances where deepfakes have been used maliciously. Bhure recounts the case in 2020 where a 17-year-old student successfully fooled Twitter’s verification system with an AI-generated image of a non-existent political candidate. Another incident involved a Hong Kong firm losing $20 million due to a deepfake video impersonating the CFO during a Zoom call. These examples underline the serious implications of deepfake technology for misinformation and financial fraud.One core discussion point centers on the challenge of distinguishing between real and artificial content. Bhure explains that the advancement in AI and hardware capabilities makes it increasingly difficult for the naked eye to differentiate between genuine and fake images. Despite this, he mentions that algorithms focusing on minute details such as skin textures, mouth movements, and audio sync can still identify deepfakes with varying degrees of success.Marco Ciappelli raises the pertinent issue of how effective detection mechanisms can be integrated into social media platforms like Twitter, Facebook, and Instagram. Bhure suggests a 'secure by design' approach, advocating for pre-upload verification of media content. He suggests that generative AI should be regulated to prevent misuse while recognizing that artificially generated content also has beneficial applications.The discussion shifts towards audio deepfakes, highlighting the complexity of their detection. According to Bhure, combining visual and audio detection can improve accuracy. He describes a potential method for audio verification, which involves profiling an individual’s voice over an extended period to identify any anomalies in future interactions.Businesses are not immune to the threat of deepfakes. Bhure notes that corporate sectors, especially media outlets, financial institutions, and any industry relying on digital communication, must stay vigilant. He warns that deepfake technology can be weaponized to bypass security measures, perpetuate misinformation, and carry out sophisticated phishing attacks.As technology forges ahead, Bhure calls for continuous improvement in detection techniques and the development of robust systems to mitigate risks associated with deepfakes. He points to his upcoming session at Sector in Toronto, where he will delve deeper into 'Hacking Deepfake Image Detection Systems with White and Black Box Attacks,' offering more comprehensive insights into combating this pressing issue.____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190SBe sure to share and subscribe!____________________________ResourcesHacking Deepfake Image Detection System with White and Black Box Attacks: https://www.blackhat.com/sector/2024/briefings/schedule/#hacking-deepfake-image-detection-system-with-white-and-black-box-attacks-40909Learn more about SecTor Cybersecurity Conference Toronto 2024: https://www.blackhat.com/sector/2024/index.html____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell your Brand Story as part of our event coverage?Learn More 👉 https://itspm.ag/evtcovbrfTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://ww

Sep 30, 202422 min

Ep 2178The Tribe of Wandering Shoes A Story Under the Stars in Four Parts. Just like the seasons! The Summer Adventure (Read In English) | Stories Sotto Le Stelle Podcast | Short Stories For Children And The Young At Heart

The Tribe of Wandering ShoesA Story Under the Stars in Four Parts. Just like the seasons!The Summer AdventureIn a large clothing store downtown, among other items for sale, there were some rather peculiar sports shoes. In addition to being very comfortable, cheerful, and available in various colors, they would occasionally swap laces and positions for fun. And, believe it or not, they talked to each other.Lately, during the closing hour from 1:45 to 2:45, they would plot how one day they could fulfill their dream: they wanted to wander the world aimlessly, thus becoming the Tribe of Wandering Shoes.Hidden behind thick curtains were the fitting rooms, where, invisible to the store staff and customers, lived a lively little witch. Her name was Soletta the Witch, and she had a glowing magic wand from which she cast spells whenever she pleased.By day she spied, and by night she schemed, wandering around the store as if it were her own; it was no surprise she knew about the plot of the sports shoes.When they decided to take action, Soletta the Witch cast a spell, first tripling their number and with a flick of her wand and a puff of air, sent them sliding down the escalator. Suddenly, they found themselves free outside.Now, free and multiplied, the Tribe of Wandering Shoes was ready for adventure.It was summer, the days were so hot and sunny that they decided to go to the beach. This would be their first stop. After packing for the journey, they set off.Step by step, they reached the seaside just at sunset: an incredible light reflected on the waves, turning them silver, and upon arriving at the beach, they swayed like leaves in the wind. The cool sand was pleasant to step on, but the grains that got into their shoes as they walked caused a lot of itching. They started jumping, dancing, and having fun, waking up all the umbrellas which reopened along with the drowsy deckchairs. At that point, everyone was laughing and dancing with the shoes; joy, as we know, is contagious.After a wonderful evening together, they went to their hotel, and after a refreshing sleep, they got up early. The sun was still low on the horizon, and all agreed it would be nice to take a walk in the pine forest. After a hearty breakfast, they set off in single file: one, two, three, one, two, three, forward march.They walked in the shade along a tree-lined avenue. Seeing them, people were curious and said: “What beautiful colorful shoes” and they, happy and indifferent, continued: one, two, three, one, two, three, forward march.Reaching the pine forest, they sat under a huge tree. Everything was pleasant and relaxing until a bright flash, a sudden bolt from the blue, grazed them. They closed their eyes in fright, and when they opened them, they saw a vast field of mushrooms in front of them.Were they magical mushrooms? How could they have appeared so suddenly? And what about the pine forest? Was it perhaps a fantastic and enchanted place?Seeing the bewilderment of the Wandering Shoes, some mushrooms began to speak in unison: “We are part of a magic spell. This is the Pine Forest of Wonders. We communicate with fantastic creatures and, together with them, protect the animals and plants living in this habitat.”“We are very curious about this,” said the surprised Wandering Shoes, “what else do you do?”The mushrooms responded again in chorus: “At night we illuminate the undergrowth with iridescent lights, our stems grow, and our caps change color.”And they continued: “We traverse secret paths, where magical plants grow that emit an enveloping and intoxicating fragrance. We enter caves where elves, squirrels, owls, bunnies, and many others live. We have the power to communicate with them.”“But if you are wondering why we appeared to you, it is because, unexpectedly, something fantastic has happened. The bright flash that grazed you has given you a superpower that now allows you to know the magical secrets of the pine forest.”The mushrooms invited the entire Tribe of Wandering Shoes, astonished and speechless, to stay in the pine forest and wait for the night. Mystery hung in the air until dusk when the forest magically transformed into an enchanted fairy tale.And as the mushrooms had said, the shoes with their newfound superpower became part of it. They quietly explored the secret paths, entered the caves following the mushrooms, and met the elves and all the other inhabitants of the pine forest — magical and non-magical.At one point, all the shoes found themselves asleep under the big tree. Awakening before dawn as if from an incredible and fantastic dream, the pine forest returned to their eyes as it was the day before. They lay for a while, reflecting on the mystery of the magical mushrooms.Drawn to the fantastic life of the nighttime pine forest, they returned once, twice, three times, and more. They learned the secret language used by the animals, mushrooms, and elves to communicate with each other, and thus the Wandering Shoes became part

Sep 30, 20248 min

Ep 2177Where is Everybody? The SETI Paradox | Stories From Space Podcast With Matthew S Williams

