
The ITSPmagazine Podcast
2,024 episodes — Page 39 of 41

Ep 770FrankenPhish A Monster That Feeds On Credentials | Are We Afraid Of Technology, Or Do We Just Like To Be Scared? | The Mystery Of The Hundreds Mummies On Boats | Paranormal Activities And The House Market — Who You Gonna Call? | Through The TechVine Radio Program Episode TwentyOne
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Angela Marafino as a guest on this Halloween Special Edition Episode — together they talk about: FrankenPhish A Monster That Feeds On Credentials | Are We Afraid Of Technology, Or Do We Just Like To Be Scared? | The Mystery Of The Hundreds Mummies On Boats | Paranormal Activities And The House Market — Who You Gonna Call? | Through The TechVine Radio Program Episode TwentyOneWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Angela MarafinoOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/angela-marafino____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 769From Marine Aircraft Rescue Fire Fighter To Red Teamer | A Conversation with Gabe Thompson | The Hacker Factory With Phillip Wylie
Gabe's curiosity for how things work as a child is later used as a red teamer, but not leveraged until years later.Gabe shares his story and how his approach to learning and his career reflects how he prepares for 100 mile runs._______________________GuestGabe ThompsonOn Linkedin | https://www.linkedin.com/in/gabethompson1811/On Twitter | https://twitter.com/grnbeltwarrior______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 768Gatekeeping In InfoSec | A Conversation With Naomi Buckwalter | The Changemaking With Chloé Messdaghi
It's time we break the gates and allow for folks to enter the industry.Learn why we must change the situation and how to get involved.GuestNaomi BuckwalterOn LinkedIn | https://www.linkedin.com/in/naomi-buckwalter/On Twitter | https://twitter.com/ineedmorecyber______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________ResourcesCybersecurity Gatebreakers Foundation: https://www.cybersecuritygatebreakers.org/______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 767It Could Be A Vampire And Other Global Security Points Of View | A Conversation With Chris Kubecka | The National Blast With Keenan Skelly
What we can learn from other countries about privacy and cybersecurity. We take a look back on each issue discussed during this season of The National Blast._______________________GuestChris KubeckaOn LinkedIn | https://www.linkedin.com/in/chris-kubecka/On Twitter | https://twitter.com/SecEvangelism______________________HostKeenan SkellyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly______________________This Episode’s SponsorsvArmour 👉https://itspm.ag/varmour-8d92______________________Resources ______________________For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 766Building a Third Party Security Program | A Conversation With Kyle Tobener | Tech Done Different With Ted Harrington
Kyle Tobener has seen many flavors of how to manage third-party security risk. He joins Tech Done Different to share many insights on this critical security domain. You'll learn:- why companies that have a unified system for third party/vendor security risk management are always in the best shape- why experience in third party security is like an MBA for a future career as a CISO- how to balance depth with any specific vendor vs breadth across assessing the risk of many vendors- why (and how) security should build relationships, educate, and set timelines with business units- why you want to establish as many methods of communication as possible between security processes so you encourage people to want to do the right security- why transparency matters________________________________GuestKyle TobenerOn Linkedin | https://www.linkedin.com/in/kyletobener/On Twitter | https://twitter.com/kylekyle ________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources ________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 765How Are Hackers Made? | Contextualizing Technology And Art | Why Computer Power Is Never Enough | What Could Cybersecurity Learn From Plants? | Vinyl Records & Video Cassette - Remembering BlockBuster | Through The TechVine Radio Program Episode Twenty
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Philip Wylie (The Hacker Maker)as a guest on the show — together they talk about: How Are Hackers Made? | Contextualizing Technology And Art | Why Computer Power Is Never Enough | What Could Cybersecurity Learn From Plants? | Vinyl Records & Video Cassette - Remembering BlockBuster | Through The TechVine Radio Program Episode TwentyWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Phillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 764A Mirror On Society: Debiasing Artificial Intelligence (AI) And The Importance Of AI Ethics | A Conversation with Catherine Yeo | DeltaX Podcast With Ellen Xu
Harvard CS and English undergraduate student, Catherine Yeo, talks about her journey founding an AI ethics organization with tens of thousands of article views and discovering her interests through her love of writing.Besides founding her organization Fair Bytes, Catherine is also lead venture partner at Contrary Capital and has previously worked at Disney’s StudioLab, Dover, IBM Research, and Apple in AI research and software engineering roles.“I want to help others really look at AI from both technical and ethical perspectives… and also consider who they are also designing this algorithm for and how they can maximize the help for them.” - CatherineIn this episode, we talk:AI ethicsComputer science + EnglishEducation and impactFor anyone interested in developing tech solutions to impactful problems, this podcast episode provides insight into important implications and how we can work together as a society to de-bias our algorithms._______________________GuestCatherine YeoOn LinkedIn | https://www.linkedin.com/in/catherine-yeo/On Twitter | https://twitter.com/catherinehyeo______________________HostEllen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu______________________This Episode’s Sponsors ______________________ResourcesFairbytes: https://fairbytes.org______________________For more podcast stories from Delta X Podcast With Ellen Xu: https://itspmagazine.com/delta-x-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________Want more? Catch this week’s episode and previous ones on the DeltaX newsletter: https://newsletter.deltaxpod.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 763Software Developer Turned Web App Pentester And Content Creator | A Conversation With Rana Khalil | The Hacker Factory With Phillip Wylie
Rana discovered application security as a software developer which inspired her interest in web app pentesting.During her studies and journey to prepare for the OSCP certification, Rana started sharing what she learned in blogs and went on to create video learning content for aspiring pentesters and security professionals._______________________GuestRana KhalilOn Linkedin | https://www.linkedin.com/in/ranakhalil1/On Twitter | https://twitter.com/rana__khalilOn YouTube | https://www.youtube.com/channel/UCKaK-XPQAbznwIISC46b1oAOn Medium | https://ranakhalil101.medium.com/______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________ResourcesAcademy: https://academy.ranakhalil.com/______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 762The Blue Lava Origin Story | A Blue Lava Story With Co-Founders Demetrios Lazarikos (Laz), Julia Tran, Jonna Melinauskas, And Andy Hoernecke
This is one of those origin stories that we love to share on ITSPmagazine. While each company's story is unique, inspiring, and beautiful in its own way, this one is told by the four friends that happen to be those that had a dream and turned it into reality. It is an extraordinary moment for the four of the co-founders to tell us how Blue Lava came to be and for us to share it with all of you.Legend says that it all started with a walk on the beach, a napkin, and a poem written just for them on the Embarcadero in San Francisco. Fiction or reality? This is what we are going to find out from Laz, Julia, Joanna, and Andy.When an entire community of top cybersecurity professionals comes together, magic can indeed happen, and a new kind of company with a revolutionary vision — and platform — can come to life.Join us and listen to this inspiring conversation about the origins of Blue Lava — even the name.Note: This story contains promotional content. Learn more.____________________________GuestsDemetrios Lazarikos (Laz)On Linkedin 👉https://www.linkedin.com/in/iamlaz/On Twitter 👉https://twitter.com/otrwithlazJulia TranOn Linkedin 👉https://www.linkedin.com/in/julia-tran-1840895/Jonna MelinauskasOn Linkedin 👉https://www.linkedin.com/in/jartukovich/Andy HoerneckeOn Linkedin 👉https://www.linkedin.com/in/andy-hoernecke-6a94787/____________________________Be sure to visit Blue Lava at https://itspm.ag/blue-lava-w2qs to learn more about their team and their offering.____________________________Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 761Transhumanism And Biohacking | What Makes Us Human? | Redefining Technology With Len Noe
According to our guest, Len Noe, “biohackers exist and walk among us.” We have no reason to doubt him. His latest talk called “BioHackers, Augmented Human Attack Vectors” explains the details — but that’s only one side of our conversation: the meaning of transhumanism and the relationship between being human and technology.We all enjoyed this conversation so much that we decided to dig deeper into more philosophical topics, soon, with Len.Start here, and stay tuned for more.______________________________GuestsLen NoeOn Linkedin | https://www.linkedin.com/in/len-noe/On Twitter | https://twitter.com/hacker_213______________________________ResourcesSecTor Talk | BioHackers: The Invisible Threat: https://sector.ca/sessions/biohackers-the-invisible-threat/What is Transhumanism: https://whatistranshumanism.org/______________________________This Episode’s SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qsDevo ✨ https://itspm.ag/itspdvwebAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technology Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 759WiCyS | Vladimir The Cat | Lynn’s Scary Mummy | Plants And Solar Panels | A DNA Test That Tells You What To Eat | An Electric Cure to Depression | Happy Bday Pac-Man | Through The TechVine Radio Program Episode Nineteen
