Itspmagazine Podcast public
[search 0]
More

Download the App!

show episodes
 
Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has o ...
 
Loading …
show series
 
In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco talk about: Invasion of the Robot Umpires | 30 Moonshots for a Climate Positive Future | The Dream of Carbon Air Capture Edges Toward Reality | Through The TechVine Radio Program Episode Sixteen We have officially decided to keep Through The TechVine a live re…
 
Through selfstudy, hard work, and persistence Cody Winkler went from an Air Force network engineer into red teaming becoming an adversary emulation expert. Cody shares his story and advice on starting a career in red teaming. With his unique perspective and to the point style he gives helpful advice for aspiring offensive security professionals. __…
 
How do we build things with the user in mind? How do we marry convenience and usability? How do we make the most secure way also be the path of least resistance? As a security researcher focused on human-centered design, Maritza Johnson studies these questions every day. She joins Tech Done Different to share insights from both her research, and he…
 
Want to know how you can crush those bad study habits and gain insight on some new study habits for cybersecurity certifications? Chris is a Special Forces Green berets and is a Sr. Process architect. Chris shares his experience as a special forces operator and how that has allowed him to learn “life hacks” with getting certifications and getting i…
 
In this special Black Hat episode, Andrew Lohn and Micah Musser explain “Disinformation At Scale: Using GPT-3 Maliciously for Information Operations” - the double-edged sword of large language models. The Generative Pre-trained Transformer 3, or GPT-3, is an autoregressive language model that uses deep learning to produce human-like text, created b…
 
Everyone likes to quote De Coubertin, the visionary founder of the modern Olympic Games: "The most important thing in the Olympic Games is not winning but taking part." But let's face it, when we compete, we all try to win. The US Cyber Games is no different; it is about competing and winning, but it is also about learning and promoting a different…
 
Through the tech vine episode 15 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this episode we talk about: WiCyS Advancing Women in Cy…
 
Enterprise resiliency is something many organizations take into account as they manage their business operations to extract the most from their investment. However, the CISO view of what it is and why it matters may look different as we explore different markets and operating environments. In this episode, we take a deep dive into the impact of ent…
 
When it comes to addressing the lack of diversity in technology, the checkbox approach coupled with the measurement of rates and figures may or may not be a good place to start. Regardless, it may be that we need to understand the why before anything else. In this episode, we speak with Di Ciruolo, a top DEI Consultant who asks our listeners to con…
 
Today’s students need to contend with video learning, privacy issues, and cyberbullying. Lisa Plaggemier Executive Director at National Cyber Security Alliance explains how kids can stay safe online. Is online/remote school here to stay and what do parents need to know to help their children stay safe? Tips for staying safe even if you’re going to …
 
David's journey started by majoring in theology; his career took a turn to become a linguist for the US Navy. After leaving the US Navy, David became a red team exploitation analyst for the NSA. David is now a successful businessman and consultant in the cybersecurity space. _______________________ Guest David Evenden On Linkedin | https://www.link…
 
New federal legislation has been proposed to address data security and privacy. Is it the right move? Is it enough? Is it the next CFAA (Computer Fraud and Abuse Act)? ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where…
 
From job postings to gatekeeping, this episode dives into better hiring practices and how to stand out. Deidre Diamond shares guidance and feedback on hiring best practices and how to get the job you want in cybersecurity. Guest Deidre Diamond On LinkedIn | https://www.linkedin.com/in/deidrediamond/ On Twitter | https://twitter.com/DeidreDiamond __…
 
The difference between a problem and a solution is action. It may sound simple, but most of the time, it isn't. It requires motivation, commitment, determination, an open mind, and the will to tackle the issue from different angles. Until you find the one that works well enough. Suppose this is true, and it is, for each problem; it is even more so …
 
Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on how to think about the many ways cybersecurity is synonymous with national security. As the Executive Director of the Cyber Project at Harvard's Belford Center, Lauren Zabierek is working on the front lines of how to think about the many ways cybersec…
 
Through the tech vine episode 14 We have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think? Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐 In this week's episode of Through The TechVine Live Radio …
 
Alethe shares the story of her childhood, winning the DEF CON Social Engineering CTF and becoming a cyber security consultant. Some people are born with specific skills, and Alethe seems to have social engineering in her DNA. She shares how her childhood experience was an indicator of what she would do as a career someday. Alethe not only shares he…
 
Privacy Rights And The Right-To-Life Laws Passed In Texas | The Compromise With Alyssa Miller And Keenan Skelly ______________________________ Public versus private sector, enterprise versus SMB organizations, entrepreneurial versus corporate viewpoints. Where do these worlds collide and where can we find common ground? One thing is for certain, th…
 
As with most things in life that require some thought, before making a decision and taking action, it's often best to figure out the "why" behind the result. In this case, start with the "Why are we hiring a CISO" question. But then what? That's where things get interesting. Undoubtedly, the answer to "Why" sets the stage for the play that's about …
 
What are the dangers of deepfakes? How is it related to cyber and cognitive psychology? Dr. Canham explains Deepfake Social Engineering: Creating a Framework for Synthetic Media Social Engineering. Deepfakes (a combination of “deep learning” and “fake”) leverages Artificial Intelligence to repurpose existing media to appear to be someone else. It’s…
 
Jon has harnessed his passion for education since early on in his career. He sees a unique opportunity to advocate for his students, regardless of what his students experience in their respective home lives. Additionally, he found a community amongst his colleagues, with a shared goal of making a difference in each of their student’s journeys. Jon …
 
Is it your job to innovate? Should you be creative? Can big changes result from small, daily moments? If you listen to Josh Linkner (which you absolutely should), the answer is a resounding YES to all. An entrepreneur, venture capitalist, and New York Times bestselling author, Josh is an innovation guru who joins Tech Done Different to help unleash…
 
Maxie Reynolds shares her story of going from an underwater robotics expert to a social engineer and authoring "The Art of Attack: Attacker Mindset for Security Professionals." Maxie's story demonstrates how, no matter how much you have invested in education and experience, it is never too much to change your career direction even when highly succe…
 
Linguistics is the scientific study of language and its structure. Sociolinguistics is the study of language in relation to social factors. How do the changes in our societies affect the way we communicate, and in what ways does technology come into play? Good questions, right? We asked many more during this episode of Redefining Society. From why …
 
Online entities and their affiliates are using and abusing our personal information. It's time to learn how we can change the situation and do better. Guest Alan Michaels On LinkedIn: https://www.linkedin.com/in/alan-michaels-1066814/ ______________________________ Host Chloé Messdaghi On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-pod…
 
Loading …

Quick Reference Guide

Copyright 2021 | Sitemap | Privacy Policy | Terms of Service
Google login Twitter login Classic login