Log in

goodpods headphones icon

To access all our features

Open the Goodpods app
Close icon
ITSPmagazine Podcasts - Wear Whatever You Want When Hacking | A Conversation With John Jackson | The National Blast With Keenan Skelly
plus icon
bookmark

Wear Whatever You Want When Hacking | A Conversation With John Jackson | The National Blast With Keenan Skelly

07/13/21 • 30 min

ITSPmagazine Podcasts

Why the Computer Fraud and Abuse Act (CFAA) is ruining hacks for good.

_______________________

Guest
John Jackson
On Twitter 👉https://twitter.com/johnjhacking
On Linkedin 👉https://www.linkedin.com/in/johnjhacking/
______________________
Host
Keenan Skelly
On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly

______________________
This Episode’s Sponsors

______________________
Resources

Hackers Are Investing in Each Other's Operations: https://tribunecontentagency.com/article/hackers-are-investing-in-each-others-operations-just-like-vcs-invest-in-startups/

Computer Fraud and Abuse Act (CFAA): https://www.nacdl.org/Landing/ComputerFraudandAbuseAct

Podcast: Are Laws Keeping Pace With Cyber Reality? | The History And Impact Of The Computer Fraud and Abuse Act (CFAA) On Society | A Conversation With Riana Pfefferkorn And Leonard Bailey

______________________
For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast

______________________
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships

plus icon
bookmark

Why the Computer Fraud and Abuse Act (CFAA) is ruining hacks for good.

_______________________

Guest
John Jackson
On Twitter 👉https://twitter.com/johnjhacking
On Linkedin 👉https://www.linkedin.com/in/johnjhacking/
______________________
Host
Keenan Skelly
On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly

______________________
This Episode’s Sponsors

______________________
Resources

Hackers Are Investing in Each Other's Operations: https://tribunecontentagency.com/article/hackers-are-investing-in-each-others-operations-just-like-vcs-invest-in-startups/

Computer Fraud and Abuse Act (CFAA): https://www.nacdl.org/Landing/ComputerFraudandAbuseAct

Podcast: Are Laws Keeping Pace With Cyber Reality? | The History And Impact Of The Computer Fraud and Abuse Act (CFAA) On Society | A Conversation With Riana Pfefferkorn And Leonard Bailey

______________________
For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast

______________________
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships

Previous Episode

undefined - The Joys Of Merger And Acquisition | Indistinguishable From Magic With Chris Abramson And Rafal Los

The Joys Of Merger And Acquisition | Indistinguishable From Magic With Chris Abramson And Rafal Los

Just when you thought you had some reasonable handle on security, your companies goes and does a merger/acquisition.

Of course, what you inherit is a beautiful box wrapped in a bow - otherwise known as Pandora's Box. What's inside? Will it be a company where security is part of the culture? Or does everyone have local and/or domain admin? You just don't know! But you do know ego, culture, and ego will be there to thwart your best laid plans.

_______________________

Hosts
Rafal Los
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rafal-los

Chris Abramson
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chris-abramson

_______________________

This Episode’s Sponsors

_______________________

For more podcast stories from Indistinguishable From Magic With Rafal Los and Chris Abramson, visit: https://www.itspmagazine.com/indistinguishable-from-magic-podcast

_______________________

Are you interested in sponsoring an ITSPmagazine Channel

👉https://www.itspmagazine.com/podcast-series-sponsorships

Next Episode

undefined - Book |  Making Sense Of Cyber Security | Redefining Security With Thomas Kranz

Book | Making Sense Of Cyber Security | Redefining Security With Thomas Kranz

Cybersecurity has become too technology-focused. Not only is the field becoming needlessly complicated to those who need to understand these issues most—developers, managers, executives—but the focus on technology-driven solutions is forcing us to miss some of the basics of a sound cybersecurity strategy.

Most people simply do not understand cybersecurity and, therefore, its need and value. However, if we keep pointing fingers and can't explain in simple terms what we do as cybersecurity professionals and why it is essential to the business and our customers/partners, no leadership team will be willing to allocate the funds and resources necessary to tackle the growing security threats they face.

So... what are we going to do about this? First, we're going to break down what it means to be cyber secure, looking at it from the perspective of those that need to know but that do not need to be experts in the field — "just" understand the basics.

The book that Thomas Kranz wrote: Making Sense of Cyber Security, talks about this, and much more.

About The Book
'Making Sense of Cyber Security' is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.

____________________________

Guest
Tom Kranz
On Linkedin 👉https://www.linkedin.com/in/tomkranz
On Twitter 👉https://twitter.com/whoopsie
On Medium 👉https://medium.com/@prestelpirate

____________________________

Resources

Book: Making Sense of Cyber Security: manning.com/books/making-sense-of-cyber-security

____________________________

This Episode’s Sponsors

Imperva: https://itspm.ag/imperva277117988

Archer: https://itspm.ag/rsaarchweb

Edgescan: https://itspm.ag/itspegweb

____________________________

To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-security

Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships

Episode Comments

Generate a badge

Get a badge for your website that links back to this episode

Select type & size
Open dropdown icon
share badge image

<a href="https://goodpods.com/podcasts/itspmagazine-podcasts-3754/wear-whatever-you-want-when-hacking-a-conversation-with-john-jackson-t-15713382"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to wear whatever you want when hacking | a conversation with john jackson | the national blast with keenan skelly on goodpods" style="width: 225px" /> </a>

Copy