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Lynn Dohm (Executive Director At WiCyS) as a guest on the show — together they talk about: WiCyS | Vladimir The Cat | Lynn’s Scary Mummy | Plants And Solar Panels | A DNA Test That Tells You What To Eat | An Electric Cure to Depression | Happy Bday Pac-Man | Through The TechVine Radio Program Episode NineteenWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Lynn Dohm On LinkedIn 👉 https://www.linkedin.com/in/lynndohm/On Twitter 👉 https://twitter.com/lynn_dohmWiCys Website 👉 https://www.wicys.org____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 760The Importance Of Soft Skills In The Workforce | A Conversation With Casey Driscoll | Hackerz And Haecksen Podcast With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
Casey Driscoll is a rockstar in the learning and development space. Join Erika, Jax and Casey for an engaging conversation on the importance of soft skills in the workforce. Casey breaks down invaluable soft skills that are relevant for any industry. Starting with how you present yourself, your communication skills and relationship building.Casey provides guidance around communicating and receiving feedback around these soft skills and how to take action. Tune in to the latest Hackerz and Haecksen episode to hear more about “what you permit, you promote” and how you can take action today!__________________________GuestCasey DriscollOn Linkedin | https://www.linkedin.com/in/cassandra-driscoll-ma-cpc-sphr-b4691a49/__________________________HostsJaclyn (Jax) ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffieJon HelmusOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jon-helmus__________________________Sponsors__________________________ResourcesCasey's Personal Website: https://www.holisticleadershipcoach.co/__________________________For more podcast stories from Hackerz And Haecksen with Jaclyn (Jax) Scott, Erika McDuffie, and Jon Helmus, visit: 👉 https://www.itspmagazine.com/hackerz-and-haecksen-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 758Book | Cybersecurity Career Master Plan: Proven Techniques And Effective Tips To Help You Advance In Your Cybersecurity Career | Redefining Security With Dr. Gerald Auger, Jaclyn (Jax) Scott, Jon Helmus, And Kim Nguyen
What would you do differently if you knew then what you know now? Good question, but not practical, because that is obviously not going to happen. Still, some people have “been there” before you, and even if they cannot guide you step by step — they can lay out some master plans and give you some tips on how to advance your cybersecurity career.This is a field that is constantly changing. So even if you did know what and where you want to be tomorrow, there's a good chance that you would adjust your destination (and goals) as you go; but it sure would be nice to have some guidelines to start on the right path, to receive some advice, and maybe even a guide as you climb up that mountain.Jax, Kim, Gerald, and Jon come from different backgrounds, experiences, and all have diverse skills. Nevertheless, they are all extremely valuable for anyone who is about to embark on, or needs some guidance along the way through, their infosec profession adventure.Join us as we learn what inspired them to co-author this book, what they bring to the table, teach, and even learn from each other as they wrote this Cybersecurity Career Master Plan.There is something for everyone in this book, even for themselves.Listen up and let us know your thoughts.___________________About the bookCybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.This book is designed by leading industry experts to help you enter the world of cybersecurity with confidence, covering everything from gaining the right certification to tips and tools for finding your first job. The book starts by helping you gain a foundational understanding of cybersecurity, covering cyber law, cyber policy, and frameworks. Next, you'll focus on how to choose the career field best suited to you from options such as security operations, penetration testing, and risk analysis. The book also guides you through the different certification options as well as the pros and cons of a formal college education versus formal certificate courses. Later, you'll discover the importance of defining and understanding your brand. Finally, you'll get up to speed with different career paths and learning opportunities.By the end of this cyber book, you will have gained the knowledge you need to clearly define your career path and develop goals relating to career progression.____________________________GuestsDr. Gerald AugerOn LinkedIn | https://www.linkedin.com/in/geraldauger/On Twitter | https://twitter.com/gerald_augerJaclyn (Jax) ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottJon HelmusOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jon-helmusKim NguyenOn LinkedIn | https://www.linkedin.com/in/kimnguyenm/____________________________ResourcesBook | Cybersecurity Career Master Plan: Proven Techniques And Effective Tips To Help You Advance In Your Cybersecurity Career: https://www.amazon.com/dp/B097HSV755/____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 759Health Drives Performance | A Conversation With Dr. Glen Robison, MD | Tech Done Different With Ted Harrington
What do nutrition, rest, and movement have to do with peak performance in your career? Surgeon Dr. Glen Robison, MD joins Tech Done Different to help explain. You'll learn:why people will do anything to escape pain, and when you're in pain, cognition diminisheswhy to eat organic, and avoid the toxins & chemicals omnipresent in food, which lower your immune systemwhat it means to "eat to your body temperature" and how to do itwhy good nutrition delivers better performance, more energy, more stamina, less stress, less anxiety, and more claritywhy "movement is life" and the best way to think about exercisewhat happens when you think differently about your sleep patterns________________________________GuestDr. Glen Robison, MDOn Linkedin | https://www.linkedin.com/in/glen-robison-68a871199/On Twitter | https://twitter.com/glenrobisondpm________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources ________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 757From Aspiring Herbalist To Red Teamer | A Conversation With Joe Vest | The Hacker Factory With Phillip Wylie
Joe Vest started his journey as an aspiring herbalist, then his focus turned to IT working as a sysadmin.Joe's knack for technology as a sysadmin led him to cybersecurity and then red teaming when the discipline was not very known or practiced._______________________GuestJoe VestOn Linkedin | https://www.linkedin.com/in/joe-vest/On Twitter | https://twitter.com/joevest______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________ResourcesJoe's book Red Team Development and Operations A PRACTICAL GUIDE: https://redteam.guide/______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 756The Only Constant Is Change. Staying On Course When The Ground Falls Away | The Mentor Project Series On ITSPmagazine | Redefining Society With Hara Estroff Marano
In a world where technology accelerates the speed of change in our society, the only way to stay grounded is to accept that you can’t. We have to learn how to keep up with the times and prepare the next generation for that.With three books and a long carrier as editor of Psychology Today, Hara Estroff Mariano shares her personal and professional experience on the matter.____________________________GuestsHara Estroff MaranoOn LinkedIn | https://www.linkedin.com/in/hara-estroff-marano-55b2512/On Twitter | https://twitter.com/HaraMarano____________________________ResourcesLearn more about the Mentor Project: https://www.mentorproject.org/Book | A Nation of Wimps: The High Cost of Invasive Parenting: https://www.amazon.com/Nation-Wimps-High-Invasive-Parenting/dp/0767924037/____________________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcwebBlackCloak 👉 https://itspm.ag/itspbcweb____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-societyTo hear more from The Mentor Project Series, visit: https://www.itspmagazine.com/the-mentor-project-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 755Break The Shackles Of Stalkerware | A Conversation With Martijn Grooten | Your Everyday Cyber With Limor Kessem And Diana Kelley
Stalkerware can monitor all of your device activity. Martijn Grooten, Coordinator The Coalition Against Stalkerware talks us through what to do if you’re being cyberstalked.Stalkerware is software that is installed by abusers and predators on a victim’s device without their consent. Stalkerware can monitor your emails, texts, social media posts, phone conversations and browsing history. Unfortunately, the solution may not be as simple as deleting the app, if you can even find it. But there are ways to protect yourself.Conversation highlights:What stalkerware is and doesWhether or not stalkerware is legalHow stalkers install it on devicesWhy you might not want to delete it immediatelySteps you can take online and IRL to protect yourselfWhere and how to report if you are in an abusive relationship and need help________________________________GuestMartijn GrootenOn LinkedIn | https://www.linkedin.com/in/martijngrooten/________________________________HostsLimor KessemOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/limor-kessemDiana KelleyOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelley________________________________ResourcesNational Domestic Violence Hotline (USA): https://www.thehotline.org/The Coalition Against Stalkerware: https://stopstalkerware.org/________________________________This Episode’s Sponsors ________________________________For more podcast stories from Your Everyday Cyber With Limor Kessem and Diana Kelley 🎙✨ https://www.itspmagazine.com/your-everyday-cyber-podcastIf you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here 👍 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 754Mental Health | A Conversation With Ryan Louie | The Changemaking With Chloé Messdaghi
