POPULARITY
Richard completes his summary of the March 2025 Gartner Risk and Security Conference held in Sydney Australia.
In this episode, we delve into the complexities of fragility in Bangladesh. Our guest for this discussion is Tasnia Khandaker Prova, Lead on Climate Research at the Center for Peace and Justice at BRAC University. We discuss the dynamics of internal and cross-border migration, borderland securitization and the role of community networks in addressing these challenges. As Bangladesh grapples with the repercussions of climate change, especially rising sea levels and increasingly extreme weather events, these pressures serve to compound pre-existing and intersectional vulnerabilities. Tasnia shares insights from her research on Bangladesh's climate-affected borderlands, emphasising the importance of understanding local dynamics and community-led solutions in fostering resilience.Further resources:Community-based participatory research (video) | Hearing local voices at the "Ground Zero" of climate change (article) | Berlin Climate and Security Conference session on migration featuring Tasnia (video)© adelphi global, all rights reserved adelphi global (https://adelphi-global.de/en) is an economically and politically independent, non-profit organisation dedicated to promoting sustainability, enhancing environmental protection, improving education, expanding development cooperation, and strengthening international collaborations. Our commitment is reflected in targeted projects, in-depth analyses, and informative educational events, through which we strive for a just and sustainable world. Editing by Paulus Müller-Hahl (Lichtbilder).
In the show: news; the security conference in Prague, and the Czech view on the worsening security situation; a new study shows drink spiking is present in Prague; our interview with female train driver Marie Sehnalová.
In the show: news; the security conference in Prague, and the Czech view on the worsening security situation; a new study shows drink spiking is present in Prague; our interview with female train driver Marie Sehnalová.
Richard describes Day 1 of Gartner's Sydney and Risk Conference held recently in Sydney.
In dieser Episode teilen wir die Erfahrungen und Erkenntnisse von der Munich Cyber Security Conference, reflektieren die aktuelle Cyber-Sicherheitslage in der Ukraine und die Rolle von Hacktivismus sowie staatlichen Cyberangriffen. Es gibt aber auch gute Nachrichten, Tobi konnte Geld aus einer Insolvenz rückerstatten lassen - Tobi sagt im Podcast, dass das in einer Frist von "2 Monaten" geht, aber es sind tatsächlich sogar 120 Tage. Wenn Du zu den wenigen gehörst, die diese Shownotes lesen, dann hast Du jetzt einen Wissensvorsprung :)! Und irgendwie reden wir immer mehr über das Basteln, und dieses Mal teilen wir wie man ein Photo-Booth für (nicht nur) Kindergeburtstage bauen kann. Ist also für alle was dabei! -- Wenn Euch unser Podcast gefallen hat, freuen wir uns über eine Bewertung! Feedback wie z.B. Themenwünsche könnt Ihr uns über sämtliche Kanäle zukommen lassen: Email: podcast@ichglaubeeshackt.de Web: podcast.ichglaubeeshackt.de Instagram: http://instagram.com/igehpodcast
US Vice President J.D. Vance speaks at the Munich Security Conference. As Ukraine's President Zelensky warns about Vladimir Putin's European ambitions, is Europe now on its own when it comes to defence? Also in the programme: why did six federal prosecutors resign in protest in New York and D.C. yesterday? And the study explaining why humans feel there IS a separate stomach for pudding.(IMAGE: US Vice President JD Vance speaks during the 61st Munich Security Conference (MSC), in Munich, Germany, 14 February 2025 / CREDIT: Ronald Wittek/EPA-EFE/REX/Shutterstock)
AP Washington correspondent Sagar Meghani reports on Vice President JD Vance's lecture to European security officials.
Liam Nolan, Eastern Europe Reporter, is at the major security conference taking place in Munich, Germany.
