ITSPmagazine Podcast artwork

ITSPmagazine Podcast

1,056 episodes - English - Latest episode: about 3 years ago - ★★★★★ - 15 ratings

Welcome To The Intersection Of Technology, Cybersecurity, And Society.

Join our podcast conversations as we journey into the past, the present, and the future, and explore the relationship between technology and humanity.

Together we are going to find out what it means to live in a society where everything is connected, and the only constant is change.

Knowledge is power — now more than ever.

ITSPmagazine is a free online publication that focuses on technology and the influence that it has on our everyday lives – as businesses, individuals, and the society in which we live.

Technology education internet business computers digital transformation future technology innovation science hacking
Homepage Apple Podcasts Google Podcasts Overcast Castro Pocket Casts RSS feed

Episodes

Improving Life Through Smart Buildings — How Technology Can Bridge The Gaps We've Created At Home, At Work, And While Shopping | A Cyber Society Conversation With Todd Boucher

March 17, 2021 16:30 - 35 minutes - 32.3 MB

When is a building more than just a thing, and it becomes smart? When it can adjust to the needs of its tenants, occupants, workers, and guests, that's when. In this podcast, we learn what this means and how our spaces should adapt to us and not the other way around. Please listen as Sean chats with designer Todd Boucher to discuss this and the future of living as our society becomes more technologically advanced. The design, construction, existence, and maintenance of smart buildings is a...

The Relationship Between Roles: Human Resources And Information Security | HR Is The Organization's Communications Super Glue | Redefining Security Culture With Dora Ross, Global Security Culture Specialist

March 16, 2021 18:30 - 33 minutes - 31 MB

The human resources department within any organization is well-positioned to feel the pulse and monitor a company's culture—teams, divisions, and the organization as a whole. Because of this, it could be the ideal ally to the InfoSec team. But is it? Let's find out. Consider the lifecycle of an employee. The initial company awareness, gaining familiarity with its brand, exploring its job opportunities, moving on to the next role, all the way to retirement—or perhaps even getting fired. Of c...

Compliance Is Not Security | A Conversation With Compliance Guru, AJ Yawn | Tech Done Different With Ted Harrington

March 16, 2021 15:00 - 44 minutes - 40.4 MB

In this episode of Tech Done Different, we hear from compliance expert AJ Yawn. Perhaps the most surprising takeaway from this dynamic chat with a guru in compliance? Security and compliance are not the same thing. Yet, done properly, compliance can be a powerful driver for security.  Listen in to learn: why compliance reports should get better over time (and why a "clean report" is neither realistic nor a good thing) why cursory, scan-based "penetration testing" (meaning, really vulnerab...

Log's Honest Truth — Confessions Of A Cybersecurity Consultant | A Confession From “Mr L” | A Devo Story With Jason Mical

March 16, 2021 14:00 - 19 minutes - 17.8 MB

Security information and event management (SIEM) solutions have evolved quite a bit over the years. Yet, for most, much of what they do and how they tend to do it have not really matured to a point where they can take a lot of the burden off of the security consultant’s shoulders. In this conversation, we speak with Jason Mical, Cyber Security Evangelist at Devo, about the confession “Mr L” shared with the Devo team. “Mr L” described 3 main challenges faced: Increased level and variety of ...

Log's Honest Truth — Confessions Of An Information Security Consultant | A Confession From “Mr L” | A Devo Story With Jason Mical

March 16, 2021 14:00 - 19 minutes - 17.8 MB

Security information and event management (SIEM) solutions have evolved quite a bit over the years. Yet, for most, much of what they do and how they tend to do it have not really matured to a point where they can take a lot of the burden off of the security consultant’s shoulders. In this conversation, we speak with Jason Mical, Cyber Security Evangelist at Devo, about the confession “Mr L” shared with the Devo team. “Mr L” described 3 main challenges faced: Increased level and variety of ...