The pandemic has brought out a sense of work and personal balance. Now it's time to dive in further.Learn about burnout, PCSD, and what organizations can do to make a better environment for employees' health.GuestDr. Ryan LouieOn LinkedIn | https://www.linkedin.com/in/ryanlouie/On Twitter | https://twitter.com/ryanlouie______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________Resources ______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 753Dogs and Halloween | Technology makes spycraft obsolete and more dangerous | The many reasons for keeping our phones and gadgets | Robot's inner speech improves trust and interactions with people | Through The TechVine Radio Program Episode Eighteen
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Chloé Messdaghi as a guest on the show — together they talk about: Dogs and Halloween | Technology making the old way of spying obsolete and more dangerous | From climate crisis to child labor; the many reasons for keeping our phones and gadgets | Robot's inner speech affects a human user's trust and improve its interactions with people | Through The TechVine Radio Program Episode EighteenWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐This episode’s news links:Technology making the old way of spying obsolete and more dangeroushttps://www.nbcnews.com/politics/national-security/human-spies-have-become-obsolete-says-one-expert-culprit-technology-n1280965From climate crisis to child labor; the many reasons for keeping our phones and gadgetshttps://www.cnn.com/2021/10/03/tech/right-to-repair-climate-environmental-impact/index.htmlRobot's inner speech affects a human user's trust and improve its interactions with peoplehttps://techxplore.com/news/2021-10-explores-robot-speech-affects-human.htmlhttps://techxplore.com/news/2021-04-pepper-robot-interactions-people.html Learn more about these topics and some more by listening to this podcast.We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Chloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 752Naked As A Jaybird | Amazon Astro, Privacy For The Elderly And Disabled, And Centralized Privacy In The U.S. | A Conversation With Liz Wharton | The National Blast With Keenan Skelly
Naked As A Jaybird: Amazon Astro, Privacy For The Elderly And Disabled, And Centralized Privacy In The U.S._______________________GuestLiz WhartonOn LinkedIn | https://www.linkedin.com/in/elizabeth-wharton/On Twitter | https://twitter.com/LawyerLiz______________________HostKeenan SkellyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly______________________This Episode’s SponsorsvArmour 👉https://itspm.ag/varmour-8d92______________________Resources ______________________For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 751Kindness First | A Conversation With Jason Geffner | Tech Done Different With Ted Harrington
As a security consultant who transitioned to lead product security in-house, Jason Geffner has seen both sides of the application security process. He joins Tech Done Different to provide insights about consulting vs. in-house, leadership, the role of kindness in team dynamics, and managing third party security risk.You'll learn:why it's the consultant's job to find vulnerabilities, but not necessarily to fix themwhy it's ok to accept risk sometimeswhy there is no such thing as "perfect security"why hiring is always the hardest part of managing teams________________________________GuestJason GeffnerOn Linkedin | https://www.linkedin.com/in/geffner/On Twitter | https://twitter.com/jasongeffner________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec👉 https://itspm.ag/crowdsec-b1vp________________________________Resources ________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 750Event Presentation | October 20th 2021 Is The First Ever SOC Analyst Appreciation Day | A Conversation About The Value Of The SOC In Running A Business With Nipun Gupta
SOC analysts are often overworked and under-appreciated — but that needs to change! How and where do the SOC and the SOC analyst make positive impacts on the business? That's exactly what we explore in this new episode.In this third of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Nipun Gupta, a security engineer and security operations leader who has held roles at Deloitte and Deutsche Bank. During our conversation, we look at how the business value of the SOC can be much more than just blocking attacks and how business requirements map to SOC objectives and vice versa.ITSPmagazine is proud to partner with Devo to recognize the efforts put in by the practitioners working away in the trenches and on the front lines of cybersecurity. Join us to help us recognize them and their efforts.About the SOC Analyst Appreciation DayJoin us for five hours of live-streamed content — with sessions ranging from what skills are needed to move up in the SOC, to desk decompression from a yoga instructor, to a panel discussion about a day in the life of a SOC, to a "Lunch & Laugh" where a stand-up comedian will provide some much-needed de-stressing entertainment. There's a ton to celebrate — let's do this!Learn more about SOC Analyst Appreciation Day: https://itspm.ag/devoq0zz______________________________GuestNipun GuptaOn Linkedin | https://www.linkedin.com/in/guptanipun/______________________________To see and hear more conversations about and from this event as we explore the personal, technical, operational, and innovative aspects of this role:🎙✨ https://www.itspmagazine.com/first-annual-soc-analyst-appreciation-dayLearn more about promoting your own event on ITSPmagazine:👉 https://itspm.ag/pyevmn Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 749Event Presentation | Hack For Troops | CyberSecurity Gaming For The Benefit Of Military Veterans | A Conversation With Tech For Troops' Mark Casper
The cybersecurity gaming event, Hack For Troops, takes place on October 30, 2021 from 9AM–4PM ET. Listen in to learn how you can play, watch, and support this program which helps raise money for the non-profit, Tech For Troops.About the Hack For Troops EventHack For Troops is an annual capture the flag fundraising event to support Tech For Troops. Tech For Troops is the fastest growing national non-partisan veterans organization bridging the digital divide. We provide in-need veterans and children of veterans with affordable refurbished computers and opportunities to partner with businesses that provide training and networking experiences.Learn more about Hack For Troops: https://itspm.ag/154ca8About Tech For TroopsTech for Troops is the fastest growing national non-partisan veterans organization bridging the digital divide. We provide in need veterans and children of veterans with affordable refurbished computers and opportunities to partner with businesses that provide training and networking experiences.Learn more about Tech For Troops: https://itspm.ag/69ac92______________________________GuestMark CasperOn Linkedin | https://www.linkedin.com/in/mark-casper-b2b4896/Tech For TroopsOn LinkedIn | https://www.linkedin.com/company/4794466/On Twitter | https://twitter.com/TechForTroopsVAOn Facebook | https://www.facebook.com/Tech4Troops/On YouTube | https://www.youtube.com/channel/UCnEJtjGP-D6_92XrjjAsqRw______________________________ResourcesThe Why ... https://www.youtube.com/watch?v=zRYZFIhG804The What ... https://www.youtube.com/watch?v=iCIE6QAveI0______________________________Learn more about promoting your own event on ITSPmagazine:👉 https://itspm.ag/pyevmn Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 748Book | Navigating The CyberSecurity Career Path | Redefining Security With Helen Patton
Many paths can bring you to a specific place — no single one of them is the absolute best. One can be faster, another easier, another more pleasing to the eye, sunnier, darker; it is up to you to decide. What you do need to know is what the options are to make the decision that is right for you. Maybe you’ll even change your mind a bit while on the way.Of course, we are not talking about vacationing and exploring here — we are talking about cybersecurity. What is the right path?One piece of good advice is to ask people that have been there before you; network with them. Ask those that have experienced the different ways and may share their experience with you. Then you can decide where to start.But it is not just about the way to the destination. What do you do when you reach what you thought was your forever destination and you want to change it up a bit, or even, one day, be done with it and move up? Left? Right? Down?Join our chat with Helen Patton, and let’s decide where we can go today — and how we could get there.____________________________GuestHelen PattonOn LinkedIn | https://www.linkedin.com/in/helenpatton/On Twitter | https://twitter.com/CisoHelen____________________________ResourcesBook | Navigating The CyberSecurity Career Path: https://www.amazon.com/Navigating-Cybersecurity-Career-Path-Insider/dp/1119833426/More About Helen Patton: https://www.cisohelen.com/____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 747From Pentesting Applications To Educating The Masses | A Conversation With Louis Nyffenegger | The Hacker Factory With Phillip Wylie