MONACO DI BAVIERA (GERMANIA) (ITALPRESS) - "Nelle precedenti crisi straordinarie, guarda cosa abbiamo fatto. Abbiamo dato agli Stati membri un margine di manovra fiscale extra attivando la clausola di salvaguardia. In parole povere, abbiamo dato agli Stati membri il potere di aumentare sostanzialmente gli investimenti pubblici legati alla crisi. Credo che ora siamo in un altro periodo di crisi che giustifica un approccio simile. Ecco perché posso annunciare che proporrò di attivare la clausola di salvaguardia per gli investimenti nella difesa". Lo ha detto a Monaco di Baviera, in occasione della Conferenza sulla Sicurezza, la presidente della Commissione europea Ursula von der Leyen."Ciò consentirà agli Stati membri di aumentare sostanzialmente la loro spesa per la difesa. Naturalmente, lo faremo in modo controllato", ha proseguito.sat/gsl (Fonte video: Commissione Europea)
MONACO DI BAVIERA (GERMANIA) (ITALPRESS) - "Nelle precedenti crisi straordinarie, guarda cosa abbiamo fatto. Abbiamo dato agli Stati membri un margine di manovra fiscale extra attivando la clausola di salvaguardia. In parole povere, abbiamo dato agli Stati membri il potere di aumentare sostanzialmente gli investimenti pubblici legati alla crisi. Credo che ora siamo in un altro periodo di crisi che giustifica un approccio simile. Ecco perché posso annunciare che proporrò di attivare la clausola di salvaguardia per gli investimenti nella difesa". Lo ha detto a Monaco di Baviera, in occasione della Conferenza sulla Sicurezza, la presidente della Commissione europea Ursula von der Leyen."Ciò consentirà agli Stati membri di aumentare sostanzialmente la loro spesa per la difesa. Naturalmente, lo faremo in modo controllato", ha proseguito.sat/gsl (Fonte video: Commissione Europea)
Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is fast approaching (February 19-21), bringing together security professionals, IT leaders, and business executives to discuss the principles and implementation of Zero Trust. Hosted by ThreatLocker, this event offers a unique opportunity to explore real-world security challenges and solutions.In a special On Location with Sean and Marco episode recorded ahead of the event, Ryan Bowman, VP of Solutions Engineering at ThreatLocker, shares insights into his upcoming session, The Dangers of Shadow IT. Shadow IT—the use of unauthorized applications and systems within an organization—poses a significant risk to security, operations, and compliance. Bowman's session aims to shed light on this issue and equip attendees with strategies to address it effectively.Understanding Shadow IT and Its RisksBowman explains that Shadow IT is more than just an inconvenience—it's a growing challenge for businesses of all sizes. Employees often turn to unauthorized tools and services because they perceive them as more efficient, cost-effective, or user-friendly than the official solutions provided by IT teams. While this may seem harmless, the reality is that these unsanctioned applications create serious security vulnerabilities, increase operational risk, and complicate compliance efforts.One of the most pressing concerns is data security. Employees using unauthorized platforms for communication, file sharing, or project management may unknowingly expose sensitive company data to external risks. When employees leave the organization or access is revoked, data stored in these unofficial systems can remain accessible, increasing the risk of breaches or data loss.Procurement issues also play a role in the Shadow IT problem. Bowman highlights cases where organizations unknowingly pay for redundant software services, such as using both Teams and Slack for communication, leading to unnecessary expenses. A lack of centralized oversight results in wasted resources and fragmented security controls.Zero Trust as a MindsetA recurring theme throughout the discussion is that Zero Trust is not just a technology or a product—it's a mindset. Bowman emphasizes that implementing Zero Trust requires organizations to reassess their approach to security at every level. Instead of inherently trusting employees or systems, organizations must critically evaluate every access request, application, and data exchange.This mindset shift extends beyond security teams. IT leaders must work closely with employees to understand why Shadow IT is being used and find secure, approved alternatives that still support productivity. By fostering open communication and making security a shared responsibility, organizations can reduce the temptation for employees to bypass official IT policies.Practical Strategies to Combat Shadow ITBowman's session will not only highlight the risks associated with Shadow IT but also provide actionable strategies to mitigate them. Attendees can expect insights into:• Identifying and monitoring unauthorized applications within their organization• Implementing policies and security controls that balance security with user needs• Enhancing employee engagement and education to prevent unauthorized technology use• Leveraging solutions like ThreatLocker to enforce security policies while maintaining operational efficiencyBowman also stresses the importance of rethinking traditional IT stereotypes. While security teams often impose strict policies to minimize risk, they must also ensure