A Conversation With Bryson Bort | Candid CyberSec Podcast With Vandana Verma

March 15, 2021 21:50 - 15 minutes - 14.4 MB

Today we have a very special guest with us, Bryson Bort. Bryson is an army veteran and served as an officer in the US army. On the episode, we talked about what he has achieved with building a great team and a great culture and a commitment to giving back to the Community. In his free time, Bryson does huge amounts of work with ICS Village alongside Tom Norman, as he works with industrial control systems. They have been demonstrating the different kinds of breaches for several years in the ...

Email, The Reason We Drink | Indistinguishable From Magic With Chris Abramson And Rafal Los

March 15, 2021 21:23 - 46 minutes - 42.7 MB

Sensitive Documents? Proprietary Information? Compliance-controlled data? Sure! Send it over email. Why? Why do you people keep sending critically important data over one of the most insecure channels out there? WHY!? Look, this is why we drink—a lot sometimes—it's because email shouldn't be used for secure transport...and yet... Hosts Rafal Los | Chris Abramson This Episode’s Sponsors If you’d like to sponsor this or any other podcast episode on ITSPmagazine, you can learn more here...

Black Girls Hack Founder Sets Out To Change The Cyber Security Applicant Pool | A Conversation With Tennisha Martin | Focal Point With Chantel Sims And Angela Marafino

March 13, 2021 18:34 - 52 minutes - 47.8 MB

As the founder & executive director of #BlackGirlsHack, Tennisha Martin has set out to change what the cyber security applicant pool consists of and is removing barriers for any and all. Black Girls Hack, a now official 501c3 nonprofit, provides free training and resources for those looking to gain certifications in Security+, eLearnSecurity's Junior Penetration Tester, and the coveted Certified Ethical Hacker. They also hold weekly 'Friday Night Labs' for people who have no experience and ...

What Does —What Should— Drive Innovation And Technology Advancement | The Cyber Society | A Conversation With Amanda Obidike And Baiba Žiga

March 11, 2021 01:27 - 40 minutes - 37.3 MB

“What drives innovation” is a fundamental question in our society — any society, in any historical time. The capacity to make changes by introducing new ideas, methods, and products is one trait that makes humans unique on this planet. But, again, what drives it? The answer may — actually, most certainly will — vary depending on when, where, and of whom you ask that same question. It also does so even more when you apply those thoughts to different knowledge, industries, and cultures. So, l...

What Is Imposter Syndrome | A Conversation With Dr. Ruth Gotian | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus

March 10, 2021 15:57 - 27 minutes - 25.3 MB

During this episode, we chat with Dr. Ruth Gotian who is a Chief Learning Officer and Assistant professor of Education in anesthesiology. She is a contributor to Forbes and Psychology Today where she writes about “optimizing success.” She works with high performers and understands how it feels to be a high performer—yet still has Imposter Syndrome. Dr. Gotian is a wealth of information because of her research conducted while working with high performers. Ruth shares her personal experience ...

Power Of The Pivot | A Conversation With Las Vegas Headliner, Jeff Civillico | Tech Done Different With Ted Harrington

March 09, 2021 20:14 - 45 minutes - 41.5 MB

In this episode of Tech Done Different, we interview yet another incredible person who has achieved the absolute pinnacle of their field: Las Vegas headliner, Jeff Civillico. Jeff is not just Ted's Georgetown classmate and longtime friend, he's also a world champion juggler who delivered his own Vegas show for 10 years, defying the odds and succeeding even up against monster shows like Cirque Du Soleil, Cher, and more. He joins us to share insights about how to adapt, the role that passion ...

