A chronicle and a podcast from Sean Martin for 'At The Edge' Column
|
|
By Sean Martin
Guests: Emily Miller | Ted Harrington | Dean Weber
Host: Sean Martin
In today's episode, I connect with Emily, Dean, and Ted, we look at the current state of security in IT, OT, IoT, and ICS — and the connections between these different environments.
Together, we explore how identity plays a critical role in ensuring a safe environment that can be traced to specific sensors, devices networks, and people. And, with the massive numbers of things hitting the market—and our society—we attempt to answer the question surrounding our ability (or lack thereof) to scale the controls and protections to minimize—or perhaps even eliminate—undue exposure to risk introduced by these things.
|
|
Unusual Gatherings
This is our latest conversation at the intersection of technology, cybersecurity, and society.
|
|
Unusual Gathering | Episode XXVIII|
Conversations At The Intersection Of IT Security And Society
Guests
Elizabeth Wharton | Damon Jackman
Hosts
Sean Martin | Marco Ciappelli
ITSPmagazine’s Unusual Gatherings XXVIII:
Just How Smart Are Smart Airports?
Think about the last time you were in an airport, any airport.
Now think about the best mall you have ever been inside.
Was it the one with the best shopping or restaurant experiences? Did it have comfortable waiting areas? Or maybe the TSA security check lines were moving smoothly and the check-in process welcoming? Were the amenities clean? Or, perhaps, you felt a sense of security.
I bet that if you have seen some of the largest and most modern airports in the world you might have had the thought along the lines of something like "Wow, these are like small cities! I could almost live here." I also bet you were likely annoyed - even just a little bit - by the amount of time you had to present your passport, your boarding ticket and to have your identity questioned.
But here is one thing that you probably did not ask yourself:
“What does it take to run this thing - this airport that feels like a small city?"
|
|
It is important to detect a cyber incident as soon as you can to limit the amount of damage to your small or medium-sized business. So how can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized business? What signs do you look for? What are methods of detecting an incident? We’ll spend the hour talking all about detection and what you can do to limit or contain the impact of a potential cybersecurity event:
How can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized business?
What signs do you look for?
What are methods of detecting an incident?
PANELISTS
Bradford J. Willke, CISSP
Director (Acting), Stakeholder Engagement and Cyber Infrastructure
Resilience, Office of Cybersecurity and Communications
U.S. Department of Homeland Security
Robin L. Wetherill
Division of Privacy and Identity Protection
Bureau of Consumer Protection
Federal Trade Commission
|
|
This is one of our last Experts Corner.
Enjoy and discover the new opportunity to join our conversations.
|
|
Growing privacy concerns have Facebook users measurably less engaged, and recent findings show that they have serious concerns about trust and security on the site. So if you were counting on a future of low-effort, algorithm-driven advertising, you might want to go back to the drawing board. But, as Ben Mizes, Co-Founder of Clever Real Estate points out, there is some good news, too.
|
|
ITSPmagazine On Location Coverage
Be part of our conference conversations before, during, and after the event.
When you join us this year, you have a unique opportunity to associate your company to the Thought Leadership conversations that we will have before, during and following the event. Additionally, you get Brand Awareness and Exposure while receiving all of the benefits offered by our platform.
If you have a story to share and want to join us as we cover our next set of conferences—InfoSec EU, RSAC APJ, Black Hat USA and DEFCON—we invite you to discover the benefits of our conference coverage sponsorship program and let us know if you are interested in joining us for our adventures.
Join us for one, two, or all our travels and conversations. We would love to have your company on board.
|
|
ITSPmagazine is, and will always be a free publication.
If you like what we do, share our values, and would like to associate your brand with ITSPmagazine, we invite you to consider becoming a sponsor.
Visit our Media Kit, or simply contact us to talk about it.
|
|
|
|
Help us spread cybersecurity awareness and education.
Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
|
|
|
|