ITSPmagazine Podcast

40 Episodes
Subscribe

By: ITSPmagazine, Marco Ciappelli, Sean Martin

Welcome To The Intersection Of Technology, Cybersecurity, And Society. Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity. Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change. Knowledge is power — now more than ever. ITSPmagazine is a free online publication that focuses on technology and the influence that it has on our everyday lives – as businesses, individuals, and the society in which we live.

Students, Women And Veterans—All Part Of The Solution To The Cybersecurity Skills Gap | The Academy | A Conversation With Yolanda Craig And Sandra Wheatley
#457
Yesterday at 5:30 PM

Close the door. There is no more room. We resolved the cybersecurity skill gap problem, and it feels damn good! Well, maybe not, but is it really that hard? There are so many smart people out there that would do very well in InfoSec—do they even know this is an option?

Would you dream of going to the moon if you never looked up to the sky? And even if you did, would you think that the dream could come true if no one like you has never gone there before, and nobody told you that yo...


Building A Culture Of Security | A Conversation With Dr. Keri Pearlson | Tech Done Different With Ted Harrington
#458
Yesterday at 4:00 PM

In this episode of Tech Done Different, Ted chats with Dr. Keri Pearlson, Executive Director of MIT's cybersecurity research organization, CAMS. She shares insight from her team's research into how companies of all sizes can build a strong security culture, even for little or no cost.

You'll learn:

why tech alone can't stop attackers, because they're "getting badder, faster"why training alone isn't sufficient; you need to change beliefswhy behavior changes only if it matterswhy reward systems work, even if the reward is of little or no monetary valuewhy punishment works just as well, toohow some...


When Failure Is Not An Option, Organizations Turn To The Mainframe — Incorporating Mainframes Into Your Zero Trust Architecture | A Key Resources Story With Cynthia Overby
#456
Last Thursday at 3:35 PM

As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks.

One organization — Key Resources — has been looking at this problem for quite some time, and their President, Cynthia Overby, joined us for a conversation. Many critical infrastructure organizations such as financial institutions, insurance companies, and healthcare organizations rely on these mainframes for the most important of transactions and data — when you need some serious power, there is no way around i...


The Quest For The Master Algorithm — How The Ultimate Learning Machine Will Remake Our World | A Conversation With Pedro Domingos
#454
Last Wednesday at 4:00 PM

Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities.

This same thing can be said of a carved stone used as a tool by our ancestors, the wheel, electricity, engines, airplanes, and of the most advanced technologies of today and tomorrow.

Most of us do not realize it, but at the core of all the digital technology...


2020 Inside The Mind Of A Hacker Report | There Will Always Be Hackers — We Just Need More | A Bugcrowd Story — Part 3 of 4 | With Robin Marte (@masonhck357) And Michael Skelton (@codingo)
#453
Last Tuesday at 3:14 PM

Forget about stereotypes of hackers being nefarious masterminds. Hackers are dynamic, young individuals who come from all walks of life — diversity is a big plus for this community — and so it is for the cybercriminals, but they actually are nefarious masterminds.

Countless people are building the applications and systems we use at work and at home. It's a safe assumption they are smart people. Do hackers need to be as smart or smarter than them?

We are glad you're back for another episode as we continue to unveil and explore what is inside the mind of a...


Doing The Right Thing Is Always The Right Thing | A Conversation With Consumer Advocate Christopher Elliott | Tech Done Different With Ted Harrington
#452
02/26/2021

What happens in society when consumers have little control over their customer service experience? Join us for this episode as consumer advocate, Christopher Elliott, shares some insights into the consumer/business relationship.

You'll learn:

why consumers need to understand the basics of security, and pay attention to what companies are claimingwhy companies need to backup any security claims they make, and how to do it (hint: just be transparent)the impact of "thoughtful regulation" as an approach to force companies to treat customers right, including around securitywhy to align your company's values to your behaviors (and...


How To Create A Programming Language, Using Your Time To Learn By Failing, And The Need To Be A Little Crazy | A Conversation With Keno Fischer | Elevate The Future With Ellen Xu
#451
02/25/2021

As one of the core members in implementing the Julia programming language, Keno Fischer shares the advantages of Julia, behind the scenes of creating a coding language, and his vision for the future.

Keno Fischer is the cofounder of Julia Computing and a Forbes 30 Under 30 in Enterprise Technology. Julia is one of the fastest modern open-source languages for data science, machine learning and scientific computing; it has been downloaded over 2 million times and is taught at MIT, Stanford and in over 100 universities around the world.