During Louis Nyffenegger's education at a university, he discovered his interest in information security.Louis went on to create a globally popular web app pentesting learning platform used by aspiring pentesters and bug hunters. Louis is passionate about educating and helping others, which is more obvious the more you learn about him._______________________GuestLouis NyffeneggerOn Linkedin | https://www.linkedin.com/in/nyffeneggerlouis/On Twitter | https://twitter.com/snyff______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________ResourcesFree Exercises on PentesterLab: https://pentesterlab.com/exercises?dir=desc&only=free______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 746Book | Transformative | Being Innovative Is No Longer Enough. To Win, You Need To Be Transformative. | Redefining Technology With William Kilmer
Companies are putting more resources than ever into producing innovative solutions, yet nearly every executive expresses some level of dissatisfaction with their company's innovation performance. That's because while innovation is still critical, it's no longer enough.Join us as we talk to a technological thought leader and investor, William Kilmer. Together, we explore why organizations need to step back and build a strategy that not only will produce great products, but that can transform the market.What allows a company to transform is to understand societal and cultural changes that are or are about to take place. If they can foster their teams to develop a strategy beyond being first to the market or leader in the industry but to reach, serve, and create loyalty uniquely and innovatively to customers in that market segment.All of this will likely require that the organization re-tool itself for innovation. This doesn't magically happen; teams don't just start producing something innovative. Instead, the individuals and the teams themselves become innovative. This is transformation.“Transformative companies aren’t first movers who invent new products; they’re game-changers whose category-creating solutions deliver new and better customer outcomes, altering industry structure, and radically changing and reframing existing markets.”About The Book"I wrote Transformative as a framework that will help companies build the momentum and strategy to become a game-changing organization. Behind it is the principle that companies that accept the rules of the market are condemned to live by them and limit their ability to compete to a narrow set of product features and performance. Those that open themselves to a broader view of how to innovate to win have many more options for success."______________________________GuestWilliam KilmerOn Linkedin | https://www.linkedin.com/in/wkilmer/On Twitter | https://twitter.com/wkilmer______________________________ResourcesBook | Transformative: https://www.williamkilmer.com/transformative.html______________________________This Episode’s SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qsDevo ✨ https://itspm.ag/itspdvwebAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technology Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 745CyberSecurity Leaders Use The Blue Lava CMM To Achieve Cybersecurity Maturity With Their InfoSec Program | A Blue Lava Story With Demetrios Lazarikos (Laz) And Andy Hoernecke
While InfoSec teams must mature their cybersecurity programs to protect digital assets, it's just as essential to synchronize programs with business objectives. Only then can InfoSec teams ensure their activities strategically support market penetration, revenue generation, and cost-saving business processes—rather than continually functioning in firefighting mode. And this is precisely one key area where Blue Lava aims to help cybersecurity leaders succeed with delivering the Blue Lava CMM: Cybersecurity Maturity.What Salesforce did for sales and SAP did for Finance, Blue Lava is bringing to the world of cybersecurity. Blue Lava's business application is built by and for security leaders to help them strategically manage their functions all in one place. Blue Lava guides security leaders to measure, optimize, and communicate their security programs strategically.The team at Blue Lava combines their deep operational experience with prominent industry subject matter experts to bring to market a platform with, by, and for the security leadership community. Blue Lava guides security leaders to measure, optimize, and communicate their security programs strategically. CMM is a critical part of that process.Listen in to learn more from Laz and Andy as they share their experiences and expertise. Join us to examine what it means for InfoSec teams to achieve maturity and how a comprehensive program framework can help the group begin their journey by setting a baseline and establishing maturity measurements. Download this informative resource now to learn more about:aligning your security framework to the needs of the business by arming the right people with the proper knowledge and the correct dataidentifying gaps and achieving the maturity goals you want with your InfoSec program based on where your investments are being made or maybe lackingbuilding a mature cybersecurity program that delivers value to the risk management practices that not only protect business growth but also help to drive the business forwardNote: This story contains promotional content. Learn more.____________________________GuestsDemetrios Lazarikos (Laz)On Linkedin 👉https://www.linkedin.com/in/iamlaz/On Twitter 👉https://twitter.com/otrwithlazAndy HoerneckeOn Linkedin 👉https://www.linkedin.com/in/andy-hoernecke-6a94787/____________________________eBook | Achieving Security Program Maturity: https://itspm.ag/blue-llfm0And, be sure to visit Blue Lava at https://itspm.ag/blue-lava-w2qs to learn more about their offering.____________________________Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 744Fun With Flags! Get Hands-On Cyber Experience While Making Friends At CTFs | A Conversation With Akshay Rohatgi | Your Everyday Cyber With Limor Kessem And Diana Kelley
Cybersecurity is so hot companies can’t hire fast enough. What’s the blocker? Experience. But how can recent grads and those in school get it? CTF expert Akshay Rohatgi explains how to get involved.One of the most common questions we get is: how can I get experience if I can’t get that first job? Even entry-level cyber roles often require 1-3 years of experience. Early stage cyber experts can practice and hone their skills by participating in bug bounty programs, open-source projects, and internships. Another great way to get experience and build your network are Capture the Flag (or CTF) competitions.Conversation highlights:What a capture the flag contest isThe difference between Jeopardy v. Attack/Defense competitionsWhat to expect during an eventHow much experience you need to join oneLearn about the Air Force Association’s CyberPatriot National Youth Cyber Education ProgramThe craziest thing that happened to Akshay during competitionHow you can get involved________________________________GuestAkshay RohatgiOn LinkedIn | https://www.linkedin.com/in/akshay-rohatgi-1564521b2/On Twitter | ________________________________HostsLimor KessemOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/limor-kessemDiana KelleyOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelley________________________________ResourcesWhat is US CyberPatriot?: https://www.uscyberpatriot.org/Pages/About/What-is-CyberPatriot.aspxList of Capture the Flag Competitions: https://ctftime.org/________________________________This Episode’s Sponsors ________________________________For more podcast stories from Your Everyday Cyber With Limor Kessem and Diana Kelley 🎙✨ https://www.itspmagazine.com/your-everyday-cyber-podcastIf you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here 👍 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 743WAFs And APIs And Data Highways, Oh My! | An Imperva Story With Alissa Knight And Kunal Anand
The state of API Security is in constant flux, with traditional WAF technologies being paired with, and extended by, newer models of application-driven protections. With Gartner recognizing this trend and introducing a Web Application & API Protection market, what do two long-time API security leaders think about WAFs and their immediate and long-term limitations? More pointedly, why don't traditional WAFs work well when it comes to securing APIs?We're glad you asked - that's precisely what Alissa Knight and Kunal Anand get into during this high-energy, in-depth conversation about the future of APIs and the future of API security in this latest Their Story with Imperva.Listen in to this unscripted and incredibly passionate conversation to learn about their best practices and recommended approaches to API security. It may help you to change or tune-up, your perspective and take new actions.Note: This story contains promotional content. Learn more.____________________________HostAlissa KnightOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alissa-valentina-knightGuestKunal AnandOn LinkedIn | https://www.linkedin.com/in/kunalanand/On Twitter | https://twitter.com/ka____________________________Be sure to visit Imperva at https://itspm.ag/imperva277117988 to learn more about their offering.On Linkedin 👉https://www.linkedin.com/company/imperva/On Twitter 👉https://twitter.com/ImpervaWatch the video here: https://youtu.be/2FxkrZBhKgAMore from this APIs series with Imperva: https://www.itspmagazine.com/their-stories/taming-the-chaotic-world-of-api-security-finding-your-path-to-protection-an-imperva-storyArticle | Why WAFs Don’t Work According to a Hacker: https://www.sdxcentral.com/articles/news/why-wafs-dont-work-according-to-a-hacker/2021/08/____________________________Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 742Welcome To The Metaverse: Virtual Reality For Immersive Education | A Conversation With Nicolas Barone | DeltaX Podcast With Ellen Xu
