Copy
ITSPmagazine | At the Intersection of IT Security & Society™
View this email in your browser
 
“If you give me six lines written by the hand of the most honest of men, I will find something in them which will hang him.” 

― Cardinal Armand Jean du Plessis, 1st Duke of Richelieu and Fronsac | 1585 – 1642
This newsletter is brought to you by
our RSA Conference Coverage Sponsors


ITSPmagazine coverage, podcasts, webcasts, articles, and all our happenings during RSA Conference 2019 will be made possible by the generosity of our sponsors. We are ever so grateful for your support.

Visit their company page on ITSPmagazine to learn about them

If you have a story to share and want to join us for the journey, we invite you to discover the benefit of the full coverage sponsorship and let us know if you are interested in joining us for our adventures. We look forward to another exciting conference.

Learn More About Our RSAC SF 2019 Coverage

*Are you considering another ITSPmagazine sponsorship?
Visit our Media Kit, or simply contact us to talk about it.

Stay tuned, enjoy this week's content, and share it recklessly with everyone.
They will thank you.
😉

 

Join Us For Yet Another Memorable Road Trip To San Francisco


Chats On The Road To RSA Conference 
because we can bring you stories before they even happen 😉

It has become an ITSPmagazine tradition to start our coverage with what we call Chats On The Road To RSA Conference. We connect with conference speakers, presenters, panelists and organizers to start the conversation way before anyone else does.

Here's what we have so far
[many more have been recorded and still more scheduled]

Chats On The Road To RSAC 2019 | Solving The Cybersecurity Talent Shortage | With Claudia Schabel Of Schabel Solutions

Today’s guest is Claudia Schabel of Schabel Solutions, who gives us a sneak peek into her panel at the “Solving Our Cybersecurity Talent Shortage” seminar at RSAC.

 

Chats On The Road To RSAC 2019 | The Five Most Dangerous New Attack Techniques And How To Counter Them | With The SANS Keynote Panel

In today’s chat, Sean Martin connect with all 4 of the SANS panelists for their RSA Conference keynote panel entitled The Five Most Dangerous New Attack Techniques and How to Counter Them. This RSA Conference session is again led by Research Director and Founder of the SANS Institute, Alan Paller, who is joined on stage by Ed Skoudis, Heather Mahalik and Johannes Ullrich. In this podcast they’ll give us a sneak peek into what they will be talking about this year with regards to the latest threats, attacks and the methods used to carry them out.

 

Chats On The Road To RSAC 2019 | Solving The Cybersecurity Talent Shortage | With Caroline Wong Of Cobalt

Today’s guest is Caroline Wong, who gives us a sneak peek into her panel at the “Solving Our Cybersecurity Talent Shortage” seminar at RSAC.

Solving The Cybersecurity Talent Shortage | With Vanessa Pegueros Of DocuSign

Patrick Heim And Richard Seiersen | What You Can Learn At The Innovation Sandbox

Solving The Cybersecurity Talent Shortage At RSA Conference 2019

Itineraries on the Road to RSA Conference 2019
because we all need a little help deciding what to do at RSA Conference 🤔

You’re in luck! It has become another ITSPmagazine tradition to pull together a collection of itineraries from some of the brightest minds in the industry in what we call Itineraries On The Road To RSA Conference. In this section, you’ll find personal views, lists of events, sessions, activities, and speakers designed to help you make the most of your journey during the conference.

There are already two of them:
From the Experts Corner​

Breaches aren’t easy to deal with, especially if you are of the opinion that companies are people, too. Having seen, been part of, and lent a shoulder to many a breach, Javvad Malik, Security Advocate at AlienVault, offers nine of the common (but not best!) ways that companies respond to breaches.



Unusual Gathering | Episode XIX | Guests MK Palmore And Eva Casey-Velasquez

Conversations At The Intersection Of IT Security And Society

Guests
MK Palmore | Eva Casey-Velasquez

Hosts
Sean Martin | Marco Ciappelli

This episode:

Identity theft, misuse of personal information, and criminal intrusion — it is complicated and so are the consequences.

Here are a few teasers to get you inspired to listen up.

In the Federal Bureau of Investigation, there is a clear distinction in the way that they refer to privacy and cybersecurity:

Privacy relates to the misuse of personal information that was legitimately given but then used not for the intended purpose or by the party it was originally given to. 

Cybersecurity refers to a criminal intrusion, and therefore the theft of information, by an unauthorized party that stole information from a source.

This may very well make sense from a legal and criminal investigation standpoint, but we must agree that privacy and identity are more often than not part of the same big cybersecurity picture, and that consumers certainly feel this way.

Thanks to this episode sponsor:


ITSPmagazine | Visit our homepage here, on ITSPmagazine 😬

Learn more about sponsorship options here.

Listen Now
From the Experts Corner​
5 Recommendations To Build Security Into Your Multi-Cloud Strategy

While multi-cloud is a smart decision, it's extremely hard to get right, and the added complexity of securing data makes it an even more daunting proposition. Mario Duarte explores the challenges in developing a multi-cloud strategy that accounts for security and reviews four recommendations to execute on your own secure multi-cloud strategy.


Read More →
From the Experts Corner​
Better Make Some Plans When Moving To The Cloud

As organizations shift more to the cloud, it means they will increasingly rely on networks and infrastructure they don't own or directly manage. Yet this infrastructure is just as critical to consume and deliver the applications and services as when it was in the data center. Alex Henthorn-Iwane, VP Product Marketing at ThousandEyes, outlines 6 key network considerations that IT managers should take into account before shifting to the cloud.


Read More →
From the Experts Corner

5 Tips To Improve Your Cybersecurity Posture In 2019

The #CyberAvengers, a group of salty and experienced professionals, takes a brief look back at 2018 with its breaches of epic proportions. But rather than whine, moan and complain about the past — they suggest 5 things you can do in the next few weeks to have a safer cyber 2019.


Read More →

ITSPmagazine is, and will always be a free publication.
Our mission is to raise awareness for cybersecurity by making it understandable, accessible, and part of everyone’s everyday life.

If you can and wish to contribute, consider an individual donation,
even one dollar per month will help us to create more content and extend our influence.


https://patreon.com/itspmagazine

Together we can make a difference!


Lots Of Ways To Earn Continuing Professional Education Credits!

Earning CPE Credits With ITSPmagazine. Now That's Cool
 

 
Start Earning Your CPEs With ITSPmagazine
As we grow ITSPmagazine, we are offering very affordable sponsorship opportunities.

If you like what we do and would like to associate your brand with us,
we invite you to visit our Media Kit Page.

Help us spread cybersecurity awareness and education.

Thanks for sharing our newsletter with family, friends, neighbors, peers, and colleagues!
Share
Tweet
Share
Forward

Interested in advertising with ITSPmagazine to reach our growing audience? Great!
Let's Go Places Together!
Inquire about ITSPmagazine sponsorship opportunities

Keep in touch with us

An

imsmartin consulting
publication
Copyright © 2019 ITSPmagazine, an IMSMARTIN publication, All rights reserved.


Want to change how you receive these emails?
You can update your preferences or unsubscribe from this list