that these policies do not create unnecessary obstacles for employees. The key is to strike a balance between control and usability.Why This Session MattersWith organizations constantly facing new security threats, understanding the implications of Shadow IT is critical. Bowman's session at Zero Trust World 2025 will provide a practical, real-world perspective on how organizations can protect themselves without stifling innovation and efficiency.Beyond the technical discussions, the conference itself offers a unique chance to engage with industry leaders, network with peers, and gain firsthand experience with security tools in hands-on labs. With high-energy sessions, interactive learning opportunities, and keynotes from industry leaders like ThreatLocker CEO Danny Jenkins and Dr. Zero Trust, Chase Cunningham, Zero Trust World 2025 is shaping up to be an essential event for anyone serious about cybersecurity.For those interested in staying ahead of security challenges, attending Bowman's session on The Dangers of Shadow IT is a must.Guest: Ryan Bowman, VP of Solutions Engineering, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/ryan-bowman-3358a71b/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Zero Trust World 2025, hosted by ThreatLocker, is set to bring together IT professionals, business leaders, and cybersecurity practitioners for three days of hands-on labs, insightful discussions, and expert-led sessions. Taking place in Orlando, Florida, from February 19-21, this year's event promises an expanded agenda with cutting-edge topics, interactive workshops, and a unique approach to cybersecurity education.The Growth of Zero Trust WorldNow in its fifth year, Zero Trust World continues to grow exponentially, increasing in size by roughly 50% each year. Kieran Human, Special Projects Engineer at ThreatLocker, attributes this rapid expansion to the rising demand for cybersecurity solutions and the company's own growth. More IT leaders are recognizing the necessity of a Zero Trust approach—not just as a security measure, but as a fundamental philosophy for protecting their organizations.What to Expect: Hands-On Learning and Key DiscussionsOne of the biggest draws of Zero Trust World is its focus on hands-on experiences. Attendees can participate in hacking labs designed to teach them how cyber threats operate from an attacker's perspective. These include interactive exercises using rubber duckies—USB devices that mimic keyboards to inject malicious commands—demonstrating how easily cybercriminals can compromise systems.For those interested in practical applications of security measures, there will be sessions covering topics such as cookie theft, Metasploit, Windows and server security, and malware development. Whether an attendee is an entry-level IT professional or a seasoned security engineer, there's something to gain from these hands-on labs.High-Profile Speakers and Industry InsightsBeyond the labs, Zero Trust World 2025 will feature a lineup of influential speakers, including former Nintendo of America President and CEO Reggie Fils-Aimé, Chase Cunningham (known as Dr. Zero Trust), and ThreatLocker CEO Danny Jenkins. These sessions will provide strategic insights on Zero Trust implementation, industry challenges, and innovative cybersecurity practices.One of the key sessions to look forward to is “The Dangers of Shadow IT,” led by Ryan Bowman, VP of Solution Engineering at ThreatLocker. Shadow IT remains a major challenge for organizations striving to implement Zero Trust, as unauthorized applications and devices create vulnerabilities that security teams may not even be aware of. Stay tuned for a pre-event chat with Ryan coming your way soon.Networking, Certification, and MoreZero Trust World isn't just about education—it's also a prime networking opportunity. Attendees can connect during daily happy hours, the welcome and closing receptions, and a comic book-themed afterparty. ThreatLocker is even introducing a new cybersecurity comic book, adding a creative twist to the conference experience.A major highlight is the Cyber Hero Program, which offers attendees a chance to earn certification in Zero Trust principles. By completing the Cyber Hero exam, participants can have the cost of their event ticket fully refunded, making this an invaluable opportunity for those looking to deepen their cybersecurity expertise.A Unique Capture the Flag ChallengeFor those with advanced cybersecurity skills, the Capture the Flag challenge presents an exciting opportunity. The first person to successfully hack a specially designed, custom-painted high-end computer gets to take it home. This competition is expected to draw some of the best security minds in attendance, reinforcing the event's commitment to real-world application of cybersecurity techniques.Join the ConversationWith so much to see and do, Zero Trust World 2025 is shaping up to be an essential event for IT professionals, business leaders, and security practitioners. Sean Martin and Marco Ciappelli will be covering the event live, hosting interviews with speakers, panelists, and attendees to capture insights and takeaways.Whether you're looking to enhance your security knowledge, expand your professional network, or experience hands-on cybersecurity training, Zero Trust World 2025 offers