A gumbo of insights and information about Cybersecurity and Data Protection
…
continue reading
![Artwork](/static/images/128pixel.png)
1
253: Inside the Mind of a Data Privacy Expert – John D. Cook Consulting
15:38
15:38
Play later
Play later
Lists
Like
Liked
15:38
John D. Cook, founder and CEO of John D. Cook Consulting shares insights from his extensive background in math and statistics, focusing on data privacy. The discussion dives into the complexities of handling data breaches, emphasizing the stress and challenges organizations face when sensitive information is compromised. We also cover the importanc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
252: AI, ML, and NVMe: The Power Trio Driving Data Performance - Graid Technology
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
252: AI, ML, and NVMe: The Power Trio Driving Data Performance – Graid Technology
23:14
23:14
Play later
Play later
Lists
Like
Liked
23:14
Kelley Osburn, Senior Director of OEM and Channel Business Development at Graid Technology discuss the advancements and challenges in NVMe, Non-Volatile Memory Express storage and RAID, Redundant Array of Independent Disks technology. We also explore the future of NVMe and GPU integration, emphasizing the need for high-speed data access in AI and M…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
251: What Everyone Should Know About Immutable Storage - Scality
22:26
22:26
Play later
Play later
Lists
Like
Liked
22:26
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
…
continue reading
Candida Valois, Field CTO at Scality dives into the crucial topic of ransomware and the role of immutable storage in defending against such attacks. Candida emphasizes that not all immutable storage solutions are equal and highlights the importance of true immutability, particularly through S3 object storage.…
…
continue reading
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cybersecurity, this episode offers valuable insights for anyone in the tech industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
250: Choosing Your Tech Path: Field CTO vs. Technical Evangelist - DataCenterDude
35:37
35:37
Play later
Play later
Lists
Like
Liked
35:37
Nick Howell, Global Field CTO for Cloud at NetApp discusses the evolving responsibilities and challenges faced by Field CTOs and Technical Evangelists. From navigating job market trends and salary transparency to exploring the future of AI and cybersecurity, this episode offers valuable insights for anyone in the tech industry.…
…
continue reading
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape storage, deduplication, and cloud solutions in modern data protection strategies, while also touching on…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
249: How Artificial Intelligence is Changing Data Protection - Quantum
22:45
22:45
Play later
Play later
Lists
Like
Liked
22:45
Jordan Winkelman, Field Solutions CTO at Quantum discusses the impact of AI on data management, emphasizing the importance of preserving data, ensuring compliance, and protecting it from cybersecurity threats. We also delve into the role of tape storage, deduplication, and cloud solutions in modern data protection strategies, while also touching on…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
248: Immutability: Protecting Data Integrity in the Cyber Age – Scality
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
248: Immutability: Protecting Data Integrity in the Cyber Age - Scality
20:34
20:34
Play later
Play later
Lists
Like
Liked
20:34
Giorgio Regni, CTO at Scality discusses immutability in data storage, explaining its evolution from media-based to software-based implementations. He also highlights the complexities of immutability, including administrative controls, compliance with regulations like GDPR, and the need for effective detection and recovery processes.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
247: Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal – Nutanix
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hybrid and multi-cloud environments, emphasizing the role of customer-managed security policies and the r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
247: Unexpected Consequences: Insights for VMware Users Post-Broadcom Deal - Nutanix
27:24
27:24
Play later
Play later
Lists
Like
Liked
27:24
Lee Caswell, SVP Product and Solutions Marketing at Nutanix highlights the increasing importance of adapting total cost of ownership (TCO) and return on investment (ROI) models to reflect new licensing costs. He also addresses the shift towards hybrid and multi-cloud environments, emphasizing the role of customer-managed security policies and the r…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