Nicolas is creating the next reality for online learning using VR - the intersection of accessible education and movement towards the metaverse.After realizing the difficulties and lack of immersiveness of online learning, Nicolas took a gap year from his studies at Cornell as an Applied Mathematics major to found a VR company, combining technology with his passion for educational accessibility. They have now taught over 10,000 students and are currently the 3rd largest VR events producer.But education isn’t the only application for VR. 3D interactions in a virtual setting form the foundations of the “metaverse”.“A new reality but a digital life, just like you would do things in real life in a new location and meet people, but in a digital sense and represented as a 3D avatar.”Nicolas discusses the applications of VR to education, trends of online and in-person education, and the rise of the metaverse._______________________GuestNicolas BaroneOn LinkedIn | https://www.linkedin.com/in/nicolas-barone______________________HostEllen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu______________________This Episode’s Sponsors ______________________Resources ______________________For more podcast stories from Delta X Podcast With Ellen Xu: https://itspmagazine.com/delta-x-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________Want more? Catch this week’s episode and previous ones on the DeltaX newsletter: https://newsletter.deltaxpod.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 741Adjusting To Remote Work Life | A Conversation With George Tang | Hackerz And Haecksen Podcast With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
Join Jax and Erika for an interactive conversation with returning guest, George, surrounding the work style changes and life hacks that COVID- 19 has presented.We talk through the challenges that were faced by many, hacks for managing workload and battling meeting exhaustion.__________________________GuestGeorge TangOn Linkedin | https://www.linkedin.com/in/georgetang/__________________________HostsJaclyn (Jax) ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffieJon HelmusOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jon-helmus__________________________Sponsors __________________________For more podcast stories from Hackerz And Haecksen with Jaclyn (Jax) Scott, Erika McDuffie, and Jon Helmus, visit: 👉 https://www.itspmagazine.com/hackerz-and-haecksen-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 740Food Science | A Conversation With Josh Nixon | Tech Done Different With Ted Harrington
How is making meatless meat similar or different from hacking software? to answer that (and more), we're joined by Josh Nixon, CTO of meat alternative pioneer Prime Roots. We discuss what tech even is (hint: not always software), and how to think about the acceleration of innovation.You'll learn:why tech typically refers to software (but it shouldn't)how the idea of accidental discovery drives innovationwhy you don't need to know the science behind something to know itwhy "we don't know crap"what happens when you build on the work of others________________________________GuestJosh NixonOn Linkedin | https://www.linkedin.com/in/nixonpjoshua/On Twitter | https://twitter.com/nixonpjoshua________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec👉 https://itspm.ag/crowdsec-b1vp________________________________Resources ________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 739Crowdsourcing CyberSecurity Intelligence To Secure Society | A CrowdSec Story With Philippe Humeau
Suppose you still believe the narrative of a hooded figure with ski gloves and a crowbar attacking a company network. In that case, this may be hard to digest: Cybercrime is a business. Cybercriminals are well organized.They share data; sell information; rent, lease, and trade tools; and market their business.It's time to source the crowd of cyber defenders to counter this advantage.Many organizations are spending millions, if not billions, of dollars standing up multi-layered endpoint, network, and perimeter protection systems, multi-layered cloud security solutions, and privilege-oriented identity management systems, as well as real-time security operations centers - and much, much more.And let's not forget that the security team needs to do all of this while allowing the users to get their job done and, in the best-case scenario, not having to worry about any of this. The Cybercriminal environment doesn't have to worry about this — actually, they will try to take advantage of it. All their investments go straight into understanding their target. What technology is used to run the business, what are their weaknesses, and how can they get in and out with as much value as possible without the possibility of being caught. Cybercriminals use threat intelligence to attack. This is what they can focus on, and they use it to their advantage, each and every day.CrowdSec is joining the good guys on this battlefield and understands that by acting together and sharing important, relevant pieces of information, we can successfully counteract organized cybercrime. CrowdSec's CTI-driven IPS objective is to automate cybersecurity threat intelligence sharing and consumption on a large scale.How does that happen?Through the crowd, of course.What makes it work beyond scale?It's all about the real-world context that the crowd experiences and shares.There are plenty of data lakes, and CTI feeds available to determine the state of an IP address; has it been seen as malicious or not?That's only part of the question.How relevant are these data sets to your business? To your environment? To your risk level? Can you ingest them, make sense of them, take action from them?Once these and many other questions are answered, captured, shared, and utilized at scale by the crowd, we can effectively become competitive against cybercrime.Learn more about what it means to join the crowd and how all the information can benefit businesses and organizations all over the globe.This is the value of authentic and accurate information sharing.Note: This story contains promotional content. Learn more.____________________________GuestPhilippe HumeauOn Linkedin 👉https://www.linkedin.com/in/philippehumeau/On Twitter 👉https://twitter.com/philippe_humeau____________________________Be sure to visit CrowdSec at https://itspm.ag/crowdsec-b1vp to learn more about their offering.On Linkedin 👉https://www.linkedin.com/company/crowdsec/On Twitter 👉https://twitter.com/Crowd_SecurityWatch the video here: https://youtu.be/cOMg-Jk5rXE____________________________Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 738Event Presentation | October 20th 2021 Is The First Ever SOC Analyst Appreciation Day | A Conversation About The Value And Drivers Of Technology Innovation With Josh Klick
SOC analysts are often overworked and under-appreciated — but that needs to change! Many look to improve their work environment through the use of technology and innovation. In the SOC, we need a lot of tuning to find that delicate balance between business goals, technology innovation, and the humanity in the machine.Scripting, coding, and other forms of automation come in handy when trying to make it through the day as a Security Operations Center (SOC) Analyst. However, there's much more to the role when it comes to innovation.Why and how we use technology is at the core of many of our conversations here at ITSPmagazine. When we talk about professions where technology can be at the same time a massive player in business performance and mental health improvement, we do wonder if, and how, the two can be leveraged to serve the same purpose. We hope it does.In this second of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Josh Klick, a SOC practitioner who successfully worked his way up into managerial and advisory positions for some large global enterprises. Together, we explore how and when innovation can be used to help the organization become more efficient and how the analysts themselves can open their minds creatively to not only accomplish more but to also feel better, mentally, about the work they are performing.ITSPmagazine is proud to partner with Devo to recognize the efforts put in by the practitioners working away in the trenches and on the front lines of cybersecurity. Join us to help us recognize them and their efforts.About the SOC Analyst Appreciation DayJoin us for five hours of live-streamed content — with sessions ranging from what skills are needed to move up in the SOC, to desk decompression from a yoga instructor, to a panel discussion about a day in the life of a SOC, to a "Lunch & Laugh" where a stand-up comedian will provide some much-needed de-stressing entertainment. There's a ton to celebrate — let's do this!Learn more about SOC Analyst Appreciate Day: https://itspm.ag/devoq0zz______________________________GuestJosh KlickOn Linkedin | https://www.linkedin.com/in/klick/______________________________To see and hear more conversations about and from this event as we explore the personal, technical, operational, and innovative aspects of this role:🎙✨ https://www.itspmagazine.com/first-annual-soc-analyst-appreciation-dayLearn more about promoting your own event on ITSPmagazine:👉 https://itspm.ag/pyevmn Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 7373D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation | Bugs in machines, computers, and code | Through The TechVine Radio Program Episode Seventeen
