ITSPmagazine is a free online publication that focuses on information technology, cybersecurity, data privacy, the InfoSec community and the influence that all this has on our everyday lives – as businesses, individuals and the society in which we live.
Delivered through articles, podcasts, webcasts, webinars, live panels, event coverage and talk shows, our team of cybersecurity experts explores the topics that matter the most: the human element and its symbiotic effect on the latest in technology, IT security and privacy.
Did you know that we just joined Patreon?
As you know, our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life. We are on Patreon because we believe that the conversations we are having and the content we are creating are important for the cybersecurity community, for businesses of any size, for individuals and for our society as a whole. If you wish to become an ITSPmagazine Patron you will help us to create more content, expand our reach and, hopefully, extend our influence.
What's Happening At The Intersection Of IT Security And Society?
This newsletter is brought to you by our sponsors:
Enjoy the latest podcasts, stories, talk shows, novelties, rarities, and oddities from ITSPmagazine.
…and then, if you please, join our Mailing List to get all the latest directly in your inbox.
ITSPradio Updates
Unusual Gatherings | Conversations At The Intersection Of IT Security And Society™ is now a weekly podcast with Sean Martin and Marco Ciappelli
Where are we going? Where do we come from? Is technology driving and controlling us, or are we still choosing our own destiny? We are lucky. We have a lot of smart friends, we often meet new ones, and we all enjoy a conversation around a fire, a table, a barrel, a monolith, or whatever is available at the time.
Every week we invite Unusual Guests and we discuss the topics that got our attention.
Join us.
Pull up a seat, sit back and relax, but most importantly, listen up.
Here is the latest Episode
Unusual Gathering | Episode XX | Guests Georgia Weidman And Larry Whiteside
Conversations At The Intersection Of IT Security And Society
Guests
Georgia Weidman | Larry Whiteside
Hosts
Selena Templeton | Sean Martin | Marco Ciappelli
This episode:
Bringing representation to the underrepresented. Let’s talk about mentors.
By definition a mentor is a wise or trusted adviser or guide, a counselor or a teacher.
In todays Unusual Gathering, we discuss the many aspects of mentorship. Who can be one, how to find one, what it takes to be a modern mentor, and where we stand now with this practice — and, in particular, where we stand in the cybersecurity industry with respect to mentors.
Not only can everyone be a mentor, but everyone needs a mentor at some stages of their career. As long as you mean it and as long as you are passionate about it, you can be both a mentor and also an amazing role model destined to change someone’s life for the best.
Visit Devo’s page here on ITSPmagazine
Learn more about sponsorship options here.
There Are Many More Unusual Gatherings Talk Shows
Some Are On Camera
Join Us For Yet Another Memorable Road Trip To San Francisco
It has become an ITSPmagazine tradition to start our coverage with what we call Chats On The Road To RSA Conference 2019. We connect with conference speakers, presenters, panelists and organizers to start the conversation way before anyone else does.
*The first two chats on the road have been published.
Be sure to listen to the podcasts, and the many more to come.
ITSPmagazine coverage, podcasts, webcasts, articles, and all our happenings during RSA Conference 2019 will be made possible by the generosity of our sponsors. We are ever so grateful for your support.
Have a story to share and want to join us for the journey? We invite you to discover the benefit of the full coverage sponsorship and let us know if you are interested in joining us for our adventures. We look forward to another exciting conference.
Partner Content
Sponsored Content
ITSPmagazine Chronicles
As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence.
Well, sorry, that is not 'exactly' what this is. We like to think of our Chronicles as a succinct mix of commentary and fact.
Most recent chronicles
By Selena Templeton, host of DiverseIT
Welcome to a new episode of ITSPmagazine’s 2019 “Chats on the Road to RSA Conference,” a series of podcasts leading up to the annual conference in San Francisco. Today’s guest is Jim Gordon, GM of Security Ecosystem Strategy & Development at Intel, who gives us a sneak peek into his Solving Our Cybersecurity Talent Shortage panels, including his 3 “Be This” rules to D&I success, why this issue is important to him, a white male, and who should attend.
By Sean Martin and Selena Templeton
In today’s chat, Sean and Selena connect with Kyla Guru, 16-year-old founder and CEO of Bits N’ Bytes Cybersecurity Education, a non-profit organization dedicated to educating and equipping citizens — young and old — with the cybersecurity skills needed to help prevent future cyber-attacks. Get ready to be inspired by Kyla and follow her lead to take action, beginning with the future generation of InfoSec professionals!