Host | Matthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode NotesWhat if the reason we're not hearing from aliens is that everyone out there is listening, but no one is broadcasting messages? This is the essence of the "SETI Paradox" and the ongoing debate between proponents of SETI and METI - Messaging Extraterrestrial Intelligence______________________ResourcesBeyond Fermi's Paradox: What is the "SETI Paradox" Hypothesis?: https://www.universetoday.com/149513/beyond-fermis-paradox-xvii-what-is-the-seti-paradox-hypothesis/______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 28, 202421 min

Ep 2176Mastering Storytelling: Author and Screenwriter Dawn Greenfield Ireland’s Literary Journey | Audio Signals Podcast With Marco Ciappelli

Guest: Dawn Greenfield Ireland, Author and StorytellerWebsite | https://degreenfield.comOn LinkedIn | https://www.linkedin.com/in/degreenfield/On Facebook | https://facebook.com/dawn.ireland.18_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network_____________________________Episode IntroductionHello, everyone! Marco Ciappelli here, and welcome to another episode of ITSPmagazine. Today, I had the pleasure of speaking with the incredibly talented author and storyteller, Dawn Greenfield Ireland. Dawn has an impressive catalog of written works, spanning from science fiction and dystopian novels to cozy mysteries and award-winning screenplays. Let’s dive into her fascinating journey and gather insightful tips for aspiring writers.The Genesis of a WriterOur conversation kicked off with Dawn sharing the origins of her writing career. Dawn’s literary journey began in an unusual way—through technical writing. In the 1970s, while working as an executive secretary in an oil and gas company’s documentation department, a surprising opportunity arose. Dawn was asked to review some documents, which led her to discover a new talent she hadn’t previously known she possessed.This realization was a game-changer, and she transitioned into technical writing. Later, Dawn moved on to work at Compaq Computer, where she gained invaluable insights into the publishing industry as a whole.Transitioning from Technical Writing to FictionOne intriguing aspect of Dawn’s career is her transition from technical writing to fiction. I asked her about this shift and whether she had always harbored a desire to write fiction. Dawn revealed that her first foray into fiction happened during a long commute to work, where daydreams turned into notes jotted down on a yellow legal pad. These notes eventually materialized into her first science fiction novel, Second Chance (later renamed Prophecy of Thal).However, the journey was anything but smooth. Dawn’s first draft took years to complete and underwent numerous revisions before it was finally published—33 years later.The Importance of Editing and Critique GroupsDawn’s story underscores the significance of continuous learning and refinement in the writing process. She shared how joining a critique group was instrumental in improving her writing skills. The group provided constructive feedback that helped her transform raw ideas into well-crafted stories.For aspiring writers, Dawn emphasizes the importance of finding a critique group or, at the very least, a good editor or proofreader to help polish one’s work.Adapting Books into ScreenplaysAs an author who has also delved into screenwriting, Dawn explained the distinctions between writing novels and screenplays. While novels allow for expansive descriptions and detailed storytelling, screenplays demand brevity and focus. Adapting a 400-page novel into a 95-page screenplay requires careful condensation, often leaving out important elements.Despite the challenges, Dawn enjoys both forms of writing, finding fulfillment in the unique constraints and creative opportunities each offers.The Role of Reading in WritingWe also discussed the pivotal role of reading in one’s development as a writer. Dawn reads two to six books per week, attributing much of her writing prowess to this habit. Reading widely exposes writers to various styles, techniques, and vocabulary, all of which contribute to honing their craft.She encourages budding writers to read extensively and use modern technology, like eBooks, to easily look up unfamiliar words and concepts.Practical Advice for Aspiring WritersTo wrap up our conversation, I asked Dawn to offer some practical advice for new writers. Here are her key suggestions:• Start with an Outline: Jot down your ideas and gradually expand them into a structured outline.• Join or Form a Critique Group: Feedback from peers can be invaluable in improving your work.• Stay Organized: Use tools and strategies to keep your writing process efficient and avoid working with outdated drafts.Final ThoughtsDawn Greenfield Ireland’s journey from technical writer to multi-genre author and screenwriter is a testament to the importance of perseverance, continuous learning, and embracing new challenges. Whether you’re just starting out or looking to transition into a new genre, implementing her advice can undoubtedly help you become a better writer.Thank you for joining us on this episode of ITSPmagazine. Don’t forget to check out Dawn’s extensive library of work and consider reaching out to her for further insights. Until next time, keep writing, and keep telling those stories t

Sep 28, 202434 min

Ep 2175HITRUST Announces Industry-Leading AI Security Certification | 7 Minutes on ITSPmagazine | A HITRUST Short Brand Innovation Story with Jeremy Huval

HITRUST will launch its AI Security Certification in December 2024, addressing the unique security risks of artificial intelligence systems. As AI reshapes the cybersecurity landscape, existing control frameworks, including HITRUST CSF, do not fully address new and evolving threats. The certification offers prescriptive controls to help secure AI deployments effectively.Targeted at AI platform and product providers, this certification is an optional extension to HITRUST CSF validated assessments. It addresses AI-specific threats alongside traditional cybersecurity risks, focusing on security practices for AI/ML deployments, including generative AI.The certification integrates with third-party risk management (TPRM) platforms, enabling more efficient workflows for managing AI solution security. This helps organizations manage AI risk, adopt AI solutions with confidence, and reduce complexity, time, and costs.Designed to enhance third-party AI risk management, the certification allows organizations to identify shared security responsibilities between AI providers and users. It ensures greater trust and security across AI deployments, helping businesses stay ahead of emerging AI threats.The draft certification specification is open for public comment until October 17, 2024.To learn more and to provide feedback visit: https://www.manula.com/manuals/hitrust/ai-security-certification-requirements-draft/1/en/topic/aboutLearn more about HITRUST: https://itspm.ag/itsphitwebNote: This story contains promotional content. Learn more.Guest: Jeremy Huval, Chief Innovation Officer, HITRUST [@HITRUST]On LinkedIn | https://www.linkedin.com/in/jeremyhuval/ResourcesLearn more and catch more stories from HITRUST: https://www.itspmagazine.com/directory/hitrustLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 28, 20247 min

Ep 2174Hackers vs. Heroes: Cybersecurity Crisis Response Leadership Best Practices and Worst Fails with Lisa Forte | Cybersecurity Insights Podcast with Matthew Rosenquist

Guest: Lisa Forte, Partner at Red Goat Security, Cybersecurity Crisis TrainerOn LinkedIn | https://www.linkedin.com/in/lisa-forte/Host: Matthew RosenquistOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionI speak with Lisa Forte, a legend when it comes to helping organizations prepare for handling cybersecurity crisis events, who shares her rich insights and recommendations.______________________Resources______________________For more podcast stories from Cybersecurity Insights with Matthew Rosenquist, visit: https://www.itspmagazine.com/cybersecurity-insights-with-matthew-rosenquistWatch this episode on YouTube: https://www.youtube.com/watch?v=fBcflVIjNnMITSPmagazine's YouTube Channel: 📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 26, 20241h 1m

Ep 2173The Muscles We Build by Bridging | A conversation with Kate O'Neill | What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman