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Ellen Xu as a guest on the show — together they talk about: 3D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation | Bugs in machines, computers, and code | Through The TechVine Radio Program Episode SeventeenWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐In this episode we talk about:3D Organ, Tissue And Cell Printing3D-printed organs could save lives by addressing the transplant shortageWhen people die, it’s not usually because their body shuts down, but because one key organ fails that the body can’t survive without. Severe heart or kidney failure patients need prompt organ transplants to survive. That’s where 3D printed organs, such as 3D printed hearts, come in. Oh, and brain cells too!From The Conversation: https://theconversation.com/3d-printed-organs-could-save-lives-by-addressing-the-transplant-shortage-132491From 3D Sourced: https://www.3dsourced.com/guides/3d-printed-organs-bioprinting/From 3D Printing Industry: https://3dprintingindustry.com/news/scientists-3d-print-living-brain-cells-in-promising-development-for-bioprinting-196684/Identifying Disease with Natural Language Processing TechnologyA Kaiser Permanente study illustrates the value of AI-based natural language processing technology in disease diagnosis.While healthcare is currently in an era of big data and data analytics, it remains hard to identify patients with complex conditions such as valvular heart disease, making it difficult to study the disease, track practice patterns, and manage population health.From Health IT Analytics: https://healthitanalytics.com/news/identifying-disease-with-natural-language-processing-technology The “Incredibly Potent Technology” of Food FermentationTechnology is revolutionizing food, but how can it be explained to consumers? Companies are making real dairy, meat and eggs without animals and using fermentation to produce new analogs, but the challenge is describing it in a way that sounds appetizing.From Food Dive: https://www.fooddive.com/news/food-tech-explain-marketing/606401/From VegConomist: https://vegconomist.com/fairs-and-events/the-future-food-series-on-29th-september-presents-the-incredibly-potent-technology-of-fermentation/Technology News in HistoryBugs in machines, computers, and code. Also Would You Eat Bugs? September 9, 1945Operators of the Harvard Mark II find a moth trapped in relay #70 in panel F. The bug is taped to their troubleshooting log where it was written, “First actual case of bug being found”. This was not the first use of the term “bug” for computer problems, but this was the first time the term “debug” was used.From Wikipedia: https://en.wikipedia.org/wiki/Software_bug#Etymology Learn more about these topics and some more by listening to this podcast.We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Ellen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 736We're In This Together | A Conversation With Phillip Wylie | The National Blast With Keenan Skelly
Breach verification reform has been needed for a long time. Now with legislation on the floor, CISA has the opportunity to change the paradigm._______________________GuestPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________HostKeenan SkellyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly______________________This Episode’s SponsorsvArmour 👉https://itspm.ag/varmour-8d92______________________ResourcesHacking is Not A Crime: https://www.hackingisnotacrime.org______________________For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 735The Escalating Demand For Tech Talent | NPower's ATCC Quarterly Event | Redefining Security Education With John Miller, Shani Waugh, Larry Quinlan, And Avneet Hall
As the industry returns to work, how are companies planning to secure and retain talent in a time where employees are choosing to work remotely? How are critical jobs in cybersecurity and cloud maintained to ensure businesses and activities remain online and secure at all times?As the demand for tech talent grows, NPower has a proven pipeline for diverse, passionate technology professionals. From cybersecurity to cloud computing, program graduates have invested in themselves to open career opportunities. The ATCC is leading the way in supporting career growth and professional development for young adults from underserved communities and military veterans. Join us for this timely discussion as we approach the future of work, post-pandemic, and meet with tech industry leaders to learn how your company can partner with NPower.Join Sean Martin, NPower, and the Advancing Tech Careers Collaborative (ATCC) steering committee members for a panel conversation discussing the increasing demand for tech talent. Want to see the crew in action? Watch them here.____________________________GuestsJohn MillerOn LinkedIn | https://www.linkedin.com/in/johnrmiller11/Shani WaughOn LinkedIn | https://www.linkedin.com/in/shani-waugh-447a4521/Larry QuinlanOn LinkedIn | https://www.linkedin.com/in/larryquinlan/Avneet HallOn LinkedIn | https://www.linkedin.com/in/avneethall/On Twitter | https://twitter.com/avneetthapar____________________________ResourcesLearn more about NPower: https://npower.org/On LinkedIn: https://www.linkedin.com/company/npower-nyOn Twitter: https://twitter.com/NPowerOrgOn Facebook: https://www.facebook.com/npower.org/Watch the panel video: https://www.youtube.com/watch?v=6aokbNaw-kw____________________________This Episode’s SponsorsDevo 👉https://itspm.ag/itspdvweb____________________________To see and hear more Redefining Education stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-educationAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 733From Pawning To Pwning | A Conversation With Cory Billington | The Hacker Factory With Phillip Wylie
Cory Billington a former member of the US Navy, worked with car racing, and in pawn shops before he found his passion.Cory found his passion in pentesting and red teaming and now works for a large national insurance company. He shares his story and recommendations on becoming an ethical hacker._______________________GuestCory BillingtonOn Linkedin | https://www.linkedin.com/in/mcorybillington/On Twitter | https://twitter.com/_th3y______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 734The Road To Athens | 19 Teams Compete For The European Cyber Security Challenge Title In Prague | Redefining Education With Iaonnis Agrafiotis, Advian Belmonte, Pedro Adão, Petr Jirasek, Mario Polino, Tom Levasseur, And Jessica Gulick
Let the games begin! Let your friends compete. Let the best team win! It's all part of a European strategy to attract, train, and nurture the next generations of cybersecurity professionals.Join Sean Martin, and he connects with our on-the-ground reporter and founder of the US Cyber Games, Jessica Gulick, as we discuss this year's European Cyber Security Challenge being held in Prague by Prague's cybersecurity challenge team of competitors and volunteers. What does it take to put this event together? Who is competing? Who is winning? And what does it mean to compete and win? And, why is Canada participating in a European challenge? There's a compelling and meaningful reason, trust us.Join us as we connect live with the team (watch the video) and then root on your favorite team as they compete for this challenge and then make their way on to the international cybersecurity challenge.____________________________About the European Cyber Security ChallengeEuropean countries host their national cybersecurity competitions. The winners of the national contests represent their countries in the ECSC. Similar to the ECSC, the national cybersecurity competitions consist of security-related challenges from domains such as web security, mobile security, crypto puzzles, reverse engineering, and forensics, which the participants have to solve in order to collect points. The individuals with the most points win the competition and secure a place in their national team, which will go on to compete in the ECSC finals.About the International Cybersecurity ChallengeIn the first International Cybersecurity Challenge, teams from across the globe will compete in a series of challenges such as web application and system exploitation, cryptography, reverse engineering, hardware challenges, forensics and escape rooms.About the US Cyber GamesThe US Cyber Games was founded by Katzcy, in cooperation with the National Initiative for Cybersecurity Education (NICE) program at the National Institute of Standards and Technology (NIST). The program will run from April to October 2021 and consist of the US Cyber Open, the US Cyber Combine Invitational, and the selection of the first-ever US Cyber Team™ to represent the United States at the 2021 International Cyber Security Challenge (ICSC) held in Athens, Greece in December.About the European Cybersecurity ChallengeThe European Cybersecurity Challenge (ECC) is an annual competition, coordinated by the European Union Agency for cybersecurity. The event offers a platform for young cyber talents across Europe to gather and engage in networking over a unique opportunity to experience cooperation in trying to resolve a cybersecurity problem.The ECC is intended to encourage young people to pursue a career in cybersecurity, by challenging and developing the participants’ skills needed in such extreme situations and connecting them with industry.____________________________GuestsIaonnis Agrafiotis, ENISA, ICCAdvian Belmonte, PM ECSC EnisaPedro Adão, Coach Team Portugal and EuropePetr Jirasek, Chairperson ECSC, ENISA Steering Committee, Chairman Czech National Cybersecurity Competition (led the day)Mario Polino, Italy Coach, Team Europe, TrainerTom Levasseur, Coach and Organizer for Cyber Team CanadaJessica Gulick, Founder US Cyber Games____________________________This Episode’s SponsorsDevo 👉https://itspm.ag/itspdvweb____________________________ResourcesWatch the video recorded LIVE from Prague: https://youtu.be/iN0s8165cl8European Cyber Security Challenge | Europe: https://ecsc.eu/On Twitter: https://twitter.com/enisa_euOn Facebook: https://www.facebook.com/ENISAEUAGENCYEuropean Cyber Security Challenge 2021 | Prague: https://ecsc2021.cz/On Twitter: https://twitter.com/ecsc2021On YouTube: https://www.youtube.com/channel/UCQKaxFZhfaqCwpDzq3KDO_g/On Facebook: https://www.facebook.com/ecsc2021More US Cyber Games News and Coverage on ITSPmagazine: https://www.itspmagazine.com/us-cybergames-2021-coverage-road-to-athens | On Twitter: https://twitter.com/USCyberGames | On LinkedIn: https://www.linkedin.com/showcase/us-cyber-games/EU Cyber Security Challenge: https://www.enisa.europa.eu/topics/cybersecurity-education/eu-cyber-challenge | https://europeancybersecuritychallenge.eu/____________________________To see and hear more Redefining Education stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-educationCatch all of our coverage of the US Cyber Games and other teams from around the world as they go On the Road to Athens: https://www.itspmagazine.com/us-cybergames-2021-coverage-road-to-athensAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 732Should We STOP Requiring CISOs To Have A CISSP? Let’s Talk About It | Redefining Security With Brian Bobo