Why Is Vuln Management Still A Disaster | Indistinguishable From Magic With Chris Abramson And Rafal Los

March 09, 2021 18:05 - 43 minutes - 39.6 MB

It's 2021. How is Vulnerability Management still such a disaster in the enterprise? Shouldn't we have had a grip on this, say, 10 years+ ago?! Seriously. A few weeks ago Rafal asked on LinkedIn for people to post the first 3 words that come to mind when you think "Vulnerability management" — the results may shock you, but the conversation probably won't surprise you. Hosts Rafal Los | Chris Abramson This Episode’s Sponsors If you’d like to sponsor this or any other podcast episode on ITS...

2020 Inside The Mind Of A Hacker Report | What Does "Mindset Of A Hacker" Even Mean? | A Bugcrowd Story — Part 4 of 4 | With Katie Paxton-Fear And Casey Ellis

March 08, 2021 17:27 - 49 minutes - 45 MB

Humans are life-long learners — well, most of them anyway. Hackers are certainly the curious and "challenge accepted!" kind. In fact, learning as they go may even be considered a lifestyle. Instead of taking an exam at a university, they dive into a problem to solve, breaking things apart to see how they work and see how they can make them work better than they were originally designed/intended. Eventually, their exam papers become a bug submission via responsible disclosure. The reward? Not...

Pilot Episode | Hackerz And Haecksen With Jaclyn (Jax) Scott, Erika McDuffie, And Jon Helmus

March 06, 2021 03:13 - 27 minutes - 25 MB

Hackerz And Haecksen helps educate, break the stereotype of the cyber security professional and discuss the “tough” topics that come along with being a woman in the field. In this episode, we introduce our amazing hosts. Listen in as Jax Scott, Erika McDuffie, Jon Helmus share their vision for the Hackerz And Haecksen podcast. Our mission is to cast a net to an inclusive audience and provide a safe place for discussion. "There is a place for everyone in cyber"—Jon Helmus Hosts Jaclyn (Ja...

Students, Women, And Veterans—All Part Of The Solution To The Cybersecurity Skills Gap | The Academy | A Conversation With Yolanda Craig And Sandra Wheatley

March 05, 2021 17:30 - 38 minutes - 34.8 MB

Close the door. There is no more room. We resolved the cybersecurity skill gap problem, and it feels damn good! Well, maybe not, but is it really that hard? There are so many smart people out there that would do very well in InfoSec—do they even know this is an option? Would you dream of going to the moon if you never looked up to the sky? And even if you did, would you think that the dream could come true if no one like you has never gone there before, and nobody told you that you could be...

Building A Culture Of Security | A Conversation With Dr. Keri Pearlson | Tech Done Different With Ted Harrington

March 05, 2021 16:00 - 39 minutes - 36.2 MB

In this episode of Tech Done Different, Ted chats with Dr. Keri Pearlson, Executive Director of MIT's cybersecurity research organization, CAMS. She shares insight from her team's research into how companies of all sizes can build a strong security culture, even for little or no cost. You'll learn: why tech alone can't stop attackers, because they're "getting badder, faster" why training alone isn't sufficient; you need to change beliefs why behavior changes only if it matters why rewar...

When Failure Is Not An Option, Organizations Turn To The Mainframe — Incorporating Mainframes Into Your Zero Trust Architecture | A Key Resources Story With Cynthia Overby

March 04, 2021 15:35 - 33 minutes - 30.2 MB

As secure as the mainframe is, it is still another operating system with software running on it. Many information security programs tend to offer these systems special treatment, exemptions, and exceptions — especially when it comes to zero-trust frameworks. One organization — Key Resources — has been looking at this problem for quite some time, and their President, Cynthia Overby, joined us for a conversation. Many critical infrastructure organizations such as financial institutions, insur...

Book | The Quest For The Master Algorithm — How The Ultimate Learning Machine Will Remake Our World | A Conversation With Pedro Domingos

March 03, 2021 16:00 - 40 minutes - 37.5 MB

Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities. This same thing can be said of a carved stone used as a tool by our ancestors, the wheel, electricity, engines, airplanes, and of the most advanced technologies of today and tomorrow. Most of us do not realize it, but at the ...