By Sean Martin, host of At The Edge
The primary goal with this webcast discussion is to highlight the value of a SOAR (security orchestration automation and response) platform/model in order to help companies figure out how best to operationalize it as part of their security management programs. The key point here is “operationalize” … who should be involved, what do they need in place in order to succeed (tech/process/people, both within and outside of the platform), and what can they expect from an operational benefit perspective.
By Marco Ciappelli
A conversation with Kristin Judge | CEO/President of the Cybercrime Support Network
It seems to me that we have a long way to go before the general population and small businesses become aware of the very likely risk of becoming victims of cybercrime. While there are many things that can be done to reduce the risk — the “100% safe” scenario is a myth — we certainly cannot expect (at this time) that someone or something is going to take those steps for us.
By Sean Martin
Mental health is a topic we care deeply about at ITSPmagazine and we were thrilled to have the chance to connect with Ryan Louie, a board-certified Psychiatrist focusing on the psychiatry of entrepreneurship and the mental health impact of cybersecurity, to get a sneak peek into his interactive session on this very topic during RSA Conference 2019.
By Sean Martin, host of At The Edge
In today's episode, Jay Leek and Patrick Heim of ClearSky Ventures shine the light on a ton of stuff related to the state of the InfoSec market and how cybersecurity investments play a role in the ecosystem of protection, detection, and response. Listen in to get their individual and combined views on investment strategies, investment buzzwords, and the categorization of the 4 types of security companies and how the categories impact investment decisions. Jay and Patrick even share some advice for the organizations making attempts to consume some of these innovative products.
By Selena Templeton, host of DiverseIT
Welcome to a new episode of ITSPmagazine’s 2019 “Chats on the Road to RSA Conference,” a series of podcasts leading up to the annual conference in San Francisco in which we connect with conference organizers, speakers, presenters and panelists. Today’s guest Elaine Marino, CEO of Equili, founder of LadyCoders and co-founder of this seminar, who will give us a sneak peek into what she’ll be bringing to the table in this discussion, how she and Karen Worstell came to create this session for RSA Conference, and who should attend these panels.
By Selena Templeton, host of DiverseIT
Welcome to a new episode of ITSPmagazine’s 2019 “Chats on the Road to RSA Conference,” a series of podcasts leading up to the annual conference in San Francisco in which we connect with conference organizers, speakers, presenters and panelists. Today’s guest is Claudia Schabel of Schabel Solutions, who gives us a sneak peek into her panel at the “Solving Our Cybersecurity Talent Shortage” seminar at RSAC.
By Sean Martin, host of At The Edge
In today’s chat, I connect with all 4 of the SANS panelists for their RSA Conference keynote panel entitled The Five Most Dangerous New Attack Techniques and How to Counter Them. This RSA Conference session is again led by Research Director and Founder of the SANS Institute, Alan Paller, who is joined on stage by Ed Skoudis, Heather Mahalik and Johannes Ullrich. In this podcast they’ll give us a sneak peek into what they will be talking about this year with regards to the latest threats, attacks and the methods used to carry them out.
By Selena Templeton, host of DiverseIT
Welcome to a new episode of ITSPmagazine’s 2019 “Chats on the Road to RSA Conference,” a series of podcasts leading up to the annual conference in San Francisco in which we connect with conference organizers, speakers, presenters and panelists. Today’s guest is Caroline Wong, who gives us a sneak peek into her panel at the “Solving Our Cybersecurity Talent Shortage” seminar at RSAC.
By Marco Ciappelli
A conversation with Sarah Squire Senior Technical Architect at Ping Identity
Times have changed quite a bit since cybersecurity wasn’t even a word. Now it is most definitely a thing, a problem, a cost, and also a value.
The fact that cybersecurity sounds boring and the fact that it is mostly perceived as a cost doesn’t help your chance for success.
But is that true?
The National Cyber Security Alliance (NCSA) put on another incredible Data Privacy Day event comprised of a number of panels and presentations and even some live audience engagement, including some questions from our own Sean Martin. As a proud media partner for this important event, ITSPmagazine’s Sean Martin captured some pictures and put out a few tweets as well.