We keep hearing the mantra that CISOs and CSOs need to be business leaders. So how come we keep seeing job descriptions and hearing about interviews that focus on the technical certifications like the CISSP and many others? That's exactly the question posed in a post on LinkedIn that caught our attention - and that of many others!Join us for a candid conversation with the post's author, a current CIO and CISO, Brian Bobo, as we explore the realities of what a CISO should be focused on and why relying on a technical security certification could turn the business looking in the wrong direction and leaving their risk profile in a bad way.From The LinkedIn PostI don’t post much but I need to go on a bit of a rant. I earned my CISSP years ago. As I am updating my CPEs to stay current I realize that almost nothing I do as a CISO counts for CPEs, I don’t even see a place to document incident management. And what does count can only really be categorized under the Security and Risk Management domain. Presenting, educating, serving on ISC(2) boards are all well and good but they still don’t make me a better CISO. There is nothing about strategy, leadership, presenting to a board, incident management, etc. As a CISO, strategy and leadership should be your focus. You should hire then allow and enable great people to do their jobs. So we need to STOP requiring Directors and above to have a CISSP and start thinking about these as leadership positions with a security focus.____________________________GuestBrian BoboOn LinkedIn | https://www.linkedin.com/in/brianbobo/____________________________ResourcesLinkedIn thread that inspired this conversation: https://www.linkedin.com/posts/brianbobo_stop-requiring-cisos-to-have-a-cissp-i-don-activity-6841017539837997056-HGwu/____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 730Ethics Guidelines And EU Standards In Artificial Intelligence | The Business And Morals Side Of AI Must And Can Coexist In Our Society | Redefining Technology With John Durcan, Fergal Finn, And Aditya Mohan
You may have not seen AI yet, but there is a good chance that AI has seen you. Artificial Intelligence can be used to create tremendous commercial value and can be used to bring significant improvements in how society functions. However, it must, and can, be done at the same time.We need to create and follow international standards that allow us to build AI around scientific and practical core ethics that can still retain those morals that make us humans, even when adapted to various countries and cultures. Maybe this is a time of self-reflection and understanding for who we really are. Join us for this European-rooted, internationally-oriented conversation with 3 AI experts looking at how standards, ethics, morals, and laws will play a role in defining, implementing, and monitoring the data-hungry artificial intelligence systems of today and the future.______________________________GuestsJohn DurcanOn Linkedin | https://www.linkedin.com/in/johndurcan/On Twitter | https://twitter.com/EI_JDurcanFergal FinnOn Linkedin | https://www.linkedin.com/in/fergalfinn/Aditya MohanOn Linkedin | ie.linkedin.com/in/admohan______________________________ResourcesNSAI Top Teams in Standards in AI: https://www.nsai.ie/standards/supporting-standards/top-teams-for-standards-in-artificial-intelligence/Learn more about National Standards Authority of Ireland (NSAI): https://www.nsai.ie/On LinkedIn: https://www.linkedin.com/company/national-standards-authority-of-ireland/On Twitter: https://twitter.com/nsai_standardsOn Facebook: https://www.facebook.com/NSAIstandards/On YouTube: https://www.youtube.com/user/NSAImediaLearn more about Enterprise Ireland: https://www.enterprise-ireland.com/en/On LinkedIn: https://www.linkedin.com/company/enterprise-irelandOn Twitter: https://twitter.com/EntirlOn Facebook: https://www.facebook.com/EnterpriseIreland?ref=hlOn YouTube: http://www.youtube.com/enterpriseirelandtv______________________________This Episode’s SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qsDevo ✨ https://itspm.ag/itspdvwebAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technology Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 729Book | Critical Infrastructure Risk Assessment: The Definitive Threat Identification And Threat Reduction Handbook | Redefining Security With Ernie Hayden
In a world where everything is connected and interdependent, complexity has become part of our very way of life, and it must be part of our way of thinking. But, especially when we look at infrastructure security, the boundaries between analog and digital, physical and cyber, are simply not there anymore.In today's conversation, we discuss the importance of looking at our society, economy, and security as a complex system of interdependent subsystems. Everything is connected, and we are not just referring to IoT.From bridges to nuclear plants, to the President's car, and all the way up to space, the security assessment of critical infrastructure is not a checklist but a mindset. About The BookAs a manager or engineer have you ever been assigned a task to perform a risk assessment of one of your facilities or plant systems? What if you are an insurance inspector or corporate auditor? Do you know how to prepare yourself for the inspection, decided what to look for, and how to write your report?This is a handbook for junior and senior personnel alike on what constitutes critical infrastructure and risk and offers guides to the risk assessor on preparation, performance, and documentation of a risk assessment of a complex facility. This is a definite “must read” for consultants, plant managers, corporate risk managers, junior and senior engineers, and university students before they jump into their first technical assignment.____________________________GuestErnie HaydenOn LinkedIn | https://www.linkedin.com/in/enhayden/Publisher's Twitter | https://twitter.com/RothsteinPub____________________________ResourcesBook: https://www.rothstein.com/product/critical-infrastructure-risk-assessment-the-definitive-threat-identification-and-threat-reduction-handbook/____________________________This Episode’s SponsorsArcher: https://itspm.ag/rsaarchwebEdgescan: https://itspm.ag/itspegweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 7318 Steps To Better Security | A Conversation With Kim Crawley | The Changemaking With Chloé Messdaghi
Is your organization using old security practices in InfoSec?Then learn more about Kim Crawley's new book on what are the best, up-to-date security practices for organizations.GuestKim CrawleyOn LinkedIn | https://www.linkedin.com/in/kimcrawley/On Twitter | https://twitter.com/kim_crawley______________________________HostChloé MessdaghiOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi______________________________This Episode’s Sponsors ______________________________Resources8 Steps to Better Security: A Simple Cyber Resilience Guide for Business: https://www.amazon.com/gp/product/B09D3592CC/______________________________For more podcast stories from The Changemaking Podcast With Chloé Messdaghi: https://www.itspmagazine.com/the-changemaking-podcast______________________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 728Event Presentation | October 20th 2021 Is The First Ever SOC Analyst Appreciation Day | We Learn About It In This Conversation With Jason Mical
SOC analysts are often overworked and under-appreciated — but that needs to change! This conversation is designed to encourage organizations to take steps to improve job satisfaction and mental well-being through recognition and rewards.We must remember that SOC analysts aren't robots tasked solely with clicking buttons from start to finish during their often stressful shift each day. Yes, their work can appear tedious and therefore seem unimportant to those outside of the security operations function, but that doesn't mean that what they do daily isn't critical for protecting the business.In this first of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Jason Mical, a leader in the world of Security Operation Centers, exploring the reasons behind why the SOC analysts' work doesn't always get noticed.ITSPmagazine is proud to partner with Devo to recognize the efforts put in by the practitioners working away in the trenches and on the front lines of cybersecurity. Join us to help us recognize them and their efforts.About the SOC Analyst Appreciation DayJoin us for five hours of live-streamed content — with sessions ranging from what skills are needed to move up in the SOC, to desk decompression from a yoga instructor, to a panel discussion about a day in the life of a SOC, to a "Lunch & Laugh" where a stand-up comedian will provide some much-needed de-stressing entertainment. There's a ton to celebrate — let's do this!Learn more about SOC Analyst Appreciate Day: https://itspm.ag/devoq0zz______________________________GuestJason MicalOn Linkedin | https://www.linkedin.com/in/jason-mical-43a147/______________________________To see and hear more conversations about and from this event as we explore the personal, technical, operational, and innovative aspects of this role:🎙✨ https://www.itspmagazine.com/first-annual-soc-analyst-appreciation-dayLearn more about promoting your own event on ITSPmagazine:👉 https://itspm.ag/pyevmn Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 727The Intersectionality Between Privacy Law And UX Design | Redefining Technology With Stephanie Lucas And Dr Jennifer King