Guest: Kate O'Neill, Dean, College of Business, American University of Iraq-BaghdadOn LinkedIn | https://www.linkedin.com/in/k-kathleen-oneill-phd-strategicleadership/Hosts: Alejandro Juárez CrawfordOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawfordMiriam Plavin-MastermanOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman______________________Episode IntroductionKate, the Dean of the College of Business at American University in Iraq, Baghdad, draws from her extensive international experience to discuss:- The importance of being self-aware of cultural assumptions.- Strategies for bridging cultural differences, including explicitly stating intentions.- The concept of semantic non-equivalence in cross-cultural contexts.- How intentional communication can overcome cultural barriers.- The paradox of finding unity in diversity and division in similarity. and lot more!The episode concludes with reflections on the importance of listening, sharing personal experiences, and finding common ground even in the face of significant differences.______________________Resources ______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________For more podcast stories from What If Instead? Podcast with Alejandro Juárez Crawford and Miriam Plavin-Masterman, visit: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alejandro-juarez-crawford and https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/miriam-plavin-masterman Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 26, 202459 min

Ep 2172Building Resilient Applications and APIs: The Importance of Security by Design to Ensure Data Protection | An Imperva Brand Story with Lebin Cheng

In this Brand Story episode, hosts Sean Martin and Marco Ciappelli welcome Lebin Cheng from Imperva to discuss the ever-important topic of API security. As the head of the API security team at Imperva, Lebin Cheng offers a nuanced view into the challenges and solutions involved in protecting sensitive data facilitated by APIs. A central theme of the discussion revolves around API security's complexity due to APIs' role in digital transformation, cloud migration, and data integration. APIs act as a gateway for data interaction and integration, offering flexibility but also introducing significant security risks.Cheng underscores that as APIs provide open access to critical data, they become prime targets for sophisticated cyber threats. These threats exploit vulnerabilities in API deployments, making robust security measures indispensable. Cheng highlights the importance of securing APIs not as a one-time effort but as an ongoing process. He discusses how Imperva employs real-time monitoring and behavioral analysis to enhance API security. By establishing a baseline of what constitutes normal behavior, Imperva can quickly detect and respond to anomalies. This approach goes beyond traditional, static security measures, which often fall short against dynamic threats that evolve alongside technology.Additionally, the conversation touches on the notion of 'security by design.' Cheng advocates for integrating security considerations from the earliest stages of API development. This results in more resilient applications capable of withstanding sophisticated attacks. The discussion also notes the growing trend of DevSecOps, which emphasizes the collaboration between development, security, and operations teams to embed security throughout the software development lifecycle. Real-world applications of these principles are evident in various sectors, including open banking.Cheng explains how open banking initiatives, which allow smaller financial institutions to access larger banks' data via APIs, highlight the necessity of strong API security. A breached API could expose sensitive financial data, leading to significant financial and reputational damage. The hosts and Cheng also explore how Imperva's innovation in API security involves leveraging artificial intelligence and machine learning. These technologies help in identifying and mitigating potential risks by analyzing vast amounts of data to detect unusual patterns that might indicate a security threat.In closing, Cheng emphasizes the importance of continuous innovation and vigilance in the field of API security. He invites organizations to adopt a proactive stance, continuously updating their security measures to protect their data assets effectively. This episode serves as a compelling reminder of the critical role API security plays in today's interconnected digital world.Learn more about Imperva: https://itspm.ag/imperva277117988Note: This story contains promotional content. Learn more.Guest: Lebin Cheng, VP, API Security, Imperva [@Imperva]On LinkedIn | https://www.linkedin.com/in/lebin/ResourcesLearn more and catch more stories from Imperva: https://www.itspmagazine.com/directory/impervaAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 25, 202436 min

Ep 2171Research is the Key - Shrey Modi and Rahul Vishwakarma's Innovation Journey at California State University | Off the Record with Saman — Student Abroad Podcast

Guests: Shrey Modi, Software Engineer Intern, Teladoc HealthOn LinkedIn | https://www.linkedin.com/in/shreymodi7/Rahul Vishwakarma, Blue Ridge Labs, Robin HoodOn LinkedIn | https://www.linkedin.com/in/rahulvishwakarma/________________________________Host: Saman FatimaOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/saman-fatima________________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network________________________________Episode DescriptionAre you from India? Wishing to come to the USA for your studies? Is your dream university - California State University? If yes, grab a pen, paper, and water, and you are all good to know everything. From researching the dream university to getting selected and beating the elephant in the room (i.e. the VISA process) to settling up - you need to know EVERYTHING because, at the end of the day, it is a foreign land with a lot of newness, loneliness, and self-dependency.________________________________ResourcesCheckout the Cal State's AI Research Club: https://www.csulb.edu/college-of-engineering/article/ai-research-club-launchesJoin the BBWIC Foundation Community: https://www.bbwic.com/________________________________For more podcast stories from Off The Record With Saman: https://www.itspmagazine.com/off-the-record-with-saman-student-abroad-podcastWatch the video version on-demand on YouTube: https://www.youtube.com/watch?v=0954PDs3hFI&list=PLnYu0psdcllS96iavkI5nQsErJ3795ow6 Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 25, 20241h 1m

Ep 2170Hello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns | A SecTor Cybersecurity Conference Toronto 2024 Conversation with Ashley Jess | On Location Coverage with Sean Martin and Marco Ciappelli

Guest: Ashley Jess, Senior Intelligence Analyst, Intel 471 [@Intel471Inc]At SecTor | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#ashley-jess-48633____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesAs part of their Chats on the Road for the On Location series during SecTor in Toronto, Sean Martin and Marco Ciappelli had an engaging conversation with Ashley Jess, a Senior Threat Intelligence Analyst from Intel471.The discussion centered on the intricacies of artificial intelligence (AI), its uses, and its abuses in the realm of cybersecurity. Ashley's upcoming presentation titled "Hello from the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation, and Scam Campaigns" sets the stage for an in-depth exploration into the dark side of AI. Ashley gives a glimpse into how AI is being utilized for nefarious purposes, highlighting the connection between generative AI and disinformation campaigns. She explains how AI has been used to create politically motivated fake graffiti, deepfake videos with celebrities, and even entirely fabricated news websites.She emphasizes that the lowest barrier to entry for generating such content is lower than ever, making it easy for bad actors to create and spread false information swiftly. She mentions a particularly interesting case during the Olympics, where an entire propaganda movie starring a deepfake Tom Cruise was produced for political purposes. This example underscores the potential of AI to convincingly spread disinformation on a massive scale. She also points out how scam campaigns are increasingly leveraging AI, making them more believable and harder to detect.One crucial topic Ashley touches on is the matter of responsibility in combating these threats. She discusses the need for more robust government regulations and the role of various technology vendors in detecting and preventing the misuse of AI. She highlights the importance of technologies like Web3 and blockchain for content provenance.According to Ashley, integrating such measures into platforms used by everyday people can help mitigate the risks posed by AI-generated disinformation. Marco Ciappelli adds to this by reflecting on how easy it is to create misleading content and target vulnerable populations. He points out that ordinary citizens, who are not as vigilant or technologically savvy, are at greater risk. On this note, Sean Martin questions who should be responsible for protecting individuals and organizations from AI-based threats.The discussion also touches on the ethical aspects of AI and its dual-use nature—where technological advancements can be both beneficial and harmful. Ashley emphasizes the need for a balanced approach that considers both the legitimate applications of AI technology and its potential for abuse. Ashley Jess is enthusiastic about her upcoming talk at SecTor where she promises to delve further into these critical issues.The session aims to provide a realistic, frontline view of how AI is being used maliciously and to encourage more proactive measures to combat these emerging threats. For those attending SecTor, her insights promise to be both enlightening and essential.Be sure to follow our Coverage Journey and subscribe to our podcasts!____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSCvf6o-K0forAXxj2P190SBe sure to share and subscribe!____________________________ResourcesHello From the Dumpster Fire: Real Examples of Artificially Generated Malware, Disinformation and Scam Campaigns (Session): https://www.blackhat.com/sector/2024/briefings/schedule/#hello-from-the-dumpster-fire-real-examples-of-artificially-generated-malware-disinformation-and-scam-campaigns-41161Learn more about SecTor Cybersecurity Conference Toronto 2024: https://www.blackhat.com/sector/2024/index.html____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell your Brand Story as part of our event coverage?Learn More 👉 https://itspm.ag/evtcovbrfTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://ww

