Sean Martin, CISSP | ITSPmagazine
Sean Martin is an information security veteran of nearly 25 years and a four-term CISSP. Sean is the co-founder and editor-in-chief at @ITSPmagazine and the president of imsmartin, an international business advisory firm. Sean's articles have been published globally covering security management, cloud computing, enterprise mobility, application security, InfoSec awareness and education, bug bounties, governance, risk, and compliance -- oftentimes with a focus on specialized industries and sectors such as government, finance, healthcare, insurance, legal, manufacturing and the supply chain. Sean is also a regular speaker and moderator traveling to cities all over the world both physically and online. View Sean's schedule.
Russell Mosley, Director, Infrastructure & Security, Dynaxys
Rusty Sailors, Chairman, Protecting Tomorrow
Tom Caldwell, Senior Director of Engineering at Webroot
Sean Martin, CISSP, Founder and Editor-in-Chief, ITSPmagazine
Between the massive amounts of data flowing through a company, the difficulty of managing its IT systems internally, relying on data synchronization and backup services, and the need to be budget conscious, much of this data may reside outside the firewall. But the use of convenient inward-out systems can put your company at risk if not managed properly.
Even with new technologies abound, we’ve come to rely on passwords as our primary means of managing access to systems, applications and data. In reality, passwords are our first—and in most cases, only—line of defense when it comes to protecting against unauthorized access, misuse and theft.
People go to work to do their job. They have meetings to attend, calls to make, tasks to complete, quotas to reach, and much more. So they can’t be bothered with worrying about information security. However, their habits – good and bad, innocent or malicious – are putting their employer’s business at risk. All it takes is one poorly made decision, or maybe even the lack of a decision in many cases, to damage or even destroy a business.
Ahhh yes, our employees. We love them dearly, but sometimes they do things that put the company at risk of a data breach or other cyber attack. I reached out to the InfoSec community to help me capture some of the more common scenarios and troubling cases where employees could cause a company harm, both unknowingly and maliciously.
It’s 2017 and we can no longer afford to ignore good cybersecurity practices. In this ITSPmagazine exclusive, we connected with top cybersecurity experts to get their recommendations on protecting business and users from malicious attacks.
Good Bots. Bad Bots. Can you tell those apart from the ‘normal’ traffic generated by the humans using your network? Sean Martin works with the team at Distil Networks to identify 10 ways to spot bad bots on your network?
If you believe the vendor hype, Artificial Intelligence is the greatest thing to ever happen to cybersecurity. Guess what? The vendors may be correct, but it’s not easy to determine what is useful technology and what is fluffy marketing.
There’s tremendous excitement about Machine Learning and its Artificial Intelligence applications for cybersecurity. There’s a lot of confusion and vendor technobabble, too, that must be sorted out.
From Big Data to Behavioral Analytics to Machine Learning, Artificial Intelligence presents a confusing landscape, in large part because the terms are vague and defined inconsistently (and vendors like it this way).
At The Edge with Sean Martin
By Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine
While the road to Black Hat is not an unfamiliar one for ITSPmagazine, this year it is especially exciting. We love what we do: listen to amazing stories, learn from each other, and rally passionately to help raise awareness for cybersecurity throughout society. ITSPmagazine co-founder Sean Martin shares how our team’s presence at Black Hat will help us further our pursuit for increased education, improved diversity, and enhanced self-empowerment for what could and should be a much safer cyber world.
By Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine
Sometimes the best things in life take time to discover. We’re thrilled to announce a new member of our team, Mark Gibbs, and introduce his long-time information technology column with a new, opinionated InfoSec spin which you’ll find only on ITSPmagazine.
ITSPmagazine and BrightTALK partner together at Black Hat 2017 to bring you four exciting, all-new live webinars on the cybersecurity matters that are most relevant and important to small businesses and everyday people just like you.
May 25, 2018 might seem like a fair distance out, and that a lot can happen between now and then. One of those things, however, could take quite a bit of planning, implementation, and proof that it's done. Ahh yes, GDPR compliance... what are you worried about?
As part of the original planning for the panel, I asked the experts to provide our audience with some actionable tips. This chronicle captures those tips. Enjoy!
As technology continues to permeate our world and our lives, more of what we do and how we interact with each other will be replaced by machines and automation. What happens when we shift from a world of virtual reality to a virtual world of reality?
Making predictions can be fun. It can seem like a game when guessing if and when a prediction would come true. But, when lives are at stake, some predictions can be downright scary.
During the first couple days of the RSA Conference, I've spent most of my time having informal conversations with attendees, taking briefings from vendors, and engaging in deep-dive interviews with executives and leaders from cybersecurity firms of all sizes. The two common themes thus far? Artificial intelligence/machine learning and a focus on ransomware and phishing.
Many organizations enter the world of information security with new products that they think are wildly innovative. But in many cases—unfortunately—they are not truly innovative. This post explores how to identify what is actually innovative, what type of innovation matters, why it matters, and how to approach innovation to achieve success.
I had the opportunity to contribute to a blog post for Distil Networks, offering up a few thoughts about the future of cybersecurity in 2017. Here's what I had to say.
What can happen when we think our devices aren't listening... but in fact, they really are?
In December 2016, ITSPmagazine secured a spot in the top 10 in Evan Carmichael's Top 100 Technology Twitter Accounts to Follow.
In the midst of our continued progress and success, I take great pride in sharing with you that our magazine has become an official media sponsor for RSA Conference 2017!
The RSA Conference Innovation Sandbox Contest is back, better than ever. This year, the event moves to the Marriott Marquis where it will share a new dedicated area with its sister event, the Early Stage Expo.
Did you know? In 2017, RSA Conference added four more Learning Labs, bringing the total this year to 16. View this list to get a sampling of the hands-on labs being offered at RSAC 2017.
Did you know? From Analytics to Technology Infrastructure, RSA Conference 2017 has a lot of conference topics to choose from. Can you guess how many?
Did you know? In 2016, RSA Conference launched what they refer to as Conference Paths. View this list to get a sampling of what's in store for RSAC 2017.
Given the level of chatter out and about in the industry, the team at ITSPmagazine shared my desire to start covering the event sooner, rather than later.
Jim Manico presented to the ISSA Orange County 2016 Symposium audience, sharing some key points on how to embrace and succeed with a secure application development program.