something for everyone. If you're attending, be sure to stop by the podcast area and join the conversation on the future of Zero Trust security.Guest: Kieran Human, Special Projects Engineer, ThreatLocker [@ThreatLocker | On LinkedIn: https://www.linkedin.com/in/kieran-human-5495ab170/Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber] | On ITSPmagazine: https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society Podcast & Audio Signals Podcast | On ITSPmagazine: https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________This Episode's SponsorsThreatLocker: https://itspm.ag/threatlocker-r974____________________________ResourcesLearn more and catch more stories from ZTW 2025 coverage: https://www.itspmagazine.com/zero-trust-world-2025-cybersecurity-and-zero-trust-event-coverage-orlando-floridaRegister for Zero Trust World 2025: https://itspm.ag/threat5mu1____________________________Catch all of our event coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverageTo see and hear more Redefining CyberSecurity content on ITSPmagazine, visit: https://www.itspmagazine.com/redefining-cybersecurity-podcastTo see and hear more Redefining Society stories on ITSPmagazine, visit:https://www.itspmagazine.com/redefining-society-podcastWant to tell your Brand Story Briefing as part of our event coverage? Learn More
Guests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:
Guests:Christine Dewhurst, Partner, NSC TechOn LinkedIn | https://www.linkedin.com/in/christine-dewhurst-262867a9/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#christine-dewhurst-48706Dr. Thomas Lee, CEO, Vivo SecurityOn LinkedIn | https://www.linkedin.com/in/thomas-lee-phd-b7766b10/At Sector | https://www.blackhat.com/sector/2024/briefings/schedule/speakers.html#dr-thomas-lee-48707____________________________Hosts: Sean Martin, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining CyberSecurity Podcast [@RedefiningCyber]On ITSPmagazine | https://www.itspmagazine.com/sean-martinMarco Ciappelli, Co-Founder at ITSPmagazine [@ITSPmagazine] and Host of Redefining Society PodcastOn ITSPmagazine | https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/marco-ciappelli____________________________Episode NotesIn this episode of the On Location with Sean and Marco as part of our coverage of SecTor Information Security Conference in Toronto, Canada, Sean Martin and Marco Ciappelli spoke with notable guests Christine Dewhurst and Dr. Thomas Lee. This episode centers on innovative approaches to assessing an organization's risk related to third-party data breaches. Christine Dewhurst and Dr. Thomas Lee present a compelling new people-centric model for determining an organization's exposure to third-party data breaches.Dr. Lee, who holds a PhD in biophysics and operates in California's Silicon Valley, initially approached cybersecurity from a scientific standpoint. He explains that their research focuses on using empirical regression modeling to quantify and predict data breach probabilities based on staffing levels and certifications. His emphasis is on the importance of having enough trained and certified personnel, which includes CISSPs and CISAs, as key indicators of security posture.Christine Dewhurst, based in Toronto, partners with Dr. Lee in applying these mathematical models in practical scenarios. She underscores the critical role of understanding the workforce's capacity to manage and protect data. Dewhurst explains that their model evaluates five key staffing metrics to predict data breach risks, emphasizing that having the right quantity and quality of staff is crucial for robust security. She highlights their unique approach which differs from traditional methods focusing solely on technical controls.The discussion also touches on the surprising significance of audit certifications (CISA) being equally important as technical security certifications (CISSP). This understanding bridges the gap between cybersecurity practices and business management strategies, providing a holistic overview of enterprise security health based on human resources. Christine Dewhurst and Dr. Thomas Lee offer fresh insights into how organizations can strategically enhance their defenses against third-party data breaches.____________________________This Episode's SponsorsHITRUST: https://itspm.ag/itsphitweb____________________________Follow our SecTor Cybersecurity Conference Toronto 2024 coverage: https://www.itspmagazine.com/sector-cybersecurity-conference-2024-cybersecurity-event-coverage-in-toronto-canadaOn YouTube:
NEWS: Women, Peace and Security conference starts | Oct 28, 2024Subscribe to The Manila Times Channel - https://tmt.ph/YTSubscribeVisit our website at https://www.manilatimes.netFollow us:Facebook - https://tmt.ph/facebookInstagram - https://tmt.ph/instagramTwitter - https://tmt.ph/twitterDailyMotion - https://tmt.ph/dailymotionSubscribe to our Digital Edition - https://tmt.ph/digitalSign up to our newsletters: https://tmt.ph/newslettersCheck out our Podcasts:Spotify - https://tmt.ph/spotifyApple Podcasts - https://tmt.ph/applepodcastsAmazon Music - https://tmt.ph/amazonmusicDeezer: https://tmt.ph/deezerStitcher: https://tmt.ph/stitcherTune In: https://tmt.ph/tunein#TheManilaTimes#KeepUpWithTheTimes Hosted on Acast. See acast.com/privacy for more information.
