show episodes
 
Welcome to the Opkalla IT Matters Podcast, where we discuss the important matters within IT as well as the importance of IT across different industries and responsibilities. About Opkalla: Opkalla helps their clients navigate the confusion in the technology marketplace and choose the technology solutions that are right for their business. They work alongside IT teams to design, procure, implement and support the most complex IT solutions without an agenda or technology bias. Opkalla was foun ...
  continue reading
 
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
  continue reading
 
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
  continue reading
 
Artwork

1
Cybertraps Podcast

Frederick Lane & Jethro Jones

Unsubscribe
Unsubscribe
Monthly+
 
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
  continue reading
 
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
  continue reading
 
Loading …
show series
 
Cybersecurity risks aren’t just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division’s Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI’s work developing Computer Security Incident R…
  continue reading
 
Creating Phone Free Spaces with Yondr Vital in an education setting to experience what life is like without a phone How you develop character through whether you’re using a phone or not. How to help teachers not be phone police. Support throughout the whole process Common complaints about schools Resetting expectations about structures School takin…
  continue reading
 
Developers know that static analysis helps make code more secure. However, static analysis tools often produce a large number of false positives, hindering their usefulness. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), David Svoboda, a software security engineer in the SEI’s CERT Division, discusses Rede…
  continue reading
 
In this episode of the IT Matters podcast, host Keith Hawkey delves into the complexities of change management with Meridith Fix, the former CIO of Lendlease. Meridith shares her extensive experience and unique perspectives on how organizations can successfully navigate technology changes from a human-centric approach. Conversation Highlights: [00:…
  continue reading
 
Not all paths to cybersecurity careers look the same. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Randy Trzeciak, deputy director of cyber risk and resilience in the SEI’s CERT division, discusses his career journey, resources for pursuing a career in cybersecurity, and the importance of building a dive…
  continue reading
 
In this episode, Keith is joined by Darrell Stinson, VP of IT & Security at Cohere Health, a software startup in the healthcare space. Darrell and Keith dive into a strategy for building and implementing security compliance plans for startups. Conversation Highlights: [00:39] Introducing our guest, Darrell Stinson [03:37] Darrell's journey with sta…
  continue reading
 
Sam Procter started out studying computer science at the University of Nebraska, but he didn’t love it. It wasn’t until he took his first software engineering course that he knew he’d found his career path. In this podcast from the Carnegie Mellon University Software Engineering Institute, Sam Procter discusses the early influences that shaped his …
  continue reading
 
In this episode, Keith is joined by Chintan Patel, Chief Information Officer at National DCP, a supply chain management company serving the franchisees of Dunkin'. Chintan delves into the hurdles and opportunities she encounters in the logistics industry, highlighting the role of technology in overcoming these obstacles. Conversation Highlights: [0…
  continue reading
 
In this episode, Keith and special guest Jesse are joined by Anthony Kent, VP of Information Technology at Four County EMC, an electric membership cooperative in North Carolina. Anthony shares insights into the technological advancements and challenges faced by electric cooperatives, particularly focusing on the integration of new technologies and …
  continue reading
 
With the increasing complexity of software systems, the use of third-party components has become a widespread practice. Cyber disruptions, such as SolarWinds and Log4j, demonstrate the harm that can occur when organizations fail to manage third-party components in their software systems. In this podcast from the Carnegie Mellon University Software …
  continue reading
 
What are Zero Trust, SSE, and SASE Zero Trust - everything behind it was trusted in the past, now we think everything is untrustworthy. Poor handling of data by vendors SASE - Secure Access Service Edge - a framework that combines network security functions with WAN capabilities to support the dynamic, secure access needs of organizations. It is pa…
  continue reading
 
Dan Brown from the Cybersecurity and Infrastructure Security Agency provides an in-depth technical discussion on email cybersecurity, focusing on SPF, DKIM, and DMARC protocols. The presentation includes practical examples, configurations, tools for checking email security, and upcoming changes in email authentication requirements. We’re thrilled t…
  continue reading
 
William MacMillan serves as the Chief Product Officer at Red Cell Partners, an incubation firm building rapidly-scalable technology-led companies. After nearly two decades of military service, he transitioned into the role of Chief Information Security Officer at the CIA, safeguarding our nation against cyber threats. In this episode, we discuss th…
  continue reading
 
