The ITSPmagazine Podcast

ITSPmagazine, Sean Martin, Marco Ciappelli
undefined
Oct 5, 2021 • 46min

Crowdsourcing CyberSecurity Intelligence To Secure Society | A CrowdSec Story With Philippe Humeau

Suppose you still believe the narrative of a hooded figure with ski gloves and a crowbar attacking a company network. In that case, this may be hard to digest: Cybercrime is a business. Cybercriminals are well organized.They share data; sell information; rent, lease, and trade tools; and market their business.It's time to source the crowd of cyber defenders to counter this advantage.Many organizations are spending millions, if not billions, of dollars standing up multi-layered endpoint, network, and perimeter protection systems, multi-layered cloud security solutions, and privilege-oriented identity management systems, as well as real-time security operations centers - and much, much more.And let's not forget that the security team needs to do all of this while allowing the users to get their job done and, in the best-case scenario, not having to worry about any of this. The Cybercriminal environment doesn't have to worry about this — actually, they will try to take advantage of it. All their investments go straight into understanding their target. What technology is used to run the business, what are their weaknesses, and how can they get in and out with as much value as possible without the possibility of being caught. Cybercriminals use threat intelligence to attack. This is what they can focus on, and they use it to their advantage, each and every day.CrowdSec is joining the good guys on this battlefield and understands that by acting together and sharing important, relevant pieces of information, we can successfully counteract organized cybercrime. CrowdSec's CTI-driven IPS objective is to automate cybersecurity threat intelligence sharing and consumption on a large scale.How does that happen?Through the crowd, of course.What makes it work beyond scale?It's all about the real-world context that the crowd experiences and shares.There are plenty of data lakes, and CTI feeds available to determine the state of an IP address; has it been seen as malicious or not?That's only part of the question.How relevant are these data sets to your business? To your environment? To your risk level? Can you ingest them, make sense of them, take action from them?Once these and many other questions are answered, captured, shared, and utilized at scale by the crowd, we can effectively become competitive against cybercrime.Learn more about what it means to join the crowd and how all the information can benefit businesses and organizations all over the globe.This is the value of authentic and accurate information sharing.Note: This story contains promotional content. Learn more.____________________________GuestPhilippe HumeauOn Linkedin 👉https://www.linkedin.com/in/philippehumeau/On Twitter 👉https://twitter.com/philippe_humeau____________________________Be sure to visit CrowdSec at https://itspm.ag/crowdsec-b1vp to learn more about their offering.On Linkedin 👉https://www.linkedin.com/company/crowdsec/On Twitter 👉https://twitter.com/Crowd_SecurityWatch the video here: https://youtu.be/cOMg-Jk5rXE____________________________Are you interested in telling your story?https://www.itspmagazine.com/telling-your-story Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 5, 2021 • 26min

Event Presentation | October 20th 2021 Is The First Ever SOC Analyst Appreciation Day | A Conversation About The Value And Drivers Of Technology Innovation With Josh Klick

SOC analysts are often overworked and under-appreciated — but that needs to change! Many look to improve their work environment through the use of technology and innovation. In the SOC, we need a lot of tuning to find that delicate balance between business goals, technology innovation, and the humanity in the machine.Scripting, coding, and other forms of automation come in handy when trying to make it through the day as a Security Operations Center (SOC) Analyst. However, there's much more to the role when it comes to innovation.Why and how we use technology is at the core of many of our conversations here at ITSPmagazine. When we talk about professions where technology can be at the same time a massive player in business performance and mental health improvement, we do wonder if, and how, the two can be leveraged to serve the same purpose. We hope it does.In this second of three episodes covering the first-ever SOC Analyst Appreciation Day, we get to speak with Josh Klick, a SOC practitioner who successfully worked his way up into managerial and advisory positions for some large global enterprises. Together, we explore how and when innovation can be used to help the organization become more efficient and how the analysts themselves can open their minds creatively to not only accomplish more but to also feel better, mentally, about the work they are performing.ITSPmagazine is proud to partner with Devo to recognize the efforts put in by the practitioners working away in the trenches and on the front lines of cybersecurity. Join us to help us recognize them and their efforts.About the SOC Analyst Appreciation DayJoin us for five hours of live-streamed content — with sessions ranging from what skills are needed to move up in the SOC, to desk decompression from a yoga instructor, to a panel discussion about a day in the life of a SOC, to a "Lunch & Laugh" where a stand-up comedian will provide some much-needed de-stressing entertainment. There's a ton to celebrate — let's do this!Learn more about SOC Analyst Appreciate Day: https://itspm.ag/devoq0zz______________________________GuestJosh KlickOn Linkedin | https://www.linkedin.com/in/klick/______________________________To see and hear more conversations about and from this event as we explore the personal, technical, operational, and innovative aspects of this role:🎙✨ https://www.itspmagazine.com/first-annual-soc-analyst-appreciation-dayLearn more about promoting your own event on ITSPmagazine:👉 https://itspm.ag/pyevmn Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 3, 2021 • 1h 7min

