Copy
ITSPmagazine
At the Intersection of Technology, Cybersecurity, and Society.
View this email in your browser

Enjoy the latest chronicles, podcasts, stories, talk shows, novelties, rarities, and oddities from ITSPmagazine.
 
“I know there's a proverb which that says 'To err is human,' but a human error is nothing to what a computer can do if it tries.” 
― Agatha Christie
This newsletter is brought to you by our InfoSec London sponsor
Click on their logo to visit their company page on ITSPmagazine and learn more about them.
________
ITSPmagazine is a free publication and all the content we create is made possible by our own passion and the generosity of our sponsors.

If you wish to become an ITSPmagazine Sponsor you can learn about
our affordable opportunities on our Media Kit page.

We would be honored and ever so grateful for your support.
 
A chronicle and a podcast from Sean Martin for 'At The Edge' Column

By Sean Martin

Guests: Emily Miller | Ted Harrington | Dean Weber
Host: Sean Martin

In today's episode, I connect with Emily, Dean, and Ted, we look at the current state of security in IT, OT, IoT, and ICS — and the connections between these different environments.

Together, we explore how identity plays a critical role in ensuring a safe environment that can be traced to specific sensors, devices networks, and people. And, with the massive numbers of things hitting the market—and our society—we attempt to answer the question surrounding our ability (or lack thereof) to scale the controls and protections to minimize—or perhaps even eliminate—undue exposure to risk introduced by these things.

Sponsored Content
Register Now. Space is limited.
Sponsored Content
Register Now to get both perspectives
 
Unusual Gatherings
This is our latest conversation at the intersection of technology, cybersecurity, and society.
Unusual Gathering | Episode XXVIII

Conversations At The Intersection Of IT Security And Society

Guests
Elizabeth Wharton | Damon Jackman

Hosts
Sean Martin | Marco Ciappelli

ITSPmagazine’s Unusual Gatherings XXVIII:
Just How Smart Are Smart Airports?


Think about the last time you were in an airport, any airport.

Now think about the best mall you have ever been inside.

Was it the one with the best shopping or restaurant experiences? Did it have comfortable waiting areas? Or maybe the TSA security check lines were moving smoothly and the check-in process welcoming? Were the amenities clean? Or, perhaps, you felt a sense of security.

I bet that if you have seen some of the largest and most modern airports in the world you might have had the thought along the lines of something like "Wow, these are like small cities! I could almost live here." I also bet you were likely annoyed - even just a little bit - by the amount of time you had to present your passport, your boarding ticket and to have your identity questioned.

But here is one thing that you probably did not ask yourself:
“What does it take to run this thing - this airport that feels like a small city?"
 
Read the full piece and listen to the podcast. Enjoy!
Partner Content

It is important to detect a cyber incident as  soon as you can to limit the amount of damage to your small or  medium-sized business. So how can you detect whether an acute incident  or significant data breach has occurred with your small or medium-sized  business? What signs do you look for? What are methods of detecting an  incident? We’ll spend the hour talking all about detection and what you  can do to limit or contain the impact of a potential cybersecurity  event:

How can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized  business?

What signs do you look for? 

What are methods of detecting an  incident?


PANELISTS

Bradford J. Willke, CISSP

Director (Acting), Stakeholder Engagement and Cyber Infrastructure
Resilience, Office of Cybersecurity and Communications
U.S. Department of Homeland Security

 

Robin L. Wetherill

Division of Privacy and Identity Protection
Bureau of Consumer Protection
Federal Trade Commission  

Register Now. It is free, of course.
This is one of our last Experts Corner.
Enjoy and discover the new opportunity to join our conversations.

Growing privacy concerns have Facebook users measurably less engaged, and recent findings show that they have serious concerns about trust and security on the site. So if you were counting on a future of low-effort, algorithm-driven advertising, you might want to go back to the drawing board. But, as Ben Mizes, Co-Founder of Clever Real Estate points out, there is some good news, too.

 

ITSPmagazine On Location Coverage

Be part of our conference conversations before, during, and after the event.

When you join us this year, you have a unique opportunity to associate your company to the Thought Leadership conversations that we will have before, during and following the event. Additionally, you get Brand Awareness and Exposure while receiving all of the benefits offered by our platform.

If you have a story to share and want to join us as we cover our next set of conferences—InfoSec EU, RSAC APJ, Black Hat USA and DEFCON—we invite you to discover the benefits of our conference coverage sponsorship program and let us know if you are interested in joining us for our adventures.
 

Join us for one, two, or all our travels and conversations. We would love to have your company on board.

For each event we offer two very affordable sponsorship options. Give it a thought.
ITSPmagazine is, and will always be a free publication.

If you like what we do, share our values, and would like to associate your brand with ITSPmagazine, we invite you to consider becoming a sponsor.


Visit our Media Kit, or simply contact us to talk about it.
 
Explore Our Media Kit

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
Forward

Keep in touch with us

An

imsmartin consulting
publication
Copyright© 2019 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list