By Sean Martin, host of At The Edge
In this episode, Sean Martin connects with Aaron Guzman and Daniel Miessler, and we take a look at the new edition of the OWASP Top 10 for the Internet of Things. The project, which began in 2014, contains a lot of work related to identifying the risks, vulnerabilities, and controls necessary to safely deploy and use Internet-connected devices at work, at home, and in society. Aaron and Daniel walk us through the top 10 list, giving us some insight into each item and how it can have an impact on the how things are built, implemented, and broken.
AppSec California 2019 brought together nearly 600 attendees to discuss application, web, and device security challenges, successes, and best practices. ITSPmagazine was there and captured a few pictures from the event.
So many things to see and so little time on our side – and we are not just talking about San Francisco. RSA Conference 2019 offers a wide variety of attractions if, like us, you are into cybersecurity matters.
On this page, we will report about our plans once we arrive in the City of Fog.
By Selena Templeton, host of DiverseIT
Welcome to a new episode of ITSPmagazine’s 2019 “Chats on the Road to RSA Conference,” a series of podcasts leading up to the annual conference in San Francisco in which we connect with conference organizers, speakers, presenters and panelists. Today’s guest is Vanessa Pegueros of DocuSign, to give us a sneak peek into her panel at the “Solving Our Cybersecurity Talent Shortage” seminar at RSAC.
By Marco Ciappelli | Co-host Selena Templeton
A conversation with Kathleen Smith
On this conversation Selena Templeton will help me dig into a subject that is very dear to Kathleen: the importance of volunteering in the cybersecurity community as an opportunity for learning new technical and non-technical skills that benefit personal growth and support career advancement.
Volunteering is good for the people who do it and for the company that supports it.
By Marco Ciappelli, Co-host Sean Martin
A conversation with NCSA Executive Director Kelvin Coleman
What’s the title of today’s story?
Data Privacy Day 2019 Reminds Businesses and Consumers About the Value of Personal Data and the Need to Protect It
In this new era of privacy, the National Cyber Security Alliance will underscore the value of personal information by informing businesses about the critical need to respect consumer privacy and safeguard data.
Looking for more?
Sponsored Content
ITSPradio

Cybersecurity Advice for SMBs
Podcasts | Webinars | Articles | Videos
The Experts Corner
The Experts Corner is where great minds share their expert opinion on information security news, privacy advices, and cybersecurity trends
Most recent contributions
Countering claims that blockchain is “pure hype and snake oil," Simon Harman, Project Lead at Loki, discusses the current reality of the blockchain sector. Addressing the failure of some projects to deliver on their promises, as well as the cause of both criticism and praise for a technology which was on everybody's radar in 2017/18, he suggests that this new industry holds a great deal of promise based on the hard work of sensible, sustainable development.
Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people, too. Having seen, been part of, and lent a shoulder to many a breach, Javvad Malik, Security Advocate at AlienVault, offers nine of the common (but not best!) ways that companies respond to breaches.
As organizations shift more to the cloud, it means they will increasingly rely on networks and infrastructure they don't own or directly manage. Yet this infrastructure is just as critical to consume and deliver the applications and services as when it was in the data center. Alex Henthorn-Iwane, VP Product Marketing at ThousandEyes, outlines 6 key network considerations that IT managers should take into account before shifting to the cloud.
While multi-cloud is a smart decision, it's extremely hard to get right, and the added complexity of securing data makes it an even more daunting proposition. Mario Duarte explores the challenges in developing a multi-cloud strategy that accounts for security and reviews four recommendations to execute on your own secure multi-cloud strategy.
January 28 of every year is Data Privacy Day, where companies around the globe gear up for educating their employees on the importance of privacy and security. Jodie Daniels, Founder of Red Clover Advisors, suggests that we consider extending the knowledge and importance generated on this day into the other 364 days of the year.
The #CyberAvengers, a group of salty and experienced professionals, takes a brief look back at 2018 with its breaches of epic proportions. But rather than whine, moan and complain about the past — they suggest 5 things you can do in the next few weeks to have a safer cyber 2019.
The cost of data breaches is higher for small businesses than large enterprises. Not only do small businesses have to weather the initial expense of a data breach — an average of $120,000 per incident — they also have to recover from the massive reputation hit a data breach causes. Janice Miller of Safety Today outlines what SMB owners need to know.