3D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation | Bugs in machines, computers, and code | Through The TechVine Radio Program Episode Seventeen

In this week's episode of Through The TechVine Live Radio Program, Diana, Sean, and Marco welcome Ellen Xu as a guest on the show — together they talk about: 3D Organ, Tissue And Cell Printing | Identifying Disease with Natural Language Processing Technology |The Incredibly Potent Technology of Food Fermentation |  Bugs in machines, computers, and code | Through The TechVine Radio Program Episode SeventeenWe have officially decided to keep Through The TechVine a live recording but Radio Style. We like that mood — what do you think?Apart from that, everything else is the usual Tech and Science Topics conversations, some good laughs, and a lot of WHAT IF?! 🤔 🧐In this episode we talk about:3D Organ, Tissue And Cell Printing3D-printed organs could save lives by addressing the transplant shortageWhen people die, it’s not usually because their body shuts down, but because one key organ fails that the body can’t survive without. Severe heart or kidney failure patients need prompt organ transplants to survive. That’s where 3D printed organs, such as 3D printed hearts, come in. Oh, and brain cells too!From The Conversation: https://theconversation.com/3d-printed-organs-could-save-lives-by-addressing-the-transplant-shortage-132491From 3D Sourced: https://www.3dsourced.com/guides/3d-printed-organs-bioprinting/From 3D Printing Industry: https://3dprintingindustry.com/news/scientists-3d-print-living-brain-cells-in-promising-development-for-bioprinting-196684/Identifying Disease with Natural Language Processing TechnologyA Kaiser Permanente study illustrates the value of AI-based natural language processing technology in disease diagnosis.While healthcare is currently in an era of big data and data analytics, it remains hard to identify patients with complex conditions such as valvular heart disease, making it difficult to study the disease, track practice patterns, and manage population health.From Health IT Analytics: https://healthitanalytics.com/news/identifying-disease-with-natural-language-processing-technology The “Incredibly Potent Technology” of Food FermentationTechnology is revolutionizing food, but how can it be explained to consumers? Companies are making real dairy, meat and eggs without animals and using fermentation to produce new analogs, but the challenge is describing it in a way that sounds appetizing.From Food Dive: https://www.fooddive.com/news/food-tech-explain-marketing/606401/From VegConomist: https://vegconomist.com/fairs-and-events/the-future-food-series-on-29th-september-presents-the-incredibly-potent-technology-of-fermentation/Technology News in HistoryBugs in machines, computers, and code. Also Would You Eat Bugs? September 9, 1945Operators of the Harvard Mark II find a moth trapped in relay #70 in panel F. The bug is taped to their troubleshooting log where it was written, “First actual case of bug being found”. This was not the first use of the term “bug” for computer problems, but this was the first time the term “debug” was used.From Wikipedia: https://en.wikipedia.org/wiki/Software_bug#Etymology Learn more about these topics and some more by listening to this podcast.We are serious about thinking about the many ways technology is and will impact our society. Still, we do not miss the opportunity to share some other stories, oddities, rarities, and some laughs.Join us!______________________________There is one truth that is not told enough: technology is not magic — but it can be magical.Technology is human — it is part of who we are… our evolution… our future.Will it be a Dystopian or Utopian one? Well, that is up to us, and nobody else._____________________________Join us for our live recording on… Twitter 👉  https://twitter.com/ITSPmagazineLinkedIn 👉  https://www.linkedin.com/company/itspmagazineFacebook 👉  https://www.facebook.com/ITSPMagazineYouTube (New Channel — follow us for video content coming soon) 👉 https://www.youtube.com/channel/UCbo3ZeBn3eyBnjE7IRiADKA…as we discuss more technology stories.Through The TechVine every week, with Diana, Sean, and Marco: https://www.itspmagazine.com/through-the-techvine____________________________Guests:Ellen XuOn ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ellen-xu____________________________This Episode SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qs Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships____________________________Meet The HostsDiana KelleyOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/diana-kelleySean MartinOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/sean-martinMarco CiappelliOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 1, 2021 • 34min

We're In This Together | A Conversation With Phillip Wylie | The National Blast With Keenan Skelly