The Quest For The Master Algorithm — How The Ultimate Learning Machine Will Remake Our World | A Conversation With Pedro Domingos

March 03, 2021 16:00 - 40 minutes - 37.5 MB

Did we invent computers, robots, and A.I. because we are fundamentally lazy? It may look like it, but that is not the technological driver. On the opposite side, it has to do with doing more, faster, more effectively, and going above and beyond our human capabilities. This same thing can be said of a carved stone used as a tool by our ancestors, the wheel, electricity, engines, airplanes, and of the most advanced technologies of today and tomorrow. Most of us do not realize it, but at the ...

2020 Inside The Mind Of A Hacker Report | There Will Always Be Hackers — We Just Need More | A Bugcrowd Story — Part 3 of 4 | With Robin Marte (@masonhck357) And Michael Skelton (@codingo)

March 02, 2021 15:14 - 50 minutes - 46.7 MB

Forget about stereotypes of hackers being nefarious masterminds. Hackers are dynamic, young individuals who come from all walks of life — diversity is a big plus for this community — and so it is for the cybercriminals, but they actually are nefarious masterminds. Countless people are building the applications and systems we use at work and at home. It's a safe assumption they are smart people. Do hackers need to be as smart or smarter than them? We are glad you're back for another episode...

Doing The Right Thing Is Always The Right Thing | A Conversation With Consumer Advocate Christopher Elliott | Tech Done Different With Ted Harrington

February 26, 2021 21:01 - 42 minutes - 39.2 MB

What happens in society when consumers have little control over their customer service experience? Join us for this episode as consumer advocate, Christopher Elliott, shares some insights into the consumer/business relationship. You'll learn: why consumers need to understand the basics of security, and pay attention to what companies are claiming why companies need to backup any security claims they make, and how to do it (hint: just be transparent) the impact of "thoughtful regulation" ...

How To Create A Programming Language, Using Your Time To Learn By Failing, And The Need To Be A Little Crazy | A Conversation With Keno Fischer | Elevate The Future With Ellen Xu

February 25, 2021 22:14 - 29 minutes - 26.8 MB

As one of the core members in implementing the Julia programming language, Keno Fischer shares the advantages of Julia, behind the scenes of creating a coding language, and his vision for the future. Keno Fischer is the cofounder of Julia Computing and a Forbes 30 Under 30 in Enterprise Technology. Julia is one of the fastest modern open-source languages for data science, machine learning and scientific computing; it has been downloaded over 2 million times and is taught at MIT, Stanford an...

A Conversation With Shira Shamban | Candid CyberSec Podcast With Vandana Verma

February 25, 2021 16:18 - 19 minutes - 18.1 MB

We are back with another Candid CyberSec podcast with a very amazing guest: none other than Shara Shamban. She's an amazing entrepreneur and information security person and we talked about the things we care about mutually. Shara has served for the armed forces. Listen in to hear about her experience in the military where in the country both men and women are required to serve and each one does a relatively different military service, depending on what your draft was and what someone decide...

Ant Colonies, Metaverses, Virtual & Augmented Realities, Diversity, Ethics, And Some Thoughts About The Future | An Audio Signals Conversation With Antonia Forster

February 24, 2021 23:48 - 41 minutes - 38 MB

Imagine you could experience worlds that you design and build the way you want them to be; alternative realities that you can enter and leave as you wish. Now, Imagine there's no countries, nothing to kill or die for... imagine all the people, livin' life in peace. You may say I'm a dreamer. But I'm not the only one. Certainly not the only one.  There are — and there have always been — brilliant minds that dream and work very hard to make wishes come true.  The advancement of our knowled...

