Copy
ITSPmagazine
At the Intersection of Technology, Cybersecurity, and Society.
View this email in your browser

Enjoy the latest chronicles, podcasts, stories, talk shows, novelties, rarities, and oddities from ITSPmagazine.
 
“Fairy tales are more than true: not because they tell us that dragons exist, but because they tell us that dragons can be beaten.” 
― Neil Gaiman, Coraline
This newsletter is brought to you by
Click on their logo to visit their company page on ITSPmagazine and learn more about them.
________
ITSPmagazine is a free publication and all the content we create is made possible by our own passion and the generosity of our sponsors.

If you wish to become an ITSPmagazine Sponsor you can learn about
our affordable opportunities on our Media Kit page.

We would be honored and ever so grateful for your support.
Unusual Gatherings
This is our latest conversation at the intersection of technology, cybersecurity, and society.
Unusual Gathering | Episode XXIX | Garth Griffin And Maurits Lucas

Conversations At The Intersection Of Technology, Cybersecurity, and Society

Guests
Garth Griffin | Maurits Lucas

Hosts
Sean Martin | Marco Ciappelli

This episode:
Are You — Yes We're Talking To You, Society — Afraid Of The Dark?

When you think of the Dark Web, what do you picture? Does it look similar to that of the forest through which Little Red Riding Hood travels through to visit her grandma? What’s in there? Who's in there? Should you go there? Why — why not?

Certainly, it is good to know what risk is waiting out there so you can avoid it if you do not have to venture into it. But, if you aren't aware of it, how do you know what to expect? If you’re ready to take a walk on the dark side with us, have a listen…

Thanks to our episode sponsor: CyberCyte

Learn more about sponsoring the Unusual Gatherings Talk Show

 

Read the full piece and listen to the podcast. Enjoy!
 
A chronicle and a podcast from Sean Martin for 'At The Edge' Column

By Sean Martin

Guests: Emily Miller | Ted Harrington | Dean Weber
Host: Sean Martin

In today's episode, I connect with Emily, Dean, and Ted, we look at the current state of security in IT, OT, IoT, and ICS — and the connections between these different environments.

Together, we explore how identity plays a critical role in ensuring a safe environment that can be traced to specific sensors, devices networks, and people. And, with the massive numbers of things hitting the market—and our society—we attempt to answer the question surrounding our ability (or lack thereof) to scale the controls and protections to minimize—or perhaps even eliminate—undue exposure to risk introduced by these things.

Sponsored Content
Read the trends.
Sponsored Content
Get the report.
Partner Content

It is important to detect a cyber incident as  soon as you can to limit the amount of damage to your small or  medium-sized business. So how can you detect whether an acute incident  or significant data breach has occurred with your small or medium-sized  business? What signs do you look for? What are methods of detecting an  incident? We’ll spend the hour talking all about detection and what you  can do to limit or contain the impact of a potential cybersecurity  event:

How can you detect whether an acute incident or significant data breach has occurred with your small or medium-sized  business?

What signs do you look for? 

What are methods of detecting an  incident?


PANELISTS

Bradford J. Willke, CISSP

Director (Acting), Stakeholder Engagement and Cyber Infrastructure
Resilience, Office of Cybersecurity and Communications
U.S. Department of Homeland Security

 

Robin L. Wetherill

Division of Privacy and Identity Protection
Bureau of Consumer Protection
Federal Trade Commission  

Register now. It is free, of course.
This is one of our last Experts Corner.
Enjoy and discover the new opportunity to join our conversations.

Growing privacy concerns have Facebook users measurably less engaged, and recent findings show that they have serious concerns about trust and security on the site. So if you were counting on a future of low-effort, algorithm-driven advertising, you might want to go back to the drawing board. But, as Ben Mizes, Co-Founder of Clever Real Estate points out, there is some good news, too.

 

ITSPmagazine On Location Coverage

Be part of our conference conversations before, during, and after the event.

When you join us this year, you have a unique opportunity to associate your company to the Thought Leadership conversations that we will have before, during and following the event. Additionally, you get Brand Awareness and Exposure while receiving all of the benefits offered by our platform.

If you have a story to share and want to join us as we cover our next set of conferences—InfoSec EU, RSAC APJ, Black Hat USA and DEFCON—we invite you to discover the benefits of our conference coverage sponsorship program and let us know if you are interested in joining us for our adventures.
 

Join us for one, two, or all our travels and conversations. We would love to have your company on board.

For each event we offer two very affordable sponsorship options. Give it a thought.

In Case You Missed It: A Handful Of Our Top Podcasts

Listen to ITSPradio on iTunes.
ITSPmagazine is, and will always be a free publication.

If you like what we do, share our values, and would like to associate your brand with ITSPmagazine, we invite you to consider becoming a sponsor.


Visit our Media Kit, or simply contact us to talk about it.
 
Explore our media kit.

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
Forward

Keep in touch with us

An

imsmartin consulting
publication
Copyright© 2019 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list