246: United Front: CISOs Collaborate to Navigate SEC Regulations - ZScaler
27:35
27:35
Play later
Play later
Lists
Like
Liked
27:35
Sam Curry, VP & CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is becoming more vulnerable and discusses new reporting standards introduced in 2024. The conversation also…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
246: United Front: CISOs Collaborate to Navigate SEC Regulations – ZScaler
27:36
27:36
Play later
Play later
Lists
Like
Liked
27:36
Sam Curry, VP & CISO at ZScaler explores the implications of new SEC reporting requirements, the increasing challenges of ransomware attacks, and the shift towards encryptionless extortion. Sam shares insights into how critical infrastructure is becoming more vulnerable and discusses new reporting standards introduced in 2024. The conversation also…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
245: Data Center Hunger Games: Only the Fittest Survive Mergers – Brass Valley
19:36
19:36
Play later
Play later
Lists
Like
Liked
19:36
Rocco D’Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance and regulations, chain of custody, and innovations in the ITAD industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
245: Data Center Hunger Games: Only the Fittest Survive Mergers - Brass Valley
19:35
19:35
Play later
Play later
Lists
Like
Liked
19:35
Rocco D'Amico, the founder and CEO of Brass Valley dives into various aspects of IT Asset Disposition, including the hidden threats of dark data and end-of-life assets, challenges of data center closures and mergers, cost management, compliance and regulations, chain of custody, and innovations in the ITAD industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
244: Cloud Security Insights: From Innovation to Evangelism – Plerion
22:52
22:52
Play later
Play later
Lists
Like
Liked
22:52
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role’s unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation officer, emphasizing expertise, opinion formation, and public engagement.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
244: Cloud Security Insights: From Innovation to Evangelism - Plerion
22:51
22:51
Play later
Play later
Lists
Like
Liked
22:51
Daniel Grzelak, Chief Innovation Officer at Plerion discusses his role's unique challenges with a focus on simplifying cloud security. He also shares valuable insights for aspiring tech leaders on becoming a technical evangelist or innovation officer, emphasizing expertise, opinion formation, and public engagement.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
243: Surviving the Unexpected: From Disaster Recovery to Cyber Recovery - BETSOL
29:00
29:00
Play later
Play later
Lists
Like
Liked
29:00
Justin Gesso, Senior Director of Marketing at BetSol, dives into critical disaster recovery strategies, emphasizing the need for thorough planning and testing. He talks about the evolving role of backup administrators in the age of cloud computing and automation, and the importance of maintaining a balance between human oversight and technological …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
242: From Vulnerability to Strength: Transforming Your Data Security Posture - Clarify360
20:16
20:16
Play later
Play later
Lists
Like
Liked
20:16
Jo Peterson, Vice President of Cloud and Security Services at Clarify360 discusses the critical importance of Data Security Posture Management (DSPM) in protecting against modern cyber threats. She covers the essential aspects of understanding exposure and accessibility of data, the importance of determining access levels, and how DSPM benefits org…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
241: Securing Active Directory Against Modern Cyber Threats - Cayosoft
27:51
27:51
Play later
Play later
Lists
Like
Liked
27:51
Dmitry Sotnikov, Chief Product Officer at Cayosoft a dives into the rising threat of ransomware, emphasizing the necessity of robust business continuity and disaster recovery plans for active directory. The conversation covers best practices for protecting and recovering Active Directory, the significance of having automated recovery solutions, and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
240: Are LLMs Too Large for Traditional Storage? - OSNEXUS
28:37
28:37
Play later
Play later
Lists
Like
Liked
28:37
Steven Umbehocker, Founder & CEO of OSNEXUS a dives into the current state and future of storage solutions in the age of AI and ML but also ignites a conversation on the readiness of traditional storage systems to handle the massive scale of LLMs. Through technical insights, forward-looking predictions, and practical advice, he highlights the criti…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
