Where Automation Meets Security
…
continue reading
Welcome to the Opkalla IT Matters Podcast, where we discuss the important matters within IT as well as the importance of IT across different industries and responsibilities. About Opkalla: Opkalla helps their clients navigate the confusion in the technology marketplace and choose the technology solutions that are right for their business. They work alongside IT teams to design, procure, implement and support the most complex IT solutions without an agenda or technology bias. Opkalla was foun ...
…
continue reading
Breaking Cyber Barriers dives deep into the world of Cybersecurity, uncovering trends and exploring its limitless potential. Join host Liz Vagenas as she speaks with top leaders about the current challenges and opportunities within the industry, as well as strategies for success.
…
continue reading
The TOF® Biosphere is a privacy focused platform. It accommodates real-world, event driven accounting in DLT and location free use of fiat or cryptocurrencies during legally compliant contractual based engagements. Users define and exchange on their own, trusted terms.
…
continue reading
We explore the risks arising from the use and misuse of digital devices and electronic communication tools. We interview experts in the fields of cybersafety, cybersecurity, privacy, parenting, and technology and share the wisdom of these experts with you!
…
continue reading
1
Software Engineering Institute (SEI) Podcast Series
Members of Technical Staff at the Software Engineering Institute
The SEI Podcast Series presents conversations in software engineering, cybersecurity, and future technologies.
…
continue reading
OK, everyone knows that #APKnowsIT. Our global team of 500+ geeks, who work globally on five continents, across 30+ countries, are #CreatingExcellence every day. We want to share our excellence with the IT community. We aim to educate, inspire, and motivate IT, professionals, worldwide. Disclaimer: The views expressed in the podcasts are the speaker’s own and do not reflect the view of Authority Partners. ® AP 1998 - 2023
…
continue reading
1
Developing a Global Network of Computer Security Incident Response Teams (CSIRTs)
30:51
30:51
Play later
Play later
Lists
Like
Liked
30:51
Cybersecurity risks aren’t just a national concern. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), the CERT division’s Tracy Bills, senior cybersecurity operations researcher and team lead, and James Lord, security operations technical manager, discuss the SEI’s work developing Computer Security Incident R…
…
continue reading
Creating Phone Free Spaces with Yondr Vital in an education setting to experience what life is like without a phone How you develop character through whether you’re using a phone or not. How to help teachers not be phone police. Support throughout the whole process Common complaints about schools Resetting expectations about structures School takin…
…
continue reading
1
Automated Repair of Static Analysis Alerts
27:05
27:05
Play later
Play later
Lists
Like
Liked
27:05
Developers know that static analysis helps make code more secure. However, static analysis tools often produce a large number of false positives, hindering their usefulness. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), David Svoboda, a software security engineer in the SEI’s CERT Division, discusses Rede…
…
continue reading
1
Navigating Change Management in IT, with Meridith Fix
30:10
30:10
Play later
Play later
Lists
Like
Liked
30:10
In this episode of the IT Matters podcast, host Keith Hawkey delves into the complexities of change management with Meridith Fix, the former CIO of Lendlease. Meridith shares her extensive experience and unique perspectives on how organizations can successfully navigate technology changes from a human-centric approach. Conversation Highlights: [00:…
…
continue reading
Not all paths to cybersecurity careers look the same. In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Randy Trzeciak, deputy director of cyber risk and resilience in the SEI’s CERT division, discusses his career journey, resources for pursuing a career in cybersecurity, and the importance of building a dive…
…
continue reading
1
Building Security Compliance Plans for Startups, with Darrell Stinson
30:53
30:53
Play later
Play later
Lists
Like
Liked
30:53
In this episode, Keith is joined by Darrell Stinson, VP of IT & Security at Cohere Health, a software startup in the healthcare space. Darrell and Keith dive into a strategy for building and implementing security compliance plans for startups. Conversation Highlights: [00:39] Introducing our guest, Darrell Stinson [03:37] Darrell's journey with sta…