Starting or Running a Vulnerability Disclosure Program? Here’s What To Do Next | Redefining Responsible Disclosure With Chloé Messdaghi And John Jackson

February 23, 2021 22:03 - 43 minutes - 40.1 MB

If a tree falls in a forest and no one is around to hear it, does it make a sound? Yes and no, it depends on who you ask. In our case, the answer is a solid FOR SURE. Especially once we consider the squirrels that live in the said forest — the criminal and the ethical ones. Listen up. In the cybersecurity community it is not uncommon to use the sentence: whether you are aware of it or not, you're already running a vulnerability disclosure program. But who is running it? Is it the cybercrimi...

TMI? Staying Social Without Oversharing | A Conversation With Tim Sadler | Your Everyday Cyber With Limor Kessem And Diana Kelley

February 23, 2021 16:00 - 26 minutes - 24 MB

Chances are you’re on at least one social media platform. It’s a great way to connect, but you need to connect and share mindfully. Tim Sadler helps us take a closer look at how to social safely. You can overshare on social media and it can get risky quickly if you share personal data like your birthday, you COVID vaccine card, or even the names of your children. Bad actors (aka cybercriminals) look for this kind of information so they can exploit it and use it against you. This subject nev...

A Conversation With Kim Crawley | The Uncommon Journey With Alyssa Miller, Chloe Messdaghi, And Phillip Wylie

February 20, 2021 16:00 - 44 minutes - 41.2 MB

In this episode we talk to Kim Crawley about her experience in the cyber security industry. She shares her perspectives as an author and her efforts to bring more inclusive perspectives to the community. Come join us for another uncommon journey with Phil, Alyssa, and Chloe. In this episode they wander into the InfoSec bar and sit down for a conversation with Kim. Guest Kim Crawley (@kim_crawley on Twitter) Hosts Alyssa Miller | Chloe Messdaghi | Phillip Wylie Resources The Book: The Pen...

Big News, Business Success, And Beavers! | All About Alissa Knight | Focal Point With Chantel Sims And Angela Marafino

February 19, 2021 20:51 - 1 hour - 55.7 MB

You probably know Alissa Knight as the badass female hacker of banks and cars, but she is so much more! Join us as we get to know (and laugh with) Alissa – the author, content creator, entrepreneur, speaker, wife, and all around wonderful human! From starting her first company at 17 and selling it at age 20, to hacking connected cars and writing a book about it, Alissa Knight has accomplished many notable things in her career to date. In this episode we talk about her prior accomplishments...

Part 4 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | WISP — WoSec — Gate Breachers

February 19, 2021 16:00 - 28 minutes - 26.4 MB

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond. It doesn't matter how big or small these organizations are; your...

Safe To Drink? Cyber Attacks And The Water Supply: What You Need To Know | A Conversation With Bryson Bort | Your Everyday Cyber With Limor Kessem And Diana Kelley

February 18, 2021 18:39 - 20 minutes - 18.4 MB

Water, we usually take it for granted that what comes out of our taps is safe. But recently an attacker attempted to poison a water supply in Florida. Bryson Bort, explains what happened. Bryson is a cyber-security expert with vast experience in cyber mission support for national defense, especially where a lot of industrial controls are implemented. He is here today to help explain what went on with the attack, what the future of water safety may look like, and what our listeners can do to...

Part 3 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | Diana Initiative — Black Girls Hack — WiCSME

February 18, 2021 16:00 - 31 minutes - 29 MB

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond. It doesn't matter how big or small these organizations are; your...

Part 2 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | Women’s Society of Cyberjutsu — OWASP WIA — Ladies Hacking Society

February 17, 2021 16:00 - 30 minutes - 27.9 MB

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond. It doesn't matter how big or small these organizations are; your...

Part 1 Of 4 | Please Allow Us To Introduce You Some Wonderful Non-Profit Organizations Supporting Diversity And Inclusion In InfoSec | WeAreHackerz — WiCyS — InfoSecGirls

February 16, 2021 02:26 - 24 minutes - 22.6 MB

When we received the invitation to be part of the Women Unite Over CTF event and record a short interview with the 12 women's organizations involved with the event, we wanted to take this opportunity to also present each organization to our podcast and radio audience. It is an honor and a joy to introduce to all of you some old and new friends that are making a big difference for diversity and inclusion in InfoSec and beyond. It doesn't matter how big or small these organizations are; your...