239: The Executive's Guide to Cybersecurity Incidents, Materiality, and the SEC - Clark Hill PLC
23:57
23:57
Play later
Play later
Lists
Like
Liked
23:57
Richard Halm, Senior Attorney, Cybersecurity, Data Protection, & Privacy at Clark Hill PLC explores the complexities of the new SEC rule on incident and risk disclosures. We dive into the resurgence of ransomware, the impact of AI on cybersecurity threats, and the critical elements of the SEC's requirements. The episode also covers the crucial conc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
238: Navigating AI, Data Protection, and Beyond - Conexus
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48
Eric Daimler, CEO of Conexusdeep dives into the realms of AI, autonomous technologies, and data security. As a former Presidential Innovation Fellow under the Obama administration, Daimler shares his insights on AI's potential, its implications for data protection, and the revolutionary work of Conexus in solving the data deluge challenge. With dis…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
237: From NIST CSF to CMMC: Evolving Cybersecurity Standards Explained - Petronella Technology Group
26:34
26:34
Play later
Play later
Lists
Like
Liked
26:34
Craig Petronella, CEO of Petronella Technology Group dives into the complexities of the Cybersecurity Maturity Model Certification (CMMC). We discuss the inception and necessity of CMMC within the defense sector, its evolution from NIST standards, and the challenges of self-attestation. The conversation also touches on the financial aspects of comp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
236: The Intersection of Testing Backups and Tech Layoffs 2024 - Servosity
38:54
38:54
Play later
Play later
Lists
Like
Liked
38:54
Damien Stevens, Founder and CEO of Servosity delves into the critical importance of regular backup testing amidst the landscape of technological advancements and the recent trends in tech layoffs. He navigates through the complexities of maintaining data integrity in a time of tech industry fluctuations, highlighting the essential role of diligent …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
235: How to Store Data Virtually Forever - Cerabyte
26:54
26:54
Play later
Play later
Lists
Like
Liked
26:54
Martin Kunze, Founder and Chief Marketing Officer at Cerabyte discusses the long-term durability and efficiency of storing data. This approach addresses issues like data longevity, ecological impact, and the increasing volume of digital information. We also touch on the technical and philosophical implications of preserving digital heritage for fut…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
234: Beyond Basics: A Masterclass in AI That's Shaping the Industry! - Pangea Tech Consulting
36:19
36:19
Play later
Play later
Lists
Like
Liked
36:19
Dr. Ali Sekmen, CEO at Pangea Tech Consulting, and Chris Jones, Chief Technology Officer discuss the forefront of AI and machine learning, focusing on the development and application of these technologies in solving complex data science and engineering problems. With a blend of academic insight and practical industry experience, the episode delves …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
233: Every Second Counts: Identity Orchestration's Answer to Cyber Attacks - Strata Identity
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Gerry Gebel, Head of Standards at Strata Identity explores the evolving landscape of identity management and cybersecurity. The conversation delves into identity orchestration, policy orchestration, the importance of access policies, and the impact of emerging technologies like AI on cybersecurity practices. We also discuss the staggering increase …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
232: The 3-2-1 Rule Revisited: Overkill or a Cybersecurity Must-Have? - Synergy Six Degrees
29:13
29:13
Play later
Play later
Lists
Like
Liked
29:13
Kevin Bailey, Chief Analyst and Founder at Synergy Six Degrees talks about the evolving nature of data protection focusing on the 3-2-1 backup strategy and its relevance in modern cybersecurity. Kevin challenges traditional data protection methods, emphasizing the increasing sophistication of cyber-attacks and the importance of protecting active da…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
231: The Maestro of Cyber Defense: A CISO's Guide to Orchestrating Protection - Carbide
30:33
30:33
Play later
Play later
Lists
Like
Liked
30:33