Sep 24, 202422 min

Ep 2169Book | The Developer's Playbook for Large Language Model Security: Building Secure AI Applications | A Conversation with Steve Wilson | Redefining CyberSecurity with Sean Martin

Guest: Steve Wilson, Chief Product Officer, Exabeam [@exabeam] & Project Lead, OWASP Top 10 for Larage Language Model Applications [@owasp]On LinkedIn | https://www.linkedin.com/in/wilsonsd/On Twitter | https://x.com/virtualsteve____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity, host Sean Martin sat down with Steve Wilson, chief product officer at Exabeam, to discuss the critical topic of secure AI development. The conversation revolved around the nuances of developing and deploying large language models (LLMs) in the field of cybersecurity.Steve Wilson's expertise lies at the intersection of AI and cybersecurity, a point he emphasized while sharing his journey from founding the Top 10 group for large language models to authoring his new book, "The Developer's Playbook for Large Language Model Security." In this insightful discussion, Wilson and Martin explore the roles of developers and product managers in ensuring the safety and security of AI systems.One of the key themes in the conversation is the categorization of AI applications into chatbots, co-pilots, and autonomous agents. Wilson explains that while chatbots are open-ended, interacting with users on various topics, co-pilots focus on enhancing productivity within specific domains by interacting with user data. Autonomous agents are more independent, executing tasks with minimal human intervention.Wilson brings attention to the concept of overreliance on AI models and the associated risks. Highlighting that large language models can hallucinate or produce unreliable outputs, he stresses the importance of designing systems that account for these limitations. Product managers play a crucial role here, ensuring that AI applications are built to mitigate risks and communicate their reliability to users effectively.The discussion also touches on the importance of security guardrails and continuous monitoring. Wilson introduces the idea of using tools akin to web app firewalls (WAF) or runtime application self-protection (RASP) to keep AI models within safe operational parameters. He mentions frameworks like Nvidia's open-source project, Nemo Guardrails, which aid developers in implementing these defenses.Moreover, the conversation highlights the significance of testing and evaluation in AI development. Wilson parallels the education and evaluation of LLMs to training and testing a human-like system, underscoring that traditional unit tests may not suffice. Instead, flexible test cases and advanced evaluation tools are necessary. Another critical aspect Wilson discusses is the need for red teaming in AI security. By rigorously testing AI systems and exploring their vulnerabilities, organizations can better prepare for real-world threats. This proactive approach is essential for maintaining robust AI applications.Finally, Wilson shares insights from his book, including the Responsible AI Software Engineering (RAISE) framework. This comprehensive guide offers developers and product managers practical steps to integrate secure AI practices into their workflows. With an emphasis on continuous improvement and risk management, the RAISE framework serves as a valuable resource for anyone involved in AI development.About the BookLarge language models (LLMs) are not just shaping the trajectory of AI, they're also unveiling a new era of security challenges. This practical book takes you straight to the heart of these threats. Author Steve Wilson, chief product officer at Exabeam, focuses exclusively on LLMs, eschewing generalized AI security to delve into the unique characteristics and vulnerabilities inherent in these models.Complete with collective wisdom gained from the creation of the OWASP Top 10 for LLMs list—a feat accomplished by more than 400 industry experts—this guide delivers real-world guidance and practical strategies to help developers and security teams grapple with the realities of LLM applications. Whether you're architecting a new application or adding AI features to an existing one, this book is your go-to resource for mastering the security landscape of the next frontier in AI.___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe!___________________________ResourcesBook: "The Developer's Playbook for Large Language Model Security: Building Secure AI Applications": https://amzn.to/3ztW

Sep 24, 202434 min

Ep 2168$17M Series B Will Accelerate Growth As BlackCloak Further Strengthens Its Personal Cybersecurity Platform And Drives Innovative Products | 7 Minutes on ITSPmagazine | A BlackCloak Short Brand Innovation Story with Chris Pierson

In 7 Minutes on ITSPmagazine, Sean Martin chats with Chris Pierson, CEO and Co-founder of BlackCloak, about their latest milestone in digital executive protection. BlackCloak, a pioneer in protecting executives, senior leaders, high-net-worth individuals, and family offices, has secured $17 million in a Series B funding round led by Baird Capital, with contributions from Blue Heron, TDF, and Tech Operators.Chris explains that the new funds will focus on scaling the company's operations, building proprietary cybersecurity and privacy technologies, and enhancing their concierge-level services. The goal is to provide specialized protection and remediation for corporate executives, board members, and high-profile individuals, including those in their families' personal lives.The conversation touches on the increasing need for digital executive protection against breaches, privacy risks, and identity theft. Chris highlights how recent attacks on home environments have accelerated the demand for robust digital security solutions. Investors are drawn to BlackCloak's unique approach and market potential.Looking ahead, Chris envisions a day in the life of a protected digital executive as one where privacy enhancements and proactive, intelligence-driven alerts become standard. BlackCloak aims to make managing personal cybersecurity seamless, offering reactive support and expert advice along the way. With this fresh investment, the company is poised to capture significant growth in this critical space.Learn more about BlackCloak:https://itspm.ag/itspbcwebNote: This story contains promotional content. Learn more.Guest: Chris Pierson, Founder and CEO of BlackCloak [@BlackCloakCyber]On Linkedin | https://www.linkedin.com/in/drchristopherpierson/On Twitter | https://twitter.com/drchrispiersonResourcesLearn more and catch more stories from BlackCloak: https://www.itspmagazine.com/directory/blackcloakBlackCloak Raises $17M Series B Funding Round to Enhance Personal Cybersecurity Protections for Corporate Executives, High Net Worth Individuals, and Family Offices: https://blackcloak.io/news-media/blackcloak-raises-17m-series-b-personal-cybersecurity-protections-corporate-executives-high-networth-individuals-family-offices/Learn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 18, 20247 min

