The ITSPmagazine Podcast

ITSPmagazine, Sean Martin, Marco Ciappelli
undefined
Apr 21, 2022 • 45min

Underserved People Need Free Access To Learn Digital, Social, And Business Skills | Redefining Society With Dr. Susan Birne-Stone and Busayo Odunlami

Positive cultural and societal changes do not happen in a day, but they need to start somewhere, and indeed they do not happen by magic. Education is a key driver that can promote, facilitate, and speed up such changes.Contact of different societies, technological evolution, and geographical and ecological factors can initiate societal changes that can take quite some time. Still, sometimes we need to improve our communities faster, which is when movements and organizations can speed up the pace.In today's podcast, we talk about how providing underserved young people with free access to the digital, business, and social skills required to be successful in today's technology-driven global economy can change not only the lives of individuals but also bring much more significant positive consequences in our modern societies.Billion Strong Foundation“To achieve economic independence, we believe there are a billion energetic, determined individuals that, if given a chance, will eagerly acquire the digital, social, and business skills necessary to succeed in today's ever-changing global environment.We want to inspire and uplift young individuals, across the globe, to build future products and services while creating new jobs and new businesses that serve their communities and society. We believe that our framework supports the transformation required for individuals to develop the entrepreneurial spirit required to exist in a technology-driven world.”____________________________Co-HostDr. Susan Birne-StoneSystems Psychotherapist, International Coach, Talk Show Host & Producer, Professor | Mentor at the Mentor ProjectOn LinkedIn | https://www.linkedin.com/in/dr-susan-birne-stone-phd-lcsw-62764a18/On Twitter | —Website | drsusanbirnestone.comGuestBusayo Odunlami Global Business Transformation | Change & Culture Ninja | Board Member | M&A | Mentoring | VC On LinkedIn | https://www.linkedin.com/in/busayo/On Twitter | —————____________________________Resources Billion Strong Foundation Websitehttps://www.billionstrong.me____________________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcwebBlackCloak 👉 https://itspm.ag/itspbcweb____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-societyAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 19, 2022 • 27min

Lessons From Secret Service | A Conversation With Former Special Agent, John Toney | Tech Done Different With Ted Harrington

Former special agent John Toney joins Tech Done Different to provide insights gleaned from the Secret Service, and how he applies those insights now as a Global CISO in the private sector. You'll learn how protecting a US President is pretty much the same as protecting your digital assets, as well as how to build teams, foster culture, and so much more.You'll learn:when to move and when not to movewhy incident response needs to be done in advancehow stress prevents good decisionswhy (and how) to be your own best self advocatewhy it matters for leaders to coach their teams on how to share information________________________________GuestJohn ToneyGlobal Chief Information Security Officer at City Electric Supply [@CityElectricUSA] & former Special Agent, US Secret Service [@SecretService]On LinkedIn | https://www.linkedin.com/in/johntoney/________________________________HostTed HarringtonOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington________________________________This Episode’s SponsorsCrowdSec 👉 https://itspm.ag/crowdsec-b1vp________________________________Resources________________________________For more podcast stories from Tech Done Different With Ted Harrington: https://www.itspmagazine.com/tech-done-different-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 19, 2022 • 51min

Secure Access And Authorization: Keeping Precious Resources Safe From Prying Eyes And Bad Actors | A Live Stream Panel With Shinesa Cambric And John Sapp Jr | Redefining CyberSecurity With Sean Martin