Breach verification reform has been needed for a long time. Now with legislation on the floor, CISA has the opportunity to change the paradigm._______________________GuestPhillip WylieOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________HostKeenan SkellyOn ITSPmagazine  👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly______________________This Episode’s SponsorsvArmour 👉https://itspm.ag/varmour-8d92______________________ResourcesHacking is Not A Crime: https://www.hackingisnotacrime.org______________________For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 1, 2021 • 1h

The Escalating Demand For Tech Talent | NPower's ATCC Quarterly Event | Redefining Security Education With John Miller, Shani Waugh, Larry Quinlan, And Avneet Hall

As the industry returns to work, how are companies planning to secure and retain talent in a time where employees are choosing to work remotely? How are critical jobs in cybersecurity and cloud maintained to ensure businesses and activities remain online and secure at all times?As the demand for tech talent grows, NPower has a proven pipeline for diverse, passionate technology professionals. From cybersecurity to cloud computing, program graduates have invested in themselves to open career opportunities. The ATCC is leading the way in supporting career growth and professional development for young adults from underserved communities and military veterans. Join us for this timely discussion as we approach the future of work, post-pandemic, and meet with tech industry leaders to learn how your company can partner with NPower.Join Sean Martin, NPower, and the Advancing Tech Careers Collaborative (ATCC) steering committee members for a panel conversation discussing the increasing demand for tech talent. Want to see the crew in action? Watch them here.____________________________GuestsJohn MillerOn LinkedIn | https://www.linkedin.com/in/johnrmiller11/Shani WaughOn LinkedIn | https://www.linkedin.com/in/shani-waugh-447a4521/Larry QuinlanOn LinkedIn | https://www.linkedin.com/in/larryquinlan/Avneet HallOn LinkedIn | https://www.linkedin.com/in/avneethall/On Twitter | https://twitter.com/avneetthapar____________________________ResourcesLearn more about NPower: https://npower.org/On LinkedIn: https://www.linkedin.com/company/npower-nyOn Twitter: https://twitter.com/NPowerOrgOn Facebook: https://www.facebook.com/npower.org/Watch the panel video: https://www.youtube.com/watch?v=6aokbNaw-kw____________________________This Episode’s SponsorsDevo 👉https://itspm.ag/itspdvweb____________________________To see and hear more Redefining Education stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-educationAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 1, 2021 • 31min

From Pawning To Pwning | A Conversation With Cory Billington | The Hacker Factory With Phillip Wylie

Cory Billington a former member of the US Navy, worked with car racing, and in pawn shops before he found his passion.Cory found his passion in pentesting and red teaming and now works for a large national insurance company. He shares his story and recommendations on becoming an ethical hacker._______________________GuestCory BillingtonOn Linkedin | https://www.linkedin.com/in/mcorybillington/On Twitter | https://twitter.com/_th3y______________________HostPhillip WylieOn ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/phillip-wylie______________________This Episode’s SponsorsBugcrowd 👉 https://itspm.ag/itspbgcweb______________________Resources______________________For more podcast stories from The Hacker Factory with Phillip Wylie, visit: https://www.itspmagazine.com/the-hacker-factory-podcast______________________Are you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Oct 1, 2021 • 31min

The Road To Athens | 19 Teams Compete For The European Cyber Security Challenge Title In Prague | Redefining Education With Iaonnis Agrafiotis, Advian Belmonte, Pedro Adão, Petr Jirasek, Mario Polino, Tom Levasseur, And Jessica Gulick