Ep 2167Indigenous Astronomy: The Legacy of the Aztecs | Stories From Space Podcast With Matthew S Williams

Host | Matthew S WilliamsOn ITSPmagazine 👉 https://itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-s-williams______________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode NotesThe Aztec Empire was the dominant power in pre-Columbian Mesoamerica. The astronomical and cosmological traditions they created were extremely fascinating but are still subject to prejudice. Like their peers in Eurasia and East Asia, the Aztecs watched the heavens avidly and discerned patterns that influenced their worldview, calendar systems, and even urban planning.______________________ResourcesAztecs Used an Extremely Accurate Solar Observatory to Manage Their Farming - Universe Today: https://www.universetoday.com/159220/aztecs-used-an-extremely-accurate-solar-observatory-to-manage-their-farming/______________________For more podcast Stories from Space with Matthew S Williams, visit: https://itspmagazine.com/stories-from-space-podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 17, 202442 min

Ep 2166AI & Cybersecurity: Legal Risks and Solutions | A Conversation with Justin Daniels | The Soulful CXO Podcast with Dr. Rebecca Wynn

Guest: Justin Daniels, WSJ & USA Today Best Selling Author, Shareholder/Corporate M&A and Tech Transactions Attorney, Baker Donaldson [@Baker_Donelson]LinkedIn: https://www.linkedin.com/in/justinsdaniels/Host: Dr. Rebecca WynnOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rebecca-wynn________________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network________________________________Episode DescriptionIn this episode of the Soulful CXO, host Dr. Rebecca Wynn sits down with Justin Daniels, a distinguished expert in corporate mergers and acquisitions, tech transactions, and cybersecurity, who also co-chairs the blockchain and digital assets practice at Baker Donelson. Together, they explore how businesses can gain a competitive edge by treating cybersecurity as a strategic risk rather than just a technical issue. Justin emphasizes the importance of robust disaster recovery plans and modern IT infrastructures to ensure resilience, discusses the implications of recent events like the Delta outage, and highlights the need for government-private sector collaboration to secure critical infrastructure. The conversation also covers executive accountability for cyber hygiene, effective vendor management, and the evolving landscape of cyber liability insurance and AI due diligence in M&A deals. Listen in to learn how these insights can help business leaders stay ahead in today’s fast-paced digital environment________________________________ResourcesData Reimagined: Building Trust One Byte at a Time: https://www.amazon.com/Data-Reimagined-Building-Trust-Byte-ebook/dp/B0BDVQ97YQ/NIST CSF v2.0: Simplified Cybersecurity Guidance: https://www.linkedin.com/pulse/nist-csf-v20-simplified-cybersecurity-guidance-wynn-the-soulful-cxo-efvvc/NIST AI Risk Management Framework: https://www.nist.gov/itl/ai-risk-management-frameworkEU AI Act: https://artificialintelligenceact.eu/Colorado AI Act: https://leg.colorado.gov/bills/sb24-205________________________________Support:Buy Me a Coffee: https://www.buymeacoffee.com/soulfulcxo________________________________For more podcast stories from The Soulful CXO Podcast With Rebecca Wynn: https://www.itspmagazine.com/the-soulful-cxo-podcastITSPMagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 17, 202431 min

Ep 2165The Critical Role of Identity in Creating Effective Ransomware Attack Defense and Broader Business Resilience Strategies | 7 Minutes on ITSPmagazine | A Semperis Short Brand Story with Simon Hodgkinson

Semperis, a pioneer in identity-driven cyber resilience has published the results of its global ransomware study of nearly 1,000 IT and security professionals at organisations spanning multiple industries across the US, UK, France, and Germany. The study aims to understand the prevalence, frequency and costs of ransomware attacks—in both ransom payments and collateral damage. The results highlight an alarming trend toward multiple, sometimes simultaneous attacks, forcing business leaders to re-evaluate their cyber resilience strategies to address common points of failure, including inadequate identity system backup and recovery practices. Organisations must ensure they have appropriate controls to withstand attacks where possible, however assume a mindset that at some point they will have to recover from a catastrophic outage and therefore have a tried and tested plan to recover business operations. Given the criticality of Active Directory, firms need a dedicated means of backing up and recovering Active Directory to recover from attacks with integrity and at speed. However, according to our survey, just 23% of UK respondents stated that they have dedicated, Active Directory–specific backup systems.Now, more than ever, modernised threats require modernised defences prioritised on the most critical assets – which is the identity platform - and for most organisations this is Active Directory. Semperis is a pioneer in managing and protecting the identity credentials of enterprises' hybrid environments and was purpose-built for securing AD. Semperis provide a portfolio of products including a free tool - Purple Knight - which organisations use to uncover unknown vulnerabilities, communicate security posture to leaders and other teams, compensate for lack of inhouse AD skills, prepare for other assessments including pen tests, and garner more resources for AD security improvements.The full ransomware study, which includes breakdowns of responses by vertical market and by country, is available at https://itspm.ag/semper6u3wLearn more about Semperis: https://itspm.ag/semperis-1rooNote: This story contains promotional content. Learn more.Guest: Simon Hodgkinson, Strategic Advisor, Semperis [@SemperisTech]On LinkedIn | https://www.linkedin.com/in/simon-hodgkinson-6072623ResourcesLearn more and catch more stories from Semperis: https://www.itspmagazine.com/directory/semperisLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 17, 20247 min

Ep 2164The Ransomware Threat and the Resilience Imperative | A HITRUST Collaborate 2024 Conversation with Allan Liska | On Location Coverage with Sean Martin and Marco Ciappelli

