
Wear Whatever You Want When Hacking | A Conversation With John Jackson | The National Blast With Keenan Skelly
07/13/21 • 30 min
Why the Computer Fraud and Abuse Act (CFAA) is ruining hacks for good.
_______________________
Guest
John Jackson
On Twitter 👉https://twitter.com/johnjhacking
On Linkedin 👉https://www.linkedin.com/in/johnjhacking/
______________________
Host
Keenan Skelly
On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly
______________________
This Episode’s Sponsors
______________________
Resources
Hackers Are Investing in Each Other's Operations: https://tribunecontentagency.com/article/hackers-are-investing-in-each-others-operations-just-like-vcs-invest-in-startups/
Computer Fraud and Abuse Act (CFAA): https://www.nacdl.org/Landing/ComputerFraudandAbuseAct
______________________
For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast
______________________
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships
Why the Computer Fraud and Abuse Act (CFAA) is ruining hacks for good.
_______________________
Guest
John Jackson
On Twitter 👉https://twitter.com/johnjhacking
On Linkedin 👉https://www.linkedin.com/in/johnjhacking/
______________________
Host
Keenan Skelly
On ITSPmagazine 👉https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/keenan-skelly
______________________
This Episode’s Sponsors
______________________
Resources
Hackers Are Investing in Each Other's Operations: https://tribunecontentagency.com/article/hackers-are-investing-in-each-others-operations-just-like-vcs-invest-in-startups/
Computer Fraud and Abuse Act (CFAA): https://www.nacdl.org/Landing/ComputerFraudandAbuseAct
______________________
For more podcast stories from The National Blast Podcast with Keenan Skelly, visit: https://www.itspmagazine.com/the-national-blast-podcast
______________________
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships
Previous Episode

The Joys Of Merger And Acquisition | Indistinguishable From Magic With Chris Abramson And Rafal Los
Just when you thought you had some reasonable handle on security, your companies goes and does a merger/acquisition.
Of course, what you inherit is a beautiful box wrapped in a bow - otherwise known as Pandora's Box. What's inside? Will it be a company where security is part of the culture? Or does everyone have local and/or domain admin? You just don't know! But you do know ego, culture, and ego will be there to thwart your best laid plans.
_______________________
Hosts
Rafal Los
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/rafal-los
Chris Abramson
On ITSPmagazine 👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/chris-abramson
_______________________
This Episode’s Sponsors
_______________________
For more podcast stories from Indistinguishable From Magic With Rafal Los and Chris Abramson, visit: https://www.itspmagazine.com/indistinguishable-from-magic-podcast
_______________________
Are you interested in sponsoring an ITSPmagazine Channel
Next Episode

Book | Making Sense Of Cyber Security | Redefining Security With Thomas Kranz
Cybersecurity has become too technology-focused. Not only is the field becoming needlessly complicated to those who need to understand these issues most—developers, managers, executives—but the focus on technology-driven solutions is forcing us to miss some of the basics of a sound cybersecurity strategy.
Most people simply do not understand cybersecurity and, therefore, its need and value. However, if we keep pointing fingers and can't explain in simple terms what we do as cybersecurity professionals and why it is essential to the business and our customers/partners, no leadership team will be willing to allocate the funds and resources necessary to tackle the growing security threats they face.
So... what are we going to do about this? First, we're going to break down what it means to be cyber secure, looking at it from the perspective of those that need to know but that do not need to be experts in the field — "just" understand the basics.
The book that Thomas Kranz wrote: Making Sense of Cyber Security, talks about this, and much more.
About The Book
'Making Sense of Cyber Security' is a no-nonsense overview of common cyber threats. Written for readers at all skill levels, this easy-to-read guide breaks down the core ideas and terminology of cybersecurity so that you can effectively contribute to the planning and implementation of a security strategy. You'll learn the three pillars of a successful security strategy and how to create and apply threat models that will iteratively improve your organization's readiness.
____________________________
Guest
Tom Kranz
On Linkedin 👉https://www.linkedin.com/in/tomkranz
On Twitter 👉https://twitter.com/whoopsie
On Medium 👉https://medium.com/@prestelpirate
____________________________
Resources
Book: Making Sense of Cyber Security: manning.com/books/making-sense-of-cyber-security
____________________________
This Episode’s Sponsors
Imperva: https://itspm.ag/imperva277117988
Archer: https://itspm.ag/rsaarchweb
Edgescan: https://itspm.ag/itspegweb
____________________________
To see and hear more Redefining Security content on ITSPmagazine, visit:
https://www.itspmagazine.com/redefining-security
Are you interested in sponsoring an ITSPmagazine Channel?
👉 https://www.itspmagazine.com/podcast-series-sponsorships
If you like this episode you’ll love
Episode Comments
Generate a badge
Get a badge for your website that links back to this episode
<a href="https://goodpods.com/podcasts/itspmagazine-podcasts-3754/wear-whatever-you-want-when-hacking-a-conversation-with-john-jackson-t-15713382"> <img src="https://storage.googleapis.com/goodpods-images-bucket/badges/generic-badge-1.svg" alt="listen to wear whatever you want when hacking | a conversation with john jackson | the national blast with keenan skelly on goodpods" style="width: 225px" /> </a>
Copy