Unusual Gatherings
This is our latest conversation at the intersection of technology, cybersecurity, and society.
|
|
Unusual Gathering | Episode XXIX | Garth Griffin And Maurits Lucas
Conversations At The Intersection Of Technology, Cybersecurity, and Society
Guests
Garth Griffin | Maurits Lucas
Hosts
Sean Martin | Marco Ciappelli
This episode:
Are You — Yes We're Talking To You, Society — Afraid Of The Dark?
When you think of the Dark Web, what do you picture? Does it look similar to that of the forest through which Little Red Riding Hood travels through to visit her grandma? What’s in there? Who's in there? Should you go there? Why — why not?
Certainly, it is good to know what risk is waiting out there so you can avoid it if you do not have to venture into it. But, if you aren't aware of it, how do you know what to expect? If you’re ready to take a walk on the dark side with us, have a listen…
Thanks to our episode sponsor: CyberCyte
Learn more about sponsoring the Unusual Gatherings Talk Show
|
|
A chronicle and a podcast from Sean Martin for 'At The Edge' Column
|
|
By Sean Martin
Guests: Emily Miller | Ted Harrington | Dean Weber
Host: Sean Martin
In today's episode, I connect with Emily, Dean, and Ted, we look at the current state of security in IT, OT, IoT, and ICS — and the connections between these different environments.
Together, we explore how identity plays a critical role in ensuring a safe environment that can be traced to specific sensors, devices networks, and people. And, with the massive numbers of things hitting the market—and our society—we attempt to answer the question surrounding our ability (or lack thereof) to scale the controls and protections to minimize—or perhaps even eliminate—undue exposure to risk introduced by these things.
|
|
It is important to detect a cyber incident as soon as you can to limit the amount of damage to your small or medium-sized business. So how can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized business? What signs do you look for? What are methods of detecting an incident? We’ll spend the hour talking all about detection and what you can do to limit or contain the impact of a potential cybersecurity event:
How can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized business?
What signs do you look for?
What are methods of detecting an incident?
PANELISTS
Bradford J. Willke, CISSP
Director (Acting), Stakeholder Engagement and Cyber Infrastructure
Resilience, Office of Cybersecurity and Communications
U.S. Department of Homeland Security
Robin L. Wetherill
Division of Privacy and Identity Protection
Bureau of Consumer Protection
Federal Trade Commission
|
|
This is one of our last Experts Corner.
Enjoy and discover the new opportunity to join our conversations.
|
|
Growing privacy concerns have Facebook users measurably less engaged, and recent findings show that they have serious concerns about trust and security on the site. So if you were counting on a future of low-effort, algorithm-driven advertising, you might want to go back to the drawing board. But, as Ben Mizes, Co-Founder of Clever Real Estate points out, there is some good news, too.
|
|
ITSPmagazine On Location Coverage
Be part of our conference conversations before, during, and after the event.
When you join us this year, you have a unique opportunity to associate your company to the Thought Leadership conversations that we will have before, during and following the event. Additionally, you get Brand Awareness and Exposure while receiving all of the benefits offered by our platform.
If you have a story to share and want to join us as we cover our next set of conferences—InfoSec EU, RSAC APJ, Black Hat USA and DEFCON—we invite you to discover the benefits of our conference coverage sponsorship program and let us know if you are interested in joining us for our adventures.
Join us for one, two, or all our travels and conversations. We would love to have your company on board.
|
|
In Case You Missed It: A Handful Of Our Top Podcasts
|
|
ITSPmagazine is, and will always be a free publication.
If you like what we do, share our values, and would like to associate your brand with ITSPmagazine, we invite you to consider becoming a sponsor.
Visit our Media Kit, or simply contact us to talk about it.
|
|
|
|
Help us spread cybersecurity awareness and education.
Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
|
|
|
|