When is the last time your company truly thought about the security of your network, devices and data? If this answer isn’t “yesterday” or “today,” then your agency, and the client data it is entrusted with, might be at risk. Dror Liwer, CISO of Coronet, outlines what agencies can do to get serious about cybersecurity.
Randy Bagwell interviews Ian Corey and Doug DePeppe of eosedge Legal about their view of 2019 as a “tipping point,” based on Malcolm Gladwell’s ideas in The Tipping Point: How Little Things Can Make a Big Difference, for behavioral change and enforcement of data protection duties based upon events and laws that emerged in 2018.
With hundreds, if not thousands of security alerts per day pouring into Security Operations Centers (SOC), security professionals are fighting a losing battle. Fortunately, tried-and-true manufacturing techniques can turn the tide. Heather Hixon of DFLabs outlines two techniques that can help even the playing field between SOCs and their adversaries.
In 2019, security teams will start using more technologies to achieve detection and response versus simply relying only on standard SIEM alone. But deploying more and more technologies is not enough. SVP strategy at CyberInt Itay Yanovski explains why organizations need to look at Security Operations Centers (SOC) in a different way.
The Ancient Athenian Themistocles said: “He who controls the sea controls everything.” In today's world, the "sea" is the "communications sea" and the "communications sea" relies on anything and everything cyber. George Platsis of SDI Cyber lays out how somebody has been quietly dominating the communications sea and what the implications are for everybody — including who will rule this empire.
It is impossible for privacy professionals using manual, survey-based approaches to stay on top of an environment of ever-changing data and these days, the CTO is increasingly being tasked with operationalizing their companies’ data privacy solution. Kristina Bergman, CEO and co-founder of Integris Software, outlines four recommendations for CTOs when it comes to Data Privacy Automation.
Local governments and small businesses are frequently being targeted by ransomware attacks. What makes these entities prime targets for malware and how can they avoid being an easy target? Cohesity CTO Steve Grewal suggests what government officials and business owners can do to avoid having their operations halted.
Whether you’re building a security operations center or ensuring that your existing security operations team has all its bases covered, you must ensure that you’re properly protecting your digital assets. Jorge Alago, cybersecurity architecture lead at Veristor, provides a quick rundown of 8 essential components that should be core to your security efforts.
There is a widespread need for organizations to modernize their security operations. Why? It creates the structure to eliminate distractions caused by chasing compliance mandates and the latest “shiny technology objects” and allows security organizations to reduce enterprise risk. Mark Maxey of Optiv outlines how to get started on modernizing operations.
Want more stories from our expert cybersecurity contributors? There's plenty of InfoSec goodness to be had!
Have an opinion of your own you'd like to share? Want to make a contribution to the community?
ITSP Webinars and Webcasts
We are constantly planning for and working on more webinars, podcast interviews, and a variety of conversations with the cybersecurity and privacy experts you want to hear from. Stay tuned for some specialized series as well, including our SMB webcasts and our new ITSPmagazine Talk Show.
Stay with us and enjoy some ITSP Radio & TV. Interested in producing a webinar with ITSPmagazine? Let us know!
Contact us if you would like to sponsor this episode
EXPERT PANELISTS
Tim Condello, Senior Customer Success Manager, Siemplify
Heather Hixon, Senior Solutions Architect, DFLabs
Lior Kolnik, Head of Security Research, Demisto
Ken Westin, Staff Security Strategist, Splunk (Phantom)
Fred Wilmot, VP, Security Engineering, Devo
MODERATOR
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
Contact us if you would like to sponsor this episode
YOUR EDUCATORS
Masha Sedova, Co-Founder, Elevate Security
James Stanger, Chief Technology Evangelist , CompTIA
Rachel Tobac, CEO, SocialProof Security
YOUR MODERATORS
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
Marco Ciappelli, Co-Founder, ITSPmagazine
This episode is sponsored by: CYBERARK
Contact us if you would like to be a sponsor
YOUR EDUCATORS
Melanie Masterson, Sr. Threat Response Engineer, LendingClub
George Viegas, CISO and Privacy Champion, Chapman University
TBA
YOUR MODERATORS
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
Contact us if you would like to sponsor this episode
YOUR EDUCATORS
Stina Ehrensvärd, CEO, Yubico
Melanie Masterson, Sr. Threat Response Engineer, LendingClub
Patrick Roserie, NPower Graduate and Information Security Engineer, VMware AirWatch
YOUR MODERATORS
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine