11:11 Systems Director of Product Market Intelligence Brian Knudtson is joined by guests Justin Warren, Gina Rosenthal, and Liron Amitzi for a conversation about how important it is for employees to be aware of cybersecurity. They discuss the effectiveness of security training, important tools to protect employees, and if executives should be able to avoid the training. Ideally, your organization should have a good culture of security so you don’t have to rely on trebuchets, guillotines, and always poison-checking your coffee.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests James Charter, Cristian Sandescu, and Andrew Green for a conversation about the state of vulnerability management. They talk about the various aspects of vulnerability management and prioritization based on your business needs. With over 4000 vulnerabilities discovered in 2021, it is no easy task to keep up with all of the patching and remediation efforts.
11:11 Systems of Cloud Market Intelligence Brian Knudtson is joined by guests Steve Broeder, Allan Liska, and Christian Mohn for a conversation about malware. Are cyber-criminals still lurking around each corner ready to infect your endpoints with ransomware, or are there new actors in the threat landscape? Should corporate IT still be in charge of security? We also discuss the importance of constant vigilance and DR plans.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Matt Vogt, Justin Warren, and Jim Czuprynski for a conversation about the most important element in IT: the data. They discuss what businesses should do to protect their data and the people, process, and technology functions it takes. Data security needs to cover everything from protecting emailed spreadsheets to database security.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Nathan Bennett, Andrew Green, and Jason Collier for a conversation about cloud based applications and their new needs for security. While observability is always key, we need to take further consideration into things like Zero Trust Network Access (ZTNA) and other authorization matters. And no application conversation can end without talking about the special considerations for APIs.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Paul Woodward, James Charter, and Jason Carrier for a conversation about the dangers to both on-premises and cloud supply chains. They discuss how customers need to evaluate their partners, how cloud providers protect their services, and what we should expect from our vendors. They’ll help you ask the hard questions when investigating a vendor, but if you aim to build a partnership, these questions should be easy to ask.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Liron Amitzi, Lauren Malhoit, and David Klee for a conversation about the security implications of managing service providers. They discuss their experiences with security, compliance, and overall functionality considerations when embarking on using 3rd parties to augment I.T. staff. When it comes to using service providers for critical IT tasks, it’s important that you trust but verify.
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Vince Wood, Lauren Malhoit, and Chris Ray for a conversation about keeping track of the assets, both physical and virtual, that IT companies rely on to conduct business. They discuss the importance of visibility for any business, how to adapt asset management for the world of SaaS, and even integrating ephemeral assets into your management system. Is asset management about counting the number of servers in a rack, or is there more to it?
11:11 Systems Director of Cloud Market Intelligence Brian Knudtson is joined by guests Tom Hollingsworth, Leon Adato, and Mike Spanbauer for a conversation about a new generation of thinking about security. Many of the same tools still apply, as things like firewalls and micro-segmentation are relevant but may be used in different ways. In the end it comes down to good monitoring and observability to make sure our defenses are performing as expected.