Constructive dialogue about social issues at the intersection of race, violence, and medicine.
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
I
ITSPmagazine Podcast


1
Technology And The Autism Community: What's Working And What's Missing | A Redefining Society Conversation With Doug Blecher
39:56
39:56
Play later
Play later
Lists
Like
Liked
39:56
As humans, we tend to take things for granted. Sure, there are always advances in technology, and life, in general, seems to be getting "easier" — but that's not always the case for everyone. Technology can and should be so much more than that. We must constantly remind ourselves that there is nothing magic about it. We are the ones that imagine, b…
I
ITSPmagazine Podcast


1
Kiss Fewer Frogs! Staying Safe With Online Dating | A Conversation With Kristin Judge | Your Everyday Cyber With Limor Kessem And Diana Kelley
17:03
17:03
Play later
Play later
Lists
Like
Liked
17:03
While online games can be a healthy coping strategy, they can also pose some risks as cyber-attackers lurk looking for loot. Game security expert Etay Maor explains what you need to know to stay safe. Tune in to learn: Which platforms are most used by gamers How criminal launder money through games How predators fool players and even groom them, es…
I
ITSPmagazine Podcast


1
What To Do After College | A Conversation With Kim Nguyen | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
27:02
27:02
Play later
Play later
Lists
Like
Liked
27:02
Kim Nguyen talks about her story about what made her want to get into computer science and discusses some of the speed bumps she has encountered during school and how she is doing to prepare her life for success post-college. Kim Nguyen's story illustrates that we all come from a different path when entering the cyber workforce. We all bring a uniq…
I
ITSPmagazine Podcast


1
The Good, The Bad, And The Ugly | The Bad Bot Report 2021 | Part 2 | An Imperva Story With Edward Roberts
37:23
37:23
Play later
Play later
Lists
Like
Liked
37:23
Now that you know what bots are, where they originate, what good they can do, and the harm they can cause, it's time to understand how to implement a strategy to fight back and contain the damage they can bring. Businesses can be negatively affected by they do not have to. In part 1 of this 2-part series, we explore the source of bots: who writes t…
I
ITSPmagazine Podcast


1
How A High School Robotics Team Leverages Their Success For The Benefit Of Other High School Clubs And The Community | The Academy | A Conversation With Nicole Pi And James Hunt
35:14
35:14
Play later
Play later
Lists
Like
Liked
35:14
Think of a high school club, and you might think about a group of young students meeting regularly to engage in a common topic. Accurate, but the Del Norte High School's Team Optix 3749 Club builds robots and competes with them. This, and so much more. At its core, the purpose behind Team Optix 3749 is to provide an environment for students to lear…
I
ITSPmagazine Podcast


1
Why Responsible Disclosure Programs Make You Better | A Conversation With Tom Kuzler | Tech Done Different With Ted Harrington
35:50
35:50
Play later
Play later
Lists
Like
Liked
35:50
We hear from the leader of a SaaS company that has successfully set up an effective responsible disclosure program (RDP). Tom Kuzler, CEO of email marketing platform is no stranger to this crucial relationship with the security research community, and walks us through how an RDP has worked for his company. You'll learn: why it's important to set up…
I
ITSPmagazine Podcast


1
The Relationship Between Roles — PR/Media Relations And Information Security | Redefining Security With Melanie Ensign And Ed Amoroso
38:23
38:23
Play later
Play later
Lists
Like
Liked
38:23
A lot can be done by CSOs/CISOs to maximize value and reduce risks when working with PR/media. However, the path forward is not always straightforward. What are the common hiccups, screw-ups, and give-ups? As part of our ongoing "CISO functional relationships" series, in today's episode, we look at the role of PR and the media as a function of esta…
I
ITSPmagazine Podcast


1
Evolving Third-Party Risk Management For Today’s Complex Ecosystems | An Archer Story With Jon Ehret And Chris Patteson
58:58
58:58
Play later
Play later
Lists
Like
Liked
58:58
The third-party ecosystems of today’s organizations have become more complex, more digital, and more extensive than ever before. The need for an accurate picture of your vendor’s security posture is greater than ever, with public and private sector organizations reporting a surge in cyber-attacks, and at the same time, continuing to experience and …
I
ITSPmagazine Podcast