Skills Needed For A Career In Cybersecurity | A Conversation With Dr. Gerald Auger, Ph.D | ITSPradio Host Jon Helmus

February 15, 2021 18:13 - 34 minutes - 31.7 MB

In this episode Jon Helmus guest hosts a special episode on ITSPradio on behalf of Caroline Wong. His guest is Dr. Gerald Auger, Ph.D, Cyber Advisor, Speaker, and Educator. They talk about finding your passion within cybersecurity, how to get started in the field, and what companies should look for to build out their security programs. Guest Dr. Gerald Auger, Ph.D, Managing Partner, Coastal Information Security Group (@Gerald_Auger on Twitter) Host Jon Helmus, Manager of Pentest Community...

Two Wrongs and Finger Pointing | Indistinguishable From Magic With Chris Abramson And Rafal Los

February 15, 2021 16:00 - 39 minutes - 36.4 MB

On this episode, Rafal and Chris discuss how a Washington state agency screwed its vulnerable users using an irresponsible vendor's 20-year-old software. You know what, they're both wrong.  Even though there are technicalities, and someone is going to win in the upcoming court battles (quote us on this one), the real victims are those who have had their information stolen at a time when they're already hurting. Hosts Rafal Los | Chris Abramson This Episode’s Sponsors: If you’d like to sp...

You're Compensated By How Much You Help People | A Conversation With Venture Capitalist Will Lin | Tech Done Different With Ted Harrington

February 13, 2021 16:00 - 42 minutes - 39 MB

During this episode, Ted and Will talked about a gazillion things related to startups, investments, leadership, the cybersecurity market, and so much more. Here are some of the highlights: why venture capital is not about money; it's about helping founders succeed why to succeed you don't need to have a solution that 100% of CISOs need, you just need 30-60% why it's far more important to focus, because depth is better than breadth the power of unspoken assumptions, and how to free yourse...

Human Hacking: Win Friends, Influence People, And Leave Them Better Off for Having Met You | A Conversation With Christopher Hadnagy

February 13, 2021 01:39 - 45 minutes - 41.8 MB

Who are you today? Is there one true self, or are we adapting behaviors to different social situations and goals? The answer is yes, and yes. Whether we realize it or not, we are all social engineers; we are all human hackers. Some of us are good at it and do it intentionally. Some are just being human and part of a social species. And, a few are so good at this game that they've made a profession out of it. Once again, there is always another big existential choice to make in every situati...

Book | Human Hacking: Win Friends, Influence People, And Leave Them Better Off for Having Met You | A Conversation With Christopher Hadnagy

February 13, 2021 01:39 - 45 minutes - 41.8 MB

Who are you today? Is there one true self, or are we adapting behaviors to different social situations and goals? The answer is yes, and yes. Whether we realize it or not, we are all social engineers; we are all human hackers. Some of us are good at it and do it intentionally. Some are just being human and part of a social species. And, a few are so good at this game that they've made a profession out of it. Once again, there is always another big existential choice to make in every situati...

Taking The Insanity Out Of Incident Response | Redefining Your Security Operations Center | With Melissa Duncan And Kristy Westphal

February 11, 2021 17:59 - 42 minutes - 39.3 MB

We know that SOC team members are burning out as they try to protect companies, yet many InfoSec programs repeat the same strategies expecting different results. Can we take insanity out of the incident response? That's a good question. One that we're not going to answer, but one that we will discuss and hopefully encourage you all to think about with us as we try to get to the root of the problem: what needs to change. In this podcast, we will shed some light on how SOC teams could modify...