Biodiversity COP is around the corner. For the first time, the forum will look into how peace and security issues intersect with nature, and we are here for it. To understand the CBD COP process, how peace and security landed in the global biodiversity agenda, and to what to expect from the upcoming gathering of the community in Cali, we spoke with Florian Titze, Senior Policy Advisor for International Biodiversity Policy at WWF. Tune in to prepare for following the discussions around global biodiversity!Related links: BCSC-Cali: Berlin Climate and Security Conference 2024 - Cali Edition Report The Economics of Biodiversity: The Dasgupta Review Catalogue of Nature-based Solutions for Peace and Security
The industry event in September will discuss the best ways to improve Windows' security and avoid another computer crash. Learn more about your ad choices. Visit podcastchoices.com/adchoices
Join us for the 9th Annual Securing Your Place of Worship Online Conference on Tuesday, September 10th! This year, Drew Moldenhauer will guide us through the critical topic of surviving an active shooter situation. We're excited to feature Lt. Col. Dave Grossman and Carl Chinn as keynote speakers. Plus, we've got signed books, free courses, and decision decks to give away! This fully virtual conference brings over 9 hours of expert teaching from 10 presenters right to your screen, wherever you are. Don't miss out—register now: Church Safety and Security Conference
In this episode of the Security Insider podcast, we are looking at the ethical development and deployment of AI in the security space.We all know that AI is set to play a crucial role in the future of not just security but society as a whole. Amongst the many challenges around the development of AI, are things like ensuring that privacy, transparency, security, and fairness are paramount in any discussion and development. To help us better understand these issues, we are speaking with Philip Meyer. Philip is a Technology Strategist at Microsoft, where he has worked for over 30 years. He helps Microsoft Partners build solutions and services for various sectors using Microsoft's wide range of products and technologies. His main areas of expertise are Migration to the Cloud, Hybrid Cloud implementations, Artificial Intelligence and Security. He has also held roles in Product Marketing, Business Development and Team Management in his career at Microsoft. Philip will be presenting on AI and the way we, as an industry, might better navigate this uncertain future at the upcoming Security Conference being held in Darling Harbour from the 21st to the 23rd of August.
1. Boeing to Purchase Spirit AeroSystems - Shaking Up US Army FLRAA Program.Bell (winner of the FLRAA competition), intends to step away from Spirit AeroSystem as the fuselage provider for the Future Long-Range Assault Aircraft after the Boeing acquisition is finalized.2. Israel PM: Hezbollah Will Pay Heavy Price for Druze Village Rocket Attack. Following the deadly strike, PM Netanyahu spoke to the spiritual leader of Israel's Druze community Sheikh Muafak Tarif, the Prime Minister's Office said, and vowed that Israel would not sit idly by.3. Greece Joins F-35 Joint Strike Fighter Club.Greece has officially signed off on the procurement of 20 x F-35A Joint Strike Fighters, becoming the 19th country to operate the Lockheed Martin-made fifth-generation jet, according to defense minister Nikos Dendias.4. Royal Australian Navy Admiral is concerned about dry dock and port facilities in Western Australia for the AUKUS submarine effort.The military and government needed to “get going” on crucial work to ready Western Australia for AUKUS submarines or risk falling behind, Rear Admiral Wendy Malcolm said at the Indian Ocean Defence and Security Conference.5. US to announce a new Three-Star Joint Force Headquarters in Japan. US Defense Official: "Secretary Austin (US SEC DEF), plans to announce that the United States intends to reorganize US Forces Japan as a Joint Force Headquarters, reporting to the Commander of U.S. INDOPACOM." 6. Latest update (23 July 2024) from the Congressional Research Service on the Navy Medium Landing Ship (LSM) (Previously Light Amphibious Warship [LAW]) Program - Background and Issues for Congress.
I am thrilled to welcome back to Resoundingly Human the 2024 INFORMS President Julie Swann, who is also the A. Doug Allison Distinguished Professor and Department Head of the Edward P. Fitts Department of Industrial and Systems Engineering at North Carolina State University, to share some behind the scenes updates on all that's been happening with INFORMS!
In this 2024 Cloud and Security Conference interview hosted by Aki Anastasiou, BCX Cloud Advisory and Consulting Executive Mpho Mothapo discusses the cutting-edge cloud solutions offered by BCX. Mothapo is a respected entrepreneur and executive in the ICT sector, with extensive experience in business strategy and consulting. In 2019, Mothapo became the Sales Director for Dotcom Software Solutions, before taking a Cloud Advisory and Consulting Executive position at BCX in 2023. In this position, Mothapo plays a pivotal role in the evolution of South Africa's ICT sector. Mothapo begins this interview by highlighting the partnerships BCX has with top cloud providers and explaining how this sets it apart from its competitors. He then discusses the different types of cloud implementations that BCX offers and the purposes they serve. Mothapo expands on this by explaining how BCX uses these cloud implementations to deliver highly specialised and tailored solutions that perfectly fit the needs of their clients — and explains why BCX is the best partner for cloud deployments. Mothapo concludes the interview by giving a teaser of the presentation he will deliver at the 2024 Cloud and Security Conference. The 2024 Cloud and Security Conference takes place on 11 July 2024 at The Venue in Melrose Arch.