1
Next Level Human Machine Interfaces Are Here! | An Exciting Exploration Of Next Generation Biopotential Situational Awareness With Dexter Ang | Impactful Innovations With JJ Snow
41:07
41:07
Play later
Play later
Lists
Like
Liked
41:07
In this episode JJ and Dexter Ang explore the latest in gesture control using human machine interfaces and talk about how this technology can help us all to live our best life. Drawing on his expertise in Human Computer Interaction and mechanical engineering, Dexter leads the development of the next generation of patented nerve-sensing electroneuro…
I
ITSPmagazine Podcast


1
A Conversation About Application Security And Bug Bounty With John Jackson | The Hacker Factory With Phillip Wylie
29:27
29:27
Play later
Play later
Lists
Like
Liked
29:27
John Jackson is a Senior Application Security Engineer by day and security researcher and hacker advocate in his spare time. John discusses his path into application security and hacking. He discusses how hackers should not be viewed as the bad guys and are the truly heroes. Guest John Jackson, Founder of Sakura Samurai (@johnjhacking on Twitter) H…
I
ITSPmagazine Podcast


1
Crafting, Testing, And Tuning Your Workflows For Success | A Nintex Story | With Jesse McHargue, Nicole (Prestby) Vesser, And Ben Stori
50:37
50:37
Play later
Play later
Lists
Like
Liked
50:37
In this third episode, the group discusses the value of taking some time to reflect on the definition and desired outcome for the business process being implemented as you begin to execute and get it into the hands of the end user. Many found that ignoring or bypassing user acceptance training as part of the process could make things that much hard…
I
ITSPmagazine Podcast


1
You Asked, We Answer! It’s The Your Everyday Cyber Ask Us Anything Episode | Your Everyday Cyber With Limor Kessem And Diana Kelley
22:21
22:21
Play later
Play later
Lists
Like
Liked
22:21
The Your Everyday Cyber audience has questions and we have answers: welcome to our special “Ask Us Anything” episode, crafted especially for you, our listener. Tune in to hear our answers to these questions: How do you find guests for the podcast? Why did you decide to focus on the Everyday consumer? What’s your favorite part about being in cyber s…
I
ITSPmagazine Podcast


1
eHealth, Telemedicine, And Technology: A Global View | Redefining Society With WHO Digital Health Technical Advisor Michael Miller
41:31
41:31
Play later
Play later
Lists
Like
Liked
41:31
"Perhaps the most underused person in healthcare is the patient." — Prof. David Cutler | A quote that reminds us that any Healthcare system should be patient-centric — built for and around it. In our societies, this is not the case, but technology can help create such a system. We all know that we should be moving away from a system that prioritize…
I
ITSPmagazine Podcast


1
Professional Certification Chat With George Tang | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33
In this episode, we meet with George Tang to discuss professional certifications. What tips or tricks do you use to prepare for Certification exams? How to prioritize the certifications you want to obtain? All of these questions and more will be answered during this episode. We are thankful you are here, please enjoy. Guest George Tang, Principal S…
I
ITSPmagazine Podcast


1
The Good, The Bad, And The Ugly | The Bad Bot Report 2021 | Part 1 | An Imperva Story With Edward Roberts
35:10
35:10
Play later
Play later
Lists
Like
Liked
35:10
Bots have been around for a very long time. At its basic level, a bot is merely a script that can automate a computer task on behalf of the human; as such, it can do good things or bad things. Like most technology, the line is thin and blurry. It can get ugly too. Bots have also come a long way since their inception. They can provide automated cust…
I
ITSPmagazine Podcast


1
Be Brave Enough to Try | A Conversation With Josh Little | Tech Done Different With Ted Harrington
39:52
39:52
Play later
Play later
Lists
Like
Liked
39:52
In this episode of Tech Done Different, we chat with serial entrepreneur Josh Little, CEO and Founder of Volley App. In his pursuit of solving the disaster that is overwhelming calendars and neverending video meetings, Josh has learned a few things about how to solve problems worth solving. You'll learn: that 93% of communication is nonverbal why t…
I
ITSPmagazine Podcast


