Synopsis
Is your organization agile and secure enough to survive? Join Cherie Caswell Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.Presented by Forsythe.
Episodes
-
Taking SIEM to the Next Level
29/08/2018 Duration: 20minOrganizations are suffering from cyber fatigue with too many alerts, too many technologies, and not enough people. This makes it difficult to streamline operations, and decrease the time it takes to detect and remediate security incidents. Companies that rely heavily on security information and event management (SIEM) to support threat detection efforts are increasingly complementing deployments with solutions that advance their analytics capabilities, effectively taking SIEM to the next level. Listen to this episode to learn: How to ensure you have the right building blocks in place for advanced analytics How to identify use cases and build out strategies to support them The positive impact user and entity behavior analytics (UEBA) can have on visibility How threat intelligence can arm you with the insights you need to understand how you are being targeted HowSOCs and IR teams are leveragingendpoint detection and response (EDR) tools and network security analytics for additional capabilities Listen to the
-
Down with Dark Data: Your Strategy for Intelligent Data Management
27/03/2018 Duration: 18minSponsored by Veritas In the drive to transform and modernize IT, backup remains critical. But IT modernization demands a new way of thinking about data, and that means a new way of thinking about backup. In the past, all data was backed up equally. Today, the path to modernization requires going beyond backup to intelligent data management that enables innovation while driving efficiencies. We’re speaking with industry expert Adam Shomaker to learn how organizations can gain a new understanding of the backup and storage modernization. Listen to this episode to learn: The three questions organizations should ask to prepare for storage modernization. How the answers can lead you to a data management strategy. How to strive for efficiency, but not at the cost of security. How the platform approach to data management can be customized to your unique business environment. Beyond Backup to Intelligent Data Management – Successful backup and storage modernization relies on a data management platform approach that
-
Zero Trust Architecture: Debunking Myths
07/02/2018 Duration: 15minSponsor: Palo Alto Traditional data security strategies tend to operate under a “trust but verify” approach — trusting internal users with unrestricted network access and considering the external network as the only network in need of security controls. Rooted in the principle of “never trust, always verify,” Zero Trust architecture is an alternative and individualized approach to network security that uses an organization’s functionality and business objectives to determine exactly what data needs to be safeguarded and how best to do it. Because it diverges from traditional strategies, there are common misconceptions about the implementation and function of this approach. We spoke with the creator of Zero Trust, John Kindervag, to debunk myths and learn how the model can be strategically implemented. Listen to this episode to learn: Why Zero Trust architecture is changing security strategies The 4 major myths about Zero Trust architecture How real companies are finding success with this model How to impleme
-
Flex Your IT Super Powers with Virtualization
21/12/2017 Duration: 24minBusinesses depend heavily on a solid application infrastructure. Increasingly, IT is the foundation for the business and in charge of enabling organizations to innovate. Speed, agility, impenetrable security, and availability of applications are essential, but also tricky to deliver flawlessly. We spoke with industry expert, Andrew Young, about how a virtualized approach can enable IT to move as fast as the business demands without compromising the security or availability of critical applications. Listen to this episode to learn: How virtualization is helping companies drive business and transform their industries The key benefits of virtualization How virtualization can help keep your business secure Some of the best use cases for a virtualized approach and where we’re seeing success stories Get Your Guide to Transforming Enterprise Cybersecurity Today - In this eBook, get actionable security advice from industry experts on the cybersecurity landscape, and what your organization should be doing to combat
-
Roadmap to Digital Transformation by 2020
19/12/2017 Duration: 23minSponsored by Dell EMC Times are changing when it comes to the never-ending storage refresh cycle. By moving to a flexible consumption-based storage model, you can avoid spending too many resources on the yearly refresh, lower expenses and gain efficiencies. So, how can companies get moving on a hyperconverged storage model? We spoke with industry-expert Patrick Conway to learn how to build a roadmap to digital transformation by 2020. Listen to this episode to learn: What digital transformation means in terms of business transformation Why now is a critical time to shift to a hyperconverged storage model How to create and execute a vision for digital transformation by 2020 How real companies are taking advantage of their own digital transformations [Webinar] Top Storage Trends that Will Impact Your Data Center – Get yourself out of the old, draining refresh cycle and make a shift that will help position your IT team as strategic business partners. Hyperconvergence Installation: How to Make Yours a Smooth Ope