…
continue reading
1
Episode VII - AI Machine Learning and New Threats
18:03
18:03
Play later
Play later
Lists
Like
Liked
18:03
Founder and CEO of Nandi Security, Inc., Vikram Venkatasubramian discusses various new threats and AI based attack techniques targeting consumers and individuals.By Liz Vagenas
…
continue reading
Sam Procter started out studying computer science at the University of Nebraska, but he didn’t love it. It wasn’t until he took his first software engineering course that he knew he’d found his career path. In this podcast from the Carnegie Mellon University Software Engineering Institute, Sam Procter discusses the early influences that shaped his …
…
continue reading
1
Challenges and Opportunities of the Logistics Industry, with Chintan Patel
40:02
40:02
Play later
Play later
Lists
Like
Liked
40:02
In this episode, Keith is joined by Chintan Patel, Chief Information Officer at National DCP, a supply chain management company serving the franchisees of Dunkin'. Chintan delves into the hurdles and opportunities she encounters in the logistics industry, highlighting the role of technology in overcoming these obstacles. Conversation Highlights: [0…
…
continue reading
1
Episode VI - Securing the Software Development Lifecycle and Supply Chain
24:07
24:07
Play later
Play later
Lists
Like
Liked
24:07
Scribe Security CEO and co-founder Rubi Arbel will discuss how to tackle the challenges and manage the risks within the software development lifecycle and supply chain.By Liz Vagenas
…
continue reading
1
Technology's Impact on the EMC Industry, with Anthony Kent
37:03
37:03
Play later
Play later
Lists
Like
Liked
37:03
In this episode, Keith and special guest Jesse are joined by Anthony Kent, VP of Information Technology at Four County EMC, an electric membership cooperative in North Carolina. Anthony shares insights into the technological advancements and challenges faced by electric cooperatives, particularly focusing on the integration of new technologies and …
…
continue reading
1
Developing and Using a Software Bill of Materials Framework
37:37
37:37
Play later
Play later
Lists
Like
Liked
37:37
With the increasing complexity of software systems, the use of third-party components has become a widespread practice. Cyber disruptions, such as SolarWinds and Log4j, demonstrate the harm that can occur when organizations fail to manage third-party components in their software systems. In this podcast from the Carnegie Mellon University Software …
…
continue reading
1
Episode V - Data Security and Privacy Today
19:55
19:55
Play later
Play later
Lists
Like
Liked
19:55
Paperclip CRO Chad Walters shares his experience and insights in managing data security and privacy challenges in today's times.By Liz Vagenas
…
continue reading
1
Fortifying our Networks and Keeping Kids and Teachers Safe with Zero Trust, SSE, and SASE with John Spiegel
40:46
40:46
Play later
Play later
Lists
Like
Liked
40:46
What are Zero Trust, SSE, and SASE Zero Trust - everything behind it was trusted in the past, now we think everything is untrustworthy. Poor handling of data by vendors SASE - Secure Access Service Edge - a framework that combines network security functions with WAN capabilities to support the dynamic, secure access needs of organizations. It is pa…
…
continue reading
1
INCH360 Panel: Dan Brown: Email Cybersecurity - Lab Environment DMARC
22:54
22:54
Play later
Play later
Lists
Like
Liked
22:54
Dan Brown from the Cybersecurity and Infrastructure Security Agency provides an in-depth technical discussion on email cybersecurity, focusing on SPF, DKIM, and DMARC protocols. The presentation includes practical examples, configurations, tools for checking email security, and upcoming changes in email authentication requirements. We’re thrilled t…
…
continue reading
1
Episode 5:Network Pillar Micro-Segmentation 3-Tier Architecture
28:09
28:09
Play later
Play later
Lists
Like
Liked
28:09
Building a Micro-segmented 3-Tier Architecture in Azure Government with STRUCTURA.IO: Infrastructure as Code and Zero Trust Network Pillar PrinciplesBy VILLA-TECH
…
continue reading
1
Implementing Zero Trust Architecture, with William MacMillan
37:59
37:59
Play later
Play later
Lists
Like
Liked
37:59
William MacMillan serves as the Chief Product Officer at Red Cell Partners, an incubation firm building rapidly-scalable technology-led companies. After nearly two decades of military service, he transitioned into the role of Chief Information Security Officer at the CIA, safeguarding our nation against cyber threats. In this episode, we discuss th…