Across the globe, women account for less than 30 percent of professionals in technical fields. That number drops to 22 percent in the field of Artificial Intelligence (AI). In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Violet Turri, a software developer in the SEI’s AI Division, discusses the evolution of…
  continue reading
 
Brennan Manion serves as a Senior Account Executive at Red Canary, a Managed Detection Response service providing 24/7/365 protection for their customers. Through Red Canary's innovative approach, which integrates AI and human expertise, organizations can effectively mitigate cyber threats while minimizing false positives, providing peace of mind i…
  continue reading
 
In this episode of the Cybertraps podcast, host Jethro Jones discusses the crucial topic of working with managed service providers (MSPs) and outside cyber services. Featuring a session from the Inch 360 conference in Spokane, Washington, the conversation dives deep into the value of cybersecurity measures, the challenges businesses face, and the b…
  continue reading
 
In this special live edition of the Cybertraps podcast recorded at the Inch360 event in Spokane, Washington, Jethro Jones interviews John Hansman, the CEO of Truit. They discuss Truit's role as a managed service provider with a focus on cybersecurity, the challenges and advantages for businesses using MSPs, and the importance of proactive cybersecu…
  continue reading
 
In this special edition of the Cybertrops podcast, recorded at the Inch360 event on Gonzaga University’s campus in Spokane, Washington, Jethro Jones interviews Bryan Yamanaka, CEO and founder of Arkangelos. They discuss Bryan's transition from Seattle to Spokane, his perspectives on the local tech community, and the services his company provides fo…
  continue reading
 
At the request of the White House, the Office of the Director of National Intelligence (ODNI) began exploring use cases for large language models (LLMs) within the Intelligence Community (IC). As part of this effort, ODNI sponsored the Mayflower Project at Carnegie Mellon University’s Software Engineering Institute (SEI) from May 2023 through Septe…
  continue reading
 
Todd Capriotti serves as the Chief Information Officer of Wahiawa General Hospital, a community-owned, non-profit hospital serving Central Oahu and Oahu's North Shore. Hand-picked as the first-ever CIO for Wahiawa, Todd pioneered a comprehensive transformation strategy, reversing a 5+ year negative trend of delivery outages and service interruption…
  continue reading
 
Modern software engineering practices of Agile and DevSecOps have provided a foundation for producing working software products faster and more reliably than ever before. Far too often, however, these practices do not address the non-software concerns of business mission and capability delivery even though these concerns are critical to the success…
  continue reading
 
In this episode of the Cybertraps podcast, host Jethro Jones leads an expert panel discussion on the aftermath of cyber breaches. Panelists share insights on preparation, incident response, and long-term strategies for recovery and prevention. The conversation includes first-hand accounts, practical tips, and the importance of training and communic…
  continue reading
 
The Zero Trust Data Pillar is a critical component of the Department of Defense's (DoD) Zero Trust Strategy, which aims to enhance cybersecurity and protect sensitive information. The Data Pillar focuses on securing and safeguarding data by implementing a Zero Trust approach. This approach assumes that no user or asset can be trusted by default, an…
  continue reading
 
Increasingly in government acquisition of software-intensive systems, we are seeing programs using Agile development methodology and earned value management. While there are many benefits to using both Agile and EVM, there are important considerations that software program managers must first address. In this podcast, Patrick Place, a senior engine…
  continue reading
 
In this episode of the Cybertraps podcast, host Jethro Jones interviews Dominic Booker at the Inch360 event. Dominic discusses his journey into the IT and cybersecurity fields, his motivations for attending the event, and the importance of both digital and physical security. The conversation provides insights into building community in tech, mentor…
  continue reading
 
Kristopher Moniz serves as the National Data & Analytics Lead for Centric Consulting, an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. Kristopher's focus is helping his clients tackle their Data & Analytics challenges, specifi…
  continue reading
 
This episode of Cybertraps features an insightful panel discussion from the Inch360 conference held in Spokane, Washington, focusing on the latest trends and challenges in cloud security and systems architecture. Topics include: Cloud security issues Integration Reactive to proactive Effective practices in an evolving landscape. We’re thrilled to b…
  continue reading
 