Let the games begin! Let your friends compete. Let the best team win! It's all part of a European strategy to attract, train, and nurture the next generations of cybersecurity professionals.Join Sean Martin, and he connects with our on-the-ground reporter and founder of the US Cyber Games, Jessica Gulick, as we discuss this year's European Cyber Security Challenge being held in Prague by Prague's cybersecurity challenge team of competitors and volunteers. What does it take to put this event together? Who is competing? Who is winning? And what does it mean to compete and win? And, why is Canada participating in a European challenge? There's a compelling and meaningful reason, trust us.Join us as we connect live with the team (watch the video) and then root on your favorite team as they compete for this challenge and then make their way on to the international cybersecurity challenge.____________________________About the European Cyber Security ChallengeEuropean countries host their national cybersecurity competitions. The winners of the national contests represent their countries in the ECSC. Similar to the ECSC, the national cybersecurity competitions consist of security-related challenges from domains such as web security, mobile security, crypto puzzles, reverse engineering, and forensics, which the participants have to solve in order to collect points. The individuals with the most points win the competition and secure a place in their national team, which will go on to compete in the ECSC finals.About the International Cybersecurity ChallengeIn the first International Cybersecurity Challenge, teams from across the globe will compete in a series of challenges such as web application and system exploitation, cryptography, reverse engineering, hardware challenges, forensics and escape rooms.About the US Cyber GamesThe US Cyber Games was founded by Katzcy, in cooperation with the National Initiative for Cybersecurity Education (NICE) program at the National Institute of Standards and Technology (NIST). The program will run from April to October 2021 and consist of the US Cyber Open, the US Cyber Combine Invitational, and the selection of the first-ever US Cyber Team™ to represent the United States at the 2021 International Cyber Security Challenge (ICSC) held in Athens, Greece in December.About the European Cybersecurity ChallengeThe European Cybersecurity Challenge (ECC) is an annual competition, coordinated by the European Union Agency for cybersecurity. The event offers a platform for young cyber talents across Europe to gather and engage in networking over a unique opportunity to experience cooperation in trying to resolve a cybersecurity problem.The ECC is intended to encourage young people to pursue a career in cybersecurity, by challenging and developing the participants’ skills needed in such extreme situations and connecting them with industry.____________________________GuestsIaonnis Agrafiotis, ENISA, ICCAdvian Belmonte, PM ECSC EnisaPedro Adão, Coach Team Portugal and EuropePetr Jirasek, Chairperson ECSC, ENISA Steering Committee, Chairman Czech National Cybersecurity Competition (led the day)Mario Polino, Italy Coach, Team Europe, TrainerTom Levasseur, Coach and Organizer for Cyber Team CanadaJessica Gulick, Founder US Cyber Games____________________________This Episode’s SponsorsDevo 👉https://itspm.ag/itspdvweb____________________________ResourcesWatch the video recorded LIVE from Prague: https://youtu.be/iN0s8165cl8European Cyber Security Challenge | Europe: https://ecsc.eu/On Twitter: https://twitter.com/enisa_euOn Facebook: https://www.facebook.com/ENISAEUAGENCYEuropean Cyber Security Challenge 2021 | Prague: https://ecsc2021.cz/On Twitter: https://twitter.com/ecsc2021On YouTube: https://www.youtube.com/channel/UCQKaxFZhfaqCwpDzq3KDO_g/On Facebook: https://www.facebook.com/ecsc2021More US Cyber Games News and Coverage on ITSPmagazine: https://www.itspmagazine.com/us-cybergames-2021-coverage-road-to-athens | On Twitter: https://twitter.com/USCyberGames | On LinkedIn: https://www.linkedin.com/showcase/us-cyber-games/EU Cyber Security Challenge: https://www.enisa.europa.eu/topics/cybersecurity-education/eu-cyber-challenge | https://europeancybersecuritychallenge.eu/____________________________To see and hear more Redefining Education stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-educationCatch all of our coverage of the US Cyber Games and other teams from around the world as they go On the Road to Athens: https://www.itspmagazine.com/us-cybergames-2021-coverage-road-to-athensAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Sep 30, 2021 • 42min

Should We STOP Requiring CISOs To Have A CISSP? Let’s Talk About It | Redefining Security With Brian Bobo

We keep hearing the mantra that CISOs and CSOs need to be business leaders. So how come we keep seeing job descriptions and hearing about interviews that focus on the technical certifications like the CISSP and many others? That's exactly the question posed in a post on LinkedIn that caught our attention - and that of many others!Join us for a candid conversation with the post's author, a current CIO and CISO, Brian Bobo, as we explore the realities of what a CISO should be focused on and why relying on a technical security certification could turn the business looking in the wrong direction and leaving their risk profile in a bad way.From The LinkedIn PostI don’t post much but I need to go on a bit of a rant. I earned my CISSP years ago. As I am updating my CPEs to stay current I realize that almost nothing I do as a CISO counts for CPEs, I don’t even see a place to document incident management. And what does count can only really be categorized under the Security and Risk Management domain. Presenting, educating, serving on ISC(2) boards are all well and good but they still don’t make me a better CISO. There is nothing about strategy, leadership, presenting to a board, incident management, etc. As a CISO, strategy and leadership should be your focus. You should hire then allow and enable great people to do their jobs. So we need to STOP requiring Directors and above to have a CISSP and start thinking about these as leadership positions with a security focus.____________________________GuestBrian BoboOn LinkedIn | https://www.linkedin.com/in/brianbobo/____________________________ResourcesLinkedIn thread that inspired this conversation: https://www.linkedin.com/posts/brianbobo_stop-requiring-cisos-to-have-a-cissp-i-don-activity-6841017539837997056-HGwu/____________________________This Episode’s SponsorsImperva: https://itspm.ag/imperva277117988HITRUST: https://itspm.ag/itsphitweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Sep 29, 2021 • 47min

