ITSPmagazine | At the Intersection of IT Security & Society™
View this email in your browser

Enjoy the latest chronicles, podcasts, stories, talk shows, novelties, rarities, and oddities from ITSPmagazine.
“Privacy is not dead, just cumbersome and getting more and more expensive.” 

― Chris Kubeckan
This newsletter is brought to you by:

Click on the logo to visit their company page on ITSPmagazine and learn about them.

ITSPmagazine is a free publication and all the content we create is made possible by our own passion and the generosity of our sponsors. We are ever so grateful for your support.

Unusual Gathering | Episode XXVI | Guests Melanie Ensign And Bennett Cyphers

Conversations At The Intersection Of IT Security And Society

Melanie Ensign, Uber | Bennett Cyphers, EFF

Sean Martin | Marco Ciappelli

This episode:
All your trips’ data belong to us — and so does your privacy.

We are having this conversation because LADOT is requesting that all the shared scooter companies give them all the data they collect as a condition “sine qua non” if they want to do business on the streets of L.A..

The amount of information that LADOT is hoping to collect is quite extensive and it’s unclear what will be done with the data once received except that it will be sent to a third-party data aggregator — AND the data collected is subject to public access requests, which means that if anyone wants it, they can have it. 

So where do we stand as consumers if this initiative goes further? Where do morals and humanity stand on this topic? When we make new rules and regulations, we must think about the future that we want because the right to privacy is the right to freedom.

__ Read the full article on ITSPmagazine __

Thanks to our episode sponsor: Onapsis

Learn more about sponsoring the Unusual Gatherings Talk Show

Read the full article and enjoy the podcast
📜 A chronicle and a podcast 🎙
from Sean Martin for 'At The Edge' Column 

By Sean Martin

Sean Martin chats with Amit Elazari of UC Berkeley School of Information, and Leonard Bailey of the U.S. Department of Justice, Criminal Division. Today’s topic looks at the life of a hacker, the challenges they face from both a liability and legal perspective, and how organizations deal with the research activities they encounter from both cybercriminals and ethical hackers alike.

📜 A chronicle and a podcast 🎙
From Marco Ciappelli for 'The Cyber Society' Column 

By Marco Ciappelli

A conversation with Dr. Ryan K. Louie, M.D., Ph.D.  Psychiatrist

“Psybersecurity” when technology, security and safety cross the boundaries and become an integral part of our perception of human security.

I invite you to listen to this podcast, and to do so I am going to use Ryan’s own words: “As the world of devices and technology becomes increasingly connected with human users, the security of each becomes one and the same.”

Sponsored Content


Webinar: Attacking Microsoft SQL Server Databases

During this on-demand session, STEALTHbits Technologies reviews how Microsoft SQL Server can be discovered, attacked, and used as a vehicle for attacking systems and data.

Watch now and learn how to be the exception to the rule
From Our Experts Corner

Looking back to identify trends and patterns, we can see what lessons we can learn when it comes to patch management. Chris Goettl, director of product management, security at Ivanti, reviews what we saw throughout 2018 and also some trends across the last decade. From this he provides some guidance as to what you should be working toward to make your cybersecurity program successful.

From Our Experts Corner

IoT devices are already being used in hospitals, and any tampering with them — such as imaging nurse call systems, infusion pumps and patient monitors — can cost human lives. Andy Norton of Lastline illustrates that, given their vulnerabilities and the ease with which bad actors can take advantage of them, it’s clear that not enough is being done to secure IoT devices.

Sponsored Content

Unleash Your Analysts. Evolve Your SOC.

As the front line defense in stopping adversaries, SecOps teams are critical in securing the enterprise. Yet as the complexity of data types and volumes increase, SOC analysts are drowning in data that is overwhelming in volume, noise, and difficult to extract insights from.

It’s time for SecOps to evolve
From Our Experts Corner

The evolution of malware (kicked off in 1986 with the Brain virus) spawned a plethora of Trojans, worms and ransomware. David Balaban, computer security researcher with over 15 years of experience in malware analysis and antivirus software evaluation, looks back on the top 10 computer viruses that turned out to be groundbreaking or caused hefty damage.

Sponsored Content
Join Your Peers At The Next Cyber Security Summit Event

This exclusive ITSPmagazine discounted VIP Pass includes access to all Interactive Panels & Discussions, as well as a Catered Breakfast, Lunch and Cocktail & Cigar Reception.

Regular Price $350
ITSPmagazine is, and will always be a free publication.

If you like what we do, share our values, and would like to associate your brand with ITSPmagazine, we invite you to consider becoming a sponsor.

Visit our Media Kit, or simply contact us to talk about it.

If you have a story to share and want to join us as we cover our next set of conferencesInfoSec EU, RSAC APJ, Black Hat USA and DEFCONwe invite you to discover the benefits of our conference coverage sponsorship program and let us know if you are interested in joining us for our adventures.
Explore Our Media Kit

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!

Keep in touch with us


imsmartin consulting
Copyright© 2019 ITSPmagazine, an IMSMARTIN publication, All rights reserved.

Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list