As developers continue to build greater autonomy into cyber-physical systems (CPSs), such as unmanned aerial vehicles (UAVs) and automobiles, these systems aggregate data from an increasing number of sensors. However, more sensors not only create more data and more precise data, but they require a complex architecture to correctly transfer and proc…
  continue reading
 
In this special edition of the Cybertraps podcast, recorded live at the Inch360 event in Spokane, Washington, Jethro Jones interviews Shawn Hafen from Spokane Teachers Credit Union (STCU). They discuss Shawn's role in managing STCU's cybersecurity team, the importance of local cybersecurity events, strategies for small businesses to enhance cyberse…
  continue reading
 
Explore the dynamic realm of internal audits, revealing the transformative power of automation with MS Power Platform and Power BI. From ISO certifications to the critical role of CAPA systems, our subject matter experts provide a concise, yet comprehensive, look at how Authority Partners elevates audit processes for enhanced efficiency and client …
  continue reading
 
Matt Huffman serves as the Information Technology Manager for Reinders, Inc, one of the Midwest’s largest full-service distributors of products to the commercial green industry. Matt has both administrated cybersecurity audits during his tenure at Wipfli and navigated them on the customer side. Through the years of seeing both ends, he developed a …
  continue reading
 
In this special live edition of the Cybertraps podcast, Jethro Jones talks with Nick Mirizzi at the Inch360 event at Gonzaga University. The discussion covers Nick's background in high tech and cybersecurity, the evolution of cloud security, the importance of outsourcing cybersecurity for small to mid-sized businesses, and the growing talent gap in…
  continue reading
 
In this episode of the Cybertraps podcast, host Jethro Jones sits down with Pia Hallenberg at the INCH360 event at Gonzaga University in Spokane, Washington. Pia discusses her transition from a 20-year career in journalism to becoming a cybersecurity writer, the challenges and rewards of the profession, and the significance of the dark web in today…
  continue reading
 
In this episode of the Cybertraps podcast, host Jethro Jones introduces a session from the Inch 360 Conference in Spokane, Washington. Heather Stratford, founder and CEO of DRIP7, discusses the latest trends in security awareness training and the continuing importance of addressing cybersecurity as a people issue. With compelling statistics and eng…
  continue reading
 
Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click submit! Let us know what kind of content you …
  continue reading
 
Implementing an Organizational Multi-Factor Authentication and Identity Provider Solution with Microsoft Entra ID, Yubico, and KeyFactor Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3…
  continue reading
 
Where Automation Meets Security: Episode 2 Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click su…
  continue reading
 
This episode of the Cybertraps Podcast is a special live event edition from the Inch 360 conference in Spokane, Washington. Host Jethro Jones interviews Peter Gregory from GCI, discussing GCI's support for community initiatives, Peter's role in cybersecurity, his insights from the conference, and essential tips for maintaining good cyber hygiene. W…
  continue reading
 
In this special edition of the Cybertraps podcast, Jethro Jones interviews Matt Porter, the founder and Chief Solutions Officer at AmorFati Labs, live at the Inch360 event in Spokane, Washington. Matt shares his background as a former intelligence officer and discusses his transition to starting AmorFati Labs, a deep tech studio focused on holistic…
  continue reading
 
This special edition of the Cybertraps podcast features an engaging conversation with Naci Seyhanli, IT Security Analyst at the Spokane Regional Health District. Hosted by Jethro Jones, the episode dives into the unique challenges and approaches to cybersecurity within a public health institution, the importance of staff education, and the value of…
  continue reading
 
On this episode of the IT Matters Podcast, Keith Hawkey and Becca Black discuss the nuances of Technology Advisory. Becca reflects on her journey into the IT world, the significance of authentic relationships, and the importance of effective communication. Tune in for a candid discussion on building connections and achieving success in the IT realm…
  continue reading
 
To better understand the potential uses of large language models (LLMs) and their impact, a team of researchers at the Carnegie Mellon University Software Engineering Institute CERT Division conducted four in-depth case studies. The case studies span multiple domains and call for vastly different capabilities. In this podcast, Matthew Walsh, a seni…
  continue reading
 
Loading …

Quick Reference Guide