1
Book | The Ethics Of Surveillance: An Introduction | An Audio Signals Conversation With The Author Kevin Macnish
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29
Is there such a thing as human morality that can help us distinguish between good and evil. Or, is it influenced by cultures? Nowadays, we talk quite a bit about ethics because technology amplifies the issue: AI, algorithms, privacy, security, and surveillance. The meaning of life? Bathing at the beach naked or fully dressed? Was Big Brother right …
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of An InfoSec Engineer | A Confession From Mr B | A Devo Story With Julian Waits
16:49
16:49
Play later
Play later
Lists
Like
Liked
16:49
When businesses rely on their own infrastructure to protect their customers' products and services, security analysts are left with very little room for error and no time to waste. Long waiting times on database search results is most certainly not a good thing. Many might be skeptical that the latest and greatest methods and technologies can meet …
I
ITSPmagazine Podcast


1
How I Got Started In CTI | A Conversation With JR | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
30:44
30:44
Play later
Play later
Lists
Like
Liked
30:44
During this episode, we meet with the brilliant and extremely humble JR who has over 15 years of experience in the cyber space. She talks about her unique experience going from medical work to now be working in the cyber threat space where she now works with Cyber Crime, Human Intel and so much more. Anyone considering getting into the cyber threat…
I
ITSPmagazine Podcast


1
Exploring The "Virtual Reality" Future of Work, Education, And Empathy | A Conversation With Cortney Harding | Impactful Innovations With JJ Snow
44:52
44:52
Play later
Play later
Lists
Like
Liked
44:52
Virtual and Augmented Reality solutions are racing forward to the future! In this episode we explore the impact these technologies are having on the future of work, edtech and the human experience. JJ Snow is joined by Cortney Harding, Founder and CEO of Friends with Holograms, an entrepreneur and social impact technologist who is using her powers …
I
ITSPmagazine Podcast


1
Hacking Physical Security | A Conversation With Crystal | The Hacker Factory With Phillip Wylie
35:33
35:33
Play later
Play later
Lists
Like
Liked
35:33
When thinking of pentesting, you think of computers, networks, and other technologies, but there are pentesters that specialize in hacking humans and buildings. During this episode, Crystal shares how she got into physical pentesting and social engineering coming from a military career. Guest Crystal, Social Engineer, Physical Pentester, Veteran (@…
I
ITSPmagazine Podcast


1
The Connection Between Product Quality Assurance And Application Security In Business | Redefining Security With Tom Morrissey And Cassio Goldschmidt
46:48
46:48
Play later
Play later
Lists
Like
Liked
46:48
Nowadays, every company is pretty much a technology company, and as such, they all should have some understanding of quality assurance (QA). Also, an understanding of information security would be nice. The question is, how and where do these two worlds collide? And, is that security world AppSec or DevSecOps? Or is it something completely differen…
I
ITSPmagazine Podcast


1
Advancing Higher Education Through Community Mentoring And Knowledge Sharing | A CyberSecurity Conversation In The Academy With Brian Kelly
32:59
32:59
Play later
Play later
Lists
Like
Liked
32:59
Cybersecurity is a complex topic to understand. A plethora of standards, frameworks, processes, tools, conferences, presentations, courses, and even certifications may help but can also be a bit overwhelming. This is where the community comes in. Understanding the threats and the risk faced by a university is one thing; understanding the high educa…
I
ITSPmagazine Podcast


1
A Conversation With Tanya Janca | Candid CyberSec Podcast With Vandana Verma
16:01
16:01
Play later
Play later
Lists
Like
Liked
16:01
Thank you for joining us for another candid conversation with one very special guest who's very well known in the industry: none other than Tanya Janca: she's an author, a CEO, a startup founder, a programmer, a hacker, and a philanthropist. In this episode, we're going to touch upon some really special aspects about who Tanya is and how she is mak…
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of A Digital Security and Fraud Director | A Confession From Mr V | A Devo Story With Jill Orhun
15:58
15:58
Play later
Play later
Lists
Like
Liked
15:58
Looking for signs of fraud and the loss of intellectual property or customer data is not the same. What's the difference? What's the overlap? Are there organizations set up to do both well? Glad you asked. You will find the answers by listening to this podcast. As organizations take their journey on a digital transformation and move to the cloud, m…
I
ITSPmagazine Podcast