In this interview, Dr Nkosi Kumalo, MTN's General Manager of Product and Capability at MTN Business, speaks with Aki Anastasiou about MTN Business's impressive cloud offerings. Dr Kumalo is responsible for driving MTN's product strategy and innovation. Before joining MTN, Dr Kumalo held various leadership positions at Oracle, BCX, and Telkom. Dr Kumalo begins this interview by explaining the benefits of getting your business's cloud solutions from a company like MTN, which also owns its own network infrastructure. He discusses the core cloud solutions offered by MTN Business, noting that its product suite is suitable for businesses of all sizes. Dr Kumalo also explains the importance of forging the right partnerships and how this allows MTN Business to offer superior cloud services. He then covers MTN Business's most popular cybersecurity solutions before explaining the power of MTN Business's capability to deliver bespoke solutions to businesses of all sizes. Dr Kumalo concludes the interview by giving viewers a teaser before his presentation at the Cloud and Security Conference 2024. Learn more about this year's Cloud and Security Conference: https://cloudconference.co.za/
Australian Defence Minister, Richard Marles, was critical of China's military build-up during his speech at a security conference in Singapore. Marles later met with his Chinese counterpart to raise his concerns face-to-face. The Shangri-La Dialogue has continued over the weekend, with Ukrainian President Volodymyr Zelenskyy is expected to speak on Sunday. Australian Correspondent Murray Olds told Tim Beveridge “China has become more and more aggressive – publicly aggressive.” Olds said China has apparently been pumping potentially deadly underwater sonar waves to hit Australian divers in international waters. LISTEN ABOVE. See omnystudio.com/listener for privacy information.
In this interview with Aki Anastasiou, Cipherwave CEO Shamith Maharaj discusses Cipherwave's partnership with OADC to deliver cloud services through its data centres. Maharaj has extensive knowledge in project management, network design, network activations, network operations, network management, IT management, and service assurance. He previously worked at CMC Networks for over 14 years, serving as the Head of NOC (Network Operations Centre) and Service Assurance, and then as the Vice President of Global Network Operations. Maharaj begins this interview by discussing Cipherwave's main cloud services and the importance of partnering with OADC to deliver these cloud services using OADC's data centres. He then explains the key benefits of this partnership, including world-class security, an extensive network of data centre infrastructure, and fantastic power rates. Maharaj also discusses the cloud technologies and trends that Cipherwave is keeping an eye on for the future. He concludes the interview by giving viewers a sneak peek at the presentation he will give at the 2024 Cloud and Security Conference.
PEBCAK Podcast: Information Security News by Some All Around Good People
Welcome to this week's episode of the PEBCAK Podcast! We've got four amazing stories this week so sit back, relax, and keep being awesome! Be sure to stick around for our Dad Joke of the Week. (DJOW) Follow us on Instagram @pebcakpodcast RSAC 2024 wrap up https://www.cnet.com/tech/services-and-software/generative-ai-muddies-the-election-2024-outlook-and-voters-are-worried/ https://siliconangle.com/2024/05/11/rsa-conference-2024-goes-beyond-ai-powered-security-securing-ai/ Leader of LockBit ransomware gang revealed https://krebsonsecurity.com/2024/05/u-s-charges-russian-man-as-boss-of-lockbit-ransomware-group/ https://x.com/NCA_UK/status/1789566462975226004 Microsoft launches ChatGPT for spies https://arstechnica.com/information-technology/2024/05/microsoft-launches-ai-chatbot-for-spies/ https://www.bloomberg.com/news/articles/2024-05-07/microsoft-creates-top-secret-generative-ai-service-for-us-spies National teacher and nurses appreciation week https://nationaltoday.com/teacher-appreciation-week/ https://www.yahoo.com/lifestyle/national-nurses-week-2024-rn-105004648.html Find the hosts on LinkedIn: Chris - https://www.linkedin.com/in/chlouie/ Brian - https://www.linkedin.com/in/briandeitch-sase/ Glenn - https://www.linkedin.com/in/glennmedina/
Guests: Umesh Shankar, Distinguished Engineer, Chief Technologist for Google Cloud Security Scott Coull, Head of Data Science Research, Google Cloud Security Topics: What does it mean to “teach AI security”? How did we make SecLM? And also: why did we make SecLM? What can “security trained LLM” do better vs regular LLM? Does making it better at security make it worse at other things that we care about? What can a security team do with it today? What are the “starter use cases” for SecLM? What has been the feedback so far in terms of impact - both from practitioners but also from team leaders? Are we seeing the limits of LLMs for our use cases? Is the “LLM is not magic” finally dawning? Resources: “How to tackle security tasks and workflows with generative AI” (Google Cloud Next 2024 session on SecLM) EP136 Next 2023 Special: Building AI-powered Security Tools - How Do We Do It? EP144 LLMs: A Double-Edged Sword for Cloud Security? Weighing the Benefits and Risks of Large Language Models Supercharging security with generative AI Secure, Empower, Advance: How AI Can Reverse the Defender's Dilemma? Considerations for Evaluating Large Language Models for Cybersecurity Tasks Introducing Google's Secure AI Framework Deep Learning Security and Privacy Workshop Security Architectures for Generative AI Systems ACM Workshop on Artificial Intelligence and Security Conference on Applied Machine Learning in Information Security
Getrackte Wildtiere - Die überraschende Biografie einer Wandergazelle / Projekt Icarus - Tierbeobachtung aus dem All / Cyber Security Conference - Von der Mobilmachung der IT-Industrie.