Fischer got into contributing to the project when he was...


A Conversation With Shira Shamban | Candid CyberSec Podcast With Vandana Verma
#450
02/25/2021

We are back with another Candid CyberSec podcast with a very amazing guest: none other than Shara Shamban. She's an amazing entrepreneur and information security person and we talked about the things we care about mutually.

Shara has served for the armed forces. Listen in to hear about her experience in the military where in the country both men and women are required to serve and each one does a relatively different military service, depending on what your draft was and what someone decided for you what you are going to do. Shara ended up being in...


Ant Colonies, Metaverses, Virtual & Augmented Realities, Diversity, Ethics, And Some Thoughts About The Future | An Audio Signals Conversation With Antonia Forster
#449
02/24/2021

Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace.

You may say I'm a dreamer. But I'm not the only one.

Certainly not the only one. 

There are — and there have always been — brilliant minds that dream and work very hard to make wishes come true. 

The advancement of our knowledge and the conver...


Starting or Running a Vulnerability Disclosure Program? Here’s What To Do Next | Redefining Responsible Disclosure With Chloé Messdaghi And John Jackson
#447
02/23/2021

If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up.

In the cybersecurity community it is not uncommon to use the sentence: whether you are aware of it or not, you're already running a vulnerability disclosure program. But who is running it? Is it the cybercriminals that are ex...


TMI? Staying Social Without Oversharing | A Conversation With Tim Sadler | Your Everyday Cyber With Limor Kessem And Diana Kelley
#448
02/23/2021

Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely.

You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of your children. Bad actors (aka cybercriminals) look for this kind of information so they can exploit it and use it against you. This subject never loses importance because attackers neve...


A Conversation With Kim Crawley | The Uncommon Journey With Alyssa Miller, Chloe Messdaghi, And Phillip Wylie
#444
02/20/2021

In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community.

Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conversation with Kim.

Guest
Kim Crawley (@kim_crawley on Twitter)

Hosts
Alyssa Miller | Chloe Messdaghi | Phillip Wylie

Resources
The Book: The Pentester Blueprint: Starting a Career as an...


Big News, Business Success, And Beavers! | All About Alissa Knight | Focal Point With Chantel Sims And Angela Marafino
#446
02/19/2021

You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human!

From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a book about it, Alissa Knight has accomplished many notable things in her career to date.

In this episode we talk about her prior accomplishments, a few new surprises that are in the works, and ev...


Part 4 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | WISP — WoSec — Gate Breachers
#443
02/19/2021

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience.

It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond.

It doesn't matter how big or small these organizations are; your heart and passion matter the most. We...


Safe To Drink? Cyber Attacks And The Water Supply: What You Need To Know | A Conversation With Bryson Bort | Your Everyday Cyber With Limor Kessem And Diana Kelley
#445
02/18/2021

Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened.

Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemented. He is here today to help explain what went on with the attack, what the future of water safety may look like, and what our listeners can do to help protect their own water sources.

Tune in to...


Part 3 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | Diana Initiative — Black Girls Hack — WiCSME
#442
02/18/2021

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience.

It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond.

It doesn't matter how big or small these organizations are; your heart and passion matter the most. We...


Part 2 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | Women’s Society of Cyberjutsu — OWASP WIA — Ladies Hacking Society
#441
02/17/2021

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience.

It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond.

It doesn't matter how big or small these organizations are; your heart and passion matter the most. We...


Part 1 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | WeAreHackerz — WiCys — InfoSecGirls
#440
02/16/2021

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience.

It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond.

It doesn't matter how big or small these organizations are; your heart and passion matter the most. We...


Skills Needed For A Career In Cybersecurity | A Conversation With Dr. Gerald Auger, Ph.D | ITSPradio Host Jon Helmus
#439
02/15/2021

In this episode Jon Helmus guest hosts a special episode on ITSPradio on behalf of Caroline Wong. His guest is Dr. Gerald Auger, Ph.D, Cyber Advisor, Speaker, and Educator.

They talk about finding your passion within cybersecurity, how to get started in the field, and what companies should look for to build out their security programs.

Guest
Dr. Gerald Auger, Ph.D, Managing Partner, Coastal Information Security Group (@Gerald_Auger on Twitter)

Host
Jon Helmus, Manager of Pentest Community at Cobalt (@Moos1e_Moose on Twitter)

This Episode’s...