Guest: Allan Liska, Senior Security Architect and Ransomware Specialist, Recorded Future [@RecordedFuture]On Linkedin | https://www.linkedin.com/in/allan2On Twitter | https://twitter.com/uuallan____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of the On Location with Sean and Marco podcast, recorded for the HITRUST Collaborate Conference in Dallas, TX, hosts Sean Martin and Marco Ciappelli engage in a dynamic conversation around the theme of cybersecurity in healthcare, specifically focusing on ransomware resilience. Sean and Marco are joined by Allan Liska for an insightful discussion on the current state of ransomware and the importance of proactive defenses.The episode begins with Sean and Marco acknowledging the hectic nature of their schedule, emphasizing their excitement for the upcoming events. Sean mentions his active participation at the HITRUST conference, working closely with risk management and compliance experts, while Marco expresses his envy yet supports Sean’s engagements.Allan Liska, the guest of this episode, brings a wealth of knowledge as an intelligence analyst specializing in ransomware research at Recorded Future. Allan delineates the ongoing challenges faced by organizations, particularly in healthcare, in mitigating ransomware threats. He highlights the increase in law enforcement activities targeting ransomware groups, which has led to more internal drama within the cybercriminal community, making the topic more relatable and urgent for organizations.A substantial part of the conversation revolves around the significance of tabletop exercises in preparing organizations for ransomware incidents. Allan stresses that effective tabletop exercises must involve representatives from across the entire organization, ensuring comprehensive preparedness. The exercises should be engaging and realistic, incorporating lessons learned to update incident response plans continually. Allan also recommends keeping out-of-band communication methods ready, such as using Signal, to ensure seamless operations during a ransomware attack.The importance of leadership buy-in is underlined, with Allan explaining how having senior leaders understand and support these exercises can significantly enhance the overall security posture. The discussion touches on common pitfalls, such as the assumption that backups alone will suffice, highlighting the necessity of regular, holistic testing of recovery processes.The hosts also reflect on the collaborative aspect of the HITRUST conference, noting that it provides an invaluable opportunity for participants to network, share best practices, and learn from each other's experiences. That's precisely the spirit Allan hopes to capture during his session at the conference.In conclusion, this episode is a deep dive into the complexities of ransomware defense, offering practical advice and underscoring the collective effort required to protect healthcare systems against cyber threats. Sean and Marco invite listeners to stay engaged and informed through their podcast series, promising more enlightening discussions on critical cybersecurity topics.____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our HITRUST Collaborate 2024 coverage: https://www.itspmagazine.com/hitrust-collaborate-2024-information-risk-management-and-compliance-event-coverage-frisco-texasOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllSjVk_qSl7vkUafmICX9RleBe sure to share and subscribe!____________________________ResourcesThe Ransomware Threat and the Resilience Imperative (Session): https://www.hitrustevents.com/event/HITRUSTCollaborate2024/websitePage:645d57e4-75eb-4769-b2c0-f201a0bfc6ce?session=3448b1bf-3996-4945-95ed-bd957710b0acLearn more about HITRUST Collaborate 2024 and register for the conference: https://itspm.ag/hitrusmxay____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell your Brand Story as part of our event coverage?Learn More 👉 https://itspm.ag/evtcovbrf Hosted by Simplecast, an AdsWizz company. Se

Sep 14, 202424 min

Ep 2163The Missing Link: How We Collect and Leverage SBOMs | An OWASP 2024 Global AppSec San Francisco Conversation with Cassie Crossley | On Location Coverage with Sean Martin and Marco Ciappelli

Guest: Cassie Crossley, VP, Supply Chain Security, Schneider Electric [@SchneiderElec]On LinkedIn | https://www.linkedin.com/in/cassiecrossley/____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of On Location with Sean and Marco, hosts Sean Martin and Marco Ciappelli head to San Francisco to attend the OWASP Global AppSec conference. They kick off their journey with a light-hearted conversation about their destination, quickly segueing into the substantive core of the episode. The dialogue provides a rich backdrop to the conference's key focus: securing applications and the crucial role of Software Bill of Materials (SBOMs) in this context.Special guest Cassie Crossley joins the hosts to delve deeper into the significance of SBOMs. Cassie introduces herself and highlights her previous engagements with the podcast, touching on her upcoming session titled "The Missing Link: How We Collect and Leverage SBOMs." She explains the essential function of SBOMs in tracking open-source and commercial software components, noting the importance of transparency and risk evaluation in modern software development.Cassie explains that understanding the software components in use, including transitive dependencies, is crucial for managing risks. She discusses how her company, Schneider Electric, implements SBOMs within their varied product lines, ranging from firmware to cloud-based applications. By collecting and analyzing SBOMs, they can quickly assess vulnerabilities, much like how organizations scrambled to evaluate their exposure in the wake of the Log4J vulnerability.Sean and Marco steer the conversation towards the practical aspects of SBOM implementation for smaller companies. Cassie reassures that even startups and smaller enterprises can benefit from SBOMs without extensive resources, using free tools like Dependency-Track to manage their software inventories. She emphasizes that having an SBOM—even in a simplified form—provides a critical layer of visibility, enabling better risk management even with limited means.The discussion touches on the broader impact of SBOMs beyond individual corporations. Cassie notes the importance of regulatory developments and collective efforts, such as those by the Cybersecurity and Infrastructure Security Agency (CISA), to advocate for wider adoption of SBOM standards across industries.To wrap up, the hosts and Cassie discuss the value of conferences like OWASP Global AppSec for fostering community dialogues, sharing insights, and staying abreast of new developments in application security. They encourage listeners to attend these events to gain valuable knowledge and networking opportunities. Finally, in their closing remarks, Sean and Marco tease future episodes in the On Location series, hinting at more exciting content from their travels and guest interviews.____________________________This Episode’s SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our OWASP 2024 Global AppSec San Francisco coverage: https://www.itspmagazine.com/owasp-2024-global-appsec-san-francisco-cybersecurity-and-application-security-event-coverageOn YouTube: 📺 https://www.youtube.com/playlist?list=PLnYu0psdcllTcqoGpeR1rdo6p47Ozu1jtBe sure to share and subscribe!____________________________ResourcesThe Missing Link - How We Collect and Leverage SBOMs (Session): https://owasp2024globalappsecsanfra.sched.com/event/1g3XV/the-missing-link-how-we-collect-and-leverage-sbomsWhy the Industry Needs OpenSSF | A Conversation with Omkhar Arasaratnam, Adrianne Marcum, Arun Gupta, and Christopher Robinson | Redefining CyberSecurity with Sean Martin: https://redefiningcybersecuritypodcast.com/episodes/why-the-industry-needs-openssf-a-conversation-with-omkhar-arasaratnam-adrianne-marcum-arun-gupta-and-christopher-robinson-redefining-cybersecurity-with-sean-martinLearn more about OWASP 2024 Global AppSec San Francisco: https://sf.globalappsec.org/SBOM-a-Rama: https://www.linkedin.com/feed/update/urn:li:activity:7232385837869469699/____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-cybersecurity-society-humanity-conference-and-event-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastAre you interested in sponsoring our event coverage with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplcWant to tell you

Sep 14, 202421 min

Ep 2162BOOK | The Warminster Series: J.V. Hilliard on His Journey from Defense Lobbyist to Fantasy Novelist and How the Mythical World he Created is Becoming a Video Game | A Conversation with J.V. Hilliard | Audio Signals Podcast With Marco Ciappelli