…
continue reading
1
The Importance of Diversity in Cybersecurity: Carol Ware
26:37
26:37
Play later
Play later
Lists
Like
Liked
26:37
In this podcast from the Carnegie Mellon University Software Engineering Institute, Carol Ware, a senior cybersecurity engineer in the SEI’s CERT Division, discusses her career path, the value of mentorship, and the importance of diversity in cybersecurity.By Carol Ware
…
continue reading
1
The Importance of Diversity in Software Engineering: Suzanne Miller
29:02
29:02
Play later
Play later
Lists
Like
Liked
29:02
In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Suzanne Miller, a principal researcher in the SEI’s Software Solutions Division, discusses her career path, the value of mentorship, and the importance of diversity in software engineering.By Suzanne Miller
…
continue reading
1
The Importance of Diversity in Artificial Intelligence: Violet Turri
16:57
16:57
Play later
Play later
Lists
Like
Liked
16:57
Across the globe, women account for less than 30 percent of professionals in technical fields. That number drops to 22 percent in the field of Artificial Intelligence (AI). In this podcast from the Carnegie Mellon University Software Engineering Institute (SEI), Violet Turri, a software developer in the SEI’s AI Division, discusses the evolution of…
…
continue reading
1
Understanding MDR Services, with Brennan Manion
29:57
29:57
Play later
Play later
Lists
Like
Liked
29:57
Brennan Manion serves as a Senior Account Executive at Red Canary, a Managed Detection Response service providing 24/7/365 protection for their customers. Through Red Canary's innovative approach, which integrates AI and human expertise, organizations can effectively mitigate cyber threats while minimizing false positives, providing peace of mind i…
…
continue reading
1
INCH360 Panel: Working with MSPs or Outside Cyber Services
39:24
39:24
Play later
Play later
Lists
Like
Liked
39:24
In this episode of the Cybertraps podcast, host Jethro Jones discusses the crucial topic of working with managed service providers (MSPs) and outside cyber services. Featuring a session from the Inch 360 conference in Spokane, Washington, the conversation dives deep into the value of cybersecurity measures, the challenges businesses face, and the b…
…
continue reading
In this special live edition of the Cybertraps podcast recorded at the Inch360 event in Spokane, Washington, Jethro Jones interviews John Hansman, the CEO of Truit. They discuss Truit's role as a managed service provider with a focus on cybersecurity, the challenges and advantages for businesses using MSPs, and the importance of proactive cybersecu…
…
continue reading
In this special edition of the Cybertrops podcast, recorded at the Inch360 event on Gonzaga University’s campus in Spokane, Washington, Jethro Jones interviews Bryan Yamanaka, CEO and founder of Arkangelos. They discuss Bryan's transition from Seattle to Spokane, his perspectives on the local tech community, and the services his company provides fo…
…
continue reading
1
Using Large Language Models in the National Security Realm
34:45
34:45
Play later
Play later
Lists
Like
Liked
34:45
At the request of the White House, the Office of the Director of National Intelligence (ODNI) began exploring use cases for large language models (LLMs) within the Intelligence Community (IC). As part of this effort, ODNI sponsored the Mayflower Project at Carnegie Mellon University’s Software Engineering Institute (SEI) from May 2023 through Septe…
…
continue reading
1
Navigating IT Challenges in Healthcare, with Todd Capriotti
35:07
35:07
Play later
Play later
Lists
Like
Liked
35:07
Todd Capriotti serves as the Chief Information Officer of Wahiawa General Hospital, a community-owned, non-profit hospital serving Central Oahu and Oahu's North Shore. Hand-picked as the first-ever CIO for Wahiawa, Todd pioneered a comprehensive transformation strategy, reversing a 5+ year negative trend of delivery outages and service interruption…
…
continue reading
1
Atypical Applications of Agile and DevSecOps Principles
33:41
33:41
Play later
Play later
Lists
Like
Liked
33:41
Modern software engineering practices of Agile and DevSecOps have provided a foundation for producing working software products faster and more reliably than ever before. Far too often, however, these practices do not address the non-software concerns of business mission and capability delivery even though these concerns are critical to the success…
…
continue reading
1
168 INCH360: Lessons Learned From a Breach
42:34
42:34
Play later
Play later
Lists
Like
Liked
42:34