1
You Gotta Listen To What The Market Tells You | A Conversation With Dr Wanda Toro Turini | Tech Done Different With Ted Harrington
40:04
40:04
Play later
Play later
Lists
Like
Liked
40:04
In this episode of Tech Done Different, we chat with Dr Wanda Toro Turini, who shares insights about how to adapt in order to make sure that a given piece of innovative tech can best service the market. You'll learn: why you gotta listen to what the marketplace is telling you why you need strategy in order to wield the power of technology why (and …
I
ITSPmagazine Podcast


1
From Salesman To Professional Researcher | A Conversation With Filipi Pires | The Hacker Factory With Phillip Wylie
31:57
31:57
Play later
Play later
Lists
Like
Liked
31:57
Brazilian hacker Filipi Pires discusses hacking, community, mentoring, and learning. During this episode Phillip Wylie and his guest Filipi Pires discusses hacking, community, mentoring, and learning how to become a hacker. Filipi shares his path of going from a non-technical sales role and his path to becoming a hacker. Guest Filipi Pires, Securit…
I
ITSPmagazine Podcast


1
Book | Uncaring: How The Culture Of Medicine Kills Doctors And Patients. How Tech Can Help | An Audio Signals Conversation With Dr. Robert M. Pearl
35:08
35:08
Play later
Play later
Lists
Like
Liked
35:08
How good of a dish are you going to get when you use bad ingredients? Are you going to blame the recipe? Some people would, and by doing so, they would keep baking bad cooks and blaming the recipe for it. Algorithms work the same. You give AI bad data, you get bad results. The metaphor works well until you realize that, when you end up with a lousy…
I
ITSPmagazine Podcast


1
Autism In Adulthood: Role Of Technology In Advocating For Quality Of Life | A Cyber Society Conversation With Becca Lory Hector
42:59
42:59
Play later
Play later
Lists
Like
Liked
42:59
If we don't open our eyes and think about how we are all different—in so many ways—we will never truly understand that our personal quality of life and behaviors affects that of the group and society we are part of. Is technology helping diversity and inclusivity? Join this conversation with our guest, Becca Lory Hector, as she helps us open our ey…
I
ITSPmagazine Podcast


1
Building A Community In InfoSec | A Conversation With Tanya Janca — She Hacks Purple | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
33:47
33:47
Play later
Play later
Lists
Like
Liked
33:47
Tanya Janca walks us through how her need for community inspired her to develop one of her own. Join us for an inclusive conversation on how to navigate a male-dominated field and how to create your own success. Tanya Janca, also known as SheHacksPurple, is the author of ‘Alice and Bob Learn Application Security’. She is also the founder of We Hack…
I
ITSPmagazine Podcast


1
The Future of Farming is Here | A Conversation About Vertical Farming With Samuel Bertram | Impactful Innovations With JJ Snow
37:26
37:26
Play later
Play later
Lists
Like
Liked
37:26
In this episode, JJ is joined by Samuel Bertram to discuss the impact that robotics, AI and new plant cultivation technologies will have on conservation and the future of global food production. Food security and conservation issues associated with current industrial farming practices have been a continuing concern due to increased risks from pollu…
I
ITSPmagazine Podcast


1
Network Security 101: What Does That Even Mean These Days | Redefining Network Security Fundamentals With Dr. Meg Layton
36:49
36:49
Play later
Play later
Lists
Like
Liked
36:49
Upon coming across a Tweet, curiosity quickly rose for what network security fundamentals actually are these days. Have the networks changed so much that "Network Security 101" no longer applies? The best way to find out is to take a walk down memory lane. The most apparent change to the network landscape comes in the form of the cloud, with "every…
I
ITSPmagazine Podcast


1
Everything About Your Data Has Changed — Has Your Journey To The Cloud Kept Up? | Part 1 Of 2 | An Imperva Story With Ron Bennatan
34:46
34:46
Play later
Play later
Lists
Like
Liked
34:46
It may be hard to believe, but data doesn’t just magically appear; it is generated by apps, services, AND, well, all of it, by humans. Storage systems and databases do not magically show up on the scene either; they have to be built and hosted to handle the scenarios encapsulated in the business requirements, desired user experience, and data secur…
I
ITSPmagazine Podcast