Diversity And Cybersecurity Management In The DoD And Commercial Sector | Removing Barriers And Filters | A Conversation With Madiha Jafri And Steve Sietz From Lockheed Martin

February 09, 2021 23:01 - 37 minutes - 34 MB

Cybersecurity is a multi-faceted discipline that needs brains — a lot, and of all kinds. As such, there is plenty of room for diversity, but it is not welcoming and retaining talent as fast as it could and should. Why? The answers — yes, plural — likely sit inside each of us. Unfortunately, as humans, we all have preconceived notions and perspectives. That's actually a good thing in some cases. However, many humans hold conscious and unconscious bias. Many refuse to remove those filters and...

New Phone, Who Dis? | A Conversation With Special Guest, Rachel Arnold | Your Everyday Cyber With Limor Kessem And Diana Kelley

February 09, 2021 21:00 - 20 minutes - 18.8 MB

Getting and setting up a new phone has become a regular occurrence for many of us. Rachel Arnold helps us understand what we should do to protect our privacy when setting up a new device. Tune in to hear: What smartphone privacy means How law enforcement uses cell information to track suspects How exercising the same place a crime is committed could make you a suspect If locations tracking apps including retail loyalty, food delivery, and healthcare like COVID-19 tracers are a privacy c...

The Key To Technology Is Relationships | A Conversation With Ben Stanbury | Tech Done Different With Ted Harrington

February 09, 2021 19:59 - 47 minutes - 43.6 MB

Ben Stanbury has been a top executive at some of the largest content creators in the world, from EA Sports to Disney to Amazon Studios, where he currently serves as the Worldwide Head of Technology. In this episode, he shares a number of insights about how to get your ideas to resonate with top executives. Perhaps most surprising of them all? The key is to build relationships. It doesn't matter how scientific and technical our field is, success is driven by relationships. In this episode, ...

Journey To Dropping Out Of College, Co-Founding A Techstars Startup, And Raising $250k | A Conversation With Aaron Lebel | Elevate The Future With Ellen Xu

February 08, 2021 17:53 - 24 minutes - 22.2 MB

Aaron Lebel is a Carnegie Mellon ML and Statistics dropout and co-founder @ Pairi, a Techstars startup which has raised $250k. He discusses the value of self-learning, untraditional pathways, and taking risks. College is not the only path to success. Initially building an eyelash extension business, Lebel and his co-founder pivoted to building a no-code platform for launching service based marketplaces fast—a risk which paid off and resulted in both of them dropping out of Carnegie Mellon t...

The Thought Police. To Protect, Serve, Predict, And Surveil. The Thin Line Between Utopia And Dystopia | A Conversation With Sarah Brayne And Lam Nguyen

February 05, 2021 16:18 - 46 minutes - 43 MB

"Whether he wrote DOWN WITH BIG BROTHER, or whether he refrained from writing it, made no difference... The Thought Police would get him just the same. He had committed... the essential crime that contained all others in itself. Thoughtcrime, they called it.”―George Orwell, 1984 It was the year 1949 when, in the dystopian novel, 1984, George Orwell introduces the Thought Police, Thinkpol. Luckily, now, in 2021, we can look back and be grateful that it was, after all, just the product of a b...

Cybersecurity's Problem With Metrics | Indistinguishable From Magic With Chris Abramson And Rafal Los

February 04, 2021 15:00 - 39 minutes - 36.5 MB

Cybersecurity has a big problem with metrics — whether it's showing progress, regress, or just telling a narrative. We're historically bad at understanding how to make the thousands of metrics our security products throw at us make sense to people that are in our leadership chain. The point of using metrics is to show a trend, or an impact — but the way many of us do it we accomplish neither. Hosts Rafal Los | Chris Abramson This Episode’s Sponsors: If you’d like to sponsor this or any ...