Two Wrongs and Finger Pointing | Indistinguishable From Magic With Chris Abramson And Rafal Los
#438
02/15/2021

On this episode, Rafal and Chris discuss how a Washington state agency screwed its vulnerable using an irresponsible vendor's 20-yr-old software. You know what, they're both wrong. Even though there are technicalities, and someone is going to win in the upcoming court battles (quote us on this one), the real victims are those who have had their information stolen at a time when they're already hurting.

Hosts
Rafal Los | Chris Abramson

This Episode’s Sponsors:

If you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more...


You're Compensated By How Much You Help People | A Conversation With Venture Capitalist Will Lin | Tech Done Different With Ted Harrington
#437
02/13/2021

During this episode, Ted and Will talked about a gazillion things related to startups, investments, leadership, the cybersecurity market, and so much more. Here are some of the highlights:

why venture capital is not about money; it's about helping founders succeedwhy to succeed you don't need to have a solution that 100% of CISOs need, you just need 30-60%why it's far more important to focus, because depth is better than breadththe power of unspoken assumptions, and how to free yourself from their graspwhy you need to find people who like you for you, and the value of authenticitywhy...


Human Hacking: Win Friends, Influence People, And Leave Them Better Off for Having Met You | A Conversation With Christopher Hadnagy
#436
02/13/2021

Who are you today? Is there one true self, or are we adapting behaviors to different social situations and goals? The answer is yes, and yes. Whether we realize it or not, we are all social engineers; we are all human hackers.

Some of us are good at it and do it intentionally. Some are just being human and part of a social species. And, a few are so good at this game that they've made a profession out of it. Once again, there is always another big existential choice to make in every situation: are you...


Taking The Insanity Out Of Incident Response | Redefining Your Security Operations Center | With Melissa Duncan And Kristy Westphal
#435
02/11/2021

We know that SOC team members are burning out as they try to protect companies, yet many InfoSec programs repeat the same strategies expecting different results. Can we take insanity out of the incident response?

That's a good question. One that we're not going to answer, but one that we will discuss and hopefully encourage you all to think about with us as we try to get to the root of the problem: what needs to change.

In this podcast, we will shed some light on how SOC teams could modify their programs to embrace...


Diversity And Cybersecurity Management In The DoD And Commercial Sector | Removing Barriers And Filters | A Conversation With Madiha Jafri And Steve Sietz From Lockheed Martin
#432
02/09/2021

Cybersecurity is a multi-faceted discipline that needs brains — a lot, and of all kinds. As such, there is plenty of room for diversity, but it is not welcoming and retaining talent as fast as it could and should. Why?

The answers — yes, plural — likely sit inside each of us. Unfortunately, as humans, we all have preconceived notions and perspectives. That's actually a good thing in some cases. However, many humans hold conscious and unconscious bias. Many refuse to remove those filters and break down the barriers that prevent themselves and others from taking the first steps into this i...


New Phone, Who Dis? | A Conversation With Special Guest, Rachel Arnold | Your Everyday Cyber With Limor Kessem And Diana Kelley
#434
02/09/2021

Getting and setting up a new phone has become a regular occurrence for many of us. Rachel Arnold helps us understand what we should do to protect our privacy when setting up a new device.

Tune in to hear:

What smartphone privacy meansHow law enforcement uses cell information to track suspectsHow exercising the same place a crime is committed could make you a suspectIf locations tracking apps including retail loyalty, food delivery, and healthcare like COVID-19 tracers are a privacy concernWhat you’re consenting to and why when you download appsWhy social app policies deserve a se...


The Key To Technology Is Relationships | A Conversation With Ben Stanbury | Tech Done Different With Ted Harrington
#433
02/09/2021

Ben Stanbury has been a top executive at some of the largest content creators in the world, from EA Sports to Disney to Amazon Studios, where he currently serves as the Worldwide Head of Technology.

In this episode, he shares a number of insights about how to get your ideas to resonate with top executives. Perhaps most surprising of them all? The key is to build relationships. It doesn't matter how scientific and technical our field is, success is driven by relationships.

In this episode, we discuss:

why to think holistically and to think...