Welchering, Peterwww.deutschlandfunk.de, Forschung aktuell
A round-up of the main headlines in Sweden on January 8th 2024. You can hear more reports on our homepage www.radiosweden.se, or in the app Sveriges Radio Play. Presenter: Babak ParhamProducer: Kris Boswell
In this episode, Mark Ledlow and guest Tim Wenzel dive into the importance of leading with kindness and building authentic connections in the security industry. They share their experiences from a recent conference, GSX, where they witnessed a transformative culture of collaboration, friendship, and trust. They discuss the significance of recognizing our common humanity, forgiving past grievances, and embracing the power of relationships in business. Mark and Tim explore how to create a culture of kindness within organizations and offer practical insights for both personal and professional growth.Learn about all this and more in this episode of The Fearless Mindset Podcast.KEY TAKEAWAYSBuilding genuine relationships and trust is paramount in the security industry.Forgiveness and letting go of grudges can open the door to fruitful connections.The power of in-person connections and face-to-face meetings cannot be underestimated.Embrace the philosophy of "leading with kindness" by recognizing our common humanity.Everyone has aspirations and occasionally falls short—plan for disappointment and be understanding.QUOTES"Trust is earned, and friendship is earned. Then the business comes as a side effect." - Mark Ledlow"Recognizing our common humanity is understanding that we all have aspirations and we all occasionally fall short of them." - Tim WenzelGet to know more about Tim:LinkedIn: https://www.linkedin.com/in/relevant-perception/Website: https://www.owninglifestories.com/To hear more episodes of The Fearless Mindset podcast, you can go to https://the-fearless-mindset.simplecast.com/ or listen to major podcasting platforms such as Apple, Google Podcasts, Spotify, etc. You can also subscribe to the Fearless Mindset YouTube Channel to watch episodes on video.
Chinese Defense Minister Li Shangfu has addressed the annual Moscow Conference on International Security, reaffirming China's commitment to global security.
Get ready to unlock the thrills and chills of Defcon, the world's largest security conference. I promise to give you an insider's look at this exhilarating event, filled with expert talks that range from AI models cracking safes to taking over vehicles on the highway. And if you've ever wondered how to network like a pro, prepare to enter the exciting world of LineCon, where you can rub elbows with bug bounty hunters and malware reverse engineers. Plus, I'll be revealing how you can score an exclusive security unfiltered sticker if you spot me at the event!Navigating Defcon can be as tricky as hacking a complex system, but fear not, I've got the best strategies for you, from note-taking during expert talks, exploring the various villages, to even sneaking into invite-only parties. But remember, with great power comes great responsibility – and that includes taking charge of your personal security. I'll shed light on the risks associated with bringing personal devices to the event and how you can protect yourself. And believe me, as someone who's been there, I'll share the must-know tips and my personal tales of the unforgettable Defcon experiences. So gear up, subscribe, and get ready to infiltrate the exciting world of Defcon!AVL's Reimagine Mobility PodcastOur podcast balances general mobility topics with technical deep dives. We invite you...Listen on: Apple Podcasts SpotifySupport the showAffiliate Links:NordVPN: https://go.nordvpn.net/aff_c?offer_id=15&aff_id=87753&url_id=902 Follow the Podcast on Social Media!Instagram: https://www.instagram.com/secunfpodcast/Twitter: https://twitter.com/SecUnfPodcastPatreon: https://www.patreon.com/SecurityUnfilteredPodcastYouTube: https://www.youtube.com/@securityunfilteredpodcastTikTok: Not today China! Not today
This episode, listen to guests Matt Benyo, Matt Woodruff and Jaron Bradley to discuss the latest in how Jamf is helping customers in the security landscape as well as unpack what they presented on and learned at the RSA security conference. Then, hear from Sr. Director of Product Marketing, Jen Kaplan to further hear more about the Jamf Spring Event. Jen elaborates on Jamf Safe Internet and Trusted Access.