Darren Gallop, Co-Founder and CEO at Carbide shares his unique journey from the music industry to leading a cybersecurity firm. The discussion covers a wide range of topics including the importance of leadership in cybersecurity, the evolving role of artificial intelligence in data protection, and the challenges faced by modern Chief Information Se…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
230: The Future of Digital Currencies and Blockchain Security - Mimo
25:50
25:50
Play later
Play later
Lists
Like
Liked
25:50
Claude Eguienta, Chief Executive Officer at Mimo discusses the company's role in providing tools and assets for users across different market cycles, particularly in crypto. We dive into the evolution of crypto, the security aspects of blockchain compared to traditional banking, and the potential of Central Bank Digital Currencies (CBDCs). We also …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
229: Dirty Little Secrets of Being a CISO - NeuEon
28:46
28:46
Play later
Play later
Lists
Like
Liked
28:46
Candy Alexander, Chief Information Security Officer and Security Practice Lead at NeuEon Inc. discusses the challenges and realities of being a CISO, emphasizing the importance of technical skills, strategic thinking, and effective communication with the C-suite. She further highlights the necessity of understanding and aligning with business strat…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
228: Post-Ransomware Attack: Critical Actions You Can't Ignore - Quorum
25:27
25:27
Play later
Play later
Lists
Like
Liked
25:27
Gabe Gambill, VP Product and Tech Operations at Quorum provides a detailed guide for individuals and organizations recovering from a ransomware attack. He emphasizes the urgent need for immediate action to isolate and assess affected systems. He advises on the importance of clear communication with stakeholders and law enforcement, and the crucial …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
227: Why Simple Backups Don't Cut It Anymore - Scality
20:52
20:52
Play later
Play later
Lists
Like
Liked
20:52
Paul Speciale, Chief Marketing Officer at Scality discuss critical issues in cybersecurity, including ransomware and immutable storage. The episode emphasizes the role of immutable storage in enhancing cybersecurity strategies amidst increasing cyber threats and the integration of AI in data protection. It also highlights the importance of thorough…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
226: Tape Storage in 2024: Why You Need to Hear This Now - Tape Ark
36:15
36:15
Play later
Play later
Lists
Like
Liked
36:15
Guy Holmes, Founder and CEO of Tape Ark discusses various topics related to data protection, tape storage, and the evolution of data storage technologies. He also talks about the challenges and solutions in migrating legacy tape data to the cloud, enabling innovative uses of historical data. He shares insights on data liberation, and interesting pr…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
225: Cutting Through Alerts by Optimizing Your Security Operations Center - Silk Security
23:02
23:02
Play later
Play later
Lists
Like
Liked
23:02
Yoav Nathaniel, CEO of Silk Security, joins us to discuss the transformative role of AI-driven solutions in cybersecurity risk management. Exploring how to leverage AI to enhance security operations and streamline risk assessment processes. Yoav offers unique insights into tackling the overwhelming challenge of managing security alerts. We delve in…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
224: How Generative AI is Changing the Security Questionnaire Game - Vendict
26:35
26:35
Play later
Play later
Lists
Like
Liked
26:35
Udi Cohen, CEO and Co-founder of Vendict explores the groundbreaking impact of generative AI on the security compliance landscape. We dive deep into how this innovative technology is transforming the traditional processes, making the completion of security questionnaires faster, more accurate, and less resource-intensive.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
223: Ransomware Resilience: Proven Strategies to Render It Powerless - Calamu
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Paul Lewis, CEO of Calamu, goes deep into the evolving landscape of cybersecurity and data protection. He explores cutting-edge strategies for combating ransomware, the role of AI in both offensive and defensive cybersecurity tactics, and the future of data storage solutions. He also shares his expert views on the challenges and solutions in cyber …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
222: Ransom Paid: Now, How Do We Catch Cyber Criminals? - Panther Protocol
25:23
25:23
Play later
Play later
Lists
Like
Liked
25:23