Journey To Dropping Out Of College, Co-Founding A Techstars Startup, And Raising $250k | A Conversation With Aaron Lebel | Elevate The Future With Ellen Xu
#431
02/08/2021

Aaron Lebel is a Carnegie Mellon ML and Statistics dropout and co-founder @ Pairi, a Techstars startup which has raised $250k. He discusses the value of self-learning, untraditional pathways, and taking risks.

College is not the only path to success. Initially building an eyelash extension business, Lebel and his co-founder pivoted to building a no-code platform for launching service based marketplaces fast—a risk which paid off and resulted in both of them dropping out of Carnegie Mellon to pursue their work on their startup, Pairi. The many lessons he has learned along the way have taught him th...


The Thought Police. To Protect, Serve, Predict, And Surveil. The Thin Line Between Utopia And Dystopia | A Conversation With Sarah Brayne And Lam Nguyen
#429
02/05/2021

"Whether he wrote DOWN WITH BIG BROTHER, or whether he refrained from writing it, made no difference... The Thought Police would get him just the same. He had committed... the essential crime that contained all others in itself. Thoughtcrime, they called it.”―George Orwell, 1984

It was the year 1949 when, in the dystopian novel, 1984, George Orwell introduces the Thought Police, Thinkpol. Luckily, now, in 2021, we can look back and be grateful that it was, after all, just the product of a brilliant, imaginative mind. Sure it was, you better believe it, or they will know―eventually. 

And here...


Cybersecurity's Problem With Metrics | Indistinguishable From Magic With Chris Abramson And Rafal Los
#430
02/04/2021

Cybersecurity has a big problem with metrics — whether it's showing progress, regress, or just telling a narrative.

We're historically bad at understanding how to make the thousands of metrics our security products throw at us make sense to people that are in our leadership chain.

The point of using metrics is to show a trend, or an impact — but the way many of us do it we accomplish neither.

Hosts
Rafal Los | Chris Abramson

This Episode’s Sponsors:

If you’d like to sponsor this or any other podcast...


Are Laws Keeping Pace With Cyber Reality? | The History And Impact Of The Computer Fraud and Abuse Act (CFAA) On Society | A Conversation With Riana Pfefferkorn And Leonard Bailey
#428
02/03/2021

As with most laws, the first question that comes to mind when technology is involved is: are they keeping pace with it? However, there is a fundamental follow-up question: how are these laws interpreted in relation to how new technologies shape business and society?

The Computer Fraud and Abuse Act (CFAA), enacted by the United States Congress in 1986, is one such law. A lot has changed since then:

the technologies used in every aspect of our livesaccess to these same technologies used by criminals to commit cybercrimeuse of these technologies by ethical hackers to help organizations...


Patents Versus Progress: The State Of Technology And Cybersecurity Innovation Protection | With Joanna Chen And Puya Partow
#427
02/02/2021

Are technology patents helping us with innovation and collaborative creativity, or do they generate hyper complexity that is slowing our societies' advancement? Listen up, and maybe you will decide on your own.

By awarding and defending technological patents, we promote innovation by offering intellectual property protection to the invention and the inventors for what they've created. However, while patents may help achieve this specific goal, we must also wonder if we may be reaching the opposite results in particular situations.

Suppose companies can do research that can be used for good but is locked away...


Money Flows When Security Is A Competitive Advantage | A Conversation With Peter Harris | Tech Done Different With Ted Harrington
#426
02/01/2021

In this episode of Tech Done Different, we chat with Peter Harris, a partner at University Growth Fund. Peter explains how venture capitalists think about security, what they see their portfolio companies get right, and what they get wrong. In particular, we discuss:

how VCs generally don't focus much on security, but if they see a company who has turned security into a competitive advantage (as is taught in Hackable), they'll pay a premium for itthe leadership principle of "we get the coffee", not the internswhy the best investors bring value beyond just the checkwhy autonomy and true...


Personal Experiences Of Diversity And Inclusion | A Chat With Chloé Messdaghi | Focal Point With Angela Marafino And Chantel Sims
#425
01/31/2021

During this episode, we had the opportunity to speak with Chloé Messdaghi, Chief Strategist, InfoSec Advocate, Board Member, Keynote Speaker, and Activist, about diversity and Inclusion.

We focus on what diversity and inclusion mean to Chloé, what they look like to her in the workplace, and how she has dealt with non-diverse and non-inclusive situations in the past.

As the President of multiple organizations, Chloé shares what moved her to create the WeAreHackerz organization, formerly known as “WomenHackerz,” and the journey behind the renaming of the organization. We talk about the comfort members of WeAreHackerz find by...