Who do you rely on at your organization for data privacy expertise? Your legal team? Your security engineering team? Was "UX designer" among your first thoughts? The answer is likely no. And that's a problem."States are starting to pass laws protecting consumer privacy, and some, like California’s, have specific requirements around design." — Dr. Jennifer King, Stanford Institute for Human-Centered Artificial Intelligence“There's an enormous opportunity for cross-collaboration between the privacy law and the product design communities. While historically, legal teams have been regarded as almost cultural adversaries to designers, that's absolutely not the case with privacy. The good news is that in today's regulatory climate, attorneys, regulatory agencies, and human-centered designers are playing for the same side.” — Stephanie Lucas, UX designer and speaker focused on privacy and trust.In this podcast we talk about advertising, design, privacy, dark patterns, privacy law, and so much more.Join us! ______________________________GuestsDr Jennifer KingOn Linkedin | https://www.linkedin.com/in/jenking/On Twitter | https://twitter.com/kingjenStephanie LucasOn Linkedin | https://www.linkedin.com/in/stephanielucaslinkedin/On Twitter | https://twitter.com/eyesondesign00______________________________ResourcesIt’s High Time for Product Designers To Become Privacy Practitioners: https://www.linkedin.com/pulse/its-high-time-product-designers-become-privacy-stephanie-lucas/Stanford Institute for Human-Centered Artificial Intelligence: https://hai.stanford.edu/Dark Patterns Tip Line: https://www.darkpatternstipline.org/Dark Patterns Website: https://www.darkpatterns.org/______________________________ This Episode’s SponsorsBlue Lava 👉 https://itspm.ag/blue-lava-w2qs______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technologyAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 726Invasion of the Robot Umpires | 30 Moonshots for a Climate Positive Future | The Dream of Carbon Air Capture Edges Toward Reality | Through The TechVine Radio Program Episode Sixteen
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: Invasion of the Robot Umpires | 30 Moonshots for a Climate Positive Future | The Dream of Carbon Air Capture Edges Toward Reality | Through The TechVine Radio Program Episode SixteenWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐In this episode we talk about:Invasion of the Robot UmpiresThe minor leagues have been testing the Automated Ball-Strike System. But isn’t yelling and screaming about bad calls half the fun of baseball?From The New Yorker: https://www.newyorker.com/magazine/2021/08/30/invasion-of-the-robot-umpires 30 Moonshots for a Climate Positive FutureBuilt By 40 Inspiring Female Founders to Watch in 2021.Designing for a climate-positive future — improving energy storage, grids, food, sustainable materials, and more.From Medium: https://medium.com/girl-geek-x/inspiring-female-entrepreneurs-of-climate-tech-startups-moonshots-for-a-climate-positive-future-1df62c25b030 The Dream of Carbon Air Capture Edges Toward RealityAn industrial facility in Iceland will join a growing number of projects to remove CO2 from the air and put it underground. But major hurdles, including high costs, remain before this technology can be widely deployed and play a key role in tackling climate change.From Yale Environment 360: https://e360.yale.edu/features/the-dream-of-co2-air-capture-edges-toward-reality Learn more about these topics and some more by listening to this podcast.We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉 https://twitter.com/ITSPmagazineLinkedIn 👉 https://www.linkedin.com/company/itspmagazineFacebook 👉 https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:____________________________This Episode Sponsors Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 725From US Air Force Network Engineer To Adversary Emulation | A Conversation With Cody Winkler | The Hacker Factory With Phillip Wylie
Through selfstudy, hard work, and persistence Cody Winkler went from an Air Force network engineer into red teaming becoming an adversary emulation expert.Cody shares his story and advice on starting a career in red teaming. With his unique perspective and to the point style he gives helpful advice for aspiring offensive security professionals._______________________GuestCody WinklerOn Linkedin | https://www.linkedin.com/in/cody-winkler/On Twitter | https://twitter.com/cwinfosecOn YouTube | https://www.youtube.com/cwinfosec______________________HostPhillip WylieOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________ResourcesCody's Blog: https://cwinfosec.org/______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 724Human-Centered Design | A Conversation With Maritza Johnson | Tech Done Different With Ted Harrington
How do we build things with the user in mind? How do we marry convenience and usability? How do we make the most secure way also be the path of least resistance? As a security researcher focused on human-centered design, Maritza Johnson studies these questions every day. She joins Tech Done Different to share insights from both her research, and her forthcoming center at University of San Diego.You'll learn:what human-centered design is, and why it matterswhy users are lazy, but that's not necessarily a bad thingwhat evolutionary purpose cognitive bias playshow to think about the intersection of security and simplicity________________________________GuestMaritza JohnsonOn Linkedin | https://linkedin.com/in/maritzajOn Twitter | https://twitter.com/maritza_johnson________________________________HostTed HarringtonOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec👉 https://itspm.ag/crowdsec-b1vp________________________________Resources ________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 723CPE Life Hacks And Brute Force Study Tips | A Conversation With Christopher Ruel | Hackerz And Haecksen Podcast With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
Want to know how you can crush those bad study habits and gain insight on some new study habits for cybersecurity certifications? Chris is a Special Forces Green berets and is a Sr. Process architect.Chris shares his experience as a special forces operator and how that has allowed him to learn “life hacks” with getting certifications and getting into cybersecurity. Chris, who has the CISSP certification, guides the listener into how they can apply the same life hacks he has developed to get ahead in their own cybersecurity careers.Additionally, Chris touches on study hacks and how the listeners can apply those same study hacks to crush their own certification exams.__________________________GuestChristopher RuelOn Linkedin | https://www.linkedin.com/in/ruelcg/__________________________HostsJaclyn (Jax) ScottOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jaclyn-jax-scottErika McDuffieOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/erika-mcduffieJon HelmusOn ITSPmagazine 👉 http://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/jon-helmus__________________________Sponsors __________________________For more podcast stories from Hackerz And Haecksen with Jaclyn (Jax) Scott, Erika McDuffie, and Jon Helmus, visit: 👉 https://www.itspmagazine.com/hackerz-and-haecksen-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

Ep 722AI Or Human? Exploring GPT-3 Disinformation, Artificial Intelligence, And Creativity | A Conversation With Andrew Lohn And Micah Musser | DeltaX Podcast With Ellen Xu
In this special Black Hat episode, Andrew Lohn and Micah Musser explain “Disinformation At Scale: Using GPT-3 Maliciously for Information Operations” - the double-edged sword of large language models.The Generative Pre-trained Transformer 3, or GPT-3, is an autoregressive language model that uses deep learning to produce human-like text, created by OpenAI. In other words: “Autocomplete on steroids.” It is currently the largest and most powerful natural language model in the world, and can write realistic text from almost any genre.In this episode, I discuss with guests Andrew Lohn and Micah Musser:How can GPT-3 be used to amplify disinformation?What are the implications GPT-3 has for Artificial General Intelligence (AGI)? Can GPT-3 be considered “creative”?What are the future trends for this technology, cybersecurity, and society?And… Did I use any GPT technology to write parts of this show notes? I guess we’ll never know for certain ;)_______________________GuestsAndrew LohnOn LinkedIn | https://www.linkedin.com/in/anlohn/On Twitter | https://twitter.com/andrewjlohnMicah MusserOn LinkedIn | https://www.linkedin.com/in/micah-musser-a485b5121/On Twitter | https://twitter.com/mrmusser______________________HostEllen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu______________________This Episode’s Sponsors ______________________ResourcesGeorgetown CSET Report: https://cset.georgetown.edu/publication/truth-lies-and-automation/______________________For more podcast stories from Delta X Podcast With Ellen Xu: https://itspmagazine.com/delta-x-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________Want more? Catch this week’s episode and previous ones on the DeltaX newsletter: https://newsletter.deltaxpod.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.