Ethics Guidelines And EU Standards In Artificial Intelligence | The Business And Morals Side Of AI Must And Can Coexist In Our Society | Redefining Technology With John Durcan, Fergal Finn, And Aditya Mohan

You may have not seen AI yet, but there is a good chance that AI has seen you. Artificial Intelligence can be used to create tremendous commercial value and can be used to bring significant improvements in how society functions. However, it must, and can, be done at the same time.We need to create and follow international standards that allow us to build AI around scientific and practical core ethics that can still retain those morals that make us humans, even when adapted to various countries and cultures. Maybe this is a time of self-reflection and understanding for who we really are.  Join us for this European-rooted, internationally-oriented conversation with 3 AI experts looking at how standards, ethics, morals, and laws will play a role in defining, implementing, and monitoring the data-hungry artificial intelligence systems of today and the future.______________________________GuestsJohn DurcanOn Linkedin | https://www.linkedin.com/in/johndurcan/On Twitter | https://twitter.com/EI_JDurcanFergal FinnOn Linkedin | https://www.linkedin.com/in/fergalfinn/Aditya MohanOn Linkedin | ie.linkedin.com/in/admohan______________________________ResourcesNSAI Top Teams in Standards in AI: https://www.nsai.ie/standards/supporting-standards/top-teams-for-standards-in-artificial-intelligence/Learn more about National Standards Authority of Ireland (NSAI): https://www.nsai.ie/On LinkedIn: https://www.linkedin.com/company/national-standards-authority-of-ireland/On Twitter: https://twitter.com/nsai_standardsOn Facebook: https://www.facebook.com/NSAIstandards/On YouTube: https://www.youtube.com/user/NSAImediaLearn more about Enterprise Ireland: https://www.enterprise-ireland.com/en/On LinkedIn: https://www.linkedin.com/company/enterprise-irelandOn Twitter: https://twitter.com/EntirlOn Facebook: https://www.facebook.com/EnterpriseIreland?ref=hlOn YouTube: http://www.youtube.com/enterpriseirelandtv______________________________This Episode’s SponsorsBlueLava ✨ https://itspm.ag/blue-lava-w2qsDevo  ✨ https://itspm.ag/itspdvwebAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships______________________________To see and hear more Redefining Technology stories on ITSPmagazine, visit:🎙✨ https://www.itspmagazine.com/redefining-technology Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
undefined
Sep 29, 2021 • 45min

Book | Critical Infrastructure Risk Assessment: The Definitive Threat Identification And Threat Reduction Handbook | Redefining Security With Ernie Hayden

In a world where everything is connected and interdependent, complexity has become part of our very way of life, and it must be part of our way of thinking. But, especially when we look at infrastructure security, the boundaries between analog and digital, physical and cyber, are simply not there anymore.In today's conversation, we discuss the importance of looking at our society, economy, and security as a complex system of interdependent subsystems. Everything is connected, and we are not just referring to IoT.From bridges to nuclear plants, to the President's car, and all the way up to space, the security assessment of critical infrastructure is not a checklist but a mindset. About The BookAs a manager or engineer have you ever been assigned a task to perform a risk assessment of one of your facilities or plant systems? What if you are an insurance inspector or corporate auditor? Do you know how to prepare yourself for the inspection, decided what to look for, and how to write your report?This is a handbook for junior and senior personnel alike on what constitutes critical infrastructure and risk and offers guides to the risk assessor on preparation, performance, and documentation of a risk assessment of a complex facility. This is a definite “must read” for consultants, plant managers, corporate risk managers, junior and senior engineers, and university students before they jump into their first technical assignment.____________________________GuestErnie HaydenOn LinkedIn | https://www.linkedin.com/in/enhayden/Publisher's Twitter | https://twitter.com/RothsteinPub____________________________ResourcesBook: https://www.rothstein.com/product/critical-infrastructure-risk-assessment-the-definitive-threat-identification-and-threat-reduction-handbook/____________________________This Episode’s SponsorsArcher: https://itspm.ag/rsaarchwebEdgescan: https://itspm.ag/itspegweb____________________________To see and hear more Redefining Security content on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-securityAre you interested in sponsoring an ITSPmagazine Channel?👉 https://www.itspmagazine.com/podcast-series-sponsorships Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app