It's Not The Digital Turning Point | Indistinguishable From Magic With Chris Abramson And Rafal Los
#424
01/30/2021

The article in the WSJ was wrong... The big recent hack was NOT a "digital turning point," here's why.

Oh, you want the answer - well you'll have to listen to the show but the condensed version is that there isn't really anything in "the way we handle third party supply chains" that COULD change to make a difference with what happened. If you think we're wrong, go ahead, disagree.

Hosts
Rafal Los | Chris Abramson

This Episode’s Sponsors:

If you’d like to sponsor this or any other podcast epis...


Creating A Culture Of Privacy | On Location For Data Privacy Day 2021 To Redefine Privacy With Rita Heimes And Sean Martin
#423
01/28/2021

A successful privacy program needs to be embedded into the foundation of an organization. Join us as we take a journey into the past, present, and future of creating a culture of privacy.

While there are many regulations in place to help "nudge" organizations long, many know that data privacy involves more than just compliance. When done correctly, your privacy program will benefit your customers, employees and the overall business. In this session, we'll take a holistic look at privacy and discuss how to build a culture of privacy into your organization. We'll start with leadership and...


That Moment When Our Perspective On Privacy Changes | A Conversation With Mozilla's Jen Caltrider
#421
01/28/2021

Privacy is something everyone takes for granted until it is not. As our daily cyber activities have become an integral part of who we are and what we do, our footprints have crossed from the physical world into the cyber society.

The game has changed in many ways, but did this change our expectations for what privacy is and what it means nowadays? We are negotiating and bargaining our personal, sensitive information for services we want, enjoy, and need. Still, it is questionable to believe that everyone is aware of the real value of this exchange.

<...


2020 Inside The Mind Of A Hacker Report | An International Hacker Community Comes Together To Root Out Technology Weaknesses | A Bugcrowd Story — Part 2 of 4 | With Jasmin Landry And Grant McCracken
#422
01/28/2021

In a world where technology allows businesses to flourish and humanity to come together online, it should not come as a surprise that such technology can be both attacked and defended remotely from all over the world.

In this episode, we will look at the good side of it: the ethical hacker community. Where they are from, what they do, how they do it, and even where their research targets are located.

Leveraging Bugcrowd's Inside the Mind of a Hacker report (Download the ITMOAH report) as the basis for this conversation, and tapping into their...


The Hacker-Journalist Dance: The Need For Trust, Transparency, And Storytelling In CyberSecurity | A Conversation With Geoff White And Jake Williams
#420
01/27/2021

There are at least two sides to every story — sometimes even more. It depends on how many characters there are and how they relate to each other. This story is about hackers and journalists in the news — and Godzilla??!

To begin, it probably makes sense to take a step back from the people themselves (hackers and journalists) and look at their profession and the state of their respective industries. While our guests, Geoff and Jake, give us much more profound insight in the actual podcast, at the highest, most superficial level, we can say that nowadays journalism is a...


Cyber Wellness Check: A Health Data Safety Conversation With Caleb Barlow | Your Everyday Cyber With Limor Kessem And Diana Kelley
#419
01/26/2021

Your health data is important to you & your family’s wellbeing. It’s also a target for cyber-criminals. We speak with health data expert, Caleb Barlow, to learn how you can keep your medical data safe.

As CEO of CynergisTek, a healthcare focused cybersecurity consulting firm, Caleb is on the frontlines of the healthcare data battle and knows what works to keep health data accurate and protected.

Tune in to hear:

Why healthcare data is more attractive to cybercriminals that financial dataIf US health systems are cyber-resilientHow attackers increased attacks on healthcare during the pand...


How a 16-Year-Old Machine Learning Influencer Scaled His Twitter to 40k Followers | A Conversation With Pratham Prasoon | Elevate The Future With Ellen Xu
#418
01/24/2021

At just 16 years old, Pratham Prasoon is already the #1 Machine Learning influencer on Twitter, with an audience of over 40k. In this episode, Pratham talks about his start in machine learning, his rise on Twitter, and how he uses passion in machine learning to help others.

Pratham started off with a simple yet strong motivation — wanting to spread knowledge of how to get started in machine learning, drawing from his experience trying to get into the field himself. In May of 2020, Pratham first became active in the world of Twitter.

Inspired by the web developer co...