Anish Mohammed, co-founder and CTO of Panther Protocol delves into the use of cryptocurrency in ransomware and data exfiltration, focusing on the traceability of blockchain transactions and the mechanisms for transaction shielding. We also dive into decentralized finance (DeFi), blockchain, and the concept of Web 3.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
221: Your Data, Your Rules: Exploring Self-Sovereign Identities - Verida
25:35
25:35
Play later
Play later
Lists
Like
Liked
25:35
Chris Were, CEO and Co-Founder of Verida drops details on self-sovereign identities, security, and how to keep control of your personal data in the midst of cyber incidents on the rise.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
220: The Pitfalls of Cybersecurity Incident Response - Sygnia
30:25
30:25
Play later
Play later
Lists
Like
Liked
30:25
Oren Wortman, VP of Cybersecurity Services, NA at Sygnia shares invaluable insights on the pitfalls of incident response and the importance of preparation. He emphasizes the adversarial mindset, where understanding and simulating potential attackers' moves is crucial for robust cybersecurity. The conversation touches on the sophistication of cyberc…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
219: The Rise of Virtual CISO Neighborhood Watch - Health-ISAC
27:20
27:20
Play later
Play later
Lists
Like
Liked
27:20
Errol Weiss, Chief Security Officer at Health ISAC dives into cybersecurity, privacy, and data protection discussing the role of CISOs and their responsibilities. We also discuss ransomware attacks and data backup strategies, cybersecurity talent shortages, and internship programs for those aspiring to enter the cybersecurity industry.…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
218: Breaking Down the Hype of Airgap and Immutable Backups - Mr. Backup
34:33
34:33
Play later
Play later
Lists
Like
Liked
34:33
We dive deep with W. Curtis Preston, aka Mr. Backup, as we discover the real-world implications, benefits, and truths behind the buzzwords of Airgap and Immutability and learn why they're essential in today's data protection landscape.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
217: Unmasking the Risks of Your Data Storage - Hostirian
24:22
24:22
Play later
Play later
Lists
Like
Liked
24:22
Join us as we sit down with Ken Cox, President of Hostirian, to delve deep into the intricacies of data storage. Together, we'll unmask the often-overlooked risks and explore best practices to ensure your data remains secure and accessible.By Demetrius Malbrough
…
continue reading
![Artwork](/static/images/128pixel.png)
1
216: How Ransomware Changed the Cybersecurity Landscape - Recorded Future
29:48
29:48
Play later
Play later
Lists
Like
Liked
29:48
We journey through the history of ransomware with Allan Liska from the Computer Security Incident Response Team at Recorded Future. From its early origins to its current impact on infrastructure deployment and disaster recovery, Allan provides a comprehensive overview, sharing expert insights into data protection strategies for both on-prem and clo…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
215: From Chaos to Compliance: Solving the compliance headaches of Microsoft 365 - Hornetsecurity
23:31
23:31
Play later
Play later
Lists
Like
Liked
23:31
Andy Syrewicze, a Microsoft MVP and Technical Evangelist at Hornetsecurity delves into the intricate world of Microsoft 365 compliance, discussing the journey "From Chaos to Compliance." Andy sheds light on the challenges posed by the ever-evolving compliance regulations and shares invaluable insights on alleviating the burdens on IT teams, explori…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
214: Ransomware's New Adversary: The Power of Identity Orchestration - Strata Identity
29:26
29:26
Play later
Play later
Lists
Like
Liked
29:26
Eric Olden, Co-founder and CEO of Strata Identity, Inc., delves into the evolving identity landscape amidst rapid global changes. Addressing compliance in a multi-cloud world, the necessity of MFA and the innovative approach of Identity Orchestration. He offers insights on the future of Identity Access Management and its distinction in the current …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
213: Restore Speed: Business Maker or Breaker? - Pure Storage
25:51
25:51
Play later
Play later
Lists
Like
Liked
25:51
We dive deep with Debjeet Bagchi, Senior Technical Marketing Engineer at Pure Storage, exploring the intricacies of unstructured data management, the critical importance of robust data protection, and the evolving landscape of the storage industry in the age of public cloud. Debjeet also shares invaluable insights on the role of artificial intellig…
…
continue reading