Your organization has precious resources all over the place: on-premises in the data center on servers and in databases; in the office, at home, on the road on desktops, laptops, tablets, mobile phones, and smart devices; in the cloud inside containers, applications, and a variety of storage services. Assuming you have identified and verified the person and/or system and/or service as a valid entity, how do you ensure they only have access to these resources, when they need them, from the location they need them, from the system they are requesting them, and at the time they are requesting them? This challenge is much more complex than ensuring a user is set up in the directory and has entered a valid password. That’s what this discussion is going to be all about.Join us for this session as we explore the following points:◾️ What does “secure access” mean to security, to ops, to the users, to the business?◾️ Does the conversation and language need to change between groups?◾️ How and where is secure access managed?◾️ How to deal with the systems, applications, and data?◾️ How does it fit in with Risk Management and SecOps?◾️ What are some key challenges orgs face?◾️ What are some of the core elements many orgs leave out?◾️ Are there processes and/or tools to make things easier?◾️ Any best practices or tips to simplify the program?____________________________GuestsShinesa CambricIdentity Champion at Identity Defined Security Alliance [@idsalliance] | Principal Product Manager for Emerging Identity at Microsoft [@Microsoft]On LinkedIn | https://www.linkedin.com/in/shinesa-cambric-cissp-ccsp-cisa®-0480685/On Twitter | https://twitter.com/Gleauxbalsecur1John Sapp JrVP, Information Security & CISO at Texas Mutual Insurance Company [@texasmutual]On LinkedIn | https://www.linkedin.com/johnbsappjrOn Twitter | https://www.twitter.com/czarofcyber____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________ResourcesIdentify Defined Security Alliance Best Practices: https://www.idsalliance.org/identity-defined-security-framework/best-practices/Enterprise Risk - Engaging Others: https://www.isaca.org/resources/isaca-journal/issues/2020/volume-5/addressing-risk-using-the-new-enterprise-security-risk-management-cycle____________________________Catch the on-demand live stream video and podcast here: https://www.itspmagazine.com/live-panels/secure-access-and-authorization-keeping-precious-resources-safe-from-prying-eyes-and-bad-actors-redefining-cybersecurity-with-sean-martinTo see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 18, 2022 • 30min

The Hacker Book Club Is Now A Podcast! | With The Hacker Book Club's Founders: Chloé Messdaghi And Angela Marafino | Episode 1

The Hacker Book Club is a book club focusing on books for hackers, by hackers, and about hackers & hacking (along with some sci-fi). Now, we bring you the Hacker Book Club Podcast!For episode 1 we brought you a special founders' review of the books we've read and authors we've spoken to over the course of the book club's first year. Listen in as Chloé Messdaghi and Angela Marafino discuss some of their favorite moments and why this book club is unlike any other.Future episodes will host authors from previous books the group has read and upcoming books the group plans to read.________________________________GuestChloé MessdaghiFounder & Principal, Impactive Consulting and Host of The Changemaking PodcastOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chloe-messdaghi________________________________HostAngela MarafinoOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/angela-marafino________________________________This Episode’s SponsorsLevel Effect: https://itspm.ag/level-effect-66xu________________________________ResourcesChloé Messdaghi on Medium: https://medium.com/@messdaghi________________________________For more podcast stories from, and to learn more about, The Hacker Book Club Podcast with Angela Marafino, visit: https://www.itspmagazine.com/the-hacker-book-club-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 15, 2022 • 42min

Higher Education And Regulated Research Community Of Practice (RRCoP) | 5 Goals To Raise The Security And Compliance Posture Of Academic Institutions | Redefining CyberSecurity With Carolyn Ellis, Erik Deumens, And Michael Parisi