Get the The Warminster Series by J.V. Hilliard: https://amzn.to/3Zk4OFFGuest: J.V. Hilliard, AuthorOn Twitter | https://x.com/JVHilliardBooksWebsite | https://jvhilliard.com/_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network_____________________________Episode IntroductionHello, everyone! Welcome back to another episode of Audio Signals. I’m your host, Marco Ciappelli, where we explore the stories and storytellers shaping our world. Today, I’m thrilled to have J.V. Hilliard with me—a fantasy author whose Warminster series is captivating readers everywhere. Whether you’re watching on YouTube or tuning in via podcast, stick around as we talk about his journey from defense lobbyist to acclaimed author and his expanding universe that’s reaching into video games.From Concept to Creation: The Birth of a Fantasy WorldJ.V. begins by sharing his path into writing, born out of the downtime of the COVID pandemic. While many were stuck at home, J.V. seized the moment to bring to life a story he had carried for over two decades. That story has since evolved into the Warminster series, a fantasy world that’s grabbing the attention of readers across the globe.The Warminster Series: A Saga for the AgesI asked J.V. about Warminster’s intricate world-building, and he walked me through the inspirations behind his creation. Drawing from the likes of Tolkien and Terry Brooks, J.V. has crafted a vibrant world, rich with magic, history, and compelling characters. His attention to detail—right down to the magical systems and language—gives Warminster a life of its own, inviting readers to fully immerse themselves in this epic series.Crafting Immersive Worlds and Complex CharactersWhat sets J.V. apart is his unique method of reverse engineering his stories. Starting with the ending, he crafts his way back to the beginning, ensuring that every detail is connected. He even uses a whiteboard to track character arcs and plot points, which gives his storytelling a strategic, almost battlefield-like precision.Writing Meets Technology: J.V. Hilliard’s Unique ApproachOur conversation shifted to how J.V.’s former career in defense writing helped him structure his novels. Writing legislation, grants, and speeches in his previous work helped him hone the skills to build complex narratives. It’s an intriguing example of how different industries can unexpectedly intersect, providing a foundation for creative writing.Expanding Horizons: From Page to Video GameOne of the most exciting developments in J.V.'s career is the adaptation of Warminster into a video game. Using augmented reality, similar to Pokemon Go, the game promises to bring his fantasy world to life in new ways. It’s fascinating to see a world that started in novels now evolving into a different medium, expanding its reach to gamers.What’s Next for J.V. Hilliard?As we wrapped up, J.V. teased some exciting future projects. The fourth book in the Warminster series, Echoes of Ghostwood, is set for release soon, and he’s working on three origin story novels for key characters. Fans can also look forward to a brand-new trilogy coming in 2026, expanding this magical universe even further.Conclusion and Future PlansThank you for joining us on this deep dive into the world of Warminster with J.V. Hilliard. His story is a testament to the power of storytelling and how it can cross from novels into new media, keeping fans engaged in fresh ways. Stay tuned for more exciting conversations on Audio Signals, and don’t forget to subscribe on YouTube or follow us on your favorite podcast platform.Take care, everyone, and keep your imagination alive!_____________________________ResourcesGet the The Warminster Series by J.V. Hilliard: https://amzn.to/3Zk4OFF_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsWatch the video version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQvnJ8eHUlVX8AuyhehtexAAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 13, 202437 min

Ep 2161Healthcare, Technology, Transhumanism, and a Garlic: A Deep Dive into the Future of Healthcare and Humanity | A Carbon, a Silicon, and a Cell walk into a bar... | A Redefining Society Podcast Series With Recurring Guest Dr. Bruce Y. Lee

Book: The Singularity Is Nearer: When We Merge with AI by Ray Kurzweil (Author) https://amzn.to/3Zk7CTaGuest: Dr. Bruce Y Lee, Executive Director of PHICOR (Public Health Informatics, Computational, and Operations Research) [@PHICORteam]On LinkedIn | https://www.linkedin.com/in/bruce-y-lee-68a6834/On Twitter | https://twitter.com/bruce_y_leeWebsite | https://www.bruceylee.com/On Forbes | https://www.forbes.com/sites/brucelee/On Psychology Today | https://www.psychologytoday.com/us/contributors/bruce-y-lee-md-mba_____________________________Host: Marco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli_____________________________This Episode’s SponsorsBlackCloak 👉 https://itspm.ag/itspbcwebBugcrowd 👉 https://itspm.ag/itspbgcweb_____________________________Episode IntroductionHello, everybody. Welcome back to another episode of the Redefining Society Podcast. This episode also marks the return of the series "A Carbon, a Silicon, and a Cell Walk Into a Bar," wherein I'll be joined by my good friend and co-host, Dr. Bruce Y. Lee. Today, we're diving into a topic that perfectly aligns with the ethos of our series – transhumanism.Setting the StageIn our chat, Bruce and I discussed various facets of transhumanism, from its historical roots to the ethical dilemma it poses today. I opened the conversation by expressing how delighted I was to have Bruce, a man of many talents, join me. I emphasized his diverse background in journalism, medical expertise, and his strange affinity for avocados – a passion that I certainly share with him. We started by noting the sheer breadth of transhumanism – a term encompassing everything from genetic manipulation to uploading our brains to the cloud.Human History Meets Future PotentialBruce brought up a thought-provoking point about how humanity's journey with technology is not new. Even something as ancient as the wheel fundamentally altered what humans could accomplish. The act of inventing the wheel allowed humans to do things they couldn't do before, much like what transhumanist technologies promise today. However, Bruce and I quickly recognized that more complex technologies, like genetic manipulation and AI integration, bring forth a host of ethical and practical questions.Confronting Ethical QuestionsWe moved on to discuss the ethical implications of transhumanism. Where does one draw the line between necessary medical interventions and unnecessary enhancements? For example, medical implants that help people with degenerative diseases are widely accepted. Yet, when technology is used to enhance human abilities – making one faster or smarter – the ethical waters become murkier.Balance of Benefits and RisksBruce highlighted how society has historically handled similar ethical conundrums. One poignant example is performance-enhancing drugs in sports. Initially, these drugs were developed for legitimate medical use, yet athletes later adopted them to gain unfair advantages, skewing the level playing field. Bruce and I agreed that such parallels are worth pondering as we consider transhumanist technologies.A Garlic-Inspired ReflectionThroughout our conversation, we found humor and caution in the metaphorical garlic Dr. Bruce brought along (as a background image) an amusing yet insightful reminder of the importance of asking questions. We concluded that while we should remain optimistic about technological advancements, it’s vital to ask intelligent questions and consider potential consequences before diving headfirst into uncharted waters. This garlic-induced paradigm should guide our approach to emerging technologies like AI and brain-computer interfaces.Looking ForwardFor future episodes, Bruce and I have a packed agenda. We'll tackle specific topics like healthcare inequality in the age of singularity, human augmentation, and even far-fetched ideas like uploading your brain to the cloud. Each of these topics offers a blend of promise and peril – perfect for a series dedicated to exploring how technology is both reshaping and being shaped by society.Closing ThoughtsSo, stay tuned, and don't forget to subscribe! We’ll cover these fascinating topics and much more in our upcoming episodes. And a special thanks to Bruce and the ever-vigilant garlic for reminding us to thoughtfully navigate the complex landscape of transhumanist technology.See You Next TimeYou'll find links to connect with Bruce and explore his incredible contributions in journalism and medicine. I promise you; he's just as insightful and entertaining as he seems in the series. So, see you next time – same bar, same garlic, new topics!_____________________________ResourcesThe Singularity Is Nearer: When We Merge with AI (Book): https://amzn.to/3Zk7CTa____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/re

Sep 11, 202440 min

Ep 2160Generative AI and Large Language Model (LLM) Prompt Hacking: Exposing Systemic Vulnerabilities of LLMs to Enhance AI Security Through Innovative Red Teaming Competitions | A Conversation with Sander Schulhoff | Redefining CyberSecurity with Sean Martin