Are Laws Keeping Pace With Cyber Reality? | The History And Impact Of The Computer Fraud and Abuse Act (CFAA) On Society | A Conversation With Riana Pfefferkorn And Leonard Bailey

February 03, 2021 16:00 - 40 minutes - 36.6 MB

As with most laws, the first question that comes to mind when technology is involved is: are they keeping pace with it? However, there is a fundamental follow-up question: how are these laws interpreted in relation to how new technologies shape business and society? The Computer Fraud and Abuse Act (CFAA), enacted by the United States Congress in 1986, is one such law. A lot has changed since then: the technologies used in every aspect of our lives access to these same technologies used b...

Patents Versus Progress: The State Of Technology And Cybersecurity Innovation Protection | With Joanna Chen And Puya Partow

February 02, 2021 02:12 - 34 minutes - 31.6 MB

Are technology patents helping us with innovation and collaborative creativity, or do they generate hyper complexity that is slowing our societies' advancement? Listen up, and maybe you will decide on your own. By awarding and defending technological patents, we promote innovation by offering intellectual property protection to the invention and the inventors for what they've created. However, while patents may help achieve this specific goal, we must also wonder if we may be reaching the o...

Money Flows When Security Is A Competitive Advantage | A Conversation With Peter Harris | Tech Done Different With Ted Harrington

February 01, 2021 17:16 - 37 minutes - 34.3 MB

In this episode of Tech Done Different, we chat with Peter Harris, a partner at University Growth Fund. Peter explains how venture capitalists think about security, what they see their portfolio companies get right, and what they get wrong. In particular, we discuss: how VCs generally don't focus much on security, but if they see a company who has turned security into a competitive advantage (as is taught in Hackable), they'll pay a premium for it the leadership principle of "we get the co...

Personal Experiences Of Diversity And Inclusion | A Chat With Chloé Messdaghi | Focal Point With Angela Marafino And Chantel Sims

January 31, 2021 15:24 - 38 minutes - 35.5 MB

During this episode, we had the opportunity to speak with Chloé Messdaghi, Chief Strategist, InfoSec Advocate, Board Member, Keynote Speaker, and Activist, about diversity and Inclusion. We focus on what diversity and inclusion mean to Chloé, what they look like to her in the workplace, and how she has dealt with non-diverse and non-inclusive situations in the past. As the President of multiple organizations, Chloé shares what moved her to create the WeAreHackerz organization, formerly kno...

It's Not The Digital Turning Point | Indistinguishable From Magic With Chris Abramson And Rafal Los

January 30, 2021 16:09 - 36 minutes - 33.8 MB

The article in the WSJ was wrong... The big recent hack was NOT a "digital turning point," here's why. Oh, you want the answer - well you'll have to listen to the show but the condensed version is that there isn't really anything in "the way we handle third party supply chains" that COULD change to make a difference with what happened. If you think we're wrong, go ahead, disagree. Hosts Rafal Los | Chris Abramson This Episode’s Sponsors: If you’d like to sponsor this or any other podcast...

Guests

Kim Crawley
3 Episodes
Jake Williams
1 Episode
Phillip Wylie
1 Episode
Rahul Rana
1 Episode

Books

Behind the Curtain
3 Episodes
Knowledge Is Power
1 Episode

Twitter Mentions

@chloemessdaghi 5 Episodes
@insiderphd 3 Episodes
@ka 3 Episodes
@kim_crawley 3 Episodes
@shehackspurple 3 Episodes
@drogersuk 3 Episodes
@hacknotcrime 2 Episodes
@brysonbort 2 Episodes
@marigalloway 2 Episodes
@johnjhacking 2 Episodes
@ksz714 2 Episodes
@redteamvillage_ 2 Episodes
@drchrispierson 2 Episodes
@humanhacker 2 Episodes
@korisanjay7ips 2 Episodes
@caseyjohnellis 2 Episodes
@womencyberjutsu 2 Episodes
@disclose_io 2 Episodes
@iamthecavalry 2 Episodes
@livingstone_s 2 Episodes