-
Convergence versus Hyperconvergence: Which Horse Should You Back in the Race to Storage Modernization
13/12/2017 Duration: 10minStorage is undergoing a fundamental transformation as workloads and applications demand higher performance, scalability, and resiliency. Deploying the right converged infrastructure solution can help solve these business challenges, but not all convergence is the same. So, how do you know which solution is right for your business? Today, we’re talking with industry expert Matt Coffey to learn about how to find the right solution and partner for your needs. Listen to this episode to learn about: The critical differences between converged and hyperconverged systems The best use cases for each solution Which elements of finance and support to consider How to prepare for implementation Modernization Through Convergence: Simplifying Complexity and Improving Performance for Data-driven Businesses – Not all convergence is the same. Find out whether convergence or hyperconvergence is right for your business. Hyperconvergence Installation: How to Make Yours a Smooth Operation – From configuration to implementation,
-
How IT Simplification can Strengthen and Secure Your Healthcare Brand
11/12/2017 Duration: 20minHealthcare is constantly changing, and so must its IT. With massive consolidations and mergers driving many healthcare providers, IT organizations are tasked with supporting business-critical projects, securing data, transforming IT, and managing small capex budgets. On top of all this, IT organizations play a critical role in optimizing patient care and outcomes. We spoke with Kevin Gee, a master consultant at Forsythe, to find out how simplifying your IT can revolutionize and enhance your healthcare brand. Listen to this episode to learn how to: Prepare for the critical challenges facing healthcare IT Use technical and operational approaches to simplification Lower your total cost of ownership (TCO) Maintain a strategy that sustains innovation, modernization and security Implement technologies that target simplification How to Build a Modern, Secure, Digital Healthcare Brand – Learn how the principles of simplicity and scalability can help you innovate and secure your healthcare organization. From Disco t
-
The Future of IoT Relies on Cybersecurity
05/12/2017 Duration: 19minThink about all of the information – personal and professional – that you’ve entrusted to the Internet of Things (IoT). Have IoT devices earned this trust we invest in them? Our interactions with IoT are so often focused on automated technology that — by choice or by habit — we often assume we can trust IoT simply because it’s not human. But, in reality, the human elements of IoT devices are critical to their success and to their failure. Just as a device can be programmed to solve challenges and create conveniences, they can also be programmed to hack data and hide security flaws. We spoke with industry expert E.G. Nadhan of Red Hat to learn more about the state of IoT security and how companies and consumers can avoid risk. Listen to this episode to learn about: Emerging paradigms in IoT security The inherent risks of IoT and how to develop the right level of trust The new way companies should calculate their risk Recommendations for IoT security strategies Weaponized Smart Devices & the Internet of T
-
UNIX Isn’t Dead: Debunking the Myth and Discovering the Value of UNIX
21/11/2017 Duration: 16minToday, we’re debunking the myth that UNIX is dead. From powering large workloads on complex systems, to lowering total cost of ownership, to merging legacy systems, we’re here to find out how Unix is not only helping businesses survive, it’s helping them thrive in disruptive markets. We spoke with industry expert Kevin Gee to find out how the myth got started and how it’s bringing still value to diverse organizations. Listen to this episode to learn: Why UNIX gets a bad rap How UNIX is still providing value to businesses How IBM Power Platforms are helping organizations see value with Unix How your company should decide on a platform The future of UNIX and how young, STEM graduates can benefit from working with it How to Build a Modern, Secure, Digital Healthcare Brand – Learn how the principles of simplicity and scalability can help you innovate and secure your healthcare organization. Why a Successful Move to Cloud Bridges the Old with the New – A few years ago, IT organizations thought that they needed t
-
Machine Learning: How to Reap the Benefits and Avoid the Risks
15/11/2017 Duration: 21minSponsored by: McAfee We’ve all heard the buzz about machine learning and artificial intelligence. The terms cover all kinds of exciting and cutting edge tools, but the technology is also evolving all the time. So, how should companies assess machine learning models to see if they’re right for their business? And, how can they integrate the right model, reap the benefits, and keep their risk-management in check? To learn more, we spoke with Celeste Fralick, chief data scientist and senior principal engineer for McAfee. Listen to this episode to learn: The benefits of integrating machine learning tools How to choose the right model for your data and your business How human involvement in machine learning improves accuracy up to 30% Who “fake data-scientsts” are and how you can avoid them Related Content for Libsyn: 10 Keys to Data-Centric Security – Learn how organizations can advance their security by focusing on “crown jewel” data. Why You Need to Grasp the Human Side of the Internet of Things (IoT) – The I