In this episode of the Cybertraps podcast, host Jethro Jones leads an expert panel discussion on the aftermath of cyber breaches. Panelists share insights on preparation, incident response, and long-term strategies for recovery and prevention. The conversation includes first-hand accounts, practical tips, and the importance of training and communic…
…
continue reading
1
Zero Trust Bytes Podcast EP4: Data Pillar with MSFT Purview for Data Lifecycle Management and DLP
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50
The Zero Trust Data Pillar is a critical component of the Department of Defense's (DoD) Zero Trust Strategy, which aims to enhance cybersecurity and protect sensitive information. The Data Pillar focuses on securing and safeguarding data by implementing a Zero Trust approach. This approach assumes that no user or asset can be trusted by default, an…
…
continue reading
1
When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction
35:21
35:21
Play later
Play later
Lists
Like
Liked
35:21
Increasingly in government acquisition of software-intensive systems, we are seeing programs using Agile development methodology and earned value management. While there are many benefits to using both Agile and EVM, there are important considerations that software program managers must first address. In this podcast, Patrick Place, a senior engine…
…
continue reading
In this episode of the Cybertraps podcast, host Jethro Jones interviews Dominic Booker at the Inch360 event. Dominic discusses his journey into the IT and cybersecurity fields, his motivations for attending the event, and the importance of both digital and physical security. The conversation provides insights into building community in tech, mentor…
…
continue reading
1
Defending Your Valuable Data Assets, with Kristopher Moniz
45:00
45:00
Play later
Play later
Lists
Like
Liked
45:00
Kristopher Moniz serves as the National Data & Analytics Lead for Centric Consulting, an international management consulting firm with unmatched expertise in business transformation, AI strategy, cyber risk management, technology implementation and adoption. Kristopher's focus is helping his clients tackle their Data & Analytics challenges, specifi…
…
continue reading
1
INCH360 Panel: Cloud Security: Exploring the Latest Trends and Challenges in Cloud Security and Systems Architecture
40:24
40:24
Play later
Play later
Lists
Like
Liked
40:24
This episode of Cybertraps features an insightful panel discussion from the Inch360 conference held in Spokane, Washington, focusing on the latest trends and challenges in cloud security and systems architecture. Topics include: Cloud security issues Integration Reactive to proactive Effective practices in an evolving landscape. We’re thrilled to b…
…
continue reading
1
The Impact of Architecture on Cyber-Physical Systems Safety
34:05
34:05
Play later
Play later
Lists
Like
Liked
34:05
As developers continue to build greater autonomy into cyber-physical systems (CPSs), such as unmanned aerial vehicles (UAVs) and automobiles, these systems aggregate data from an increasing number of sensors. However, more sensors not only create more data and more precise data, but they require a complex architecture to correctly transfer and proc…
…
continue reading
In this special edition of the Cybertraps podcast, recorded live at the Inch360 event in Spokane, Washington, Jethro Jones interviews Shawn Hafen from Spokane Teachers Credit Union (STCU). They discuss Shawn's role in managing STCU's cybersecurity team, the importance of local cybersecurity events, strategies for small businesses to enhance cyberse…
…
continue reading
1
Ensuring quality, compliance and client satisfaction using automation in audits
20:27
20:27
Play later
Play later
Lists
Like
Liked
20:27
Explore the dynamic realm of internal audits, revealing the transformative power of automation with MS Power Platform and Power BI. From ISO certifications to the critical role of CAPA systems, our subject matter experts provide a concise, yet comprehensive, look at how Authority Partners elevates audit processes for enhanced efficiency and client …
…
continue reading
1
Episode IV - Supply Chain Risk and Management Strategies
18:45
18:45
Play later
Play later
Lists
Like
Liked
18:45
Black Kite CEO Paul Paget discusses the Supply Chain and how to manage risks and attacks.By Liz Vagenas
…
continue reading
1
How To Not Make IT Audits a Nightmare, with Matt Huffman
43:21
43:21
Play later
Play later
Lists
Like
Liked
43:21