Guest: Sander Schulhoff, CEO and Co-Founder, Learn Prompting [@learnprompting]On LinkedIn | https://www.linkedin.com/in/sander-schulhoff/____________________________Host: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinView This Show's Sponsors___________________________Episode NotesIn this episode of Redefining CyberSecurity, host Sean Martin engages with Sander Schulhoff, CEO and Co-Founder of Learn Prompting and a researcher at the University of Maryland. The discussion focuses on the critical intersection of artificial intelligence (AI) and cybersecurity, particularly the role of prompt engineering in the evolving AI landscape. Schulhoff's extensive work in natural language processing (NLP) and deep reinforcement learning provides a robust foundation for this insightful conversation.Prompt engineering, a vital part of AI research and development, involves creating effective input prompts that guide AI models to produce desired outputs. Schulhoff explains that the diversity of prompt techniques is vast and includes methods like the chain of thought, which helps AI articulate its reasoning steps to solve complex problems. However, the conversation highlights that there are significant security concerns that accompany these techniques.One such concern is the vulnerability of systems when they integrate user-generated prompts with AI models, especially those prompts that can execute code or interact with external databases. Security flaws can arise when these systems are not adequately sandboxed or otherwise protected, as demonstrated by Schulhoff through real-world examples like MathGPT, a tool that was exploited to run arbitrary code by injecting malicious prompts into the AI’s input.Schulhoff's insights into the AI Village at DEF CON underline the community's nascent but growing focus on AI security. He notes an intriguing pattern: many participants in AI-specific red teaming events were beginners, which suggests a gap in traditional red teamer familiarity with AI systems. This gap necessitates targeted education and training, something Schulhoff is actively pursuing through initiatives at Learn Prompting.The discussion also covers the importance of studying and understanding the potential risks posed by AI models in business applications. With AI increasingly integrated into various sectors, including security, the stakes for anticipating and mitigating risks are high. Schulhoff mentions that his team is working on Hack A Prompt, a global prompt injection competition aimed at crowdsourcing diverse attack strategies. This initiative not only helps model developers understand potential vulnerabilities but also furthers the collective knowledge base necessary for building more secure AI systems.As AI continues to intersect with various business processes and applications, the role of security becomes paramount. This episode underscores the need for collaboration between prompt engineers, security professionals, and organizations at large to ensure that AI advancements are accompanied by robust, proactive security measures. By fostering awareness and education, and through collaborative competitions like Hack A Prompt, the community can better prepare for the multifaceted challenges that AI security presents.Top Questions AddressedWhat are the key security concerns associated with prompt engineering?How can organizations ensure the security of AI systems that integrate user-generated prompts?What steps can be taken to bridge the knowledge gap in AI security among traditional security professionals?___________________________SponsorsImperva: https://itspm.ag/imperva277117988LevelBlue: https://itspm.ag/attcybersecurity-3jdk3___________________________Watch this and other videos on ITSPmagazine's YouTube ChannelRedefining CyberSecurity Podcast with Sean Martin, CISSP playlist:📺 https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYqITSPmagazine YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe!___________________________ResourcesThe Prompt Report: A Systematic Survey of Prompting Techniques: https://trigaten.github.io/Prompt_Survey_Site/HackAPrompt competition: https://www.aicrowd.com/challenges/hackaprompt-2023HackAPrompt results published in this paper "Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition EMNLP 2023": https://paper.hackaprompt.com/___________________________To see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastAre you interested in sponsoring this show with an ad placement in the podcast?Learn More 👉 https://itspm.ag/podadplc Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for ad

Sep 11, 202435 min

Ep 2159Achieving Compliance in the Cloud through Continuous Controls Monitoring (CCM) | 7 Minutes on ITSPmagazine | A RegScale Short Brand Story with Travis Howerton

With the rapid pace of cloud adoption, less time is spent ensuring that systems are built and operated effectively and with proper cyber hygiene. As a result, continuous controls monitoring (CCM) has emerged as indispensable for ensuring both security and regulatory compliance. Travis will discuss how CCM: transforms reactive security measures into a proactive stance; strengthens security protocols and embeds compliance within cloud operations; and streamlines the protection of digital assets in an ever-evolving landscape.With systems becoming increasingly cloud-native and ephemeral, manual approaches no longer work, can’t scale, and are not timely enough to manage risk. Continuous Controls Monitoring (CCM) is needed to allow cloud adoption in highly regulated industries without sacrificing security. The speed of the cloud, AI development, and digital transformation is quickly reaching a point where human-based risk and compliance business processes cannot keep up. A modern, compliance-as-code approach is needed via CCM platforms to ensure risk and compliance processes can execute in real-time to keep pace with modern cloud technology.Embracing compliance-as-code to allow business processes to execute at machine speed, generate self-updating paperwork, and leverage AI and mini-robot automations to validate and assess the results. Consider more sophisticated DevOps approaches leveraging CI/CD software factories to push security from code to cloud. The new CCM approach is to shift security processes left across every layer of the application lifecycle.Learn more about RegScale: https://itspm.ag/regscaksfbNote: This story contains promotional content. Learn more.Guest: Travis Howerton, Co-Founder and CEO, RegScale, [@RegScale]On LinkedIn | https://www.linkedin.com/in/travishowerton/ResourcesLearn more and catch more stories from RegScale: https://www.itspmagazine.com/directory/regscaleLearn more about 7 Minutes on ITSPmagazine Short Brand Story Podcasts: https://www.itspmagazine.com/purchase-programsNewsletter Archive: https://www.linkedin.com/newsletters/tune-into-the-latest-podcasts-7109347022809309184/Business Newsletter Signup: https://www.itspmagazine.com/itspmagazine-business-updates-sign-upAre you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 10, 20247 min

Ep 2158Digital Dilemmas: Legal and Social Landscape of Ransom Payments with Justin Daniels | Cybersecurity Insights Podcast with Matthew Rosenquist

Guest: Justin Daniels, M&A and Tech Transactions Attorney, Baker DonelsonOn LinkedIn | https://www.linkedin.com/in/justinsdaniels/Host: Matthew RosenquistOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/matthew-rosenquist______________________Episode SponsorsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network______________________Episode IntroductionI welcome back Justin Daniels, a prominent attorney who advises businesses on best practices, to discuss how the landscape is changing for paying digital extortion. Digital extortion, such as ransomware, has aggressively grown to near epidemic levels. The products and services now include critical infrastructure targets which can impact the lives of millions. The sentiment of regulators and consumers is changing and impacting how businesses look at cybersecurity options, including if they should potentially pay ransoms. ______________________ResourcesData Reimagined: Building Trust One Byte at a Time (Book): https://www.amazon.com/Data-Reimagined-Building-Trust-Byte-ebook/dp/B0BDVQ97YQ She Said Privacy/He Said Security (Podcast): https://podcasts.apple.com/us/podcast/she-said-privacy-he-said-security/id1536859760 ______________________For more podcast stories from Cybersecurity Insights with Matthew Rosenquist, visit: https://www.itspmagazine.com/cybersecurity-insights-with-matthew-rosenquistWatch this episode on YouTube: https://www.youtube.com/watch?v=A0pSHj4DDjkITSPmagazine's YouTube Channel:📺 https://www.youtube.com/@itspmagazineBe sure to share and subscribe! Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Sep 10, 202451 min