When it comes to implementing efficient and effective information security programs, higher education institutions can use all the help they can get. That's where the RRCoP community comes in.In today's episode, our guests, Carolyn Ellis, Erik Deumens, and Michael Parisi talk through the goals of the RRCoP community and the impact is has on the higher education cybersecurity community as they work hard to raise the security and compliance posture for their institutions.The 5 RRCoP GoalsGoal 1: Build a CommunityThe Regulated Research Community of Practice (RRCoP) builds a network of people able to help each other in implementing an affordable but effective cybersecurity and compliance program at academic institutions.Goal 2: Collect and Share ResourcesEstablish a leadership training and development program accelerating availability of distributed university resources.Goal 3: Advocate and NegotiateDevelop representation through strategic partnerships with industry and government entities.Goal 4: Manage ChangeThe Department of Defense modified the DFARS clause to mandate that NIST 800-171 be followed for data classified and marked as CUI in 2017. The next evolution of this program, CMMC, has already undergone significant changes now called CMMC 2.0. Other agencies, for example, Department of Education, have indicated that they are considering following a similar path to safeguard data.Goal 5: Simplify ComplianceA collective and streamline approach to compliance lowers the barrier to entrance for expansion of supported regulations by individual institutions.____________________________GuestsCarolyn EllisCMMC Program Manager at UC San Diego [@ucsandiego]On LinkedIn | https://www.linkedin.com/in/carolynellis1/Erik DeumensResearch Computing Director, Information Technology at University of Florida [@UF]On LinkedIn | https://www.linkedin.com/in/deumens-erik-164167146/Michael Parisi, VP of Adoption, @HITRUST____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988____________________________ResourcesRegulated Research Community of Practice: https://www.regulatedresearch.org/____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-cybersecurityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 15, 2022 • 39min

Building In Public And The Future Of Web3 | A Conversation With Aryan Sharma | DeltaX Podcast With Ellen Xu

Aryan Sharma (@aryxnsharma) on leveraging Web3, building in public, and a page from the book of game theory—the signal behind the layers of complexity and hype.Aryan Sharma is a 17-year-old builder and hacker in Web3. He’s also previously built two small startups in the education and hyper-local jobs space, and posts his thoughts on Twitter to over 10K followers.“Many people have been thinking about Web3 as an isolated market... but the behavior has been existing for years. That’s a fundamental thing about the market. You can’t create a new behavior, you have to ride on waves of behavior in the market. And that form of serving the behavior has been changing.” ~Aryan SharmaIn this episode, we talk:Distribution is key - and how you can leverage itPhilosophies driving Web3What's up with Schelling points, tokenization, decentralization, etc?_______________________GuestAryan SharmaHacker @ Layer3xyz [@layer3xyz]On LinkedIn | https://www.linkedin.com/in/aryan-sharma-2628aba2/On Twitter | https://twitter.com/aryxnsharma______________________HostEllen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu______________________This Episode’s Sponsors______________________Resources______________________For more podcast stories from Delta X Podcast With Ellen Xu: https://itspmagazine.com/delta-x-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________Want more? Catch this week’s episode and previous ones on the DeltaX newsletter: https://newsletter.deltaxpod.com/ Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 15, 2022 • 57min

Overcoming Adversity To Become A Web App Pentester | A Conversation With Alex Awad | The Hacker Factory With Phillip Wylie

Alex endured a lot of hardships including abusive family life but overcame them to become a web app pentester.Alex's hardships stemmed from an abusive family life. He was homeless and he dropped out of high school, but he had an escape through technology and gaming. Self taught he went on to educate himself, and get employed in IT. He now works as a web app pentester._______________________GuestAlex AwadWeb App Pentester at UndisclosedOn Twitter | https://twitter.com/WisdomOfRageOn LinkedIn | https://www.linkedin.com/in/alex-awad-0310091b3/______________________HostPhillip WylieOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 14, 2022 • 43min

A Conversation With Developer Advocate Simon Maple | Securing Bridges With Alyssa Miller | Episode 6

