Resumen del Editor

Founded in 2015, ITSPmagazine began as a vision for a publication positioned at the critical intersection of technology, cybersecurity, and society. What started as a written publication has evolved into a comprehensive repository for all their content—podcasts, articles, event coverage, interviews, videos, panels, and everything they create. This is where Sean Martin and Marco Ciappelli talk about cybersecurity, technology, society, music, storytelling, branding, conference coverage, and whatever else catches their attention. Over a decade of conversations exploring how these worlds collide, influence each other, and shape the human experience. This is where you'll find it all.
© Copyright 2015-2026 ITSPmagazine, Inc. All Rights Reserved
Episodios
  • Beyond the Noise: A Senior Forrester Analyst’s Take on Securing GenAI at RSAC 2026
    Mar 28 2026

    Is the cybersecurity industry just "agent-washing" its marketing, or are we on the verge of a revolutionary shift in how CISOs manage risk? Join Madelein van der Hout (Senior Analyst at Forrester), Marco Ciappelli, and Sean Martin as they record live from the RSA Conference to cut through the GenAI noise.

    Key Discussion Points:

    The CISO Challenge: Why security leaders are struggling to define their roles for the next five years.

    Agentic Behavior: The risks of AI agents attempting to bypass security controls to "find a way" to complete tasks.

    AI vs. AI: Exploring the concept of a "cybersecurity autoimmune disease" where defensive and offensive AI clash.

    Regulation as an Enabler: Why the EU AI Act and digital safety rules should be viewed as "brakes" that allow organizations to go faster, not slower.

    The Missing Link: Why discovery and identity are the most overlooked aspects of the agentic age.

    Chapters:

    0:00 - Live from RSA Conference San Francisco

    1:03 - The impossible task of the modern CISO

    2:26 - Why there were no "puppies" at RSAC this year

    4:14 - Cutting through the GenAI marketing noise

    5:51 - Upskilling vs. reskilling for an AI workforce

    7:50 - The need for "Discovery" in AI agents

    11:39 - Budgeting: Securing AI within the AI budget

    13:24 - Stop treating AI like it's "mysterious" software

    15:42 - Regulation: The EU AI Act and "Brakes" for innovation

    18:19 - AI Horror Stories: Agents gone rogue?

    23:00 - The Cybersecurity Autoimmune Disease theory

    Suggested Tags

    Broad Tags: Cybersecurity, InfoSec, Artificial Intelligence, GenAI, AI Agents, RSA Conference, RSAC 2026.

    Specific Tags: Forrester Research, Madelein van der Hout, CISO strategy, EU AI Act, AI regulation, Agentic AI, AI security risks, Cybersecurity marketing, Tech regulation.

    Next Step: Would you like me to generate a high-impact thumbnail concept or a few community post blurbs to promote the video once it's live?


    Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.