Matt Huffman serves as the Information Technology Manager for Reinders, Inc, one of the Midwest’s largest full-service distributors of products to the commercial green industry. Matt has both administrated cybersecurity audits during his tenure at Wipfli and navigated them on the customer side. Through the years of seeing both ends, he developed a …
…
continue reading
In this special live edition of the Cybertraps podcast, Jethro Jones talks with Nick Mirizzi at the Inch360 event at Gonzaga University. The discussion covers Nick's background in high tech and cybersecurity, the evolution of cloud security, the importance of outsourcing cybersecurity for small to mid-sized businesses, and the growing talent gap in…
…
continue reading
In this episode of the Cybertraps podcast, host Jethro Jones sits down with Pia Hallenberg at the INCH360 event at Gonzaga University in Spokane, Washington. Pia discusses her transition from a 20-year career in journalism to becoming a cybersecurity writer, the challenges and rewards of the profession, and the significance of the dark web in today…
…
continue reading
1
The Last Mile of Security: Security Awareness Training Trends with Heather Stratford Cybertraps Podcast 163
33:56
33:56
Play later
Play later
Lists
Like
Liked
33:56
In this episode of the Cybertraps podcast, host Jethro Jones introduces a session from the Inch 360 Conference in Spokane, Washington. Heather Stratford, founder and CEO of DRIP7, discusses the latest trends in security awareness training and the continuing importance of addressing cybersecurity as a people issue. With compelling statistics and eng…
…
continue reading
1
Zero Trust Bytes: Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure
31:11
31:11
Play later
Play later
Lists
Like
Liked
31:11
Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click submit! Let us know what kind of content you …
…
continue reading
1
Zero Trust Bytes Podcast Episode 3: Implementing an Org MFA, Identity Provider Solution
23:44
23:44
Play later
Play later
Lists
Like
Liked
23:44
Implementing an Organizational Multi-Factor Authentication and Identity Provider Solution with Microsoft Entra ID, Yubico, and KeyFactor Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3…
…
continue reading
1
Zero Trust Bytes: Ep.2: Software Defined Perimeter with Appgate
28:50
28:50
Play later
Play later
Lists
Like
Liked
28:50
Where Automation Meets Security: Episode 2 Where Automation Meets Security: Episode 1 - Conditional Access Based on Location in Microsoft Azure. GIVEAWAY :tada: Instructions: 1. Like, comment, and subscribe! 2. Click on the link https://www.structura.io/ 3. Scroll to the bottom to click on "Contact" link. 4. Fill in contact information. 5. Click su…
…
continue reading
This episode of the Cybertraps Podcast is a special live event edition from the Inch 360 conference in Spokane, Washington. Host Jethro Jones interviews Peter Gregory from GCI, discussing GCI's support for community initiatives, Peter's role in cybersecurity, his insights from the conference, and essential tips for maintaining good cyber hygiene. W…
…
continue reading
In this special edition of the Cybertraps podcast, Jethro Jones interviews Matt Porter, the founder and Chief Solutions Officer at AmorFati Labs, live at the Inch360 event in Spokane, Washington. Matt shares his background as a former intelligence officer and discusses his transition to starting AmorFati Labs, a deep tech studio focused on holistic…
…
continue reading
This special edition of the Cybertraps podcast features an engaging conversation with Naci Seyhanli, IT Security Analyst at the Spokane Regional Health District. Hosted by Jethro Jones, the episode dives into the unique challenges and approaches to cybersecurity within a public health institution, the importance of staff education, and the value of…
…
continue reading
1
Finding Value in Technology Advisors, with Becca Black
30:13
30:13
Play later
Play later
Lists
Like
Liked
30:13
On this episode of the IT Matters Podcast, Keith Hawkey and Becca Black discuss the nuances of Technology Advisory. Becca reflects on her journey into the IT world, the significance of authentic relationships, and the importance of effective communication. Tune in for a candid discussion on building connections and achieving success in the IT realm…
…
continue reading
1
ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22
To better understand the potential uses of large language models (LLMs) and their impact, a team of researchers at the Carnegie Mellon University Software Engineering Institute CERT Division conducted four in-depth case studies. The case studies span multiple domains and call for vastly different capabilities. In this podcast, Matthew Walsh, a seni…
…
continue reading
By VILLA-TECH
…
continue reading