1
Solve Your Customer's Problem | A Conversation With Brian Requarth | Tech Done Different With Ted Harrington
36:32
36:32
Play later
Play later
Lists
Like
Liked
36:32
In this episode of Tech Done Different, you'll hear from a tech entrepreneur who has hit all of the dream milestones: started a company, obtained massive funding, sold the company for over $550m. Brian Requarth, Founder of Latitude and author of Viva The Entrepreneur takes you behind the scenes of how to start and scale a successful tech business. …
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of A CISO | A Confession From Mr T | A Devo Story With JC Vega
16:39
16:39
Play later
Play later
Lists
Like
Liked
16:39
Need—Innovation—Change—Growth—Mistakes—Fixes—Results—Sprawl—Trim—Repeat. This path seems like the standard road for most businesses, but the truth is that there is no predetermined way to success for any organization. However, there is one clear and a common path to failure—not preparing for, expecting, nor embracing change. "The art of simplicity …
I
ITSPmagazine Podcast


1
Part 2 Of 2 | Hackers And CyberCriminals ARE NOT The Same | Non-Profits And Groups Supporting The Hacker Community, And Therefore, Protecting Society | Discloseio, Stanford Internet Observatory
32:31
32:31
Play later
Play later
Lists
Like
Liked
32:31
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
I
ITSPmagazine Podcast


1
Part 1 Of 2 | Hackers And CyberCriminals ARE NOT The Same | Non-Profits And Groups Supporting The Hacker Community, And Therefore, Protecting Society | Hacking Is Not A Crime, Electronic Frontier Foundation ...
41:29
41:29
Play later
Play later
Lists
Like
Liked
41:29
When we received the invitation to be part of the event co-hosted by Hacking Is Not A Crime & the Red Team Village, we wanted to do our part by sharing the stories of the non-profit groups involved, and presenting them to our magazine, podcast, and radio audience. It is an honor and a privilege to introduce to all of you some our old and new friend…
I
ITSPmagazine Podcast


1
Book | Cult Of The Dead Cow: How The Original Hacking Supergroup Might Just Save The World | An Audio Signals Conversation With Joseph Menn
40:29
40:29
Play later
Play later
Lists
Like
Liked
40:29
Let's face it, hacking got a bad reputation—it has been in the making for over 30 years, it got worse, and we have to change that. Humans want to have it simple; they want to define things as bad or good, white or black, heaven or hell—but there is so much more in between. ITSPmagazine has always taken a firm stand on the differentiation between ha…
I
ITSPmagazine Podcast


1
Integrating Advanced Access Control Measures To Drive Business Value | Redefining Multi-Factor Authentication With Shinesa Cambric
33:06
33:06
Play later
Play later
Lists
Like
Liked
33:06
There are many things to ponder when planning for a multi-factor authentication (MFA) project. They all can be positioned between two extremes: how to get away without implementing it at all, and multi-locking everything, everywhere, 365 - 24/7. Obviously, the two extremes aren't the correct answer—they never are—so what does that big vast middle g…
I
ITSPmagazine Podcast


1
Life Hacks, Time Blocking, And Goal Setting | Hackerz And Haecksen With Jaclyn (Jax) Scott and Erika McDuffie (Minus Jon Helmus)
28:06
28:06
Play later
Play later
Lists
Like
Liked
28:06
During this episode, Erika and Jax talk about life hacks, time blocking, and goal setting. You will enjoy listening to a relaxed conversation while learning more about your hosts and what keeps them at the top of their game as high performers within cybersecurity. Do you have a burning question, reach out to us on our social media platforms. We lov…
I
ITSPmagazine Podcast


1
Founding A Y Combinator Startup And Getting Started By Taking Risks | A Conversation With Helena Merk | Elevate The Future With Ellen Xu
17:46
17:46
Play later
Play later
Lists
Like
Liked
17:46
Helena founded Glimpse at Y Combinator (the startup accelerator that spun out Airbnb, DoorDash, Dropbox, etc). Listen along as she discusses her untraditional journey to where she is today! From dropping out of Duke to pivoting days before pitching in front of investors during Demo Day, Helena has an incredible mindset towards taking risks and bein…
I
ITSPmagazine Podcast