-
How to Make Hyperconvergence a Smooth Operation
31/10/2017 Duration: 13minSponsored by: Dell EMC Hyperconvergence offers a number of benefits, but many enterprises are cautious of adopting the technology. To demystify hyperconverged infrastructure (HCI) solutions, we sat down with convergence solutions specialist Bob Perkins to talk about the deployment process. We find out how to make any HCI installation a smooth operation, from configuration all the way to implementation. Listen to this episode to learn: What HCI deployment looks like, from start to finish Steps you can take to ensure a smooth installation process How you should prepare for what could go wrong Just how easy the installation can really be Hyperconvergence: More than Just Software-defined Storage – Hyper converged solutions are providing public-cloud-simplicity in a private-cloud-environment. Hyperconvergence Has Changed the Game. It’s Your Turn. - Hyperconverged platforms are enabling innovation and disruption. Is your company ready to do the same? Forsythe Technology - For more than 40 years, Forsythe has help
-
Hyperconvergence in Real Time
24/10/2017 Duration: 12minEpisode Sponsor: HPE From the small and ubiquitous iPhone to the large and complex Tesla, hyperconverged platforms are enabling companies to innovate and disrupt. Is your company ready to do the same? Hyperconverged infrastructure (HCI) solutions have many use cases, but to truly realize the benefits, you have to find the right fit for your enterprise. We spoke with Bob Perkins, a convergence solutions specialist, to find out what you should know before getting started with HCI. Listen to this episode to learn about: HCI’s top use cases, including an example from HPE’s SimpliVity How Tesla used HCI to help hurricane victims in Florida How you can reduce operational requirements to get more time for innovation and growth What factors you should consider to find the right HCI solution for your enterprise Hyperconvergence: More than Just Software-defined Storage – Hyper converged solutions are providing public-cloud-simplicity in a private-cloud-environment. Making the Jump to Hyperconvergence: Don’t Get Left Be
-
The Internet of Human Things: Making Meaningful Connections with IoT
12/10/2017 Duration: 18minFrom delivering pizzas faster, to saving money on energy bills, to improving healthcare systems, the Internet of Things (IoT) affects not only the convenience and quality of our daily lives. As IoT technology continues to rapidly evolve, the true innovators are the ones incorporating a human touch. We spoke with E.G. Nadhan, chief technology strategist for Red Hat, about companies that are using IoT to drive business value and solve real world problems by focusing on the human connections to IoT. Listen to this episode to learn how: Data driven by human interactions is changing IoT technology and driving business Innovators in transportation, energy, retail, and healthcare are using IoT to solve real world problems Bad data can make a smart device work like dumb one Human connections with technology can fuel IoT innovation Related Content: Why You Need to Grasp the Human Side of the Internet of Things (IoT) – The Internet of Things isn’t just about, well, things. To succeed with IoT, you must understand the
-
The Secret Life of Cloud Costs
14/06/2017 Duration: 20minMoving to the cloud can bring you a number of business benefits, but it may cost more than you had planned. According to the RightScale 2017 State of the Cloud, users report an average of 30 percent wasted cloud spend, while RightScale measures actual waste between 30 and 45 percent. The culprit behind these wasted resources: poor planning. To avoid unexpected cloud spend, you need a defined cloud strategy before you migrate. In this episode, host Cherie Caswell Dost speaks with industry expert Dave Carlson, vice president, Forsythe Hosting Solutions about how gain control of your cloud costs. Listen to this episode to learn: How to develop a cloud strategy that sets you up for success. The hidden costs associated with cloud and how to gain control before you migrate. Why you should focus on managing costs instead of cutting them. Four ways to optimize your cloud spend now. The Truth about Cloud Costs: 5 Things You Should Know – Moving applications to the cloud offers you greater agility, but your bill may
-
Weaponized Smart Devices and the Internet of Things
31/05/2017 Duration: 10minGartner predicts that through 2018, over 50 percent of Internet of Things (IoT) device manufacturers will not be able to address threats due to weak authentication practices. Millions of IoT devices — including everyday objects like routers, security cameras, DVRs, medical devices, cars and more — have already been infected with malware and repurposed as zombie armies by cyber attackers. As a result, the bandwidth of distributed denial of service (DDoS) attacks reached frightening levels in 2016, culminating with attacks of well over 600 Gbps. Until device makers require unique passwords by default, it is up to us to protect ourselves. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services, about the ever-changing security challenges of IoT devices, and how organizations can mitigate associated risks. Listen to the latest episode of And There You Have IT to learn: How IoT continues to change the threat landscape. The inherent and evolving
-
The General Data Protection Regulation is Changing IT Security: Are You Ready?