In this episode, Alyssa talks to Simon Maple about dev adoption and empowerment, security champions teams, and much, much more.________________________________It is a podcast, yes, but you can join us as we record each episode live on Twitter, LinkedIn, Facebook, and Youtube.Live, Every Wednesday at 1pm PDT | 4pm EDT (USA) | The Recorded Podcast version is published a few days later.Our ability to improve the security posture of our organizations depends heavily on connecting the security function with the various aspects of the business. Join our host, Alyssa Miller, as she and her guests examine key ways to build and secure the bridges between security, product development, the executive suite, and beyond.Listen in as Alyssa sits down with senior and executive security leaders from various industries to share stories of successes and failures we experience working across business teams. Explore practical strategies for building sponsorship and gaining buy-in for security initiatives.It's time to build and secure the bridge to the business.________________________________GuestSimon MapleField CTO at Snyk [@snyksec]On Twitter | https://twitter.com/sjmapleOn LinkedIn | https://www.linkedin.com/in/simonmaple/________________________________HostAlyssa MillerOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/alyssa-miller________________________________This Episode’s Sponsors________________________________ResourcesSecurity Champions program: https://snyk.io/series/security-champions/________________________________Watch the live stream webcast version on-demand on YouTube: https://www.youtube.com/playlist?list=PLnYu0psdcllQyN9-nfFOIp711q65pTsSQFor more podcast stories from Securing Bridges Podcast With Alyssa Miller: https://www.itspmagazine.com/securing-bridges-podcastAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 14, 2022 • 54min

Mentoring, Happiness Engineering, And All The Other Good Stuff | An Audio Signals Conversation With Dr Ali Binazir, M.D., M.Phil.

We all want to be happy but do we know how? Most of all, do we even know what true happiness is? We are going to talk about this, and get some tips on the matter from The Happiness Engineer himself: Dr. Ali Binazir. The truth is that we started this podcast with the idea to talk about something else “How to be a charismatic speaker” but we got fascinated by what Ali had to say about happiness and how just a few little changes in our life can help with that. Improving our relationships, our sleep, our body, and our mind to be a better version of ourselves — and maybe next time we will talk about speaking and presenting ourself in public… because let’s face it: if we feel good about ourselves there is no doubt that our whole public persona will benefit. So let’s get started, it is quite easy — well, once you know how! _____________________________GuestDr Ali Binazir, M.D., M.Phil.Chief Happiness Engineer at Happiness EngineeringOn LinkedIn | https://www.linkedin.com/in/alibinazir/On Twitter | https://twitter.com/DrAliBinazirOn Medium | https://dralibinazir.medium.com/_____________________________This Episode’s SponsorsBlue Lava: https://itspm.ag/blue-lava-w2qsNintex: https://itspm.ag/itspntweb_____________________________ResourcesRadical Acceptance: Embracing Your Life With the Heart of a Buddha by Tara Brach - https://amzn.to/3KjiuGzThe Tao of Dating: The Smart Woman's Guide to Being Absolutely Irresistible - https://amzn.to/1VAeq89_____________________________For more podcast stories from Audio Signals: https://www.itspmagazine.com/audio-signalsAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Apr 14, 2022 • 38min

Cryptography Everywhere | Protecting Data In Systems, Apps, And Communications - Is It Resilient Enough For What The Future Holds? | Redefining Society With Professor Kenneth Graham Paterson

Cryptography is now everywhere in the online world; but how do we know that it’s doing its job properly?Security of “messaging systems” like WhatsApp, Telegram, Signal, etc. How do they work? What security do they offer? How do we know they're any good?And those are just a few questions for today's reality where we tend to trust that the cryptographic algorithms in user are fairly resilient. What Impact will quantum computing have on cryptography in the future; a reality we must prepare for since quantum computing is developing rapidly. To be prepared for this, we must first understand quantum computing itself and what it means for conventional cryptographic systems. Only then can we determine how (and how well) we are getting ready for it.____________________________GuestKenneth Graham PatersonProfessor of Computer Science at ETH Zurich [@ETH_en]On LinkedIn | https://www.linkedin.com/in/kenny-paterson-6841a65/On Twitter | https://twitter.com/kennyog____________________________ResourcesCyber Body of Knowledge - Applied Cryptography: https://www.cybok.org/media/downloads/Applied_Cryptography_v1.0.0.pdfSecurity analysis of Telegram: https://mtpsym.github.io/____________________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcwebBlackCloak 👉 https://itspm.ag/itspbcweb____________________________To see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-societyAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app