In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Keenan Skelly, Circadence VP of Global Partnerships & Security Evangelist, for a fascinating conversation on cybersecurity learning, training and assessment through their Ares and Orion products — as well as women in cybersecurity and how as an industry we need to better engage and develop this important resource.
In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Shauna Park, DataLocker’s Director of Channel Sales, to discuss their solution set, and walk through how industries such as healthcare, financial services and even Hollywood are taking advantage of encrypted storage. We’ll even get a sneak peek into how use cases involving the cloud will come to be supported.
In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Cathy Allen of the Santa Fe Group to discuss how third-party risk has evolved with and around the growth in malicious hacking, the changing makeup and thinking across boards of directors, the importance of diversity (including the relationship between AI and diversity), and how well-thought-out tools assist with risk assessments.
In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Mickey Bresman, CEO at Semperis, to discuss the difficulty that normal Active Directory upgrades, restores and backups, let alone full-blown disaster recovery, can cause – and how Semperis has a solution that promises to change all of that.
In this podcast from RSA Conference, ITSPmagazine’s John Dasher is joined by Larry Link & Shreyans Mehta from Cequence, a silicon valley startup who is applying real-time network analysis, machine learning, threat intelligence, and behavioral analytics to accurately detect and mitigate bot attacks without affecting legitimate user traffic. Listen in to hear more!
A Their Story interview with Sean Martin
During RSA Conference 2019 in San Francisco, Sean Martin stops by the Edgescan booth to chat with the company’s co-founders, Eoin Keary and Rahim Jina. The conversation was driven mainly by their latest vulnerability stats report which was just released.
ITSPmagazine’s John Dasher sat down at RSA Conference with George Wrenn, CEO and Founder of CyberSaint. Imagine if you were told that your organization must demonstrably adopt a cybersecurity framework and show compliance in order to secure new business or, perhaps more frustratingly, retain a contract you’ve already won. Listen in to hear more!
ITSPmagazine’s John Dasher sat down at RSA Conference with Samantha Madrid of Juniper Networks to chat about leveraging the infrastructure you already have to protect you from unknown threats. Sound far-fetched? Hear how Juniper is applying insight gleaned through behavior intelligence to areas such as wireless network usage.
ITSPmagazine’s John Dasher sat down at RSA Conference with Colin Bastable, CEO of Lucy Security to talk about how the bad guys plan and set up infrastructure to carry out their attacks, and how transparency with employee behavior and their progress with respect to awareness training is vital.
During our conversation, Bugcrowd’s Casey Ellis and Jason Haddix share some of their recent news with us — including their Buggy Awards, v2 of their Traffic Control capabilities, and their new partnership with Secure Code Warrior, designed to help educate and train engineers as part of the ongoing development lifecycle, shifting the InfoSec training left in the SDLC.
The organization telling us their story today is Humio. Humio are headquartered in Denmark and are focused on providing real-time access to data via live system observability through fast, scalable and efficient log data management.
Our guests from Humio are Geeta Schmidt, CEO of Humio, and Pieter Heyn, Director of Sales & Alliances for the UK & Ireland at Humio. Each share their individual stories for how they entered the InfoSec arena before walking us through some of the trends they are seeing in the market, how they are building a solution to support those trends, and how their culture, solution development process, and customer interaction model are designed to establish trust and ensure that a simple, common mission is achieved.
It’s time to manage risk and vulnerabilities throughout the organization. But, how does your risk and vulnerability data flow and where does it land when it comes to educating the right people that a critical item needs to be addressed? Sean Martin connects with Dearbhail Kirwan and David Kennefick from Edgescan to look at software development lifecycles, risk management, vulnerability management, and the use of well-defined processes, integrated tools, and automated workflows to improve communications throughout the organization.
ITSPmagazine recently caught up with the CEO at Cequence Security, Larry Link. With co-founders coming from some of the largest cybersecurity companies in the world, the team at Cequence is laser-focused on stopping the growing number of malicious bot attacks.
ITSPmagazine’s John Dasher sat down at Black Hat 2018 with Willy Leichter, Vice President of Marketing at Virsec to talk about Virsec’s unique approach to security and how it protects enterprises from advanced memory-based attacks, fileless attacks, and other subtle, insidious attacks at near 100% accuracy.
ITSPmagazine’s John Dasher chats with Jonathan Sander of STEALTHbits about unstructured data, protecting credentials, ransomware, machine learning (and Sylvester Stallone) — plus how STEALTHbits can help protect an organization’s sensitive data from insider threats and automate security and compliance tasks.
ITSPmagazine's Selena Templeton sat down with Dena Haritos Tsamitis of Carnegie Mellon University to capture CMU’s story (which was among the first institutions in the world to create a degree program for cybersecurity). They also chat about the Information Networking Institute (INI) and Women@INI (WINI), Cylab (CMU's security and privacy research institute), MySecureCyberspace, diversity and inclusion, and imposter syndrome.
ITSPmagazine’s John Dasher chats with Dana Tamir of Silverfort at Black Hat 2018 about multi-factor authentication, how it’s changed with the shift to the cloud, hybrid environments and disappearing perimeters, and how Silverfort enables strong MFA across the entire network without modifications to endpoints and servers.