24/05/2017 Duration: 12minThe passing of a new European Union (EU) data protection framework — the General Data Protection Regulation (GDPR) — is having a tremendous impact on enterprises that collect data on Europeans. The May 25, 2018 compliance deadline, which from an IT planning and management perspective is right around the corner, has U.S. organizations scrambling. According to PwC, 77 percent of U.S. multinational companies are planning to spend $1 million or more on GDPR readiness this year, and 68 percent are earmarking between $1 million and $10 million. Companies looking to maintain a European presence should assess their overall data protection capabilities to identify gaps and compliance risks. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services. Listen to the latest episode of And There You Have IT to learn: How businesses should respond to GDPR immediately and into the future. Why it’s critical to implement a data centric security strategy. How d
-
WannaCry and the Evolution of Ransomware
17/05/2017 Duration: 09minThe FBI estimates that $209M was paid to ransomware criminals in the first quarter of 2016 alone. In 2017, ransomware is only growing in sophistication. Consider the WannaCry outbreak, a large-scale ransomware attack that is reported to have hit at least 150 countries, and infected 230,000 machines to date. This worldwide security incident is unprecedented in its disruption of large institutions such as Spain's Telefónica and the United Kingdom's National Health Service (NHS). It is also the first ransomware to incorporate worm functionality. The infection of one computer can ultimately lead to the infection of an entire network, without the need for additional users to click on malicious links or attachments. In this episode, host Cherie Caswell Dost speaks with Bryan Fischer, senior director, Forsythe Security Professional Services, about the evolution of ransomware and how organizations can take proactive steps towards maturing their security capabilities. Listen to the latest episode of And There You Have
-
Pillar Six: Identity and Access Management [Six Pillars of Security]
09/05/2017 Duration: 10minIn this episode about identity and access management (IAM), Cherie and Matt discuss: Why it’s critical to know what “normal” looks like for your data How micro breaches can be just as damaging as major ones The importance of examining all IAM practices for improvement, not just the “broken” ones What security professionals can learn from insider threats, like the infamous Edward Snowden breach With a comprehensive security strategy, IAM technology can generate the intelligence you need to increase your understanding of broader security events and advance your overall security posture. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to exp
-
Pillar Five: Data Center and Cloud Security [Six Pillars of Security]
03/05/2017 Duration: 13minIn this episode about data center and cloud security, Cherie and Matt discuss: Securing a cloud environment versus a physical data center. The biggest cloud security misconceptions. How to manage your third-party risk. Learn more about maintaining accountability and remediating third-party risk, whether your organization uses a cloud environment, a physical data center, or a hybrid model. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Four, Application Security – Applications have become an integral part of everyday life, and they contain some of your customers’
-
Pillar Four: Application Security [Six Pillars of Security]
25/04/2017 Duration: 09minIn this episode about application security, Cherie and Matt discuss: The importance of third-party risk assessment. How the rapid pace of application development affects security. The importance of trust after verification. Effectively handling sensitive information is a constant challenge, and transformational technologies like the cloud bring a new set of risks along with the opportunities they provide. Developing a comprehensive security strategy is your best defense. Join Forsythe’s host Cherie Caswell Dost, formerly of Chicago Public Radio, and industry expert Matt Sickles, director of consulting services, Forsythe Security Solutions, for a multi-episode series of our podcast, And There You Have IT. In this six-part series, “The Six Pillars of Security," we explore how companies can stay agile and secure in the face of an ever-evolving threat landscape. Listen to the podcast series to explore all six pillars of security. The Six Pillars of Security: Pillar Three, Compliance & Governance – Complianc