    Más Menos
    35 m
  • Order of Operations: The Foundation Risk Healthcare AI Is Running Past | Lens Four by Sean Martin | Read by TAPE9
    Mar 22 2026
    Healthcare's AI ambition and its data infrastructure are moving at different speeds. In this edition of Lens Four, Sean Martin examines what happens when those speeds collide — and who is accountable when the sequence is wrong. 🔍 In this episode: 82% of health systems have limited or no AI governance in place, while deployments proceed — Digital Medicine Society58% of frontline clinical staff are using unsanctioned AI tools — not out of recklessness, but because approved alternatives don't exist — Wolters KluwerThe vendor trust gap: trusted vendors are shipping AI capabilities into integrated products after contracts are signed, after integrations are built, after due diligence has closed — and most health systems have no mechanism to detect itJason Kor of HITRUST on what procurement processes aren't built to catch — recorded for the Redefining CyberSecurity PodcastThe Stryker attack: a nation-state operation that disrupted hospitals through their supplier — not their own systemsRyan Patrick of HITRUST on why availability of services now sits in the same risk tier as confidentiality of dataWho actually owns the patient's data — the provider, the insurer, the vendor, the device manufacturer, the government program, or the patient?TEFCA — the Trusted Exchange Framework and Common Agreement — moves data nationally across eleven Qualified Health Information Networks. It does not move the ownership rights with itThe CMS agenda: $1.7 trillion, 160 million Americans, and a policy clock that does not wait for the identity infrastructure to catch upThe vocabulary of transformation — what "pilot to production" and "scale" are selecting for, and what they are leaving outZero Trust reframed as the infrastructure condition that makes trustworthy AI deployment possible — not just a ransomware defense Fourth Lens: Healthcare's AI ambition and its data infrastructure are moving at different speeds — and the patient is where those speeds collide. The program layer is making sequence choices. The market layer is accelerating pressure. The messaging layer is optimizing for ambition. None of it is an argument against innovation. All of it is an argument for discipline — A-to-Z, every dependency, ambiguity, and fragility along the way. 🎙️ Podcast conversations referenced in this article: Jason Kor, HITRUST — Brand SpotlightRyan Patrick, HITRUST — HIMSS Recap 🔗 Full article and references: seanmartin.com/lens-four 🌐 HIMSS26 coverage: itspmagazine.com Sean Martin is a cybersecurity market analyst, content strategist, and advisor with 30+ years across engineering, product development, marketing, and media. Co-founder of ITSPmagazine and Studio C60, host of the Redefining CyberSecurity Podcast and the Music Evolves Podcast. Connect at seanmartin.com. Subscribe to Lens Four — Where business, innovation, and messaging come into focus. 🎯 Keywords: healthcare AI governance, order of operations AI, data foundation healthcare, vendor trust gap, patient data ownership, TEFCA, health information exchange, QHINs, Shadow AI healthcare, third-party risk management, supply chain resilience healthcare, Zero Trust healthcare, CMS interoperability framework, CIA triad healthcare, data integrity AI, identity management healthcare, HITRUST, Jason Kor, Ryan Patrick, Wolters Kluwer, Digital Medicine Society, DiMe, Google for Health, Jon McNeill, John Halamka, Mayo Clinic Platform, Sumbul Ahmad Desai, Apple Health, Daymond John, Dr. Mehmet Oz, Amy Gleason, Kim Brandt, DOGE healthcare, Stryker cyberattack, nation-state healthcare attack, HIMSS26, Redefining CyberSecurity Podcast, Lens Four, Sean Martin, ITSPmagazine Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
    Más Menos
    20 m
  • When AI Touches Everything: Operationalizing the Five Most Dangerous New Attack Techniques at RSAC 2026 | A Redefining CyberSecurity Podcast Conversation with Ed Skoudis, President of SANS Technology Institute and Founder & CEO of Counter Hack
    Mar 20 2026
    Show Notes For ten years, Ed Skoudis has curated one of the most anticipated sessions at RSAC Conference: SANS' "Five Most Dangerous New Attack Techniques: Crucial Tips for Defenders." The session has always been a hit -- standing room only on the main stage -- but this year, Ed says something has changed. Not one or two topics with an AI component. All five. Ed is deliberate about how the session comes together. He starts with people, not topics. He builds the panel around SANS instructors who bring front-line insight, and he starts the process six months out. This year's panel features returning panelist Heather Mahalik, Rob Teeley back for his second year, Joshua Wright in his second year -- this time carrying two topics and eight minutes instead of six -- and, making his first appearance on this stage, Robert M. Lee of Dragos, one of the world's foremost voices on ICS and OT security. The addition of "Crucial Tips for Defenders" to the title this year was intentional. Ed pushed every panelist to move beyond naming threats and toward prescribing action -- practical, implementable steps that a CISO can hand down and a practitioner can execute the next morning. For topics where prevention is impossible, the mandate shifted to detection and response. SANS publishes session notes to their website within minutes of the talk ending. The backdrop this year is a warning Ed calls unlike anything in his 30 years of attending RSA and DEF CON. At a recent AI cybersecurity conference in San Francisco, presenters from Google and Anthropic outlined what Google termed the "vuln apocalypse" -- an imminent surge in AI-discovered zero-day vulnerabilities at a scale and pace that patching pipelines are not designed to handle. Ed's own team at Counter Hack has already experienced this firsthand: a frontier AI model identified a critical zero-day in a widely used open source project in a matter of hours. The Anthropic presenter's claim was blunt: within months, AI will surpass all human vulnerability researchers combined. All of this lands at the center of what the RSAC session is designed to address -- not as a theoretical exercise, but as a set of actions defenders can take right now. The session runs Tuesday, March 24th at 3:55 PM on the main stage, with an interactive follow-on session Wednesday morning where attendees can go deeper with individual panelists. For anyone who wants to understand where the threat landscape is actually heading and what to do about it, Ed says this is the year you cannot afford to miss it. Guest Ed Skoudis, President, SANS Technology Institute; Founder & CEO, Counter Hack | On LinkedIn: https://www.linkedin.com/in/edskoudis Host Sean Martin, Co-Founder at ITSPmagazine, Studio C60, and Host of Redefining CyberSecurity Podcast & Music Evolves Podcast | Website: https://www.seanmartin.com/ Resources SANS Institute | https://www.sans.org RSA Conference 2026 is taking place April 28 - May 1, 2026 | Moscone Center, San Francisco -- Follow our coverage: https://www.itspmagazine.com/rsac-2026-conference-san-francisco-usa-cybersecurity-event-infosec-conference-coverage The Future of Cybersecurity Newsletter | https://www.linkedin.com/newsletters/7108625890296614912/ More Redefining CyberSecurity Podcast episodes | https://www.seanmartin.com/redefining-cybersecurity-podcast Redefining CyberSecurity Podcast on YouTube | https://www.youtube.com/playlist?list=PLnYu0psdcllS9aVGdiakVss9u7xgYDKYq Keywords ed skoudis, sean martin, sans institute, sans technology institute, counter hack, rsac 2026, rsa conference, five most dangerous attack techniques, ai in cybersecurity, vulnerability research, zero-day vulnerabilities, patch management, penetration testing, defender tips, ics security, ai-powered attacks, redefining cybersecurity, cybersecurity podcast, redefining cybersecurity podcast Hosted by Simplecast, an AdsWizz company. See pcm.adswizz.com for information about our collection and use of personal data for advertising.
    Más Menos
    25 m
Todavía no hay opiniones