Hugh covers the news of the morning with news clips and talks with Salena Zito, Jake Sherman, Josh Kraushaar, and Robert C. O'Brien.See omnystudio.com/listener for privacy information.
A special Nolan Investigation.
Welchering, Peterwww.deutschlandfunk.de, Forschung aktuellDirekter Link zur Audiodatei
Taylor V. stops by as we recap DEF CON 30 out in Las Vegas. There was a lot of ground to cover, so check out the show notes for some of this episode's main talking points including some of our favorite villages. Show Notes0:00 Intro1:30 Line Con2:20 Badge life4:20 Favorite Village 8:00 Conference networking12:00 Badge life of the party18:05 Merch Life23:21 OSINT Challenge27:25 Black Girls Hack28:25 Hotel Advice30:00 Girls Hack Village32:00 Conference Tips
Guest: Greg Mills | Director at Brenthurst FoundationSee omnystudio.com/listener for privacy information.
Join the Church Safety Guys as they talk about best practices for your church or place of worship! Special Guest: Chuck Chadwick Get tickets for the Conference Here: https://nocssm.org/.../conferences.../2022-conference/ For more resources and great information, visit- ChurchSafetyGuys.com Download our free- Church Security App @ ChurchSecurityApp.com. #NOCSSM #ChuckChadwick #churchsecurity #churchsafety #churchleadership #church #churchonline #semperdisciplina #csg #churchleaders
Join the Church Safety Guys as they talk about best practices for your church or place of worship! Special Guest: Chuck Chadwick Get tickets for the Conference Here: https://nocssm.org/.../conferences.../2022-conference/ For more resources and great information, visit- ChurchSafetyGuys.com Download our free- Church Security App @ ChurchSecurityApp.com. #NOCSSM #ChuckChadwick #churchsecurity #churchsafety #churchleadership #church #churchonline #semperdisciplina #csg #churchleaders
Join the Church Safety Guys as they talk about best practices for your church or place of worship! Special Guest: Chuck Chadwick Get tickets for the Conference Here: https://nocssm.org/.../conferences.../2022-conference/ For more resources and great information, visit- ChurchSafetyGuys.com Download our free- Church Security App @ ChurchSecurityApp.com. #NOCSSM #ChuckChadwick #churchsecurity #churchsafety #churchleadership #church #churchonline #semperdisciplina #csg #churchleaders --- Support this podcast: https://anchor.fm/churchsafetyandsecurity/support
Today on the Naturally Inspired Daily Tammy Talks About: Munich Security Conference Predicted Monkeypox Outbreak To Start May 15, 2022. Belgium Quarantines
All links and images for this episode can be found on CISO Series Are security conferences really helpful in advising you on making your business more secure, or are they just adding more worries to your plate that aren't actually going to be threats your business is going to have to face? This week's episode is hosted by me, David Spark (@dspark), producer of CISO Series and Andy Ellis (@csoandy), operating partner, YL Ventures. Our guest is Jason Witty, CSO, USAA. Thanks to our podcast sponsor, CyCognito By understanding risks, attacks, and behaviors from attack surface management data, CyCognito visualizes the pathways attackers will take to exploit your network enabling you the ability to see, understand and eradicate the threat. CyCognito is the only cyber risk intelligence platform that visualizes the attackers paths into your network. In this episode: What is the board's risk appetite? Is attending conferences helpful? What can security vendors do to help with board-level communications?
This Security News segment will include a discussion with OSHEAN CEO David Marble about the upcoming Security Conference to be held at Bryant University on March 15th. This week in the Security News: Dirty pipes, UEFI firmware flaws, strange social engineering, command Amazon devices to hack themselves, TLStorms, article 45.2 and why its a bad idea, misconfiguration leads to compromise, 10 signs of a poor leader, when power supplies attack, attacking SATCOMs, and the campus master key Segment Resources: https://www.oshean.org/events/EventDetails.aspx?id=1589105&group= Visit https://www.securityweekly.com/psw for all the latest episodes! Show Notes: https://securityweekly.com/psw731
Join the Church Safety Guys as they talk about creating and casting vision for your church security team! www.churchsafetyguys.com www.churchsecurityessentials.info for tickets for the Security Conference in October 2nd, 2021- Columbus Ohio.