1
Gratitude: The Tech Entrepreneur's Superpower | A Conversation With Marcus Bullock | Tech Done Different With Ted Harrington
40:30
40:30
Play later
Play later
Lists
Like
Liked
40:30
In this episode of Tech Done Different, we sit down with one of the most inspiring guests yet. Marcus Bullock shares his journey from incarceration to tech entrepreneur, showing us all why and how to be grateful for the lives we get to live every day, and how to apply that gratitude to overcome our many difficulties You'll learn: why gratitude help…
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of Cybersecurity Consultant | A Confession From Ms H | A Devo Story With Kayla Williams
17:42
17:42
Play later
Play later
Lists
Like
Liked
17:42
When climbing to reach the summit for the business, a security management failure can happen at any moment, resulting in missed opportunities or lost revenue. The good news? Your logs have the solutions. We're not only talking about finding the solution to fix problems when it is too late. We're talking about focusing the resources on knowing the b…
I
ITSPmagazine Podcast


1
Book | Parenting For A Digital Future. How Hopes And Fears About Technology Shape Children's Lives | An Audio Signals Conversation With Sonia Livingstone
40:16
40:16
Play later
Play later
Lists
Like
Liked
40:16
Who hasn't heard grandparents say something like: back in my days, life was simpler, better, safer. That's probably—kinda—true. But as time goes by, looking back, even one generation has to take into consideration the technology variable. It is all another story—this one, to be exact. In this Audio Signals episode, we talk with Sonia Livingstone, a…
I
ITSPmagazine Podcast


1
Building A Center Of Excellence For Business Processes And Workflow Automation — We're Way Beyond Process Improvement | A Nintex Story With Josh Waldo And Maggie Malone Swearingen
32:23
32:23
Play later
Play later
Lists
Like
Liked
32:23
When defined and executed well, a Center of Excellence can be more than a model or process to follow; it can set the bar for the organization by which each part can play a role in making things better. It's not automatic—it requires dedication—and customization. When an organization embarks on its journey to transform how they do business both exte…
I
ITSPmagazine Podcast


1
The Ugly Truth About Burnout | A Conversation With Chloé Messdaghi And George Tang | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus
26:46
26:46
Play later
Play later
Lists
Like
Liked
26:46
Meet George Tang and Chloé Messdaghi as we dig into the ugly truth of burnout in the cyber industry. We discuss what burnout means to us while providing the listeners, you, some helpful tips to help keep you from hitting burnout. What tips or tricks do you use to avoid burnout? What does self-care look like? What is life hacks can we use to support…
I
ITSPmagazine Podcast


1
Improving Life Through Smart Buildings — How Technology Can Bridge The Gaps We've Created At Home, At Work, And While Shopping | A Cyber Society Conversation With Todd Boucher
35:16
35:16
Play later
Play later
Lists
Like
Liked
35:16
When is a building more than just a thing, and it becomes smart? When it can adjust to the needs of its tenants, occupants, workers, and guests, that's when. In this podcast, we learn what this means and how our spaces should adapt to us and not the other way around. Please listen as Sean chats with designer Todd Boucher to discuss this and the fut…
I
ITSPmagazine Podcast


1
The Relationship Between Roles: Human Resources And Information Security | HR Is The Organization's Communications Super Glue | Redefining Security Culture With Dora Ross, Global Security Culture Specialist ...
33:53
33:53
Play later
Play later
Lists
Like
Liked
33:53
The human resources department within any organization is well-positioned to feel the pulse and monitor a company's culture—teams, divisions, and the organization as a whole. Because of this, it could be the ideal ally to the InfoSec team. But is it? Let's find out. Consider the lifecycle of an employee. The initial company awareness, gaining famil…
I
ITSPmagazine Podcast


1
Compliance Is Not Security | A Conversation With Compliance Guru, AJ Yawn | Tech Done Different With Ted Harrington
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
In this episode of Tech Done Different, we hear from compliance expert AJ Yawn. Perhaps the most surprising takeaway from this dynamic chat with a guru in compliance? Security and compliance are not the same thing. Yet, done properly, compliance can be a powerful driver for security. Listen in to learn: why compliance reports should get better over…
I
ITSPmagazine Podcast


1
Log's Honest Truth — Confessions Of An Information Security Consultant | A Confession From “Mr L” | A Devo Story With Jason Mical
19:26
19:26
Play later
Play later
Lists
Like
Liked
19:26
Security information and event management (SIEM) solutions have evolved quite a bit over the years. Yet, for most, much of what they do and how they tend to do it have not really matured to a point where they can take a lot of the burden off of the security consultant’s shoulders. In this conversation, we speak with Jason Mical, Cyber Security Evan…