Copy
ITSPmagazine | At the Intersection of IT Security & Society™
View this email in your browser
News at the intersection of IT security and society | June 23rd, 2018
 
This newsletter is sponsored by:

“I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image.”

– Stephen Hawking
 

Las Vegas... Here We Come!
We added one more event to cover "HACKING DIVERSITY"

 

Follow us on the road again, this time to Las Vegas, Nevada where we will be covering:

Black Hat USA 2018 (August 4-9)
DEFCON 26 and Hacking Diversity (August 9-12)


WHAT WE'LL BE DOING AS PART OF OUR COVERAGE

Chats on the Road to Las Vegas
A variety of Podcast and Webcast Conversations
Multiple ITSPmagazine Talk Shows
Live Expert Panels with BrightTALK

Check the page, it has been updated with live panels and Talk Show topics...
plus more stuff!

Stay Tuned To Our Coverage From Las Vegas


Thanks to our first sponsor (ISC)² for their continued support!

Sponsoring our coverage is a good deal for your brand. 
We invite you to learn more and consider the investment.
 

 

Latest ITSPmagazine Chronicles and Podcasts
 

If I Can Do It, You Can Do It: The Struggles Of An InfoSec Life #3
With Karen Worstell

By Selena Templeton, host of DiverseIT

In this third and final episode, W Risk Group founder Karen Worstell chats with ITSPmagazine’s Selena Templeton about the stresses, frustrations and victories along her journey as she got into, dropped out of, and then returned to an InfoSec life. Spoiler alert – it has a happy ending!

No need to freak out, if you missed parts #1 or #2, we got you covered.
They are right here.
Have fun going back in time to experience the beginning of Karen's journey.
If I Can Do It, You Can Do It: The Struggles Of An InfoSec Life | PART 1
If I Can Do It, You Can Do It: The Struggles Of An InfoSec Life | PART 2

 

Speaking of Taking a Journey...
This Is What SMBs Need To Begin Their Information Security Journey

By Sean Martin, host of At The Edge

In today's episode, Sean Martin digs deeper into the idea that risk and security management for SMBs is possible. Sean gets some tremendous insights from Monica Bush who shares how she joined Nintex to help bootstrap their risk, security and compliance program, taking it from its infancy stage to one of growth and continued improvement.

 

 

Small & Medium Business Cybersecurity Education
Webcast Series

 
We just recorded Episode VI of the series and it should be ready to watch and listen to soon. Get caught up by watching the full series.
Watch the SMB Cybersecurity Webcast Series
Yes! You can earn 1 CPE credit for each SMB webcast you watch on ITSPmagazine!

Sponsored Content
Join Gigamon and (ISC)² for a discussion on how visibility into your application traffic is elemental to security, how application metadata can provide the context of potential threat events and to more easily enforce corporate compliance.
More Events and Webinars From (ISC)² on ITSPmagazine
View More Events on ITSPmagazine
 

 

From Our Experts Corner

We're Still Talking Privacy. Why? Because It's Important!

It Is A New Era For Data Privacy And Regulations

With the GDPR having begun its reign as the most comprehensive digital privacy legislation that the world has ever seen, we’ve officially entered a new era of data privacy rights and regulations. But it’s also a compliance burden to many businesses. Here are the four biggest rewards that businesses can reap by complying with privacy regulations like the GDPR – even if they don’t need to. | by KJ Dearie
 

It's So Easy...

Wouldn’t You Like To Know How To Prevent Security Alert Fatigue?

Organizations of all sizes are vulnerable to cybersecurity threats, and they need to be able to detect indicators of compromise in order to address risks and respond to attacks. Integrating SIEM and SOAR combines the power of each to create a more robust, efficient and responsive security program – which ultimately allows security teams to avoid alert fatigue. | bDario Forte

 

 

 

Experts Corner FLASHBACK

1 Year Later - Are Things Still Out Of Whack?

Data Access And Security Are Out Of Sync

Enterprises  are struggling to find secure ways to allow trusted users access sensitive data. Traditional security models designed to protect limited entry points to the data are no longer viable. These best practices, presented by Gurucul’s CEO, Saryu Nayyar, can help address the challenges. | bSaryu Nayyar


Lots Of Ways To Earn Continuing Professional Education Credits!

Earning CPE Credits With ITSPmagazine. Now That’s Cool
 

 
Start Earning Your CPEs With ITSPmagazine

ITSPmagazine is, and will always be, a free publication.

Our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life.

JOIN US ON OUR QUEST!
Every little bit helps.
Thank you!

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
+1
Forward

Interested in advertising with ITSPmagazine to reach our growing audience? Great!
Let's Go Places Together!
Inquire about ITSPmagazine sponsorship opportunities

Keep in touch with us

An

imsmartin consulting
publication
Copyright © 2018 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list